<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://radar.offseq.com/</loc>
    <changefreq>hourly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats</loc>
    <changefreq>hourly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/map</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/feeds</loc>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?type=vulnerability</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?severity=critical</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?type=malware</loc>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-may-4th-2026-httpsiscsans-e5649b55</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20May%204th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9916%2C%20(Mon%2C%20May%204th)&amp;severity=medium&amp;id=69f7ff1fcbff5d861096792a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7720-command-injection-in-totolink-wa300-2e8751fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7720%3A%20Command%20Injection%20in%20Totolink%20WA300&amp;severity=medium&amp;id=69f7ff28cbff5d8610969078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7719-buffer-overflow-in-totolink-wa300-e943f95d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7719%3A%20Buffer%20Overflow%20in%20Totolink%20WA300&amp;severity=critical&amp;id=69f7ff28cbff5d861096905e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7718-command-injection-in-totolink-wa300-3a183b2d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7718%3A%20Command%20Injection%20in%20Totolink%20WA300&amp;severity=medium&amp;id=69f7ff28cbff5d8610969055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7717-buffer-overflow-in-totolink-wa300-d0708109</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7717%3A%20Buffer%20Overflow%20in%20Totolink%20WA300&amp;severity=high&amp;id=69f7f4d7cbff5d86108d83f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42370-cwe-787-out-of-bounds-write-in-geov-cb9b994f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42370%3A%20CWE-787%20Out-of-bounds%20write%20in%20GeoVision%20Inc.%20GV-VMS%20V20.0.2&amp;severity=critical&amp;id=69f7f4d3cbff5d86108d834e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7372-cwe-787-out-of-bounds-write-in-geovi-eed18717</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7372%3A%20CWE-787%20Out-of-bounds%20write%20in%20GeoVision%20Inc.%20GV-VMS%20V20.0.2&amp;severity=critical&amp;id=69f7f4d3cbff5d86108d835a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42369-cwe-787-out-of-bounds-write-in-geov-0757b787</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42369%3A%20CWE-787%20Out-of-bounds%20write%20in%20GeoVision%20Inc.%20GV-VMS%20V20.0.2&amp;severity=critical&amp;id=69f7f4d3cbff5d86108d834a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42368-cwe-266-incorrect-privilege-assignm-b84e399c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42368%3A%20CWE-266%20Incorrect%20privilege%20assignment%20in%20GeoVision%20Inc.%20GV-LPC2011%2FLPC2211&amp;severity=critical&amp;id=69f7f4d3cbff5d86108d8346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7716-sql-injection-in-code-projects-gym-m-3265e13c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7716%3A%20SQL%20Injection%20in%20code-projects%20Gym%20Management%20System%20In%20PHP&amp;severity=medium&amp;id=69f7f4d7cbff5d86108d83ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42367-cwe-522-insufficiently-protected-cr-d0b33a9f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42367%3A%20CWE-522%20-%20Insufficiently%20Protected%20Credentials%20in%20GeoVision%20Inc.%20GV-LPC2011%2FLPC2211&amp;severity=medium&amp;id=69f7f4d3cbff5d86108d8342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7371-cwe-79-improper-neutralization-of-in-0067247b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7371%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GeoVision%20Inc.%20GV-LPC2011%2FLPC2211&amp;severity=high&amp;id=69f7f4d3cbff5d86108d8356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42366-cwe-79-improper-neutralization-of-i-c83b52de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42366%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GeoVision%20Inc.%20GV-LPC2011%2FLPC2211&amp;severity=high&amp;id=69f7f4d3cbff5d86108d833e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42365-cwe-341-predictable-from-observable-43117b82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42365%3A%20CWE-341%20Predictable%20from%20observable%20state%20in%20GeoVision%20Inc.%20GV-LPC2011%2FLPC2211&amp;severity=high&amp;id=69f7f4d3cbff5d86108d833a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42364-cwe-78-improper-neutralization-of-s-2ba50633</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42364%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20GeoVision%20Inc.%20GV-LPC2011%2FLPC2211&amp;severity=critical&amp;id=69f7f4d3cbff5d86108d8336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7161-cwe-656-reliance-on-security-through-3b618742</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7161%3A%20CWE-656%20-%20Reliance%20on%20Security%20Through%20Obscurity%20in%20GeoVision%20Inc.%20GV-IP%20Device%20Utility&amp;severity=critical&amp;id=69f7f4d3cbff5d86108d8352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7715-path-traversal-in-ravenwits-mcp-serv-77ab2ef2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7715%3A%20Path%20Traversal%20in%20ravenwits%20mcp-server-arangodb&amp;severity=medium&amp;id=69f7f4d7cbff5d86108d83e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7714-missing-authentication-in-crocodiles-c35d5ea3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7714%3A%20Missing%20Authentication%20in%20crocodilestick%20Calibre-Web-Automated&amp;severity=medium&amp;id=69f7f4d7cbff5d86108d83d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7713-improper-authorization-in-crocodiles-f704c365</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7713%3A%20Improper%20Authorization%20in%20crocodilestick%20Calibre-Web-Automated&amp;severity=medium&amp;id=69f7e6bbcbff5d86107d46c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6948-cwe-770-allocation-of-resources-with-0c52d6a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6948%3A%20CWE-770%20Allocation%20of%20resources%20without%20limits%20or%20throttling%20in%20Rapid7%20Velociraptor&amp;severity=medium&amp;id=69f7e6bbcbff5d86107d46c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7712-deserialization-in-mindsdb-da28edb5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7712%3A%20Deserialization%20in%20MindsDB&amp;severity=medium&amp;id=69f7df7ccbff5d8610772820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7711-unrestricted-upload-in-mindsdb-ccea885d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7711%3A%20Unrestricted%20Upload%20in%20MindsDB&amp;severity=medium&amp;id=69f7df7ccbff5d8610772817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7710-improper-authentication-in-yunaiv-yu-276b7370</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7710%3A%20Improper%20Authentication%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69f7dbf7cbff5d8610758d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7709-improper-authorization-in-janeczku-c-392e11eb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7709%3A%20Improper%20Authorization%20in%20janeczku%20Calibre-Web&amp;severity=medium&amp;id=69f7d893cbff5d861073b5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7708-denial-of-service-in-open5gs-34aec2ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7708%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f7d4efcbff5d86107207bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7707-denial-of-service-in-open5gs-505e9b47</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7707%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f7cde9cbff5d86106f4f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7706-denial-of-service-in-open5gs-3baab19a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7706%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f7ca83cbff5d86106ce7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7705-command-injection-in-jd-cloud-jdcos-e6893df5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7705%3A%20Command%20Injection%20in%20JD%20Cloud%20JDCOS&amp;severity=medium&amp;id=69f7ca83cbff5d86106ce7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-465-released-sun-may-3rd-82ee2003</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.6.5%20Released%2C%20(Sun%2C%20May%203rd)&amp;severity=medium&amp;id=69f77d0bcbff5d8610411659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7704-path-traversal-in-av-stumpfl-pixera--14208727</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7704%3A%20Path%20Traversal%20in%20AV%20Stumpfl%20Pixera%20Two%20Media%20Server&amp;severity=medium&amp;id=69f7fc3acbff5d861094f630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-military-reaches-deals-with-7-tech-companies-to-1823914c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Military%20Reaches%20Deals%20With%207%20Tech%20Companies%20to%20Use%20Their%20AI%20on%20Classified%20Systems&amp;severity=medium&amp;id=69f7764acbff5d86103da028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7703-code-injection-in-av-stumpfl-pixera--c298ebf1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7703%3A%20Code%20Injection%20in%20AV%20Stumpfl%20Pixera%20Two%20Media%20Server&amp;severity=medium&amp;id=69f77987cbff5d86103feb78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7702-authorization-bypass-in-toeverything-39388ee2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7702%3A%20Authorization%20Bypass%20in%20toeverything%20AFFiNE&amp;severity=medium&amp;id=69f7727fcbff5d86103b98e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7701-null-pointer-dereference-in-telegram-15617371</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7701%3A%20NULL%20Pointer%20Dereference%20in%20Telegram%20Desktop&amp;severity=medium&amp;id=69f76efbcbff5d861037fa28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7700-code-injection-in-langflow-ai-langfl-8eb2b700</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7700%3A%20Code%20Injection%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69f75a03cbff5d861013ca42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7699-sql-injection-in-dromara-maxkey-37ec9aba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7699%3A%20SQL%20Injection%20in%20Dromara%20MaxKey&amp;severity=medium&amp;id=69f75a03cbff5d861013ca3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7698-os-command-injection-in-tiandy-easy7-177551a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7698%3A%20OS%20Command%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69f7565fcbff5d86100ebd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7697-sql-injection-in-amtt-hotel-broadban-dcce604e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7697%3A%20SQL%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=69f74f57cbff5d861004d81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7696-unrestricted-upload-in-acrel-electri-4880238c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7696%3A%20Unrestricted%20Upload%20in%20Acrel%20Electrical%20EEMS%20Enterprise%20Power%20Operation%20and%20Maintenance%20Cloud%20Platform&amp;severity=medium&amp;id=69f74147cbff5d8610fad20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7695-sql-injection-in-acrel-electrical-ee-5a342092</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7695%3A%20SQL%20Injection%20in%20Acrel%20Electrical%20EEMS%20Enterprise%20Power%20Operation%20and%20Maintenance%20Cloud%20Platform&amp;severity=medium&amp;id=69f74147cbff5d8610fad207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7694-sql-injection-in-acrel-electrical-ec-7023ad70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7694%3A%20SQL%20Injection%20in%20Acrel%20Electrical%20ECEMS%20Enterprise%20Microgrid%20Energy%20Efficiency%20Management%20System&amp;severity=medium&amp;id=69f736bbcbff5d8610f52a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7692-command-injection-in-wavlink-wl-wn57-3bbfefd5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7692%3A%20Command%20Injection%20in%20Wavlink%20WL-WN570HA1&amp;severity=medium&amp;id=69f72fd4cbff5d8610f05c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7691-command-injection-in-wavlink-wl-wn57-6072cc80</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7691%3A%20Command%20Injection%20in%20Wavlink%20WL-WN570HA1&amp;severity=medium&amp;id=69f72528cbff5d8610ea622d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7690-command-injection-in-wavlink-wl-wn57-11676fd8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7690%3A%20Command%20Injection%20in%20Wavlink%20WL-WN570HA1&amp;severity=medium&amp;id=69f7fc3acbff5d861094f637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7689-improper-verification-of-cryptograph-d2acf9df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7689%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Dolibarr%20ERP%20CRM&amp;severity=medium&amp;id=69f71a9bcbff5d8610e3b414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7688-sql-injection-in-dolibarr-erp-crm-929b3058</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7688%3A%20SQL%20Injection%20in%20Dolibarr%20ERP%20CRM&amp;severity=low&amp;id=69f71a9bcbff5d8610e3b40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7687-command-injection-in-langflow-ai-lan-30412ff8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7687%3A%20Command%20Injection%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69f7fc3acbff5d861094f63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7686-improper-access-controls-in-eyeo-adb-60d52203</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7686%3A%20Improper%20Access%20Controls%20in%20eyeo%20Adblock%20Plus&amp;severity=medium&amp;id=69f701fecbff5d8610ceebcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7685-buffer-overflow-in-edimax-br-6208ac-c0df4819</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7685%3A%20Buffer%20Overflow%20in%20Edimax%20BR-6208AC&amp;severity=high&amp;id=69f6f793cbff5d8610c7510f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7684-buffer-overflow-in-edimax-br-6428nc-0d59eb52</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7684%3A%20Buffer%20Overflow%20in%20Edimax%20BR-6428nC&amp;severity=high&amp;id=69f6f793cbff5d8610c75109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7683-command-injection-in-edimax-br-6428n-fc796393</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7683%3A%20Command%20Injection%20in%20Edimax%20BR-6428nC&amp;severity=medium&amp;id=69f6f793cbff5d8610c75101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7682-command-injection-in-edimax-br-6208a-53eae848</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7682%3A%20Command%20Injection%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=69f6eceacbff5d8610c1b6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5337-cwe-639-authorization-bypass-through-c4e1354a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5337%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Frontend%20File%20Manager%20Plugin&amp;severity=null&amp;id=69f6eceacbff5d8610c1b6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7681-authorization-bypass-in-jsbroks-coco-b6450487</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7681%3A%20Authorization%20Bypass%20in%20jsbroks%20COCO%20Annotator&amp;severity=medium&amp;id=69f6ded7cbff5d8610b72e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7680-path-traversal-in-jsbroks-coco-annot-24f162c4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7680%3A%20Path%20Traversal%20in%20jsbroks%20COCO%20Annotator&amp;severity=medium&amp;id=69f6ded7cbff5d8610b72e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5063-cwe-79-improper-neutralization-of-in-f0ffe501</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5063%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=high&amp;id=69f6ded7cbff5d8610b72e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7679-improper-authentication-in-yunaiv-yu-ee6c27e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7679%3A%20Improper%20Authentication%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69f6cd8dcbff5d8610ac6b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7678-sql-injection-in-yunaiv-yudao-cloud-fe5735d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7678%3A%20SQL%20Injection%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69f6cd8dcbff5d8610ac6b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7677-cross-site-scripting-in-kerwincui-fa-13a22915</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7677%3A%20Cross%20Site%20Scripting%20in%20kerwincui%20FastBee&amp;severity=medium&amp;id=69f6cd8dcbff5d8610ac6b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7676-path-traversal-in-kerwincui-fastbee-126175db</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7676%3A%20Path%20Traversal%20in%20kerwincui%20FastBee&amp;severity=medium&amp;id=69f6cd8dcbff5d8610ac6b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7675-buffer-overflow-in-shenzhen-libituo--9cc00f70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7675%3A%20Buffer%20Overflow%20in%20Shenzhen%20Libituo%20Technology%20LBT-T300-HW1&amp;severity=high&amp;id=69f6bbaecbff5d86109dae6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7674-buffer-overflow-in-shenzhen-libituo--817395ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7674%3A%20Buffer%20Overflow%20in%20Shenzhen%20Libituo%20Technology%20LBT-T300-HW1&amp;severity=high&amp;id=69f6ada0cbff5d86109381c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7673-unrestricted-upload-in-crmebjava-91b53419</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7673%3A%20Unrestricted%20Upload%20in%20crmeb_java&amp;severity=medium&amp;id=69f6ada0cbff5d86109381ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40561-cwe-444-inconsistent-interpretation-b07871be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40561%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20KAZUHO%20Starlet&amp;severity=null&amp;id=69f6a35ccbff5d861079c762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7672-sql-injection-in-youlaitech-youlai-b-6befeedb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7672%3A%20SQL%20Injection%20in%20youlaitech%20youlai-boot&amp;severity=medium&amp;id=69f6917ecbff5d861040c604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-05-03-f6ca8e8a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-05-03&amp;severity=medium&amp;id=69f7e2f6cbff5d861078c260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-05-03-c3963915</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-05-03&amp;severity=low&amp;id=69f6c2afcbff5d8610a31732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7671-improper-restriction-of-excessive-au-94645b98</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7671%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20CodeWise%20Tornet%20Scooter%20Mobile%20App&amp;severity=medium&amp;id=69f68dfbcbff5d86103d8c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7670-sql-injection-in-jinher-oa-c785ee86</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7670%3A%20SQL%20Injection%20in%20Jinher%20OA&amp;severity=medium&amp;id=69f6aaaccbff5d8610924b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7669-deserialization-in-sgl-project-sglan-2898ad25</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7669%3A%20Deserialization%20in%20sgl-project%20SGLang&amp;severity=medium&amp;id=69f6755ecbff5d8610320ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7668-out-of-bounds-read-in-mikrotik-route-3e460a4d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7668%3A%20Out-of-Bounds%20Read%20in%20MikroTik%20RouterOS&amp;severity=medium&amp;id=69f65ce4cbff5d861022aff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7653-os-command-injection-in-r-huijts-mcp-88e5fb4e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7653%3A%20OS%20Command%20Injection%20in%20r-huijts%20mcp-server-rijksmuseum&amp;severity=medium&amp;id=69f61d7bcbff5d8610f684c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7645-path-traversal-in-ruvnet-sublinear-t-a7822373</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7645%3A%20Path%20Traversal%20in%20ruvnet%20sublinear-time-solver&amp;severity=medium&amp;id=69f619f7cbff5d8610f40e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7644-improper-authorization-in-chatgptnex-85b2e135</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7644%3A%20Improper%20Authorization%20in%20ChatGPTNextWeb%20NextChat&amp;severity=medium&amp;id=69f612efcbff5d8610ef5877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7643-permissive-cross-domain-policy-with--94568db8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7643%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20ChatGPTNextWeb%20NextChat&amp;severity=medium&amp;id=69f612efcbff5d8610ef5870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7642-os-command-injection-in-pskill9-webs-59775fcd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7642%3A%20OS%20Command%20Injection%20in%20pskill9%20website-downloader&amp;severity=medium&amp;id=69f60f6bcbff5d8610edce3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7633-file-inclusion-in-totolink-n300rh-b8cc889c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7633%3A%20File%20Inclusion%20in%20Totolink%20N300RH&amp;severity=medium&amp;id=69f6aaaccbff5d8610924b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7632-sql-injection-in-code-projects-onlin-a6b442be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7632%3A%20SQL%20Injection%20in%20code-projects%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=69f604dfcbff5d8610e71489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7631-improper-authorization-in-code-proje-36d93c4e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7631%3A%20Improper%20Authorization%20in%20code-projects%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=69f604dfcbff5d8610e71482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0703-cwe-79-improper-neutralization-of-in-05571ca6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xlplugins%20NextMove%20Lite%20%E2%80%93%20Thank%20You%20Page%20for%20WooCommerce&amp;severity=medium&amp;id=69f5fdd6cbff5d8610e1a53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2554-cwe-639-authorization-bypass-through-d8e3f679</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2554%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wclovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce&amp;severity=high&amp;id=69f5fdd6cbff5d8610e1a544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3504-cwe-200-exposure-of-sensitive-inform-83a6a00a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3504%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dokaninc%20Dokan%3A%20AI%20Powered%20WooCommerce%20Multivendor%20Marketplace%20Solution%20%E2%80%93%20Build%20Your%20Own%20Amazon%2C%20eBay%2C%20Etsy&amp;severity=medium&amp;id=69f5fdd6cbff5d8610e1a549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7630-improper-authentication-in-innocomme-f011cad0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7630%3A%20Improper%20Authentication%20in%20innocommerce%20InnoShop&amp;severity=medium&amp;id=69f5fdd6cbff5d8610e1a559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7629-command-injection-in-kleneway-awesom-ccf94dc5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7629%3A%20Command%20Injection%20in%20kleneway%20awesome-cursor-mpc-server&amp;severity=medium&amp;id=69f5fdd6cbff5d8610e1a550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7628-command-injection-in-crazyrabbitltc--484ee93b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7628%3A%20Command%20Injection%20in%20crazyrabbitLTC%20mcp-code-review-server&amp;severity=medium&amp;id=69f5ec63cbff5d8610da0552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6525-cwe-476-null-pointer-dereference-in--d7f3bb48</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6525%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f5e8becbff5d8610d7fccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6817-cwe-79-improper-neutralization-of-in-ab5db7b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6817%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Quiz%20Maker%20by%20AYS&amp;severity=medium&amp;id=69f5e1b7cbff5d8610d49438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6320-cwe-22-improper-limitation-of-a-path-85369388</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6320%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wordpresschef%20Salon%20Booking%20System%20%E2%80%93%20Free%20Version&amp;severity=high&amp;id=69f5e1b7cbff5d8610d49434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4061-cwe-89-improper-neutralization-of-sp-374a2408</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4061%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=high&amp;id=69f5e1b7cbff5d8610d4941e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4790-cwe-79-improper-neutralization-of-in-30c8a45e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4790%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor%20%E2%80%93%20Powerful%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=69f5e1b7cbff5d8610d49430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4062-cwe-89-improper-neutralization-of-sp-0d5ea7b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4062%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=high&amp;id=69f5e1b7cbff5d8610d49425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4100-cwe-862-missing-authorization-in-str-dca3ff48</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4100%3A%20CWE-862%20Missing%20Authorization%20in%20strangerstudios%20Paid%20Memberships%20Pro%20%E2%80%93%20Content%20Restriction%2C%20User%20Registration%2C%20%26%20Paid%20Subscriptions&amp;severity=high&amp;id=69f5e1b7cbff5d8610d4942c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4060-cwe-89-improper-neutralization-of-sp-6aa5e903</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4060%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=high&amp;id=69f5e1b7cbff5d8610d49417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7627-path-traversal-in-8nite-metatrader-4-5c99a693</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7627%3A%20Path%20Traversal%20in%208nite%20metatrader-4-mcp&amp;severity=medium&amp;id=69f5de69cbff5d8610d25839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-bluekit-phishing-kit-features-ai-assistant-94f8ade8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Bluekit%20Phishing%20Kit%20Features%20AI%20Assistant&amp;severity=medium&amp;id=69f5d72acbff5d8610ce885c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7612-sql-injection-in-itsourcecode-courie-c362662c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7612%3A%20SQL%20Injection%20in%20itsourcecode%20Courier%20Management%20System&amp;severity=medium&amp;id=69f5d062cbff5d8610cadcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7611-insufficient-verification-of-data-au-dbc665fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7611%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20TRENDnet%20TEW-821DAP&amp;severity=medium&amp;id=69f5c91ccbff5d8610c82157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5077-cwe-79-improper-neutralization-of-in-41856eb9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Total&amp;severity=medium&amp;id=69f5c91ccbff5d8610c82153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7610-cleartext-transmission-of-sensitive--43445030</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7610%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20TRENDnet%20TEW-821DAP&amp;severity=medium&amp;id=69f5c597cbff5d8610c60a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7491-cwe-639-authorization-bypass-through-2581445b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7491%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Zyosoft%20School%20App&amp;severity=high&amp;id=69f5c597cbff5d8610c60a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7490-cwe-434-unrestricted-upload-of-file--8a138abf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7490%3A%20CWE-434%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20Sunnet%20CTMS&amp;severity=high&amp;id=69f5c597cbff5d8610c60a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7489-cwe-89-improper-neutralization-of-sp-cfeb3c40</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7489%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Sunnet%20CTMS&amp;severity=high&amp;id=69f5c597cbff5d8610c60a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7609-os-command-injection-in-trendnet-tew-ff948fde</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7609%3A%20OS%20Command%20Injection%20in%20TRENDnet%20TEW-821DAP&amp;severity=medium&amp;id=69f5c597cbff5d8610c60a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7608-os-command-injection-in-trendnet-tew-3e6a76ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7608%3A%20OS%20Command%20Injection%20in%20TRENDnet%20TEW-821DAP&amp;severity=medium&amp;id=69f5be8fcbff5d8610c006e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5324-cwe-79-improper-neutralization-of-in-973821a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=high&amp;id=69f5b787cbff5d8610baddf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4024-cwe-862-missing-authorization-in-wpr-6a21f9d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4024%3A%20CWE-862%20Missing%20Authorization%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69f5b787cbff5d8610baddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6229-cwe-918-server-side-request-forgery--89dcb0b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6229%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=high&amp;id=69f5b07ecbff5d8610b46280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6457-cwe-89-improper-neutralization-of-sp-160a988e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6457%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=medium&amp;id=69f5b07ecbff5d8610b46296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6449-cwe-285-improper-authorization-in-am-eeeb73fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6449%3A%20CWE-285%20Improper%20Authorization%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=69f5b07ecbff5d8610b4628c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2052-cwe-94-improper-control-of-generatio-f3e40995</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2052%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20marketingfire%20Widget%20Options%20%E2%80%93%20Advanced%20Conditional%20Visibility%20for%20Gutenberg%20Blocks%20%26%20Classic%20Widgets&amp;severity=high&amp;id=69f5b07ecbff5d8610b4626d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4650-cwe-862-missing-authorization-in-thi-ae3d51ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4650%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20FundPress%20%E2%80%93%20WordPress%20Donation%20Plugin&amp;severity=medium&amp;id=69f5b07ecbff5d8610b46275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7607-buffer-overflow-in-trendnet-tew-821d-8fd7a2ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7607%3A%20Buffer%20Overflow%20in%20TRENDnet%20TEW-821DAP&amp;severity=high&amp;id=69f5a639cbff5d8610ad4fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7606-insufficient-verification-of-data-au-2c7f577b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7606%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20TRENDnet%20TEW-821DAP&amp;severity=medium&amp;id=69f5a639cbff5d8610ad4fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7649-cwe-89-improper-neutralization-of-sp-4267a89f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7649%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20ARMember%20%E2%80%93%20Membership%20Plugin%2C%20Content%20Restriction%2C%20Member%20Levels%2C%20User%20Profile%20%26%20User%20signup&amp;severity=high&amp;id=69f5a639cbff5d8610ad4fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7605-server-side-request-forgery-in-jeecg-4139cf8b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7605%3A%20Server-Side%20Request%20Forgery%20in%20JeecgBoot&amp;severity=medium&amp;id=69f59eeccbff5d8610a6dc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7647-cwe-502-deserialization-of-untrusted-5adc643a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7647%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Cozmoslabs%20Profile%20Builder%20Pro&amp;severity=high&amp;id=69f59475cbff5d86109e0a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6447-cwe-79-improper-neutralization-of-in-c95b4805</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6447%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Call%20for%20Price%20for%20WooCommerce&amp;severity=medium&amp;id=69f59475cbff5d86109e0a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6916-cwe-79-improper-neutralization-of-in-90c10e26</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6916%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Kit%20for%20Elementor%20%E2%80%93%20Powerful%20Addons%20for%20Elementor%2C%20Widgets%20%26%20Templates%20for%20WordPress&amp;severity=medium&amp;id=69f59475cbff5d86109e0a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7049-cwe-918-server-side-request-forgery--881969df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7049%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pixelyoursite%20PixelYourSite%20Pro%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=high&amp;id=69f59475cbff5d86109e0a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6812-cwe-918-server-side-request-forgery--a30f7b17</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6812%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20deothemes%20Ona&amp;severity=medium&amp;id=69f59475cbff5d86109e0a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7604-server-side-request-forgery-in-jeecg-cc829fe3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7604%3A%20Server-Side%20Request%20Forgery%20in%20JeecgBoot&amp;severity=medium&amp;id=69f589f3cbff5d861095a07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4882-cwe-434-unrestricted-upload-of-file--0d013f12</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4882%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WPEverest%20User%20Registration%20Advanced%20Fields&amp;severity=critical&amp;id=69f589f3cbff5d861095a05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6446-cwe-522-insufficiently-protected-cre-2d1a5149</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6446%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20bplugins%20My%20Social%20Feeds%20%E2%80%93%20Social%20Feeds%20Embedder%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69f589f3cbff5d861095a060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6963-cwe-862-missing-authorization-in-sha-3101c5b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6963%3A%20CWE-862%20Missing%20Authorization%20in%20shahariaazam%20WP%20Mail%20Gateway&amp;severity=high&amp;id=69f589f3cbff5d861095a068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14726-cwe-200-exposure-of-sensitive-infor-ba1b62d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14726%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20trustindex%20Widgets%20for%20Social%20Photo%20Feed&amp;severity=medium&amp;id=69f589f3cbff5d861095a04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4658-cwe-79-improper-neutralization-of-in-6f98ece0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4658%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=69f589f3cbff5d861095a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7641-cwe-269-improper-privilege-managemen-9c7b2fe2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7641%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=high&amp;id=69f589f3cbff5d861095a087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7458-cwe-288-authentication-bypass-using--78b8e551</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7458%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20pickplugins%20User%20Verification%20by%20PickPlugins&amp;severity=critical&amp;id=69f589f3cbff5d861095a070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7603-server-side-request-forgery-in-jeecg-80a2f61d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7603%3A%20Server-Side%20Request%20Forgery%20in%20JeecgBoot&amp;severity=medium&amp;id=69f589f3cbff5d861095a077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7209-cwe-79-improper-neutralization-of-in-3ce3e468</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7209%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=medium&amp;id=69f57840cbff5d861067b4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7638-cwe-639-authorization-bypass-through-e267a803</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7638%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20appcheap%20App%20Builder%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Flight&amp;severity=medium&amp;id=69f57840cbff5d861067b4e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6378-cwe-79-improper-neutralization-of-in-95ad72e3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ckp267%20MaxiBlocks%20Builder%20%7C%2017%2C000%2B%20Design%20Assets%2C%20Patterns%2C%20Icons%20%26%20Starter%20Sites&amp;severity=medium&amp;id=69f57840cbff5d861067b4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7602-improper-authorization-in-jeecgboot-f197ea4b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7602%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=69f57840cbff5d861067b4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7601-denial-of-service-in-open5gs-b2ce7783</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7601%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f56a39cbff5d86102c6868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-43824-cwe-212-improper-removal-of-sensiti-5eb1043e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-43824%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20argoproj%20Argo%20CD&amp;severity=high&amp;id=69f55c1ecbff5d8610f6d5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7600-os-command-injection-in-artmin96-yii-1bcb3b5c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7600%3A%20OS%20Command%20Injection%20in%20ArtMin96%20yii2-mcp-server&amp;severity=medium&amp;id=69f543a2cbff5d8610975999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-05-03-8a65ebff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-05-03&amp;severity=medium&amp;id=69f752d3cbff5d8610066d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-05-02-85f6d6b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-05-02&amp;severity=medium&amp;id=69f69176cbff5d861040b7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-05-02-4c09b511</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-05-02&amp;severity=low&amp;id=69f5a5eacbff5d8610ace05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7599-path-traversal-in-dayoooun-hwpx-mcp-382cde3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7599%3A%20Path%20Traversal%20in%20Dayoooun%20hwpx-mcp&amp;severity=medium&amp;id=69f523decbff5d861069ef75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7598-integer-overflow-in-libssh2-5aa86104</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7598%3A%20Integer%20Overflow%20in%20libssh2&amp;severity=medium&amp;id=69f51cd7cbff5d861061b000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7597-deserialization-in-mem0ai-mem0-601a8858</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7597%3A%20Deserialization%20in%20mem0ai%20mem0&amp;severity=medium&amp;id=69f51cd7cbff5d861061aff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7596-cross-site-scripting-in-nextlevelbui-8679ab14</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7596%3A%20Cross%20Site%20Scripting%20in%20nextlevelbuilder%20ui-ux-pro-max-skill&amp;severity=medium&amp;id=69f51973cbff5d86105f6c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7595-code-injection-in-nextlevelbuilder-u-a4cf4fdc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7595%3A%20Code%20Injection%20in%20nextlevelbuilder%20ui-ux-pro-max-skill&amp;severity=medium&amp;id=69f5124bcbff5d86105840fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39805-cwe-444-inconsistent-interpretation-311f7365</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39805%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20mtrudel%20bandit&amp;severity=medium&amp;id=69f5124bcbff5d86105840de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39804-cwe-770-allocation-of-resources-wit-b21fc525</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39804%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20mtrudel%20bandit&amp;severity=high&amp;id=69f5124bcbff5d86105840d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39807-cwe-807-reliance-on-untrusted-input-cd5377cd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39807%3A%20CWE-807%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20mtrudel%20bandit&amp;severity=medium&amp;id=69f5124bcbff5d86105840e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42786-cwe-770-allocation-of-resources-wit-56eb6fa8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42786%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20mtrudel%20bandit&amp;severity=high&amp;id=69f5124bcbff5d86105840ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42788-cwe-770-allocation-of-resources-wit-033457dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42788%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20mtrudel%20bandit&amp;severity=medium&amp;id=69f5124bcbff5d86105840f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7594-path-traversal-in-flux159-mcp-game-a-25851f15</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7594%3A%20Path%20Traversal%20in%20Flux159%20mcp-game-asset-gen&amp;severity=medium&amp;id=69f5124bcbff5d86105840f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7593-os-command-injection-in-sunwood-ai-l-deeb59c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7593%3A%20OS%20Command%20Injection%20in%20Sunwood-ai-labs%20command-executor-mcp-server&amp;severity=medium&amp;id=69f50ec7cbff5d861053e786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7592-sql-injection-in-itsourcecode-courie-5d5ddf3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7592%3A%20SQL%20Injection%20in%20itsourcecode%20Courier%20Management%20System&amp;severity=medium&amp;id=69f507c0cbff5d86104ab796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-ad-for-homebrew-leads-to-macsync-stealer-17af3297</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Ad%20for%20Homebrew%20Leads%20to%20MacSync%20Stealer%2C%20(Fri%2C%20May%201st)&amp;severity=medium&amp;id=69f4f9b4cbff5d86103ca594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7591-sql-injection-in-timbroddin-astro-mc-bae5e605</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7591%3A%20SQL%20Injection%20in%20TimBroddin%20astro-mcp-server&amp;severity=medium&amp;id=69f4f9becbff5d86103ca76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7590-os-command-injection-in-eyal-gor-p69-9fa3c6f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7590%3A%20OS%20Command%20Injection%20in%20eyal-gor%20p_69_branch_monkey_mcp&amp;severity=medium&amp;id=69f4f9becbff5d86103ca768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7589-path-traversal-in-ghantakiran-splunk-40a0762e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7589%3A%20Path%20Traversal%20in%20ghantakiran%20splunk-mcp-integration&amp;severity=medium&amp;id=69f4f62dcbff5d861037bc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35233-an-unprivileged-attacker-can-craft--21c9a02e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35233%3A%20An%20unprivileged%20attacker%20can%20craft%20a%20user-space%20process%20with%20a%20malicious%20ELF%20binary%20containing%20an%20out-of-range%20sh_link%20field.%20When%20root-level%20dtrace%20attaches%20to%20--%20or%20instruments%20--%20that%20process%20(via%20dtrace%20-p%20%2C%20pid%20probes%2C%20or%20USDT)%2C%20the%20ELF%20parser%20reads%20heap%20memory%20beyond%20the%20allocated%20section%20cache%20array%20without%20any%20bounds%20check.%20This%20results%20in%20an%20uninitialized%2Fout-of-bounds%20heap%20read%20that%20can%20cause%20a%20NULL%20pointer%20dereference%20crash%20of%20the%20dtrace%20process%20(DoS)%2C%20or%20--%20depending%20on%20heap%20layout%20--%20a%20read-then-use%20of%20a%20garbage%20pointer%20controlled%20by%20adjacent%20allocations%2C%20providing%20a%20foothold%20toward%20further%20exploitation%20in%20a%20privileged%20context.%20in%20Oracle%20Corporation%20Oracle%20Linux&amp;severity=medium&amp;id=69f4ef6ecbff5d8610306921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21996-an-unprivileged-attacker-can-reliab-153917bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21996%3A%20An%20unprivileged%20attacker%20can%20reliably%20trigger%20a%20crash%20of%20the%20dtrace%20process%20with%20a%20malicious%20ELF%20binary%20due%20to%20an%20integer%20Divide-by-Zero%20in%20Pbuild_file_symtab()%20in%20Oracle%20Corporation%20Oracle%20Linux&amp;severity=low&amp;id=69f4ef6ecbff5d861030691a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7588-path-traversal-in-ggerve-coding-stan-e712f585</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7588%3A%20Path%20Traversal%20in%20ggerve%20coding-standards-mcp&amp;severity=medium&amp;id=69f4ef6ecbff5d8610306924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7587-denial-of-service-in-open5gs-91303e6d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7587%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f4dd93cbff5d861017cf87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23866-improper-verification-of-source-of--b210baca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23866%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20(CWE-940)%20in%20Facebook%20WhatsApp%20for%20Android&amp;severity=medium&amp;id=69f4d323cbff5d861010f924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23863-improper-neutralization-of-null-byt-bd9ffa4d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23863%3A%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20(CWE-158)%20in%20Facebook%20WhatsApp%20Desktop%20for%20Windows&amp;severity=medium&amp;id=69f4d323cbff5d861010f920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7586-denial-of-service-in-open5gs-393b449f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7586%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f4d323cbff5d861010f92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22166-cwe-416-use-after-free-in-imaginati-8c251060</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22166%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69f4d323cbff5d861010f91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22165-cwe-416-use-after-free-in-imaginati-2f3899a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22165%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69f4d323cbff5d861010f917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22167-cwe-cwe-119-improper-restriction-of-9bef233b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22167%3A%20CWE%20-%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69f4d323cbff5d861010f91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7585-denial-of-service-in-open5gs-9d78bb06</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7585%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f4c881cbff5d8610019a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-scattered-spider-hacker-arrested-soc-05bb60d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Scattered%20Spider%20Hacker%20Arrested%2C%20SOC%20Effectiveness%20Metrics%2C%20NSA%20Tool%20Vulnerability&amp;severity=medium&amp;id=69f4c16ecbff5d8610f92858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7583-denial-of-service-in-open5gs-925c5bb3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7583%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f4c17bcbff5d8610f92aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-adjusts-bug-bounties-chrome-payouts-drop-as-17c5afb2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Adjusts%20Bug%20Bounties%3A%20Chrome%20Payouts%20Drop%20as%20Android%20Rewards%20Rise%20Amid%20AI%20Surge&amp;severity=medium&amp;id=69f4ba66cbff5d8610f04dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7582-out-of-bounds-write-in-academysoftwa-d2482829</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7582%3A%20Out-of-bounds%20Write%20in%20AcademySoftwareFoundation%20OpenImageIO&amp;severity=medium&amp;id=69f4b73ecbff5d8610ec598b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3143-cwe-862-missing-authorization-in-bol-128bbcd5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3143%3A%20CWE-862%20Missing%20Authorization%20in%20boldgrid%20Total%20Upkeep%20%E2%80%93%20WordPress%20Backup%20Plugin%20plus%20Restore%20%26%20Migrate%20by%20BoldGrid&amp;severity=medium&amp;id=69f4afdccbff5d8610e19ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7581-permissive-cross-domain-policy-with--4e949221</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7581%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20alexta69%20MeTube&amp;severity=medium&amp;id=69f4a54ecbff5d8610d4f562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7580-code-injection-in-exiftool-633bc8ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7580%3A%20Code%20Injection%20in%20Exiftool&amp;severity=medium&amp;id=69f500b7cbff5d86104519f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-us-security-experts-sentenced-to-prison-for-he-8cf9057a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20US%20Security%20Experts%20Sentenced%20to%20Prison%20for%20Helping%20Ransomware%20Gang&amp;severity=medium&amp;id=69f493bacbff5d8610c4806b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7579-hard-coded-credentials-in-astrbotdev-d67982ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7579%3A%20Hard-coded%20Credentials%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69f493c1cbff5d8610c483ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3140-cwe-352-cross-site-request-forgery-c-05a71552</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3140%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20davidvongries%20Ultimate%20Dashboard%20%E2%80%93%20Custom%20WordPress%20Dashboard&amp;severity=medium&amp;id=69f493c1cbff5d8610c483a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3772-cwe-352-cross-site-request-forgery-c-7c76c8b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3772%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20benjaminprojas%20WP%20Editor&amp;severity=high&amp;id=69f493c1cbff5d8610c483a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-deepdoor-backdoor-enables-espionage--1d32315d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20Deep%23Door%20Backdoor%20Enables%20Espionage%2C%20Disruption&amp;severity=medium&amp;id=69f48cf4cbff5d8610bc69eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7578-unrestricted-upload-in-maccms-pro-9f29cbb7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7578%3A%20Unrestricted%20Upload%20in%20MacCMS%20Pro&amp;severity=medium&amp;id=69f485abcbff5d8610b3fa63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-releases-open-source-tool-for-ai-model-prove-46300c67</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Releases%20Open%20Source%20Tool%20for%20AI%20Model%20Provenance&amp;severity=medium&amp;id=69f47eb6cbff5d8610ae1036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42778-cwe-502-deserialization-of-untruste-db0b103e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42778%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20MINA&amp;severity=critical&amp;id=69f47ec1cbff5d8610ae12c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42779-cwe-502-deserialization-of-untruste-d7661188</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42779%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20MINA&amp;severity=critical&amp;id=69f47ec1cbff5d8610ae12c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42404-cwe-918-server-side-request-forgery-f462c99d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42404%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Neethi&amp;severity=medium&amp;id=69f47ec1cbff5d8610ae12bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7567-cwe-288-authentication-bypass-using--caa3dd82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7567%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20elemntor%20Temporary%20Login&amp;severity=critical&amp;id=69f4779bcbff5d8610a57434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42402-cwe-400-uncontrolled-resource-consu-a80f47df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42402%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Neethi&amp;severity=high&amp;id=69f470b4cbff5d86109fcd0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hugging-face-clawhub-abused-for-malware-distributi-d4fbf0df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hugging%20Face%2C%20ClawHub%20Abused%20for%20Malware%20Distribution&amp;severity=medium&amp;id=69f4698acbff5d861096edcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42403-cwe-400-uncontrolled-resource-consu-c3d0cab0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42403%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Neethi&amp;severity=high&amp;id=69f470b4cbff5d86109fcd0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40201-cwe-79-improper-neutralization-of-i-fdafaf42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40201%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20diplodoc-platform%20%40diplodoc%2Fsearch-extension&amp;severity=medium&amp;id=69f470b4cbff5d86109fcd07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-surge-in-hacker-enabled-cargo-theft-bbac4a3c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Surge%20in%20Hacker-Enabled%20Cargo%20Theft&amp;severity=medium&amp;id=69f462a2cbff5d861090220d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1800-hit-in-mini-shai-hulud-attack-on-sap-lightnin-e41e5067</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1%2C800%20Hit%20in%20Mini%20Shai-Hulud%20Attack%20on%20SAP%2C%20Lightning%2C%20Intercom&amp;severity=medium&amp;id=69f457f6cbff5d861086a5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7584-cwe-502-deserialization-of-untrusted-3a9a6f64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7584%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Zurich%20Instruments%20LabOne%20Q&amp;severity=high&amp;id=69f45b7bcbff5d861089342d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7555-sql-injection-in-itsourcecode-electr-dcc013bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7555%3A%20SQL%20Injection%20in%20itsourcecode%20Electronic%20Judging%20System&amp;severity=medium&amp;id=69f43f5bcbff5d86106a078f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13362-cwe-79-improper-neutralization-of-i-44d997b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sebet%20Go%20Fetch%20Jobs%20(for%20WP%20Job%20Manager)&amp;severity=medium&amp;id=69f43f5bcbff5d86106a0764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6127-cwe-79-improper-neutralization-of-in-4781251b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=69f43f5bcbff5d86106a077e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7554-weak-password-recovery-in-d-link-m60-0475af31</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7554%3A%20Weak%20Password%20Recovery%20in%20D-Link%20M60&amp;severity=medium&amp;id=69f43f5bcbff5d86106a0788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42994-cwe-78-improper-neutralization-of-s-70529260</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42994%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Bitwarden%20Bitwarden%20CLI&amp;severity=high&amp;id=69f42dc9cbff5d861040e106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7553-sql-injection-in-code-projects-gym-m-132e5d51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7553%3A%20SQL%20Injection%20in%20code-projects%20Gym%20Management%20System&amp;severity=medium&amp;id=69f42dc9cbff5d861040e117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7550-sql-injection-in-sourcecodester-phar-5a38a7ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7550%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f42dc9cbff5d861040e110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7549-sql-injection-in-sourcecodester-phar-0f2d28c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7549%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f42dc9cbff5d861040e109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7548-command-injection-in-totolink-nr1800-9109fa5c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7548%3A%20Command%20Injection%20in%20Totolink%20NR1800X&amp;severity=high&amp;id=69f41c7ccbff5d86102583bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7546-stack-based-buffer-overflow-in-totol-717d05bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7546%3A%20Stack-based%20Buffer%20Overflow%20in%20Totolink%20NR1800X&amp;severity=critical&amp;id=69f41c7ccbff5d86102583b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-friday-may-1st-2026-httpsiscsans-ee568f51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Friday%2C%20May%201st%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9914%2C%20(Fri%2C%20May%201st)&amp;severity=medium&amp;id=69f40a9fcbff5d86100cf3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7545-sql-injection-in-sourcecodester-adva-4f17313b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7545%3A%20SQL%20Injection%20in%20SourceCodester%20Advanced%20School%20Management%20System&amp;severity=medium&amp;id=69f40aa7cbff5d86100cf5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7538-os-command-injection-in-totolink-a80-28438d15</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7538%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f40aa7cbff5d86100cf5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7536-denial-of-service-in-open5gs-d10c56d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7536%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f40aa7cbff5d86100cf5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7535-denial-of-service-in-open5gs-dc1af87b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7535%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f40044cbff5d8610f61ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7519-path-traversal-in-fujian-apex-livebo-e1bae231</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7519%3A%20Path%20Traversal%20in%20Fujian%20Apex%20LiveBOS&amp;severity=medium&amp;id=69f40044cbff5d8610f61ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7518-denial-of-service-in-open5gs-5307949c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7518%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69f40044cbff5d8610f61ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-05-02-2bdd0599</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-05-02&amp;severity=medium&amp;id=69f5aa36cbff5d8610b04e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-05-01-eef90b3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-05-01&amp;severity=medium&amp;id=69f53ff6cbff5d8610859aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30363-na-fa7c548d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30363%3A%20n%2Fa&amp;severity=high&amp;id=69f4f9becbff5d86103ca764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52347-na-a5f99856</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52347%3A%20n%2Fa&amp;severity=high&amp;id=69f4f62dcbff5d861037bc86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26461-na-caa0e5b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26461%3A%20n%2Fa&amp;severity=medium&amp;id=69f4ef6ecbff5d861030691d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69606-na-f743a984</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69606%3A%20n%2Fa&amp;severity=medium&amp;id=69f4ef6ecbff5d8610306915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37457-na-952ce403</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37457%3A%20n%2Fa&amp;severity=high&amp;id=69f4e81bcbff5d861026ece9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63548-na-192e3e8f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63548%3A%20n%2Fa&amp;severity=high&amp;id=69f4e81bcbff5d861026ece5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63547-na-332110e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63547%3A%20n%2Fa&amp;severity=high&amp;id=69f4e81bcbff5d861026ece0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42469-na-489c1776</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42469%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd93cbff5d861017cf84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42468-na-11fef5b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42468%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42467-na-dca41e5b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42467%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37541-na-4bb36f9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37541%3A%20n%2Fa&amp;severity=critical&amp;id=69f4dd91cbff5d861017cf40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37540-na-41a9c939</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37540%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37539-na-ee89ba60</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37539%3A%20n%2Fa&amp;severity=critical&amp;id=69f4dd91cbff5d861017cf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37538-na-de3f64a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37538%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37537-na-69c85d75</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37537%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37536-na-f0c8d67b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37536%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37535-na-1a1cf7b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37535%3A%20n%2Fa&amp;severity=high&amp;id=69f4dd91cbff5d861017cf23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37534-na-40fe56fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37534%3A%20n%2Fa&amp;severity=critical&amp;id=69f4dd91cbff5d861017cf1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42485-na-436adebf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42485%3A%20n%2Fa&amp;severity=high&amp;id=69f4d687cbff5d861013603e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37532-na-a8069f0f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37532%3A%20n%2Fa&amp;severity=high&amp;id=69f4d687cbff5d861013603a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37531-na-02aa37b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37531%3A%20n%2Fa&amp;severity=critical&amp;id=69f4d687cbff5d8610136036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37530-na-18dfcd93</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37530%3A%20n%2Fa&amp;severity=high&amp;id=69f4d687cbff5d8610136032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37526-na-55da17ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37526%3A%20n%2Fa&amp;severity=high&amp;id=69f4d687cbff5d861013602e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37525-na-d4b603db</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37525%3A%20n%2Fa&amp;severity=high&amp;id=69f4d687cbff5d861013602a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37554-na-b632be68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37554%3A%20n%2Fa&amp;severity=high&amp;id=69f4d323cbff5d861010f928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42475-na-3867f6d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42475%3A%20n%2Fa&amp;severity=medium&amp;id=69f4cbfccbff5d8610073140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42474-na-61d12114</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42474%3A%20n%2Fa&amp;severity=medium&amp;id=69f4cbfccbff5d861007313b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42473-na-1e6bc7dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42473%3A%20n%2Fa&amp;severity=critical&amp;id=69f4cbfccbff5d8610073136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42472-na-c6791b54</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42472%3A%20n%2Fa&amp;severity=critical&amp;id=69f4cbfccbff5d8610073131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42471-na-65690423</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42471%3A%20n%2Fa&amp;severity=high&amp;id=69f4cbfccbff5d861007312c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37552-na-983fd57a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37552%3A%20n%2Fa&amp;severity=high&amp;id=69f4cbfccbff5d8610073127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37505-na-ed6ef807</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37505%3A%20n%2Fa&amp;severity=medium&amp;id=69f4cbfccbff5d8610073123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42481-na-2003877f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42481%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c881cbff5d8610019a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42480-na-eeee3673</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42480%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c881cbff5d8610019a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37504-na-eeef9ac0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37504%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c881cbff5d8610019a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37503-na-a8fc6324</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37503%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c881cbff5d8610019a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42479-na-6294dbfc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42479%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c17bcbff5d8610f92aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42478-na-d546ec32</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42478%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c17bcbff5d8610f92aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42477-na-1f7fb1a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42477%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c17bcbff5d8610f92aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42476-na-15f22730</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42476%3A%20n%2Fa&amp;severity=medium&amp;id=69f4c17bcbff5d8610f92aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42484-na-7ae4572a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42484%3A%20n%2Fa&amp;severity=critical&amp;id=69f4b73ecbff5d8610ec5988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42483-na-ec68fb85</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42483%3A%20n%2Fa&amp;severity=high&amp;id=69f4b73ecbff5d8610ec5985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42482-na-e7fd29fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42482%3A%20n%2Fa&amp;severity=high&amp;id=69f4b73ecbff5d8610ec5982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-43003-cwe-829-inclusion-of-functionality--0e871313</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-43003%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20OpenStack%20ironic-python-agent&amp;severity=high&amp;id=69f46607cbff5d861092e804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-43001-cwe-863-incorrect-authorization-in--67edec26</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-43001%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenStack%20Keystone&amp;severity=high&amp;id=69f46607cbff5d861092e800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-05-01-128a9787</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-05-01&amp;severity=low&amp;id=69f3f903cbff5d8610de00e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7513-buffer-overflow-in-utt-hiper-1200gw-f7ebfb9f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7513%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201200GW&amp;severity=high&amp;id=69f3eafbcbff5d8610ba40f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7512-buffer-overflow-in-utt-hiper-1200gw-f79541f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7512%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201200GW&amp;severity=high&amp;id=69f3eafbcbff5d8610ba40ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22726-cwe-923-improper-restriction-of-com-9bad7a4b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22726%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20CloudFoundry%20Foundation%20Routing%20release&amp;severity=medium&amp;id=69f3e778cbff5d8610b741a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5404-cwe-120-buffer-copy-without-checking-127fb11a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5404%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f3e778cbff5d8610b741ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5403-cwe-122-heap-based-buffer-overflow-i-0efedf3c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5403%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69f3e778cbff5d8610b741aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5656-cwe-22-improper-limitation-of-a-path-6e5274c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5656%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69f3e778cbff5d8610b741b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5405-cwe-122-heap-based-buffer-overflow-i-e5ad6249</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5405%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69f3e778cbff5d8610b741b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7510-authorization-bypass-in-owap-defectd-0869c5a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7510%3A%20Authorization%20Bypass%20in%20OWAP%20DefectDojo&amp;severity=medium&amp;id=69f3e0d7cbff5d8610af56cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7508-code-injection-in-bootstrap-cms-a5801659</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7508%3A%20Code%20Injection%20in%20Bootstrap%20CMS&amp;severity=medium&amp;id=69f3e0d7cbff5d8610af56c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7506-sql-injection-in-sourcecodester-hote-8822ab29</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7506%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20Management%20System&amp;severity=medium&amp;id=69f3dceccbff5d8610aa1566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7505-improper-authorization-in-nextlevelb-4cbc0357</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7505%3A%20Improper%20Authorization%20in%20nextlevelbuilder%20GoClaw&amp;severity=medium&amp;id=69f3d61dcbff5d86109e92ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28909-users-who-connect-to-malicious-regi-54d3e286</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28909%3A%20Users%20who%20connect%20to%20malicious%20registries%20with%20hostnames%20matching%20the%20bypass%20patterns%20will%20have%20their%20registry%20credentials%20exposed%20in%20plaintext.%20in%20Apple%20macOS&amp;severity=medium&amp;id=69f3d61dcbff5d86109e92eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1577-vulnerability-in-ibm-db2-3362fd99</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1577%3A%20Vulnerability%20in%20IBM%20Db2&amp;severity=medium&amp;id=69f3d25fcbff5d8610986845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36122-cwe-770-allocation-of-resources-wit-577c7c23</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36122%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2&amp;severity=medium&amp;id=69f3d25fcbff5d8610986842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14688-cwe-1284-improper-validation-of-spe-1cc722d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14688%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2&amp;severity=medium&amp;id=69f3d25fcbff5d861098683f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7503-buffer-overflow-in-code-projects-for-724ddcd8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7503%3A%20Buffer%20Overflow%20in%20code-projects%20for%20Plugin&amp;severity=high&amp;id=69f3d25fcbff5d861098684b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2311-cwe-284-improper-access-control-c25fe9c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2311%3A%20CWE-284%20Improper%20Access%20Control&amp;severity=medium&amp;id=69f3d25fcbff5d8610986848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7551-cwe-78-improper-neutralization-of-sp-f5ce297f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7551%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69f3cb59cbff5d86108f8849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36180-cwe-923-improper-restriction-of-com-17f6d3f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36180%3A%20CWE-923%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20IBM%20watsonx.data&amp;severity=medium&amp;id=69f3cb59cbff5d86108f882e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6389-cwe-269-improper-privilege-managemen-d916f0a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6389%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IBM%20Turbonomic%20prometurbo%20agent&amp;severity=high&amp;id=69f3cb59cbff5d86108f8837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6542-cwe-639-authorization-bypass-through-2c9318eb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6542%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20Langflow%20OSS&amp;severity=medium&amp;id=69f3cb59cbff5d86108f883a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7502-authorization-bypass-in-linkstackorg-68359b4f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7502%3A%20Authorization%20Bypass%20in%20LinkStackOrg%20LinkStack&amp;severity=medium&amp;id=69f3cb59cbff5d86108f8840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36335-cwe-256-plaintext-storage-of-a-pass-e5cac996</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36335%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20IBM%20watsonx.data%20intelligence&amp;severity=medium&amp;id=69f3cb59cbff5d86108f8831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6543-cwe-94-improper-control-of-generatio-3e8e7b51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6543%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20IBM%20Langflow%20Desktop&amp;severity=high&amp;id=69f3cb59cbff5d86108f883d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3345-cwe-22-improper-limitation-of-a-path-18f8fbeb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3345%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Langflow%20Desktop&amp;severity=medium&amp;id=69f3cb59cbff5d86108f8834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3346-cwe-89-improper-neutralization-of-sp-675ba312</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3346%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Langflow%20Desktop&amp;severity=medium&amp;id=69f3c7f3cbff5d86108d5843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3340-cwe-918-server-side-request-forgery--11ca7bc5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3340%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Langflow%20Desktop&amp;severity=medium&amp;id=69f3c7f3cbff5d86108d5840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4502-cwe-22-improper-limitation-of-a-path-4fc3e337</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4502%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Langflow%20Desktop&amp;severity=medium&amp;id=69f3c7f3cbff5d86108d5846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4503-cwe-639-authorization-bypass-through-2bd29972</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4503%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20Langflow%20Desktop&amp;severity=high&amp;id=69f3c7f3cbff5d86108d5849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7501-cross-site-scripting-in-linkstackorg-1043a0bd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7501%3A%20Cross%20Site%20Scripting%20in%20LinkStackOrg%20LinkStack&amp;severity=medium&amp;id=69f3c7f3cbff5d86108d584c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40951-vulnerability-in-absolute-software--c2b5bc8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40951%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=medium&amp;id=69f3c0cccbff5d861086a35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40950-vulnerability-in-absolute-software--c38f7f38</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40950%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=high&amp;id=69f3c0cccbff5d861086a35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28532-cwe-190-integer-overflow-or-wraparo-99967126</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28532%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20FRRouting%20frr&amp;severity=medium&amp;id=69f3b9c5cbff5d8610805806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40949-vulnerability-in-absolute-software--870f9917</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40949%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=medium&amp;id=69f3b9c5cbff5d8610805818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33452-vulnerability-in-absolute-software--40f0e070</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33452%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=medium&amp;id=69f3b9c5cbff5d8610805815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7435-cwe-89-improper-neutralization-of-sp-3825a86a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7435%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20siteserver%20SSCMS&amp;severity=high&amp;id=69f3b9c5cbff5d861080581b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33451-vulnerability-in-absolute-software--1d1e357a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33451%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=high&amp;id=69f3b9c5cbff5d8610805812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33450-vulnerability-in-absolute-software--525608f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33450%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=low&amp;id=69f3b9c5cbff5d861080580f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33449-vulnerability-in-absolute-software--ea5fd6e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33449%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=low&amp;id=69f3b9c5cbff5d861080580c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33448-vulnerability-in-absolute-software--ff210aff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33448%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=medium&amp;id=69f3b63fcbff5d86107c4f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7429-cwe-79-improper-neutralization-of-in-8e6b4acc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siteserver%20SSCMS&amp;severity=low&amp;id=69f3b63fcbff5d86107c4f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33447-vulnerability-in-absolute-software--b6ed6176</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33447%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=low&amp;id=69f3b63fcbff5d86107c4f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33446-vulnerability-in-absolute-software--72018345</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33446%3A%20Vulnerability%20in%20Absolute%20Software%20Secure%20Access&amp;severity=low&amp;id=69f3b63fcbff5d86107c4f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-unveils-claude-security-to-counter-ai-po-3ad1de36</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20Unveils%20Claude%20Security%20to%20Counter%20AI-Powered%20Exploit%20Surge&amp;severity=medium&amp;id=69f3a82fcbff5d86106e78e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-fuels-industrial-cybercrime-as-time-to-exploit--feddc4dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Fuels%20%E2%80%98Industrial%E2%80%99%20Cybercrime%20as%20Time-to-Exploit%20Shrinks%20to%20Hours&amp;severity=medium&amp;id=69f3a82fcbff5d86106e78e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7461-cwe-78-improper-neutralization-of-sp-8ab43a86</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7461%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20AWS%20Amazon%20ECS%20Agent&amp;severity=high&amp;id=69f3a4adcbff5d8610696812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32148-cwe-354-improper-validation-of-inte-978f90e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32148%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20hexpm%20hex&amp;severity=high&amp;id=69f3a4adcbff5d861069680c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33845-integer-underflow-wrap-or-wraparoun-69bead90</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33845%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=high&amp;id=69f3969dcbff5d8610590846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3832-incorrect-behavior-order-early-valid-2a718fff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3832%3A%20Incorrect%20Behavior%20Order%3A%20Early%20Validation%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=low&amp;id=69f3969dcbff5d861059085c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3833-improper-handling-of-case-sensitivit-2fa6397a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3833%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69f3969dcbff5d8610590861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71284-improper-neutralization-of-special--e063f565</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71284%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Synway%20Information%20Engineering%20Co.%2C%20Ltd.%20Synway%20SMG%20Gateway%20Management%20Software&amp;severity=critical&amp;id=69f3888dcbff5d861048853f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14543-cwe-611-improper-restriction-of-xml-8276036a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14543%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=69f376fbcbff5d86103580ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5174-cwe-20-improper-input-validation-in--1f9b9c61</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5174%3A%20CWE-20%20Improper%20input%20validation%20in%20Progress%20Software%20MOVEit%20Automation&amp;severity=high&amp;id=69f376fbcbff5d86103580db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4670-cwe-305-authentication-bypass-by-pri-dff96cb4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4670%3A%20CWE-305%20Authentication%20bypass%20by%20primary%20weakness%20in%20Progress%20Software%20MOVEit%20Automation&amp;severity=critical&amp;id=69f376fbcbff5d86103580d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7500-direct-request-forced-browsing-in-re-08155124</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7500%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69f37003cbff5d86102de4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-urges-immediate-patching-of-firewall-vul-e7012ffc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Urges%20Immediate%20Patching%20of%20Firewall%20Vulnerabilities&amp;severity=medium&amp;id=69f36feecbff5d86102d498a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-npm-packages-targeted-in-supply-chain-attack-2a7d363e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20NPM%20Packages%20Targeted%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69f368e6cbff5d8610edbc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2892-cwe-285-improper-authorization-in-th-fa4e8141</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2892%3A%20CWE-285%20Improper%20Authorization%20in%20themeisle%20Otter%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=high&amp;id=69f365d8cbff5d8610ec5024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7163-cleartext-storage-of-sensitive-infor-7973e159</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7163%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Red%20Hat%20multicluster%20engine%20for%20Kubernetes%202.1&amp;severity=medium&amp;id=69f365d8cbff5d8610ec502b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7246-cwe-77-improper-neutralization-of-sp-f44b314d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7246%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Pallets%20Click%20Click&amp;severity=high&amp;id=69f365d8cbff5d8610ec502f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7402-cwe-799-improper-control-of-interact-3b8b7176</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7402%3A%20CWE-799%20Improper%20Control%20of%20Interaction%20Frequency%20in%20MeWare%20Software%20Development%20Inc.%20PDKS&amp;severity=high&amp;id=69f407bccbff5d86100b0c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14576-cwe-94-improper-control-of-generati-31c59250</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14576%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20The%20Qt%20Company%20Qt&amp;severity=high&amp;id=69f407bccbff5d86100b0c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7399-cwe-639-authorization-bypass-through-86a7e73f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7399%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20MeWare%20Software%20Development%20Inc.%20PDKS&amp;severity=high&amp;id=69f407bccbff5d86100b0c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7382-cwe-200-exposure-of-sensitive-inform-6cd51947</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7382%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MeWare%20Software%20Development%20Inc.%20PDKS&amp;severity=medium&amp;id=69f407bccbff5d86100b0c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-gemini-cli-flaw-enabled-host-code-executi-aed1597d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Gemini%20CLI%20Flaw%20Enabled%20Host%20Code%20Execution%2C%20Supply%20Chain%20Attacks&amp;severity=critical&amp;id=69f34cc6cbff5d8610dc5876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13971-cwe-611-improper-restriction-of-xml-6ac9aea8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13971%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Lobster%20GmbH%20Lobster_pro&amp;severity=high&amp;id=69f407bbcbff5d86100b0c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/enocean-smartserver-flaws-expose-buildings-to-remo-e3c7cc71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EnOcean%20SmartServer%20Flaws%20Expose%20Buildings%20to%20Remote%20Hacking&amp;severity=critical&amp;id=69f345bfcbff5d8610d8a53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5080-cwe-340-generation-of-predictable-nu-fb2c89e3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5080%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20BIGPRESH%20Dancer%3A%3ASession%3A%3AAbstract&amp;severity=medium&amp;id=69f3499ecbff5d8610da76f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1493-cwe-79-improper-neutralization-of-in-d3d22865</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1493%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wolters%20Kluwer%20Polska%20LEX%20Baza%20Dokument%C3%B3w&amp;severity=medium&amp;id=69f3423bcbff5d8610d6429c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-cpanel-whm-vulnerability-exploited-as-zer-3ad225d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20cPanel%20%26%20WHM%20Vulnerability%20Exploited%20as%20Zero-Day%20for%20Months&amp;severity=critical&amp;id=69f33b32cbff5d8610cfce46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41882-cwe-59-in-jetbrains-intellij-idea-5e81e09a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41882%3A%20CWE-59%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=high&amp;id=69f3423bcbff5d8610d642a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copy-fail-logic-flaw-in-linux-kernel-enables-syste-6fa15d44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Copy%20Fail%E2%80%99%20Logic%20Flaw%20in%20Linux%20Kernel%20Enables%20System%20Takeover&amp;severity=medium&amp;id=69f3299dcbff5d8610c1c55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6498-cwe-345-insufficient-verification-of-cb283348</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6498%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20rustaurius%20Five%20Star%20Restaurant%20Reservations%20%E2%80%93%20WordPress%20Booking%20Plugin&amp;severity=medium&amp;id=69f3499ecbff5d8610da76fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41016-cwe-295-improper-certificate-valida-dd092550</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41016%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20SMTP&amp;severity=medium&amp;id=69f407bccbff5d86100b0c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42800-cwe-476-null-pointer-dereference-in-75177655</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42800%3A%20CWE-476%20NULL%20pointer%20dereference%20in%20ASR%20Lapwing_Linux&amp;severity=high&amp;id=69f407bccbff5d86100b0c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42799-cwe-125-out-of-bounds-read-in-asr-k-aa688f05</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42799%3A%20CWE-125%20Out-of-bounds%20read%20in%20ASR%20Kestrel&amp;severity=high&amp;id=69f407bccbff5d86100b0c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sandhills-medical-says-ransomware-breach-affects-1-1b6fe2f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sandhills%20Medical%20Says%20Ransomware%20Breach%20Affects%20170%2C000&amp;severity=medium&amp;id=69f31485cbff5d8610ac022f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22070-cwe-23-relative-path-traversal-in-o-e4705852</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22070%3A%20CWE-23%20Relative%20path%20traversal%20in%20OPPO%20ColorOS%20Assistant&amp;severity=high&amp;id=69f407bccbff5d86100b0c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39847-cwe-611-improper-restriction-of-xml-9cb9cb53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39847%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%204D%204D%20Server&amp;severity=high&amp;id=69f30313cbff5d86109ddf12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42798-cwe-190-integer-overflow-or-wraparo-054c7fc1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42798%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20littlecms%20little%20cms%20color%20engine&amp;severity=medium&amp;id=69f30313cbff5d86109ddf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41226-url-redirection-to-untrusted-site-o-783833fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41226%3A%20URL%20redirection%20to%20untrusted%20site%20(&apos;Open%20Redirect&apos;)%20in%20Ricoh%20Company%2C%20Ltd.%20Multiple%20laser%20printers%20and%20MFPs%20which%20implement%20Web%20Image%20Monitor&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5409-cwe-674-uncontrolled-recursion-in-wi-23154b63</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5409%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5408-cwe-674-uncontrolled-recursion-in-wi-29b4b29c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5408%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5406-cwe-674-uncontrolled-recursion-in-wi-397e1a7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5406%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5407-cwe-835-loop-with-unreachable-exit-c-badb8538</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5407%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5299-cwe-674-uncontrolled-recursion-in-wi-f73b4311</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5299%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5402-cwe-122-heap-based-buffer-overflow-i-bdf27e3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5402%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69f2f4e6cbff5d8610970aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5401-cwe-674-uncontrolled-recursion-in-wi-42982e17</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5401%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5654-cwe-121-stack-based-buffer-overflow--e52b55c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5654%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5655-cwe-416-use-after-free-in-wireshark--2af4d3c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5655%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5657-cwe-415-double-free-in-wireshark-fou-1c50fda0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5657%3A%20CWE-415%3A%20Double%20Free%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5653-cwe-122-heap-based-buffer-overflow-i-490bb307</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5653%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e6cbff5d8610970ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6538-cwe-121-stack-based-buffer-overflow--11149ad0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6538%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4eecbff5d8610970cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6537-cwe-121-stack-based-buffer-overflow--91da9e3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6537%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6536-cwe-835-loop-with-unreachable-exit-c-30446055</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6536%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6535-cwe-1325-improperly-controlled-seque-ee42fe95</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6535%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6534-cwe-835-loop-with-unreachable-exit-c-5247679d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6534%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6533-cwe-1325-improperly-controlled-seque-ca798bb1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6533%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6532-cwe-126-buffer-over-read-in-wireshar-61249fa0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6532%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6531-cwe-835-loop-with-unreachable-exit-c-fc482710</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6531%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6530-cwe-122-heap-based-buffer-overflow-i-09d5a2cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6530%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6529-cwe-122-heap-based-buffer-overflow-i-8b582d2f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6529%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6528-cwe-835-loop-with-unreachable-exit-c-76ab2751</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6528%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4ebcbff5d8610970c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6527-cwe-674-uncontrolled-recursion-in-wi-874cc945</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6527%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6526-cwe-476-null-pointer-dereference-in--e972e95a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6526%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6524-cwe-824-access-of-uninitialized-poin-cb5e2b86</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6524%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6523-cwe-835-loop-with-unreachable-exit-c-23a6b2bd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6523%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6521-cwe-835-loop-with-unreachable-exit-c-7b26e8ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6521%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6520-cwe-835-loop-with-unreachable-exit-c-b5b02566</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6520%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6519-cwe-835-loop-with-unreachable-exit-c-5a67a3ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6519%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6522-cwe-835-loop-with-unreachable-exit-c-21da26fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6522%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4e9cbff5d8610970bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6870-cwe-824-access-of-uninitialized-poin-e86ece1b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6870%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4eecbff5d8610970ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6869-cwe-1325-improperly-controlled-seque-cec808b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6869%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4eecbff5d8610970cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6867-cwe-1325-improperly-controlled-seque-3d94f914</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6867%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2f4eecbff5d8610970cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6868-cwe-121-stack-based-buffer-overflow--be9f6ff5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6868%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2e6f2cbff5d861093cb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7378-cwe-122-heap-based-buffer-overflow-i-0ab50125</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7378%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2e6f2cbff5d861093cb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7379-cwe-401-missing-release-of-memory-af-9bc1ae18</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7379%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2e6f2cbff5d861093cb8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7375-cwe-835-loop-with-unreachable-exit-c-0a8efe5a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7375%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2e6f2cbff5d861093cb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7376-cwe-476-null-pointer-dereference-in--f9f71ccc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7376%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69f2e6f2cbff5d861093cb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13030-missing-authentication-for-critical-4e883dd9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13030%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20django-mdeditor&amp;severity=medium&amp;id=69f2e6f2cbff5d861093cb73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7470-stack-based-buffer-overflow-in-tenda-f207f452</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7470%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%204G300&amp;severity=high&amp;id=69f2c3abcbff5d861080b111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-30th-2026-httpsis-83f2ff88</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%2030th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9912%2C%20(Thu%2C%20Apr%2030th)&amp;severity=medium&amp;id=69f2b91ecbff5d86107ca0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7469-command-injection-in-tenda-4g300-14fe8e3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7469%3A%20Command%20Injection%20in%20Tenda%204G300&amp;severity=medium&amp;id=69f2b924cbff5d86107ca1b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7468-improper-access-controls-in-1024-lab-cbc052fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7468%3A%20Improper%20Access%20Controls%20in%201024-lab%20smart-admin&amp;severity=medium&amp;id=69f2b622cbff5d86107b2331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7447-sql-injection-in-sourcecodester-pet--cb1e26e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7447%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=69f2b622cbff5d86107b232a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-hits-sap-cap-and-cloud-mta-npm-de579a3f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Attack%20Hits%20SAP%20CAP%20and%20Cloud%20MTA%20npm%20Packages&amp;severity=medium&amp;id=69f30676cbff5d86109ec9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-campaign-targets-sap-npm-packages-wit-bdc0c295</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Campaign%20Targets%20SAP%20npm%20Packages%20with%20Credential-Stealing%20Malware&amp;severity=medium&amp;id=69f309facbff5d8610a197b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/komari-red-the-monitoring-tool-with-a-built-in-rev-74320819</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Komari%20Red%3A%20The%20Monitoring%20Tool%20with%20a%20Built-in%20Reverse%20Shell&amp;severity=medium&amp;id=69f30676cbff5d86109ec9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/danger-of-libredtail-x5bguest-diaryx5d-wed-apr-29t-3b9ec76e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Danger%20of%20Libredtail%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Apr%2029th)&amp;severity=medium&amp;id=69f2a0a3cbff5d86105fc814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7446-os-command-injection-in-vetcoders-mc-59805fc6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7446%3A%20OS%20Command%20Injection%20in%20VetCoders%20mcp-server-semgrep&amp;severity=medium&amp;id=69f29cfecbff5d86105a1f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/busybox-1370-path-traversal-70e2fd4a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BusyBox%201.37.0%20-%20Path%20Traversal&amp;severity=medium&amp;id=69f5140dcbff5d86105a4033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hustoj-zip-slip-v260124-rce-ef0d2c37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HUSTOJ%20Zip-Slip%20v26.01.24%20-%20%20RCE&amp;severity=critical&amp;id=69f5140dcbff5d86105a402e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/repetier-server-1410-path-traversal-c4448611</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Repetier-Server%201.4.10%20-%20Path%20Traversal&amp;severity=medium&amp;id=69f5140dcbff5d86105a4029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-11-23h2-denial-of-service-dos-b95fbbf4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2011%2023H2%20-%20Denial%20of%20Service%20(DoS)&amp;severity=medium&amp;id=69f5140dcbff5d86105a4024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-chrome-1450763275-cssfontfeaturevaluesmap-8f3300cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Chrome%20%20145.0.7632.75%20-%20CSSFontFeatureValuesMap&amp;severity=medium&amp;id=69f5140dcbff5d86105a401f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/python-multipart-0022-path-traversal-8373c47f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Python-Multipart%200.0.22%20-%20Path%20Traversal&amp;severity=medium&amp;id=69f5140dcbff5d86105a401a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fuxa-128-authentication-bypass-rce-exploit-52099322</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FUXA%201.2.8%20-%20Authentication%20Bypass%20%2B%20RCE%20Exploit&amp;severity=critical&amp;id=69f5140ccbff5d86105a4015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-05-01-8427ae88</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-05-01&amp;severity=medium&amp;id=69f48926cbff5d8610b69ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-30-64f96899</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-30&amp;severity=medium&amp;id=69f3ee76cbff5d8610bdb136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56568-na-45131009</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56568%3A%20n%2Fa&amp;severity=null&amp;id=69f3b63fcbff5d86107c4f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46115-na-48e8db7d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46115%3A%20n%2Fa&amp;severity=null&amp;id=69f3b63fcbff5d86107c4f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36759-na-0ad09c8f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36759%3A%20n%2Fa&amp;severity=medium&amp;id=69f39dc3cbff5d8610619066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36758-na-774e68fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36758%3A%20n%2Fa&amp;severity=medium&amp;id=69f39dc3cbff5d8610619062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36756-na-d656458f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36756%3A%20n%2Fa&amp;severity=medium&amp;id=69f39dc3cbff5d861061905e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36766-na-da6a27cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36766%3A%20n%2Fa&amp;severity=medium&amp;id=69f39dc3cbff5d861061905a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36340-na-92a3b643</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36340%3A%20n%2Fa&amp;severity=high&amp;id=69f3969dcbff5d8610590866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36765-na-43fdc5e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36765%3A%20n%2Fa&amp;severity=null&amp;id=69f3969dcbff5d8610590858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36763-na-b3ca5de8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36763%3A%20n%2Fa&amp;severity=medium&amp;id=69f3969dcbff5d8610590853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36762-na-d5217e85</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36762%3A%20n%2Fa&amp;severity=null&amp;id=69f3969dcbff5d861059084e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36761-na-fd1719e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36761%3A%20n%2Fa&amp;severity=medium&amp;id=69f3969dcbff5d861059084a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36767-na-70f7890d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36767%3A%20n%2Fa&amp;severity=critical&amp;id=69f38fe1cbff5d8610519815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36764-na-de173dd5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36764%3A%20n%2Fa&amp;severity=medium&amp;id=69f38fe1cbff5d8610519811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36760-na-d638c635</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36760%3A%20n%2Fa&amp;severity=critical&amp;id=69f38fe1cbff5d861051980d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36757-na-24ff7efe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36757%3A%20n%2Fa&amp;severity=medium&amp;id=69f3888dcbff5d8610488546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38940-na-f2a9b73a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38940%3A%20n%2Fa&amp;severity=medium&amp;id=69f376fbcbff5d86103580d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38939-na-8760e67a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38939%3A%20n%2Fa&amp;severity=medium&amp;id=69f376fbcbff5d86103580d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36960-na-fb61bd73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36960%3A%20n%2Fa&amp;severity=high&amp;id=69f376fbcbff5d86103580cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36959-na-27f123ff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36959%3A%20n%2Fa&amp;severity=high&amp;id=69f37003cbff5d86102de4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36958-na-705c006b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36958%3A%20n%2Fa&amp;severity=high&amp;id=69f37003cbff5d86102de4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36957-na-9cb1af43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36957%3A%20n%2Fa&amp;severity=high&amp;id=69f37003cbff5d86102de4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36956-na-ecd02f62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36956%3A%20n%2Fa&amp;severity=high&amp;id=69f37003cbff5d86102de4e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jung-smart-visu-server-111050-dos-f2510f30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JUNG%20Smart%20Visu%20Server%201.1.1050%20-%20Dos&amp;severity=medium&amp;id=69f31228cbff5d8610aa6d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-11-25h2-heap-overflow-08190353</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2011%2025H2%20%20-%20Heap%20Overflow&amp;severity=medium&amp;id=69f31228cbff5d8610aa6d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/suse-manager-4315-code-execution-e7e04f83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SUSE%20Manager%204.3.15%20-%20Code%20Execution&amp;severity=medium&amp;id=69f311cccbff5d8610aa56f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deephas-107-prototype-pollution-ed5d7e4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=deephas%201.0.7%20-%20Prototype%20Pollution&amp;severity=medium&amp;id=69f311cccbff5d8610aa56f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/erugo-0214-remote-code-execution-rce-548963d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Erugo%20%200.2.14%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=69f311cccbff5d8610aa56eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-ai-cai-framework-0510-command-inject-09ef43ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20AI%20(CAI)%20Framework%200.5.10%20-%20Command%20Injection&amp;severity=medium&amp;id=69f311cccbff5d8610aa56e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/camaleon-cms-v290-path-traversal-cd8974d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Camaleon%20CMS%20%20v2.9.0%20-%20Path%20Traversal&amp;severity=medium&amp;id=69f311cccbff5d8610aa56e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/js2py-074-rce-eb88e58a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Js2Py%200.74%20-%20%20RCE&amp;severity=critical&amp;id=69f311cccbff5d8610aa56dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frigate-nvr-0163-remote-code-execution-3b38b94c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frigate%20NVR%200.16.3%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69f311cccbff5d8610aa56d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nicegui-361-path-traversal-714d0f57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NiceGUI%203.6.1%20-%20Path%20Traversal&amp;severity=medium&amp;id=69f311cccbff5d8610aa56d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sumatrapdf-352-remote-code-execution-f01dfc90</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SumatraPDF%203.5.2%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69f311cccbff5d8610aa56cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-30-ddb221ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-30&amp;severity=low&amp;id=69f2dc3ecbff5d86108edce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7445-path-traversal-in-zachhandley-zmcpto-f957be68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7445%3A%20Path%20Traversal%20in%20ZachHandley%20ZMCPTools&amp;severity=medium&amp;id=69f29cfecbff5d86105a1f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7443-os-command-injection-in-burtthecoder-aa04b4f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7443%3A%20OS%20Command%20Injection%20in%20BurtTheCoder%20mcp-dnstwist&amp;severity=medium&amp;id=69f28eeecbff5d861053269a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7420-buffer-overflow-in-utt-hiper-1250gw-169eee63</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7420%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69f287e7cbff5d8610509dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7419-buffer-overflow-in-utt-hiper-1250gw-a0814406</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7419%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69f287e7cbff5d8610509db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7381-cwe-200-exposure-of-sensitive-inform-0a9be82b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7381%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MIYAGAWA%20Plack%3A%3AMiddleware%3A%3AXSendfile&amp;severity=critical&amp;id=69f287e7cbff5d8610509db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7418-buffer-overflow-in-utt-hiper-1250gw-d147e37f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7418%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69f2849ccbff5d86104f5339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7417-server-side-request-forgery-in-algov-ba913bc8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7417%3A%20Server-Side%20Request%20Forgery%20in%20Algovate%20xhs-mcp&amp;severity=medium&amp;id=69f2849ccbff5d86104f5331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7416-os-command-injection-in-polarvista-x-16228383</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7416%3A%20OS%20Command%20Injection%20in%20PolarVista%20xcode-mcp-server&amp;severity=medium&amp;id=69f27d5bcbff5d86104ce856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7410-sql-injection-in-sourcecodester-pizz-53ed71b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7410%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f27679cbff5d86104aea45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7409-sql-injection-in-sourcecodester-pizz-57782148</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7409%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f27679cbff5d86104aea3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7408-sql-injection-in-sourcecodester-pizz-120d70b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7408%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f272cecbff5d86104a3aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7407-sql-injection-in-sourcecodester-pizz-7944d1af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7407%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f272cecbff5d86104a3aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1858-cwe-20-improper-input-validation-in--9814b0ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1858%3A%20CWE-20%20Improper%20input%20validation%20in%20gnu%20wget2&amp;severity=medium&amp;id=69f26bc7cbff5d861048aa2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7404-relative-path-traversal-in-getsimple-23e246fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7404%3A%20Relative%20Path%20Traversal%20in%20getsimpletool%20mcpo-simple-server&amp;severity=medium&amp;id=69f26bc7cbff5d861048aa35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7403-path-traversal-in-geldata-gel-mcp-45ac9ba3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7403%3A%20Path%20Traversal%20in%20geldata%20gel-mcp&amp;severity=medium&amp;id=69f26bc7cbff5d861048aa2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34965-cwe-94-improper-control-of-generati-ef87ff52</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34965%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cockpit%20Cockpit%20CMS&amp;severity=high&amp;id=69f264c0cbff5d861045c09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ddos-for-hire-operation-exposed-how-an-operators-d-c6e163a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DDoS-for-Hire%20Operation%20Exposed%3A%20How%20an%20Operator&apos;s%20Debug%20Build%20Unraveled%20a%20Commercial%20Game-Server%20Botnet&amp;severity=medium&amp;id=69f309facbff5d8610a1979e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kuse-web-app-abused-to-host-phishing-document-514cb57b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kuse%20Web%20App%20Abused%20to%20Host%20Phishing%20Document&amp;severity=medium&amp;id=69f309facbff5d8610a197b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7401-cross-site-scripting-in-sourcecodest-f9b3eff8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7401%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20CET%20Automated%20Grading%20System%20with%20AI%20Predictive%20Analytics&amp;severity=medium&amp;id=69f25db7cbff5d8610434828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7400-path-traversal-in-geekgod382-filesys-b90c500a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7400%3A%20Path%20Traversal%20in%20geekgod382%20filesystem-mcp-server&amp;severity=medium&amp;id=69f25db7cbff5d861043481f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7426-cwe-787-out-of-bounds-write-in-aws-f-24eab3ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7426%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=high&amp;id=69f25db7cbff5d8610434834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7425-cwe-125-out-of-bounds-read-in-aws-fr-aefacb3e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7425%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=69f25db7cbff5d861043482f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7424-cwe-191-integer-underflow-wrap-or-wr-d91dfd5c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7424%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=high&amp;id=69f256b0cbff5d86103eb491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7466-cwe-94-improper-control-of-generatio-1d5ea745</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7466%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20berabuddies%20AgentFlow&amp;severity=high&amp;id=69f256b0cbff5d86103eb496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7423-cwe-191-integer-underflow-wrap-or-wr-bcc174c0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7423%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=69f256b0cbff5d86103eb48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7422-cwe-290-authentication-bypass-by-spo-91934019</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7422%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=69f256b0cbff5d86103eb484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7398-path-traversal-in-florensiawidjaja-b-d0a56e96</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7398%3A%20Path%20Traversal%20in%20florensiawidjaja%20BioinfoMCP&amp;severity=medium&amp;id=69f256b0cbff5d86103eb47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27105-cwe-59-improper-link-resolution-bef-35e09182</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27105%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Dell%2FAlienware%20Purchased%20Apps&amp;severity=medium&amp;id=69f256b0cbff5d86103eb47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7439-cwe-346-origin-validation-error-in-b-16452b45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7439%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20berabuddies%20AgentFlow&amp;severity=medium&amp;id=69f24c6ecbff5d86103a5326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7397-symlink-following-in-nousresearch-he-7f94a293</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7397%3A%20Symlink%20Following%20in%20NousResearch%20hermes-agent&amp;severity=medium&amp;id=69f24c6ecbff5d86103a531c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26015-cwe-77-improper-neutralization-of-s-ba83675d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26015%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20arc53%20DocsGPT&amp;severity=critical&amp;id=69f2451bcbff5d861036cbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7396-path-traversal-in-nousresearch-herme-04c10dff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7396%3A%20Path%20Traversal%20in%20NousResearch%20hermes-agent&amp;severity=medium&amp;id=69f2451bcbff5d861036cbcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5712-cwe-863-incorrect-authorization-in-s-bb451392</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5712%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SailPoint%20Technologies%20IdentityIQ&amp;severity=high&amp;id=69f2451bcbff5d861036cbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7394-sql-injection-in-sourcecodester-pizz-16a1b2e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7394%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f2451bcbff5d861036cbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7393-unrestricted-upload-in-sourcecodeste-c982553d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7393%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f23e5ccbff5d8610337c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6915-cwe-1284-improper-validation-of-spec-2dda5bdb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6915%3A%20CWE-1284%20Improper%20validation%20of%20specified%20quantity%20in%20input%20in%20MongoDB%20MongoDB%20Server&amp;severity=medium&amp;id=69f23e5ccbff5d8610337c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6914-cwe-191-integer-underflow-wrap-or-wr-5f06d954</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6914%3A%20CWE-191%20Integer%20underflow%20(wrap%20or%20wraparound)%20in%20MongoDB%20MongoDB%20Server&amp;severity=high&amp;id=69f23e5ccbff5d8610337c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7392-sql-injection-in-sourcecodester-phar-7dcbab12</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7392%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f23e5ccbff5d8610337c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0206-cwe-121-stack-based-buffer-overflow--c7248604</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0206%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=69f2370ccbff5d861030647b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0205-cwe-35-path-traversal-in-sonicwall-s-e2ccd6ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0205%3A%20CWE-35%20Path%20traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=69f2370ccbff5d8610306478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0204-cwe-1390-weak-authentication-in-soni-7bfc135a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0204%3A%20CWE-1390%20Weak%20Authentication%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=69f2370ccbff5d8610306475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7391-sql-injection-in-sourcecodester-phar-3738ac00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7391%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f2370ccbff5d861030647e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7390-cross-site-scripting-in-sourcecodest-973fd07d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7390%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f22c83cbff5d86102980eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40230-cwe-79-improper-neutralization-of-i-a6b68737</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40230%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20helpyio%20helpy&amp;severity=medium&amp;id=69f22c80cbff5d8610297c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40229-cwe-79-improper-neutralization-of-i-81f4303d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40229%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20helpyio%20helpy&amp;severity=medium&amp;id=69f22c80cbff5d8610297c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7389-sql-injection-in-eyoucms-b6a4dbdd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7389%3A%20SQL%20Injection%20in%20EyouCMS&amp;severity=medium&amp;id=69f22c80cbff5d8610297c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vehicle-based-surveillance-tools-kaspersky-officia-694e5419</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vehicle-based%20surveillance%20tools%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69f225d7cbff5d8610264d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2810-cwe-125-out-of-bounds-read-in-netsko-9336b47b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2810%3A%20CWE-125%20Out-of-bounds%20read%20in%20Netskope%20Client&amp;severity=medium&amp;id=69f22c80cbff5d8610297c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7388-code-injection-in-eyoucms-5c52cb60</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7388%3A%20Code%20Injection%20in%20EyouCMS&amp;severity=medium&amp;id=69f256b0cbff5d86103eb49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41940-cwe-306-missing-authentication-for--3aceec8f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41940%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WebPros%20cPanel&amp;severity=critical&amp;id=69f22c83cbff5d86102980f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7386-path-traversal-in-fatbobman-mail-mcp-b63b8672</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7386%3A%20Path%20Traversal%20in%20fatbobman%20mail-mcp-bridge&amp;severity=medium&amp;id=69f22c83cbff5d8610298105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6849-cwe-78-improper-neutralization-of-sp-7671f8b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6849%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20OS%20My%20Computer&amp;severity=high&amp;id=69f22c83cbff5d8610298102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5166-cwe-22-improper-limitation-of-a-path-67023af4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5166%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20Software%20Center&amp;severity=critical&amp;id=69f22c83cbff5d86102980ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7384-path-traversal-in-ezequiroga-mcp-bas-5157d4ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7384%3A%20Path%20Traversal%20in%20ezequiroga%20mcp-bases&amp;severity=medium&amp;id=69f2b622cbff5d86107b2344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5161-cwe-59-improper-link-resolution-befo-30685fe7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5161%3A%20CWE-59%20Improper%20link%20resolution%20before%20file%20access%20(&apos;link%20following&apos;)%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20About&amp;severity=high&amp;id=69f2b622cbff5d86107b2341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7111-cwe-825-expired-pointer-dereference--eb7d12bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7111%3A%20CWE-825%20Expired%20Pointer%20Dereference%20in%20HMBRAND%20Text%3A%3ACSV_XS&amp;severity=high&amp;id=69f2370ccbff5d8610306485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5141-cwe-269-improper-privilege-managemen-a6851a94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5141%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20Software%20Center&amp;severity=high&amp;id=69f22c83cbff5d86102980fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41220-cwe-787-in-acronis-acronis-devicelo-da8bb959</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41220%3A%20CWE-787%20in%20Acronis%20Acronis%20DeviceLock%20DLP&amp;severity=high&amp;id=69f22c83cbff5d86102980f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41952-cwe-123-in-acronis-acronis-devicelo-5470b5be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41952%3A%20CWE-123%20in%20Acronis%20Acronis%20DeviceLock%20DLP&amp;severity=high&amp;id=69f2b622cbff5d86107b233e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25852-cwe-427-in-acronis-acronis-devicelo-9477b775</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25852%3A%20CWE-427%20in%20Acronis%20Acronis%20DeviceLock%20DLP&amp;severity=medium&amp;id=69f2b622cbff5d86107b2338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42525-vulnerability-in-jenkins-project-je-9ecf4150</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42525%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Microsoft%20Entra%20ID%20(previously%20Azure%20AD)%20Plugin&amp;severity=medium&amp;id=69f20cdfcbff5d8610181a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42524-vulnerability-in-jenkins-project-je-e951ec4c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42524%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20HTML%20Publisher%20Plugin&amp;severity=high&amp;id=69f20cdfcbff5d8610181a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42523-vulnerability-in-jenkins-project-je-d7de8e87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42523%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20GitHub%20Plugin&amp;severity=critical&amp;id=69f20cdfcbff5d8610181a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42522-vulnerability-in-jenkins-project-je-fe6b5e9b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42522%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20GitHub%20Branch%20Source%20Plugin&amp;severity=medium&amp;id=69f20cdfcbff5d8610181a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42521-vulnerability-in-jenkins-project-je-64f5617c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42521%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Matrix%20Authorization%20Strategy%20Plugin&amp;severity=medium&amp;id=69f20cdfcbff5d8610181a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42520-vulnerability-in-jenkins-project-je-f58d910a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42520%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Credentials%20Binding%20Plugin&amp;severity=high&amp;id=69f20cdfcbff5d8610181a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42519-vulnerability-in-jenkins-project-je-5da9507b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42519%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Script%20Security%20Plugin&amp;severity=medium&amp;id=69f20cdfcbff5d8610181a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/todays-odd-web-requests-wed-apr-29th-2b0ae874</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Today&apos;s%20Odd%20Web%20Requests%2C%20(Wed%2C%20Apr%2029th)&amp;severity=medium&amp;id=69f2061ccbff5d861012618b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fresh-litellm-vulnerability-exploited-shortly-afte-9234eff7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fresh%20LiteLLM%20Vulnerability%20Exploited%20Shortly%20After%20Disclosure&amp;severity=low&amp;id=69f2024dcbff5d8610101209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5140-cwe-93-improper-neutralization-of-cr-5a5c2ac6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5140%3A%20CWE-93%20Improper%20neutralization%20of%20CRLF%20sequences%20(&apos;CRLF%20injection&apos;)%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20Update&amp;severity=high&amp;id=69f20cdfcbff5d8610181a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lofystealer-malware-targeting-minecraft-players-9a2321f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LofyStealer%3A%20Malware%20targeting%20Minecraft%20players.&amp;severity=medium&amp;id=69f30d7fcbff5d8610a2e829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-attack-activities-using-sshtor-tunnels-b1fcf896</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20Attack%20Activities%20Using%20SSH%2BTOR%20Tunnels%20to%20Achieve%20Covert%20Persistence&amp;severity=medium&amp;id=69f30d7fcbff5d8610a2e832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-internet-facing-vnc-servers-expose-ics-a294c997</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20Internet-Facing%20VNC%20Servers%20Expose%20ICS%2FOT&amp;severity=medium&amp;id=69f1f43dcbff5d861005f286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22745-cwe-400-uncontrolled-resource-consu-a0301f50</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22745%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=69f1f44acbff5d861005f7f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22741-cwe-524-information-exposure-throug-9a0a3e0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22741%3A%20CWE-524%20Information%20Exposure%20Through%20Caching%20in%20VMware%20Spring%20Framework&amp;severity=low&amp;id=69f2b622cbff5d86107b2353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2902-cwe-79-improper-neutralization-of-in-3005363c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aguidrevitch%20WP%20Meteor%20Website%20Speed%20Optimization%20Addon&amp;severity=medium&amp;id=69f1f44acbff5d861005f7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/checkmarx-confirms-data-stolen-in-supply-chain-att-ea4d4783</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Checkmarx%20Confirms%20Data%20Stolen%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69f1e62ecbff5d8610fb0e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multi-stage-malware-execution-chain-analysis-b060a93b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multi-Stage%20Malware%20Execution%20Chain%20Analysis&amp;severity=medium&amp;id=69f1e2aacbff5d8610f7a275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22740-cwe-400-uncontrolled-resource-consu-f8a20f92</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22740%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=69f2b622cbff5d86107b234f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42641-server-side-request-forgery-ssrf-in-94403813</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42641%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ILLID%20Share%20This%20Image&amp;severity=medium&amp;id=69f1f131cbff5d861004acf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42645-cross-site-request-forgery-csrf-in--8b533942</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42645%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=medium&amp;id=69f1f131cbff5d861004acfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42648-missing-authorization-in-brainstorm-9ac4bf94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42648%3A%20Missing%20Authorization%20in%20Brainstorm%20Force%20Spectra&amp;severity=medium&amp;id=69f1f131cbff5d861004ad03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42642-missing-authorization-in-stellarwp--26ce44db</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42642%3A%20Missing%20Authorization%20in%20StellarWP%20GiveWP&amp;severity=medium&amp;id=69f1f131cbff5d861004acf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42646-improper-neutralization-of-special--630cfd15</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42646%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Steve%20Burge%20TaxoPress&amp;severity=high&amp;id=69f1f131cbff5d861004ad00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42643-improper-neutralization-of-input-du-759f1676</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42643%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StellarWP%20Image%20Widget&amp;severity=medium&amp;id=69f1f131cbff5d861004acf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42644-exposure-of-sensitive-system-inform-aea32505</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42644%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPDeveloper%20BetterDocs&amp;severity=medium&amp;id=69f1f131cbff5d861004acfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42652-improper-neutralization-of-input-du-a84dea82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42652%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration&amp;severity=high&amp;id=69f1f131cbff5d861004ad06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-cyber-group-handala-targets-us-troops-in-b-09ec8a91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Cyber%20Group%20Handala%20Targets%20US%20Troops%20in%20Bahrain&amp;severity=medium&amp;id=69f1df25cbff5d8610f5814e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/user-interaction-with-a-clickfix-style-phishing-si-8aeab9dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=User%20interaction%20with%20a%20ClickFix-style%20phishing%20site%20resulted%20in%20execution%20of%20an%20obfuscated%20PowerShell%20command&amp;severity=medium&amp;id=69f1e2aacbff5d8610f7a27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/38-vulnerabilities-found-in-openemr-medical-softwa-1f54d80c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=38%20Vulnerabilities%20Found%20in%20OpenEMR%20Medical%20Software&amp;severity=medium&amp;id=69f1d81ecbff5d8610efe771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kycshadow-an-android-banking-malware-exploiting-fa-6f5f80b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KYCShadow%3A%20An%20Android%20Banking%20Malware%20Exploiting%20Fake%20KYC%20Workflows%20for%20Credential%20and%20OTP%20Theft&amp;severity=medium&amp;id=69f1dbedcbff5d8610f30c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rebex-based-telegram-rat-targeting-vietnam-8a039205</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rebex-based%20Telegram%20RAT%20Targeting%20Vietnam&amp;severity=medium&amp;id=69f1dbedcbff5d8610f30bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kyber-ransomware-is-not-just-post-quantum-name-dro-b58c6bef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kyber%20ransomware%20is%20not%20just%20post-quantum%20name-dropping&amp;severity=medium&amp;id=69f1dbedcbff5d8610f30be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-147-firefox-150-security-updates-rolling-ou-587da3ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20147%2C%20Firefox%20150%20Security%20Updates%20Rolling%20Out&amp;severity=critical&amp;id=69f1d115cbff5d8610e83d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42518-cwe-321-use-of-hard-coded-cryptogra-50b8271b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42518%3A%20CWE-321%20Use%20of%20hard-coded%20cryptographic%20key%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1cdd8cbff5d8610e56f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3325-cwe-89-improper-neutralization-of-sp-5f601496</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3325%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20CRM%20Sistemas%20de%20Fidelizaci%C3%B3n%20MegaCMS&amp;severity=critical&amp;id=69f1cdd8cbff5d8610e56f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42517-cwe-639-authorization-bypass-throug-9fd1254f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42517%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1cdd8cbff5d8610e56f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4019-cwe-862-missing-authorization-in-com-0380965b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4019%3A%20CWE-862%20Missing%20Authorization%20in%20complianz%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=medium&amp;id=69f1cdd8cbff5d8610e56f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42516-cwe-639-authorization-bypass-throug-09c867b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42516%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1cdd8cbff5d8610e56f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42515-cwe-639-authorization-bypass-throug-ffcae9ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42515%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1c306cbff5d8610dc362f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42514-cwe-319-cleartext-transmission-of-s-ef582b56</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42514%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1c306cbff5d8610dc362c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42513-cwe-287-improper-authentication-in--4bb104e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42513%3A%20CWE%20287%20Improper%20Authentication%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1c306cbff5d8610dc3629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10503-cwe-79-improper-neutralization-of-i-f39da64f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10503%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=69f1c306cbff5d8610dc3623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42412-cwe-862-missing-authorization-in-we-db7d51b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42412%3A%20CWE-862%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=medium&amp;id=69f1c306cbff5d8610dc3626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42377-cwe-862-missing-authorization-in-br-bc5666a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42377%3A%20CWE-862%20Missing%20Authorization%20in%20Brainstorm%20Force%20SureForms%20Pro&amp;severity=high&amp;id=69f1b4f6cbff5d8610c35118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-github-vulnerability-exposed-millions-of--29b3abff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20GitHub%20Vulnerability%20Exposed%20Millions%20of%20Repositories&amp;severity=critical&amp;id=69f1a6e5cbff5d8610b0fda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21023-cwe-345-insufficient-verification-o-0ad16dbf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21023%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69f1f131cbff5d861004ad09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35155-cwe-522-insufficiently-protected-cr-bbbf1a46</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35155%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Dell%20iDRAC10&amp;severity=high&amp;id=69f1f133cbff5d861004adaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23773-cwe-918-server-side-request-forgery-08701a02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23773%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Dell%20Disk%20Library%20for%20mainframe%20DLm8700&amp;severity=medium&amp;id=69f1803bcbff5d86106f825a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42615-cwe-79-improper-neutralization-of-i-760a9adb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GCHQ%20CyberChef&amp;severity=high&amp;id=69f1803bcbff5d86106f825d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gachiloader-adopts-ai-skill-lure-ffed89b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GachiLoader%20adopts%20AI%20skill%20lure&amp;severity=medium&amp;id=69f1aa6acbff5d8610b46006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-29th-2026-httpsi-00ba5c0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%2029th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9910%2C%20(Wed%2C%20Apr%2029th)&amp;severity=medium&amp;id=69f1679fcbff5d86104c9397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-30-e20ac66a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-30&amp;severity=medium&amp;id=69f368dfcbff5d8610ed77ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38992-na-f6952d1b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38992%3A%20n%2Fa&amp;severity=critical&amp;id=69f2b622cbff5d86107b234b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36837-na-cd9ff5e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36837%3A%20n%2Fa&amp;severity=high&amp;id=69f2b622cbff5d86107b233b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-29-b736825e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-29&amp;severity=medium&amp;id=69f29cf6cbff5d86105a0943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38993-na-2d47aa11</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38993%3A%20n%2Fa&amp;severity=medium&amp;id=69f26bc7cbff5d861048aa43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38991-na-9df2d0b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38991%3A%20n%2Fa&amp;severity=high&amp;id=69f26bc7cbff5d861048aa3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36841-na-3e658d19</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36841%3A%20n%2Fa&amp;severity=critical&amp;id=69f26bc7cbff5d861048aa3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50328-na-150ceb4b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50328%3A%20n%2Fa&amp;severity=high&amp;id=69f26bc7cbff5d861048aa27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37555-na-79951ab9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37555%3A%20n%2Fa&amp;severity=high&amp;id=69f22c80cbff5d8610297c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30769-na-06ff0502</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30769%3A%20n%2Fa&amp;severity=high&amp;id=69f22c80cbff5d8610297c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56537-na-85afad68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56537%3A%20n%2Fa&amp;severity=medium&amp;id=69f22c80cbff5d8610297c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56536-na-e9d95af7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56536%3A%20n%2Fa&amp;severity=medium&amp;id=69f22c80cbff5d8610297c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56535-na-3606a7f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56535%3A%20n%2Fa&amp;severity=medium&amp;id=69f22c80cbff5d8610297c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56534-na-7d725f61</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56534%3A%20n%2Fa&amp;severity=medium&amp;id=69f22c80cbff5d8610297c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atlona-atomerx21-authenticated-command-injection-57e18a85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atlona%20ATOMERX21%20-%20Authenticated%20Command%20Injection&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/langchain-core-124-sstirce-851a4282</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LangChain%20Core%201.2.4%20-%20SSTI%2FRCE&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fedora-local-privilege-escalation-13ae1a26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fedora%20-%20Local%20Privilege%20Escalation&amp;severity=high&amp;id=69f1f0fdcbff5d8610047e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xibo-cms-430-rce-via-ssti-7c5e3cc6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Xibo%20CMS%20%204.3.0%20-%20RCE%20via%20SSTI&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/facturascripts-202543-xss-d0891411</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FacturaScripts%202025.43%20-%20XSS&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juzaweb-cms-342-authenticated-remote-code-executio-c84bb825</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JuzaWeb%20CMS%203.4.2%20-%20Authenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gunet-openeclass-e-learning-platform-42-remote-cod-4148bd11</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GUnet%20OpenEclass%20E-learning%20platform%20%3C%204.2%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openkm-6312-multiple-2544ee36</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenKM%206.3.12%20-%20Multiple&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openwrt-2305-authenticated-remote-code-execution-r-acd4aa25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenWrt%2023.05%20-%20Authenticated%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geographiclib-v251-stack-buffer-overflow-b77f235e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GeographicLib%20v2.5.1%20-%20stack%20buffer%20overflow&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-4016-improper-authorization-00acffb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFAQ%20%204.0.16%20-%20Improper%20Authorization&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gnu-inetutils-26-telnetd-remote-privilege-escalati-59fbb95e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GNU%20InetUtils%202.6%20-%20Telnetd%20Remote%20Privilege%20Escalation&amp;severity=high&amp;id=69f1f0fdcbff5d8610047e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/craft-cms-5616-rce-18355586</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Craft%20CMS%205.6.16%20-%20RCE&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hax-cms-24x-stored-cross-site-scripting-xss-9cfb4f44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HAX%20CMS%2024.x%20-%20Stored%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-29-bbf6d718</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-29&amp;severity=low&amp;id=69f1bbf6cbff5d8610cdaf93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40560-cwe-444-inconsistent-interpretation-a3001da8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40560%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20MIYAGAWA%20Starman&amp;severity=high&amp;id=69f14b7fcbff5d8610f33f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7355-use-after-free-in-google-chrome-b15f15fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7355%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7340-integer-overflow-in-google-chrome-dbfe7534</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7340%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69f13d70cbff5d8610e35442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7339-heap-buffer-overflow-in-google-chrom-460e63fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7339%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3543e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7341-use-after-free-in-google-chrome-24412985</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7341%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e35446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7342-use-after-free-in-google-chrome-80fd3be9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7342%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3544a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7338-use-after-free-in-google-chrome-7ba0e538</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7338%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3543a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7345-insufficient-validation-of-untrusted-0072543f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7345%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e3554a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7346-inappropriate-implementation-in-goog-a40d1ce6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7346%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e3554e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7347-use-after-free-in-google-chrome-85b93522</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7347%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7337-type-confusion-in-google-chrome-10aceb50</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7337%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e35436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7336-use-after-free-in-google-chrome-6c0c93bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7336%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e35432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7335-use-after-free-in-google-chrome-cc0ed834</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7335%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3542e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7348-use-after-free-in-google-chrome-43c8d283</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7348%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7349-use-after-free-in-google-chrome-98167a07</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7349%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e3555a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7350-use-after-free-in-google-chrome-4aeffe71</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7350%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e3555e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7351-race-in-google-chrome-4db75acb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7351%3A%20Race%20in%20Google%20Chrome&amp;severity=low&amp;id=69f13d73cbff5d8610e35562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7352-use-after-free-in-google-chrome-f7637a8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7352%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7353-heap-buffer-overflow-in-google-chrom-d89a62e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7353%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7354-out-of-bounds-read-and-write-in-goog-4de54db5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7354%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7356-use-after-free-in-google-chrome-f2efabb3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7356%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7357-use-after-free-in-google-chrome-02ed97d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7357%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7334-use-after-free-in-google-chrome-11241864</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7334%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3542a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7358-use-after-free-in-google-chrome-7da645fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7358%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7359-use-after-free-in-google-chrome-2c93f484</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7359%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7360-insufficient-validation-of-untrusted-22afc524</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7360%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=low&amp;id=69f13d76cbff5d8610e355e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7333-use-after-free-in-google-chrome-9c8ad517</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7333%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69f13d70cbff5d8610e35426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7343-use-after-free-in-google-chrome-6725c92f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7343%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7344-use-after-free-in-google-chrome-1aabf4b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7344%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7361-use-after-free-in-google-chrome-76db2a62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7361%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7363-use-after-free-in-google-chrome-7aed2952</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7363%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33467-cwe-347-improper-verification-of-cr-ea402a3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33467%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Elastic%20Elastic%20Package%20Registry&amp;severity=medium&amp;id=69f1649ccbff5d861047eb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41446-cwe-912-hidden-functionality-in-sna-09f17c72</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41446%3A%20CWE-912%20Hidden%20Functionality%20in%20Snap%20One%2C%20LLC%20WattBox%20800&amp;severity=critical&amp;id=69f1649ccbff5d861047eb94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7319-path-traversal-in-elinsky-execution--079a5a55</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7319%3A%20Path%20Traversal%20in%20elinsky%20execution-system-mcp&amp;severity=medium&amp;id=69f1649ccbff5d861047ed05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-fake-dhl-campaign-built-to-steal-credenti-42ac68f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20Fake%20DHL%20Campaign%20Built%20to%20Steal%20Credentials&amp;severity=medium&amp;id=69f1adeecbff5d8610b7f22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7318-path-traversal-in-elie-mcp-project-486418e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7318%3A%20Path%20Traversal%20in%20elie%20mcp-project&amp;severity=medium&amp;id=69f1649ccbff5d861047ecff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7317-deserialization-in-grav-cms-501c1526</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7317%3A%20Deserialization%20in%20Grav%20CMS&amp;severity=low&amp;id=69f1649ccbff5d861047ecf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7316-command-injection-in-eiliyaabedini-a-2693f5b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7316%3A%20Command%20Injection%20in%20eiliyaabedini%20aider-mcp&amp;severity=medium&amp;id=69f1649ccbff5d861047ecf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7315-path-traversal-in-eiceblue-spire-pdf-edd695ea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7315%3A%20Path%20Traversal%20in%20eiceblue%20spire-pdf-mcp-server&amp;severity=medium&amp;id=69f1649ccbff5d861047ec0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7314-path-traversal-in-eiceblue-spire-doc-6456bd3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7314%3A%20Path%20Traversal%20in%20eiceblue%20spire-doc-mcp-server&amp;severity=medium&amp;id=69f1649ccbff5d861047ebfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7306-use-of-hard-coded-cryptographic-key--32964878</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7306%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=69f1649ccbff5d861047ebed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7305-server-side-request-forgery-in-xuxue-de572ab7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7305%3A%20Server-Side%20Request%20Forgery%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=69f1649ccbff5d861047ebdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7303-improper-control-of-resource-identif-a34be21a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7303%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=69f1649ccbff5d861047ebcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7297-cross-site-scripting-in-sourcecodest-bf6ed27e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7297%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649ccbff5d861047ebb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insurance-data-gives-cisos-new-ammo-for-budg-687e996c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insurance%20Data%20Gives%20CISOs%20New%20Ammo%20for%20Budget%20Talks&amp;severity=medium&amp;id=69f0fe25cbff5d861062d85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7296-cross-site-scripting-in-sourcecodest-6568942a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7296%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649ccbff5d861047eba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7295-cross-site-scripting-in-sourcecodest-b79ed129</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7295%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649fcbff5d861047ef5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7294-cross-site-scripting-in-sourcecodest-cd5e59fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7294%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649fcbff5d861047eedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24231-cwe-918-server-side-request-forgery-64e01ed7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24231%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20NVIDIA%20NemoClaw&amp;severity=medium&amp;id=69f1649fcbff5d861047eec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24222-cwe-497-exposure-of-sensitive-syste-98c62a9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24222%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20NVIDIA%20NemoClaw&amp;severity=high&amp;id=69f1649fcbff5d861047eebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24204-cwe-20-improper-input-validation-in-213f6e73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24204%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NVIDIA%20FLARE%20SDK&amp;severity=medium&amp;id=69f1649fcbff5d861047eeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24186-cwe-502-deserialization-of-untruste-a3469bdd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24186%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20FLARE%20SDK&amp;severity=high&amp;id=69f1649fcbff5d861047eeb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7293-sql-injection-in-sourcecodester-pizz-6e24f646</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7293%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649fcbff5d861047eed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24178-cwe-639-authorization-bypass-throug-2c6d438d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24178%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20NVIDIA%20FLARE%20SDK&amp;severity=critical&amp;id=69f1649fcbff5d861047eead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6807-cwe-611-in-nsa-grassmarlin-7885cf50</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6807%3A%20CWE-611%20in%20NSA%20GRASSMARLIN&amp;severity=medium&amp;id=69f1649fcbff5d861047eecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3893-cwe-306-in-carlson-software-vasco-b--bccf8b2a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3893%3A%20CWE-306%20in%20Carlson%20Software%20VASCO-B%20GNSS%20Receiver&amp;severity=critical&amp;id=69f1649fcbff5d861047eec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7292-improper-authorization-in-o2oa-7cdf1fbd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7292%3A%20Improper%20Authorization%20in%20o2oa&amp;severity=medium&amp;id=69f1649fcbff5d861047eecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7291-server-side-request-forgery-in-o2oa-12949d3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7291%3A%20Server-Side%20Request%20Forgery%20in%20o2oa&amp;severity=medium&amp;id=69f1649ccbff5d861047ed20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vimeo-confirms-user-and-customer-data-breach-867b581e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vimeo%20Confirms%20User%20and%20Customer%20Data%20Breach&amp;severity=medium&amp;id=69f0ec91cbff5d8610507224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5794-cwe-694-use-of-multiple-resources-wi-d387600a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5794%3A%20CWE-694%20Use%20of%20multiple%20resources%20with%20duplicate%20identifier%20in%20Ercom%20Cryptobox&amp;severity=medium&amp;id=69f1649ccbff5d861047ed10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6238-cwe-126-buffer-over-read-in-the-gnu--edbd45ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6238%3A%20CWE-126%20Buffer%20over-read%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=69f1649ccbff5d861047ed13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vect-ransomware-by-design-wiper-by-accident-b77be0ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VECT%3A%20Ransomware%20by%20design%2C%20Wiper%20by%20accident&amp;severity=medium&amp;id=69f1adeecbff5d8610b7f21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7290-sql-injection-in-jeecgboot-44ffcdae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7290%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=69f1649ccbff5d861047ed17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-practical-guide-to-secure-vibe-coding-for-small--31147acf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20practical%20guide%20to%20secure%20vibe-coding%20for%20small%20businesses%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69f1f187cbff5d861004fd5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-mythos-moment-enterprises-must-fight-agents-wi-60e10811</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Mythos%20Moment%3A%20Enterprises%20Must%20Fight%20Agents%20with%20Agents&amp;severity=medium&amp;id=69f0d779cbff5d861035325e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-a-step-by-step-approach-to-ai-govern-1e4bf571</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20A%20Step-by-Step%20Approach%20to%20AI%20Governance&amp;severity=medium&amp;id=69f0d3f6cbff5d86102cee14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41873-cwe-444-inconsistent-interpretation-592a2ec3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41873%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Pony%20Mail&amp;severity=critical&amp;id=69f1649ccbff5d861047ed0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7289-buffer-overflow-in-d-link-dir-825m-c9751f35</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7289%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825M&amp;severity=high&amp;id=69f0d09ecbff5d86102a30e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40969-cwe-209-generation-of-error-message-4c52c0ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40969%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Spring%20Spring%20gRPC&amp;severity=low&amp;id=69f0d09ecbff5d86102a30d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/robinhood-vulnerability-exploited-for-phishing-att-c1650404</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Robinhood%20Vulnerability%20Exploited%20for%20Phishing%20Attacks&amp;severity=medium&amp;id=69f0c969cbff5d861023bcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7288-buffer-overflow-in-d-link-dir-825m-790ca980</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7288%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825M&amp;severity=high&amp;id=69f0d09ecbff5d86102a30de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7283-sql-injection-in-sourcecodester-phar-cfb7d591</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7283%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0d09ecbff5d86102a30d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40556-cwe-732-incorrect-permission-assign-c931c0a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40556&amp;severity=null&amp;id=69f0c288cbff5d86101cc9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7321-vulnerability-in-mozilla-firefox-1855007f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7321%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69f0c288cbff5d86101cc9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7324-vulnerability-in-mozilla-firefox-f4a866b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7324%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69f1649ccbff5d861047ed27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7323-vulnerability-in-mozilla-firefox-ec550385</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7323%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69f0c288cbff5d86101cc9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7322-vulnerability-in-mozilla-firefox-beb624de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7322%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69f0c288cbff5d86101cc9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7320-vulnerability-in-mozilla-firefox-046c3b9e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7320%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69f0c288cbff5d86101cc9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40968-cwe-653-improper-isolation-or-compa-49d1c2fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40968%3A%20CWE-653%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Spring%20Spring%20gRPC&amp;severity=medium&amp;id=69f0c288cbff5d86101cc9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alleged-chinese-state-hacker-extradited-to-us-579666a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alleged%20Chinese%20State%20Hacker%20Extradited%20to%20US&amp;severity=medium&amp;id=69f0b7d6cbff5d86101429f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7282-sql-injection-in-sourcecodester-phar-69a59036</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7282%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0c288cbff5d86101cc9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/http-requests-with-x-vercel-set-bypass-cookie-head-da2f8e7a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTTP%20Requests%20with%20X-Vercel-Set-Bypass-Cookie%20Header%2C%20(Tue%2C%20Apr%2028th)&amp;severity=medium&amp;id=69f0b7e2cbff5d8610142b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7281-cross-site-scripting-in-sourcecodest-257c9389</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7281%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0b827cbff5d8610144410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40552-cwe-669-incorrect-resource-transfer-7605e272</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40552%3A%20CWE-669%3A%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20BinSoft%20mpGabinet&amp;severity=medium&amp;id=69f0b827cbff5d86101443fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40551-cwe-603-use-of-client-side-authenti-2147c575</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40551%3A%20CWE-603%3A%20Use%20of%20Client-Side%20Authentication%20in%20BinSoft%20mpGabinet&amp;severity=high&amp;id=69f0b827cbff5d86101443f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40550-cwe-250-execution-with-unnecessary--cd433f12</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40550%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20BinSoft%20mpGabinet&amp;severity=medium&amp;id=69f0b827cbff5d86101443f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6706-cwe-862-missing-authorization-in-dev-844794df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6706%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69f0b827cbff5d8610144405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5944-cwe-306-missing-authentication-for-c-9c2e28be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5944%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Nutanix%20Cisco%20Intersight%20Device%20Connector%20for%20Prism%20Central&amp;severity=medium&amp;id=69f0b827cbff5d8610144400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vect-ransomware-by-design-wiper-by-accident-453aa263</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VECT%3A%20Ransomware%20by%20design%2C%20Wiper%20by%20accident&amp;severity=medium&amp;id=69f1f175cbff5d861004d351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7272-path-traversal-in-williamcloudqi-mat-89a68a41</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7272%3A%20Path%20Traversal%20in%20WilliamCloudQi%20matlab-mcp-server&amp;severity=medium&amp;id=69f0b827cbff5d8610144408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dozens-of-open-vsx-extension-clones-linked-to-glas-a7561f2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dozens%20of%20Open%20VSX%20Extension%20Clones%20Linked%20to%20GlassWorm%20Malware&amp;severity=medium&amp;id=69f0ad4acbff5d86100ca8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7309-untrusted-search-path-in-red-hat-red-1a33e6b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7309%3A%20Untrusted%20Search%20Path%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Container%20Platform%204&amp;severity=medium&amp;id=69f0b132cbff5d86100ea269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7271-path-traversal-in-dv0x-creative-ad-a-e832cdd5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7271%3A%20Path%20Traversal%20in%20DV0x%20creative-ad-agent&amp;severity=medium&amp;id=69f0b132cbff5d86100ea261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7269-cross-site-scripting-in-sourcecodest-fbd6595d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7269%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0b132cbff5d86100ea259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5435-cwe-787-out-of-bounds-write-in-the-g-f1e870bd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5435%3A%20CWE-787%20Out-of-bounds%20write%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69f0b132cbff5d86100ea24c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/electric-motorcycles-and-scooters-face-hacking-ris-b197840f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Electric%20Motorcycles%20and%20Scooters%20Face%20Hacking%20Risks%20to%20Security%20and%20Rider%20Safety&amp;severity=medium&amp;id=69f0a2bdcbff5d8610071866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5781-cwe-285-improper-authorization-in-mp-d70ee5a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5781%3A%20CWE-285%20Improper%20Authorization%20in%20MphRx%20Minerva&amp;severity=high&amp;id=69f0b132cbff5d86100ea256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5780-cwe-284-improper-access-control-in-m-d7854785</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5780%3A%20CWE-284%20Improper%20Access%20Control%20in%20MphRx%20Minerva&amp;severity=high&amp;id=69f0b132cbff5d86100ea253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5779-cwe-284-improper-access-control-in-m-135a916d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5779%3A%20CWE-284%20Improper%20Access%20Control%20in%20MphRx%20Minerva&amp;severity=critical&amp;id=69f0b132cbff5d86100ea250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/no-patch-for-new-phantomrpc-privilege-escalation-t-65e5eb4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=No%20Patch%20for%20New%20PhantomRPC%20Privilege%20Escalation%20Technique%20in%20Windows&amp;severity=high&amp;id=69f09bb5cbff5d861003a307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7268-sql-injection-in-sourcecodester-pizz-852d66f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7268%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f0b136cbff5d86100ea407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7267-sql-injection-in-sourcecodester-pizz-4fc4bde8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7267%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f0c288cbff5d86101cc9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/germany-suspects-russia-is-behind-signal-phishing--c6c064af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Germany%20Suspects%20Russia%20Is%20Behind%20Signal%20Phishing%20That%20Targeted%20Top%20Officials&amp;severity=medium&amp;id=69f094adcbff5d8610ff87f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7266-sql-injection-in-sourcecodester-pizz-528fff14</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7266%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f0d09ecbff5d86102a30ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7265-sql-injection-in-sourcecodester-pizz-1ad58425</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7265%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f0912acbff5d8610facead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3323-cwe-306-missing-authentication-for-c-7fc2660c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3323%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20VEGA%20Grieshaber%20VEGAPULS%206X%20Two-wire%20PROFINET%2C%20Modbus%20TCP%2C%20OPC%20UA%20(Ethernet-APL)&amp;severity=high&amp;id=69f0912acbff5d8610facea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7280-cwe-428-unquoted-search-path-or-elem-493f4b61</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7280%3A%20CWE-428%20Unquoted%20search%20path%20or%20element%20in%20eMPIA%20Technology%20AVACAST&amp;severity=high&amp;id=69f086c2cbff5d8610f343d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7279-cwe-427-uncontrolled-search-path-ele-2fa5114d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7279%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20eMPIA%20Technology%20AVACAST&amp;severity=high&amp;id=69f086bfcbff5d8610f3428b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7264-sql-injection-in-sourcecodester-pizz-cadf1164</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7264%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f086bfcbff5d8610f34284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41636-cwe-674-uncontrolled-recursion-in-a-a7343026</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41636%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41607-cwe-125-out-of-bounds-read-in-apach-679c921d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41607%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=medium&amp;id=69f086bfcbff5d8610f3427c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41606-cwe-674-uncontrolled-recursion-in-a-d467d0ce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41606%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=medium&amp;id=69f086bfcbff5d8610f34278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41605-cwe-190-integer-overflow-or-wraparo-6b02b2fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41605%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41604-cwe-125-out-of-bounds-read-in-apach-dc16fb9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41604%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41603-cwe-297-improper-validation-of-cert-6578089c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41603%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f3426c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41602-cwe-190-integer-overflow-or-wraparo-27433c8b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41602%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48431-cwe-762-mismatched-memory-managemen-cbe6be14</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48431%3A%20CWE-762%20Mismatched%20Memory%20Management%20Routines%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7248-buffer-overflow-in-d-link-di-8100-798ac14e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7248%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=critical&amp;id=69f0788fcbff5d8610e928f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7247-buffer-overflow-in-d-link-di-8100-97660054</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7247%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=69f0788fcbff5d8610e928ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spectrum-security-emerges-from-stealth-mode-with-1-15f15493</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spectrum%20Security%20Emerges%20From%20Stealth%20Mode%20With%20%2419%20Million&amp;severity=medium&amp;id=69f07185cbff5d8610e26cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7244-os-command-injection-in-totolink-a80-f82a0e92</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7244%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f0788fcbff5d8610e928e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ot-focused-malware-highlights-emerging-risk-to-wat-3119c9d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OT-Focused%20Malware%20Highlights%20Emerging%20Risk%20to%20Water%20Infrastructure%20Systems&amp;severity=medium&amp;id=69f0beddcbff5d8610199dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attack-activity-analysis-using-sshtor-tunnels-for--d90ac7f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attack%20Activity%20Analysis%20Using%20SSH%2BTOR%20Tunnels%20for%20Covert%20Persistence&amp;severity=medium&amp;id=69f1b4f5cbff5d8610c35091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-third-vultr-seoul-box-60-kimsuky-domains-18-mont-eeb2e008</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Third%20Vultr%20Seoul%20Box%3A%2060%2B%20Kimsuky%20Domains%2C%2018%20Months%20of%20DDNS%20Rotation%2C%20and%20a%205-Year%20Infrastructure%20Trail&amp;severity=medium&amp;id=69f0c280cbff5d86101cb678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7243-os-command-injection-in-totolink-a80-73a189fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7243%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f0788fcbff5d8610e928df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10539-cwe-295-improper-certificate-valida-f564b146</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10539%3A%20CWE-295%20Improper%20certificate%20validation%20in%20DeskTime%20DeskTime%20Time%20Tracking%20App&amp;severity=medium&amp;id=69f0788fcbff5d8610e928c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7242-os-command-injection-in-totolink-a80-cac9fbc1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7242%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f0788fcbff5d8610e928d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40980-cwe-400-uncontrolled-resource-consu-175c37aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40980%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Spring%20Spring%20AI&amp;severity=medium&amp;id=69f0788fcbff5d8610e928ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40979-cwe-377-insecure-temporary-file-in--f6bd7b67</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40979%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Spring%20Spring%20AI&amp;severity=medium&amp;id=69f0788fcbff5d8610e928cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7241-os-command-injection-in-totolink-a80-69ec6c50</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7241%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f0788fcbff5d8610e928d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40978-cwe-89-improper-neutralization-of-s-d943c58c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40978%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69f0788fcbff5d8610e928c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7240-os-command-injection-in-totolink-a80-cd808cb1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7240%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f06034cbff5d8610cfe2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tall-tales-how-chinese-actors-use-impersonation-an-d6edf126</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tall%20Tales%3A%20How%20Chinese%20Actors%20Use%20Impersonation%20and%20Stolen%20Narratives%20to%20Perpetuate%20Digital%20Transnational%20Repression&amp;severity=medium&amp;id=69f0c280cbff5d86101cb5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54013-cwe-306-missing-authentication-for--fbf6369a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54013%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Hanwha%20Vision%20QND-8080R&amp;severity=high&amp;id=69f0602fcbff5d8610cfd2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54012-cwe-78-improper-neutralization-of-s-2a77bad7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54012%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Hanwha%20Vision%20QND-8080R&amp;severity=high&amp;id=69f0602fcbff5d8610cfd2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7238-unrestricted-upload-in-code-projects-64248e9e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7238%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69f06034cbff5d8610cfe2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54011-cwe-20-improper-input-validation-in-afa84b22</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54011%3A%20CWE-20%20Improper%20input%20validation%20in%20Hanwha%20Vision%20QND-8080R&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4805-cwe-79-improper-neutralization-of-in-258f5315</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duongancol%20Woostify&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4911-cwe-472-external-control-of-assumed--f8c23604</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4911%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20masaakitanaka%20Booking%20Package&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7237-path-traversal-in-agiflow-scaffold-m-c930a9b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7237%3A%20Path%20Traversal%20in%20AgiFlow%20scaffold-mcp&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40966-cwe-284-improper-access-control-in--e8e38b70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40966%3A%20CWE-284%20Improper%20Access%20Control%20in%20VMware%20Spring%20AI&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medtronic-hack-confirmed-after-shinyhunters-threat-e869d541</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medtronic%20Hack%20Confirmed%20After%20ShinyHunters%20Threatens%20Data%20Leak&amp;severity=medium&amp;id=69f05565cbff5d8610c8963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7235-path-traversal-in-erlichliu-claude-a-0e2800d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7235%3A%20Path%20Traversal%20in%20ErlichLiu%20claude-agent-sdk-master&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7234-path-traversal-in-browseroperator-br-f785bf12</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7234%3A%20Path%20Traversal%20in%20BrowserOperator%20browser-operator-core&amp;severity=medium&amp;id=69f0521fcbff5d8610c67dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40967-cwe-94-improper-control-of-generati-2dbb5ab4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40967%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69f0521fcbff5d8610c67db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7233-out-of-bounds-read-in-artifex-mupdf-8002809c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7233%3A%20Out-of-Bounds%20Read%20in%20Artifex%20MuPDF&amp;severity=medium&amp;id=69f0521fcbff5d8610c67dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5306-cwe-79-cross-site-scripting-xss-in-c-6b1ca701</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5306%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Check%20%26%20Log%20Email&amp;severity=medium&amp;id=69f0521fcbff5d8610c67db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7230-cross-site-scripting-in-sourcecodest-adae387e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7230%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Safety%20Anger%20Pad&amp;severity=medium&amp;id=69f0521fcbff5d8610c67dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7229-sql-injection-in-code-projects-coach-b67f16d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7229%3A%20SQL%20Injection%20in%20code-projects%20Coaching%20Management%20System&amp;severity=medium&amp;id=69f0521fcbff5d8610c67db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7228-sql-injection-in-sourcecodester-pizz-2c87f8c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7228%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b66158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7227-sql-injection-in-sourcecodester-pizz-7ae8b08f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7227%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b66151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42510-cwe-829-inclusion-of-functionality--c43618fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42510%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20OpenStack%20Ironic&amp;severity=medium&amp;id=69f043f9cbff5d8610b66121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7226-sql-injection-in-sourcecodester-pizz-77d91fd3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7226%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b6614a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7225-sql-injection-in-sourcecodester-pizz-06df2189</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7225%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b66143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6725-cwe-79-improper-neutralization-of-in-2a05a592</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpclever%20WPC%20Smart%20Messages%20for%20WooCommerce&amp;severity=medium&amp;id=69f043f9cbff5d8610b6612d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6809-cwe-79-improper-neutralization-of-in-fa6db23b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Social%20Post%20Embed&amp;severity=medium&amp;id=69f043f9cbff5d8610b66134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6551-cwe-79-improper-neutralization-of-in-01aa0529</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techeshta%20Timeline%20Blocks%20for%20Gutenberg&amp;severity=medium&amp;id=69f043f9cbff5d8610b66124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7224-sql-injection-in-sourcecodester-pizz-c6a6a984</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7224%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b6613c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7223-server-side-request-forgery-in-bigsw-12e8532f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7223%3A%20Server-Side%20Request%20Forgery%20in%20BigSweetPotatoStudio%20HyperChat&amp;severity=medium&amp;id=69f035e3cbff5d861094ce49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7222-cross-site-scripting-in-code-project-ea75fafe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7222%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Coaching%20Management%20System&amp;severity=medium&amp;id=69f035e3cbff5d861094ce42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7221-server-side-request-forgery-in-tence-8bd1026c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7221%3A%20Server-Side%20Request%20Forgery%20in%20TencentCloudBase%20CloudBase-MCP&amp;severity=medium&amp;id=69f035e3cbff5d861094ce38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7220-os-command-injection-in-jackwrichard-21426fb0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7220%3A%20OS%20Command%20Injection%20in%20jackwrichards%20FastlyMCP&amp;severity=medium&amp;id=69f035e3cbff5d861094ce30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7219-buffer-overflow-in-totolink-n300rt-85312476</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7219%3A%20Buffer%20Overflow%20in%20Totolink%20N300RT&amp;severity=high&amp;id=69f035e3cbff5d861094ce29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7218-buffer-overflow-in-totolink-n300rt-9687d471</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7218%3A%20Buffer%20Overflow%20in%20Totolink%20N300RT&amp;severity=high&amp;id=69f020adcbff5d861065204b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7217-absolute-path-traversal-in-deepracti-7fd52c7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7217%3A%20Absolute%20Path%20Traversal%20in%20Deepractice%20PromptX&amp;severity=medium&amp;id=69f020adcbff5d8610652044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7216-path-traversal-in-donchelo-processin-091925d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7216%3A%20Path%20Traversal%20in%20donchelo%20processing-claude-mcp-bridge&amp;severity=medium&amp;id=69f020adcbff5d861065203c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1460-cwe-78-improper-neutralization-of-sp-6c865b02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1460%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Zyxel%20DX3301-T0%20firmware&amp;severity=high&amp;id=69f020adcbff5d8610652032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7215-command-injection-in-egtai-gmx-vmd-m-eeb51f56</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7215%3A%20Command%20Injection%20in%20egtai%20gmx-vmd-mcp&amp;severity=medium&amp;id=69f020adcbff5d8610652035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-28th-2026-httpsisc-b2b14274</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%2028th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9908%2C%20(Tue%2C%20Apr%2028th)&amp;severity=medium&amp;id=69f0161fcbff5d86105a42fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0711-cwe-78-improper-neutralization-of-sp-9fff62e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0711%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Zyxel%20DX3300-T0%20firmware&amp;severity=medium&amp;id=69f020adcbff5d861065202f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7214-path-traversal-in-eghuzefa-engineer--6ca2c9f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7214%3A%20Path%20Traversal%20in%20eghuzefa%20engineer-your-data&amp;severity=medium&amp;id=69f015a2cbff5d861059e30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7213-path-traversal-in-ef10007-mlopsmcp-024a87bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7213%3A%20Path%20Traversal%20in%20ef10007%20MLOps_MCP&amp;severity=medium&amp;id=69f015a2cbff5d861059e303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7212-path-traversal-in-edvardlindelof-not-0bce1f64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7212%3A%20Path%20Traversal%20in%20edvardlindelof%20notes-mcp&amp;severity=medium&amp;id=69f015a2cbff5d861059e2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7211-command-injection-in-dvladimirov-mcp-a9f308b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7211%3A%20Command%20Injection%20in%20dvladimirov%20MCP&amp;severity=medium&amp;id=69f008add3d5ab9102728441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7206-sql-injection-in-dubydu-sqlite-mcp-2e443e21</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7206%3A%20SQL%20Injection%20in%20dubydu%20sqlite-mcp&amp;severity=medium&amp;id=69f008add3d5ab9102728438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7205-path-traversal-in-duartium-papers-mc-ac891dff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7205%3A%20Path%20Traversal%20in%20duartium%20papers-mcp-server&amp;severity=medium&amp;id=69f008add3d5ab9102728431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7204-os-command-injection-in-totolink-a80-304b8a45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7204%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f008add3d5ab910272842a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7203-os-command-injection-in-totolink-a80-b3a02d32</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7203%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f008add3d5ab9102728423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-29-bee05794</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-29&amp;severity=medium&amp;id=69f31076cbff5d8610a442a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60889-na-4e760c61</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60889%3A%20n%2Fa&amp;severity=critical&amp;id=69f165e4cbff5d86104b64f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60887-na-bf1f752e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60887%3A%20n%2Fa&amp;severity=medium&amp;id=69f165e4cbff5d86104b64ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38949-na-43782f51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38949%3A%20n%2Fa&amp;severity=null&amp;id=69f1649fcbff5d861047ef8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38948-na-6b6fa87b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38948%3A%20n%2Fa&amp;severity=medium&amp;id=69f1649fcbff5d861047ef87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38651-na-f476ac9e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38651%3A%20n%2Fa&amp;severity=high&amp;id=69f1649fcbff5d861047ef81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37750-na-cce03552</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37750%3A%20n%2Fa&amp;severity=medium&amp;id=69f1649ccbff5d861047eb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-28-4ccfa6d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-28&amp;severity=medium&amp;id=69f14b75cbff5d8610f31302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67223-na-bef1a693</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67223%3A%20n%2Fa&amp;severity=high&amp;id=69f0d09ecbff5d86102a30cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-28-1048392e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-28&amp;severity=low&amp;id=69f09f32cbff5d861004acee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41526-cwe-150-improper-neutralization-of--a6e8dde0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41526%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20KDE%20KCoreAddons&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41525-cwe-669-incorrect-resource-transfer-b6daee56</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41525%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20KDE%20Dolphin&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40356-cwe-191-integer-underflow-wrap-or-w-d22033d8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40356%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20MIT%20Kerberos%205&amp;severity=medium&amp;id=69f0521fcbff5d8610c67dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40355-cwe-476-null-pointer-dereference-in-7c5cdf8c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40355%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MIT%20Kerberos%205&amp;severity=medium&amp;id=69f043f9cbff5d8610b6611c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20766-cwe-122-in-milesight-ms-cxx63-pd-3f20a1ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20766%3A%20CWE-122%20in%20Milesight%20MS-Cxx63-PD&amp;severity=high&amp;id=69f008add3d5ab910272840c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7202-os-command-injection-in-totolink-a80-9229772f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7202%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f008add3d5ab910272841b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32649-cwe-78-in-milesight-ms-cxx63-pd-d5b116ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32649%3A%20CWE-78%20in%20Milesight%20MS-Cxx63-PD&amp;severity=high&amp;id=69f008add3d5ab9102728416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32644-cwe-321-in-milesight-ms-cxx63-pd-60e79b90</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32644%3A%20CWE-321%20in%20Milesight%20MS-Cxx63-PD&amp;severity=critical&amp;id=69f008add3d5ab9102728411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27785-cwe-798-in-milesight-ms-cxx63-pd-a47740d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27785%3A%20CWE-798%20in%20Milesight%20MS-Cxx63-PD&amp;severity=high&amp;id=69f0134ecbff5d861057a5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40977-cwe-59-improper-link-resolution-bef-280cda4b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40977%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69f0134ecbff5d861057a5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40976-cwe-862-missing-authorization-in-sp-358f8485</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40976%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Spring%20Spring%20Boot&amp;severity=critical&amp;id=69f0134ecbff5d861057a5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40975-cwe-330-use-of-insufficiently-rando-03815315</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40975%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69f0134ecbff5d861057a5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40974-cwe-295-improper-certificate-valida-b9490338</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40974%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69f0134ecbff5d861057a5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7200-cross-site-scripting-in-sourcecodest-89c9fa53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7200%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0134ecbff5d861057a5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40973-cwe-377-insecure-temporary-file-in--ecbb583e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40973%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Spring%20Spring%20Boot&amp;severity=high&amp;id=69f0134ecbff5d861057a5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40972-cwe-208-observable-timing-discrepan-0658711e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40972%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20Spring%20Spring%20Boot&amp;severity=high&amp;id=69eff011d3d5ab91023eabf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7199-sql-injection-in-sourcecodester-phar-8085c5cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7199%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69eff011d3d5ab91023eabfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7196-sql-injection-in-codeastro-online-cl-5490b32d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7196%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69eff011d3d5ab91023eabf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40971-cwe-295-improper-certificate-valida-efdceea9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40971%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69efec8cd3d5ab91023ba5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7194-sql-injection-in-sourcecodester-phar-30482406</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7194%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69efec8cd3d5ab91023ba5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28747-cwe-639-in-milesight-ms-cxx63-pd-5f25c353</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28747%3A%20CWE-639%20in%20Milesight%20MS-Cxx63-PD&amp;severity=high&amp;id=69efec8cd3d5ab91023ba5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7183-uncaught-exception-in-aligungr-ueran-46c8f60d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7183%3A%20Uncaught%20Exception%20in%20aligungr%20UERANSIM&amp;severity=medium&amp;id=69efe58fd3d5ab91023219a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7179-path-traversal-in-ospg-binwalk-3fa14598</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7179%3A%20Path%20Traversal%20in%20OSPG%20binwalk&amp;severity=medium&amp;id=69efe58fd3d5ab910232199f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7178-server-side-request-forgery-in-chatg-6d14a4ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7178%3A%20Server-Side%20Request%20Forgery%20in%20ChatGPTNextWeb%20NextChat&amp;severity=medium&amp;id=69efdfeaba26a39fba6a0636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7177-server-side-request-forgery-in-chatg-4c6ac8b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7177%3A%20Server-Side%20Request%20Forgery%20in%20ChatGPTNextWeb%20NextChat&amp;severity=medium&amp;id=69efdc66ba26a39fba68d653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7160-command-injection-in-tenda-hg3-d40cdfd6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7160%3A%20Command%20Injection%20in%20Tenda%20HG3&amp;severity=high&amp;id=69efd8e1ba26a39fba67dee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7159-path-traversal-in-douinc-mkdocs-mcp--3ac8463c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7159%3A%20Path%20Traversal%20in%20douinc%20mkdocs-mcp-plugin&amp;severity=medium&amp;id=69efd8e1ba26a39fba67ded9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7158-server-side-request-forgery-in-dmitr-7b25460e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7158%3A%20Server-Side%20Request%20Forgery%20in%20dmitryglhf%20mcp-url-downloader&amp;severity=medium&amp;id=69efd1e7ba26a39fba655246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3087-cwe-22-in-python-software-foundation-cf87d6ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3087%3A%20CWE-22%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69efd1e7ba26a39fba655233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7157-command-injection-in-disler-aider-mc-b20a7960</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7157%3A%20Command%20Injection%20in%20disler%20aider-mcp-server&amp;severity=medium&amp;id=69efd1e7ba26a39fba65523f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7156-os-command-injection-in-totolink-a80-8abcd97a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7156%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efd1e7ba26a39fba655238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7155-os-command-injection-in-totolink-a80-1189da9b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7155%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc789ba26a39fba6016e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7191-cwe-94-improper-control-of-generatio-bdaccdc6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7191%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20AWS%20QnABot%20on%20AWS&amp;severity=high&amp;id=69efc789ba26a39fba6016ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7154-os-command-injection-in-totolink-a80-26498eb9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7154%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc789ba26a39fba6016dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7153-os-command-injection-in-totolink-a80-ebd1ddca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7153%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc04fba26a39fba5c0c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6741-cwe-269-improper-privilege-managemen-3462c309</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6741%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=69efc04fba26a39fba5c0c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7152-os-command-injection-in-totolink-a80-b2761578</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7152%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc04fba26a39fba5c0c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7151-stack-based-buffer-overflow-in-tenda-bc5ad396</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7151%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG3&amp;severity=high&amp;id=69efc04fba26a39fba5c0c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40970-cwe-295-improper-certificate-valida-d8275d91</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40970%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69efb5d1ba26a39fba55640b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7150-server-side-request-forgery-in-dh101-71f7a36b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7150%3A%20Server-Side%20Request%20Forgery%20in%20dh1011%20auto-favicon&amp;severity=medium&amp;id=69efb5d1ba26a39fba556415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7149-path-traversal-in-dexhunter-kaggle-m-7a2ee86d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7149%3A%20Path%20Traversal%20in%20dexhunter%20kaggle-mcp&amp;severity=medium&amp;id=69efb5d1ba26a39fba55640e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7148-sql-injection-in-codeastro-online-cl-e8513a58</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7148%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69efaeccba26a39fba5319ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7147-server-side-request-forgery-in-joeca-6b5a2679</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7147%3A%20Server-Side%20Request%20Forgery%20in%20JoeCastrom%20mcp-chat-studio&amp;severity=medium&amp;id=69efaeccba26a39fba5319e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32655-cwe-272-least-privilege-violation-i-f7039c68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32655%3A%20CWE-272%3A%20Least%20Privilege%20Violation%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=medium&amp;id=69efaeccba26a39fba5319d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25908-cwe-250-execution-with-unnecessary--d2f1849b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25908%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=medium&amp;id=69efa7b1ba26a39fba50222d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7146-server-side-request-forgery-in-aleja-702eb052</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7146%3A%20Server-Side%20Request%20Forgery%20in%20AlejandroArciniegas%20mcp-data-vis&amp;severity=medium&amp;id=69efa7b1ba26a39fba502230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7145-authorization-bypass-in-mettle-sendp-42c88490</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7145%3A%20Authorization%20Bypass%20in%20mettle%20sendportal&amp;severity=medium&amp;id=69efa435ba26a39fba4f0c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7144-authorization-bypass-in-1000-project-3deadf42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7144%3A%20Authorization%20Bypass%20in%201000%20Projects%20Portfolio%20Management%20System%20MCA&amp;severity=medium&amp;id=69efa435ba26a39fba4f0c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7143-sql-injection-in-1000-projects-portf-39937c5d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7143%3A%20SQL%20Injection%20in%201000%20Projects%20Portfolio%20Management%20System%20MCA&amp;severity=medium&amp;id=69efa435ba26a39fba4f0c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7142-improper-authorization-in-wooey-6518edb2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7142%3A%20Improper%20Authorization%20in%20Wooey&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7141-uninitialized-resource-in-vllm-b1e6fdbd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7141%3A%20Uninitialized%20Resource%20in%20vllm&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7140-os-command-injection-in-totolink-a80-a2a3f726</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7140%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efa435ba26a39fba4f0ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/73-open-vsx-sleeper-extensions-linked-to-malware-s-9cad5c0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=73%20Open%20VSX%20Sleeper%20Extensions%20Linked%20to%20Malware%20Show%20New%20Activations&amp;severity=medium&amp;id=69ef8f0dba26a39fba414088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-bulletproof-hosting-network-behind-1600-56c3bc34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20Bulletproof%20Hosting%20Network%20Behind%2016%2C000%2B%20Fake%20Shops&amp;severity=medium&amp;id=69ef8f0dba26a39fba41407d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7139-os-command-injection-in-totolink-a80-33aa0c9f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7139%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc375ba26a39fba5dc2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/extortion-in-the-enterprise-defending-against-blac-3436d7f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Extortion%20in%20the%20Enterprise%3A%20Defending%20Against%20BlackFile%20Attacks&amp;severity=medium&amp;id=69ef8f0dba26a39fba41408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-crypto-wallet-clones-in-the-app-store-and-fd9f5a88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20crypto-wallet%20clones%20in%20the%20App%20Store%20and%20other%20attacks%20on%20iOS%20and%20macOS%20crypto%20owners%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ef8c66ba26a39fba3fde0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7138-os-command-injection-in-totolink-a80-9e15fc72</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7138%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef8b94ba26a39fba3f69b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7137-os-command-injection-in-totolink-a80-5b52ad7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7137%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef8b94ba26a39fba3f69b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7136-os-command-injection-in-totolink-a80-5d4eb111</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7136%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef8b94ba26a39fba3f69aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6970-cwe-842-placement-of-user-into-incor-e26f8061</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6970%3A%20CWE-842%20Placement%20of%20user%20into%20incorrect%20group%20in%20Canonical%20authd&amp;severity=high&amp;id=69ef8b94ba26a39fba3f69a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54505-cwe-1420-exposure-of-sensitive-info-66b28f59</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54505%3A%20CWE-1420%20%20Exposure%20of%20Sensitive%20Information%20during%20Transient%20Execution%20in%20AMD%20AMD%20EPYC%E2%84%A2%207001%20Series%20Processors&amp;severity=low&amp;id=69ef811fba26a39fba3a6d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7135-out-of-bounds-read-in-gpac-a1c73700</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7135%3A%20Out-of-Bounds%20Read%20in%20GPAC&amp;severity=medium&amp;id=69ef811fba26a39fba3a6dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7134-unrestricted-upload-in-code-projects-93f887d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7134%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Lot%20Reservation%20System&amp;severity=medium&amp;id=69ef811fba26a39fba3a6da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7133-unrestricted-upload-in-code-projects-e126e654</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7133%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Lot%20Reservation%20System&amp;severity=medium&amp;id=69ef79fcba26a39fba368bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7132-path-traversal-in-code-projects-onli-f43d2f7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7132%3A%20Path%20Traversal%20in%20code-projects%20Online%20Lot%20Reservation%20System&amp;severity=medium&amp;id=69ef79fcba26a39fba368bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40514-cwe-338-use-of-cryptographically-we-40279933</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40514%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20SmarterTools%20Inc.%20SmarterMail&amp;severity=high&amp;id=69ef79fcba26a39fba368ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6357-vulnerability-in-pip-maintainers-pip-c9bfaede</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6357%3A%20Vulnerability%20in%20Pip%20maintainers%20pip&amp;severity=medium&amp;id=69ef79fcba26a39fba368ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7131-sql-injection-in-code-projects-onlin-d8a0922d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7131%3A%20SQL%20Injection%20in%20code-projects%20Online%20Lot%20Reservation%20System&amp;severity=medium&amp;id=69ef79fcba26a39fba368bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-008-26-day-pa-d3a1c9c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20008%20-%2026-Day%20Pause%20Ends%20with%20Three%20Concurrent%20Compromises%20(Checkmarx%20KICS%2C%20Bitwarden%20CLI%20Cascade%2C%20xinference%20PyPI)%2C%20CanisterSprawl%20npm%20Worm%20Identified%2C%20and%20Tier%201%20Coverage%20Returns%2C%20(Mon%2C%20Apr%2027th)&amp;severity=low&amp;id=69ef6f6aba26a39fba2fe8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7130-sql-injection-in-sourcecodester-phar-b37da0b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7130%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef6f96ba26a39fba2ff985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32688-cwe-770-allocation-of-resources-wit-e2617990</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32688%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20elixir-plug%20plug_cowboy&amp;severity=high&amp;id=69ef6f96ba26a39fba2ff971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7129-cross-site-scripting-in-sourcecodest-f2202ae0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7129%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef6f96ba26a39fba2ff97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7128-sql-injection-in-sourcecodester-phar-dc8f7058</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7128%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef6f96ba26a39fba2ff977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7127-sql-injection-in-sourcecodester-phar-a7924437</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7127%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef64deba26a39fba2863d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40557-cwe-295-improper-certificate-valida-e71177ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40557%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20Prometheus%20Reporter&amp;severity=medium&amp;id=69ef64deba26a39fba2863c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41081-cwe-287-improper-authentication-in--a5917065</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41081%3A%20CWE-287%20Improper%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20Client&amp;severity=medium&amp;id=69ef64deba26a39fba2863cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/incomplete-windows-patch-opens-door-to-zero-click--804ca52f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Incomplete%20Windows%20Patch%20Opens%20Door%20to%20Zero-Click%20Attacks&amp;severity=medium&amp;id=69ef6159ba26a39fba26e288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7126-sql-injection-in-sourcecodester-phar-3143ff4d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7126%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef64deba26a39fba2863d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6265-cwe-278-insecure-preserved-inherited-4c0ba9b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6265%3A%20CWE-278%20Insecure%20preserved%20inherited%20permissions%20in%20Cerberus%20Cerberus%20FTP%20Server&amp;severity=high&amp;id=69ef64deba26a39fba2863ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15626-cwe-639-authorization-bypass-throug-75df7060</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15626%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Ribblr%20Crotchet%20and%20Knitting&amp;severity=medium&amp;id=69ef64deba26a39fba2863c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7125-os-command-injection-in-totolink-a80-087310f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7125%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5dd8ba26a39fba258f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7124-os-command-injection-in-totolink-a80-17dc6981</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7124%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5dd8ba26a39fba258f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7040-cwe-176-improper-handling-of-unicode-17a88024</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7040%3A%20CWE-176%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20RRWO%20Text%3A%3AMinify%3A%3AXS&amp;severity=high&amp;id=69ef5dd8ba26a39fba258f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openssh-flaw-allowing-full-root-shell-access-lurke-a32be6bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenSSH%20Flaw%20Allowing%20Full%20Root%20Shell%20Access%20Lurked%20for%2015%20Years&amp;severity=low&amp;id=69ef56cdba26a39fba231582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7123-os-command-injection-in-totolink-a80-634fd53f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7123%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5dd8ba26a39fba258f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-ai-prompt-injection-attacks-increasing-b-516fa56f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20AI%20Prompt%20Injection%20Attacks%20Increasing%2C%20but%20Sophistication%20Still%20Low%3A%20Google&amp;severity=low&amp;id=69ef5349ba26a39fba2158fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/27th-april-threat-intelligence-report-f1610b0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=27th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69ef53a4ba26a39fba2171ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7122-os-command-injection-in-totolink-a80-98f75eb1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7122%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5358ba26a39fba215e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7121-os-command-injection-in-totolink-a80-db497ec6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7121%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5358ba26a39fba215e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-poisoning-via-pypi-repository-comprom-f9defab9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Poisoning%20via%20PyPI%20Repository%20Compromise&amp;severity=medium&amp;id=69ef4fc5ba26a39fba1ff6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7119-os-command-injection-in-tenda-hg3-cb5b91c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7119%3A%20OS%20Command%20Injection%20in%20Tenda%20HG3&amp;severity=high&amp;id=69ef5358ba26a39fba215e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/energy-and-water-management-firm-itron-hacked-73e29410</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Energy%20and%20Water%20Management%20Firm%20Itron%20Hacked&amp;severity=medium&amp;id=69ef48beba26a39fba1d5c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7118-sql-injection-in-code-projects-emplo-c6623a17</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7118%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef48d2ba26a39fba1d6ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5937-cwe-248-uncaught-exception-in-foxit--42296023</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5937%3A%20CWE-248%20Uncaught%20exception%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5938-insufficient-control-flow-management-c05a599b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5938%3A%20Insufficient%20Control%20Flow%20Management%20(CWE-691)%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5940-cwe-416-use-after-free-in-foxit-soft-82ad3481</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5940%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69ef48cfba26a39fba1d6dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5942-cwe-416-use-after-free-in-foxit-soft-c08799d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5942%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5943-cwe-416-use-after-free-in-foxit-soft-24b539a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5943%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69ef48cfba26a39fba1d6dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5939-cwe-416-use-after-free-in-foxit-soft-c4de69d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5939%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5941-cwe-20-improper-input-validation-in--7fadb872</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5941%3A%20CWE-20%20Improper%20input%20validation%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69ef48cfba26a39fba1d6dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7117-sql-injection-in-code-projects-emplo-b6c07af0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7117%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7116-cross-site-scripting-in-code-project-f6007849</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7116%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc6692-uses-email-bombing-social-engineering-to-d-6308b083</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC6692%20Uses%20Email%20Bombing%2C%20Social%20Engineering%20to%20Deploy%20%E2%80%98Snow%E2%80%99%20Malware&amp;severity=medium&amp;id=69ef3e31ba26a39fba195bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42410-cwe-79-improper-neutralization-of-i-fa3a5fa2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42410%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22337-cwe-266-incorrect-privilege-assignm-01630852</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22337%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Directorist%20Directorist%20Social%20Login&amp;severity=critical&amp;id=69ef3e3cba26a39fba196b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7115-sql-injection-in-code-projects-emplo-840574b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7115%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef3e3cba26a39fba196b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7114-sql-injection-in-code-projects-emplo-9ba13d91</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7114%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef3e3cba26a39fba196b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/easily-exploitable-pack2theroot-linux-vulnerabilit-f47ac708</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Easily%20Exploitable%20%E2%80%98Pack2TheRoot%E2%80%99%20Linux%20Vulnerability%20Leads%20to%20Root%20Access&amp;severity=low&amp;id=69ef3729ba26a39fba1635f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7113-missing-authentication-in-nousresear-eac9c7e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7113%3A%20Missing%20Authentication%20in%20NousResearch%20hermes-agent&amp;severity=medium&amp;id=69ef3e3cba26a39fba196b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27172-cwe-502-deserialization-of-untruste-0c460851</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27172%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=high&amp;id=69ef3e3cba26a39fba196b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33453-cwe-915-improperly-controlled-modif-884af63d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33453%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=69ef3e3cba26a39fba196b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7112-improper-authentication-in-nousresea-dc43e89e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7112%3A%20Improper%20Authentication%20in%20NousResearch%20hermes-agent&amp;severity=medium&amp;id=69ef33a6ba26a39fba15414e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33454-cwe-502-deserialization-of-untruste-3b0dba90</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33454%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=69ef33a6ba26a39fba154125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40022-cwe-288-authentication-bypass-using-0ecafeba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40022%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20Platform%20HTTP%20Main&amp;severity=high&amp;id=69ef33a6ba26a39fba15412c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-launches-sweeping-crackdown-on-southeast-asia-c-bad33b40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Launches%20Sweeping%20Crackdown%20on%20Southeast%20Asia%20Cyberscams%20and%20Sanctions%20Cambodian%20Senator&amp;severity=medium&amp;id=69ef3021ba26a39fba134baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40858-cwe-502-deserialization-of-untruste-52424157</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40858%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=high&amp;id=69ef33a6ba26a39fba154134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7110-cross-site-scripting-in-code-project-84c188a1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7110%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef33a6ba26a39fba154145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41409-cwe-502-deserialization-of-untruste-c3d25547</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41409%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20MINA&amp;severity=critical&amp;id=69ef33a6ba26a39fba154139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7109-improper-authorization-in-code-proje-f3638436</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7109%3A%20Improper%20Authorization%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef33a6ba26a39fba15413d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7108-cross-site-request-forgery-in-code-p-16013d28</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7108%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef291eba26a39fba10e2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41635-cwe-502-deserialization-of-untruste-46beca38</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41635%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20MINA&amp;severity=critical&amp;id=69ef291bba26a39fba10e188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7107-unrestricted-upload-in-code-projects-129d023e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7107%3A%20Unrestricted%20Upload%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef291eba26a39fba10e299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/firefox-vulnerability-allows-tor-user-fingerprinti-624b1087</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Firefox%20Vulnerability%20Allows%20Tor%20User%20Fingerprinting&amp;severity=low&amp;id=69ef2210ba26a39fba0e3f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7103-use-of-weak-hash-in-code-projects-ch-07788a40</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7103%3A%20Use%20of%20Weak%20Hash%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=69ef291eba26a39fba10e292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42379-cwe-201-insertion-of-sensitive-info-a7a3541e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42379%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPDeveloper%20Templately&amp;severity=high&amp;id=69ef291bba26a39fba10e18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40453-cwe-178-improper-handling-of-case-s-5d887279</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40453%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20JMS&amp;severity=critical&amp;id=69ef291bba26a39fba10e17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7102-command-injection-in-tenda-f456-f693d510</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7102%3A%20Command%20Injection%20in%20Tenda%20F456&amp;severity=medium&amp;id=69ef291eba26a39fba10e28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40860-cwe-502-deserialization-of-untruste-5ce5b6b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40860%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=69ef291bba26a39fba10e184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7101-buffer-overflow-in-tenda-f456-ccddb581</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7101%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ef291bba26a39fba10e1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40048-cwe-502-deserialization-of-untruste-37a09540</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40048%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20PQC&amp;severity=high&amp;id=69ef291bba26a39fba10e179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40473-cwe-502-deserialization-of-untruste-350ea403</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40473%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20Mina&amp;severity=high&amp;id=69ef291bba26a39fba10e180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7100-buffer-overflow-in-tenda-f456-54363147</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7100%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ef291bba26a39fba10e19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7099-buffer-overflow-in-tenda-f456-b9f5b372</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7099%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ef291bba26a39fba10e195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7098-buffer-overflow-in-tenda-f456-2ba425da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7098%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ef291bba26a39fba10e18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7097-buffer-overflow-in-tenda-f456-8b0e1328</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7097%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69efc375ba26a39fba5dc301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7096-os-command-injection-in-tenda-hg3-77bd459b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7096%3A%20OS%20Command%20Injection%20in%20Tenda%20HG3&amp;severity=high&amp;id=69ef48d2ba26a39fba1d6ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22077-vulnerability-in-oppo-oppo-wallet-a-27737c6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22077%3A%20Vulnerability%20in%20OPPO%20OPPO%20Wallet%20APP&amp;severity=medium&amp;id=69ef291eba26a39fba10e2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7095-cross-site-scripting-in-code-project-e5920b3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7095%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef5dd8ba26a39fba258f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7094-server-side-request-forgery-in-shado-19f3c488</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7094%3A%20Server-Side%20Request%20Forgery%20in%20ShadowCloneLabs%20GlutamateMCPServers&amp;severity=medium&amp;id=69ef026eba26a39fbafb331e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7093-improper-authorization-in-code-proje-f30b3776</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7093%3A%20Improper%20Authorization%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef026eba26a39fbafb3317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7092-improper-authorization-in-code-proje-be6e108c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7092%3A%20Improper%20Authorization%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef026eba26a39fbafb3310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7091-improper-authorization-in-code-proje-c65fc174</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7091%3A%20Improper%20Authorization%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef026eba26a39fbafb3309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7090-cross-site-scripting-in-code-project-94c96ca1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7090%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=69eef45eba26a39fbaf26de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7089-cross-site-scripting-in-code-project-2fa50083</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7089%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Home%20Service%20System&amp;severity=medium&amp;id=69eef45eba26a39fbaf26dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7088-sql-injection-in-sourcecodester-phar-795088e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7088%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69eef45eba26a39fbaf26dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7087-sql-injection-in-sourcecodester-phar-f2f8e554</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7087%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69eef45eba26a39fbaf26dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7086-path-traversal-in-hbai-ltd-toonflow--23d4a937</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7086%3A%20Path%20Traversal%20in%20HBAI-Ltd%20Toonflow-app&amp;severity=medium&amp;id=69eef45eba26a39fbaf26dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7085-path-traversal-in-hbai-ltd-toonflow--c33ffdf1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7085%3A%20Path%20Traversal%20in%20HBAI-Ltd%20Toonflow-app&amp;severity=low&amp;id=69eee2caba26a39fbaceec8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7084-server-side-request-forgery-in-hbai--2b58605e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7084%3A%20Server-Side%20Request%20Forgery%20in%20HBAI-Ltd%20Toonflow-app&amp;severity=medium&amp;id=69eee2caba26a39fbaceec84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7083-sql-injection-in-likeadmin-likeshop--c59f8cf9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7083%3A%20SQL%20Injection%20in%20likeadmin-likeshop%20likeadmin_php&amp;severity=medium&amp;id=69eee2caba26a39fbaceec7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7082-buffer-overflow-in-tenda-f456-cc536e34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7082%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eee2caba26a39fbaceec74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7081-buffer-overflow-in-tenda-f456-d90f75b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7081%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eee2caba26a39fbaceec6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3868-cwe-130-improper-handling-of-length--680be2d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3868%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Moxa%20EDR-8010%20Series&amp;severity=high&amp;id=69eee2caba26a39fbaceec65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3867-cwe-282-improper-ownership-managemen-f84bc9d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3867%3A%20CWE-282%3A%20Improper%20Ownership%20Management%20in%20Moxa%20EDR-8010%20Series&amp;severity=medium&amp;id=69eee2caba26a39fbaceec61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7080-buffer-overflow-in-tenda-f456-6bb8799d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7080%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eed135ba26a39fbaba83dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7079-buffer-overflow-in-tenda-f456-1842489a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7079%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eed135ba26a39fbaba83d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7106-cwe-269-improper-privilege-managemen-52554bfa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7106%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20jgrodgers%20Highland%20Software%20Custom%20Role%20Manager&amp;severity=high&amp;id=69eed135ba26a39fbaba83e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7078-buffer-overflow-in-tenda-f456-8f12c955</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7078%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eed135ba26a39fbaba83ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7077-sql-injection-in-itsourcecode-courie-4b0cdd45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7077%3A%20SQL%20Injection%20in%20itsourcecode%20Courier%20Management%20System&amp;severity=medium&amp;id=69eed135ba26a39fbaba83c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7076-sql-injection-in-itsourcecode-courie-cdc662d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7076%3A%20SQL%20Injection%20in%20itsourcecode%20Courier%20Management%20System&amp;severity=medium&amp;id=69eec325ba26a39fbab1b977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7075-sql-injection-in-itsourcecode-constr-b070b81a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7075%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69eec325ba26a39fbab1b970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7074-sql-injection-in-itsourcecode-constr-d86fa550</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7074%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69eec325ba26a39fbab1b969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7073-sql-injection-in-itsourcecode-constr-fb1ad131</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7073%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69eeb89aba26a39fbaa94844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7072-sql-injection-in-codepanda-source-ca-dd721fe0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7072%3A%20SQL%20Injection%20in%20CodePanda%20Source%20canteen_management_system&amp;severity=medium&amp;id=69eeb89aba26a39fbaa9483e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7071-file-and-directory-information-expos-7aa54267</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7071%3A%20File%20and%20Directory%20Information%20Exposure%20in%20CodeAstro%20Online%20Job%20Portal&amp;severity=medium&amp;id=69eeb89aba26a39fbaa94837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7070-sql-injection-in-code-projects-inven-f9f55dfc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7070%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=69eeb89aba26a39fbaa94830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33566-improper-neutralization-of-special--97bed31b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33566%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Japan%20Computer%20Emergency%20Response%20Team%20Coordination%20Center%20(JPCERT%2FCC)%20LogonTracer&amp;severity=medium&amp;id=69eeaaaaba26a39fba9c68c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33277-improper-neutralization-of-special--31d12542</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33277%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Japan%20Computer%20Emergency%20Response%20Team%20Coordination%20Center%20(JPCERT%2FCC)%20LogonTracer&amp;severity=high&amp;id=69eeaaaaba26a39fba9c68be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7069-buffer-overflow-in-d-link-dir-825-9f93d315</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7069%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=69eeaaaaba26a39fba9c68ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-28-884f580b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-28&amp;severity=medium&amp;id=69f12bd2cbff5d861092e3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-27-5bc03b71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-27&amp;severity=low&amp;id=69f04fe3cbff5d8610bdb109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-27-5ae51ca5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-27&amp;severity=medium&amp;id=69effa94d3d5ab910247deaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46636-na-a8490af7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46636%3A%20n%2Fa&amp;severity=critical&amp;id=69efd1e7ba26a39fba65522e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29971-na-a43413e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29971%3A%20n%2Fa&amp;severity=medium&amp;id=69efc789ba26a39fba6016d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69428-na-681f8327</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69428%3A%20n%2Fa&amp;severity=high&amp;id=69efb5d1ba26a39fba556408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35903-na-52714e0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35903%3A%20n%2Fa&amp;severity=critical&amp;id=69efaeccba26a39fba5319e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35902-na-84901bbf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35902%3A%20n%2Fa&amp;severity=medium&amp;id=69efaeccba26a39fba5319df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35901-na-8bbfd28f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35901%3A%20n%2Fa&amp;severity=medium&amp;id=69efaeccba26a39fba5319dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31256-na-24a2ddee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31256%3A%20n%2Fa&amp;severity=high&amp;id=69efaeccba26a39fba5319d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31255-na-2e725bca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31255%3A%20n%2Fa&amp;severity=medium&amp;id=69efaeccba26a39fba5319d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30346-na-c7699a08</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30346%3A%20n%2Fa&amp;severity=medium&amp;id=69efa7b1ba26a39fba502237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69689-na-5a012bec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69689%3A%20n%2Fa&amp;severity=high&amp;id=69efa435ba26a39fba4f0c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38936-na-f2e90d6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38936%3A%20n%2Fa&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38935-na-e5a9bb55</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38935%3A%20n%2Fa&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38934-na-21c6e375</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38934%3A%20n%2Fa&amp;severity=high&amp;id=69ef99a0ba26a39fba48b568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30462-na-8db3ce25</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30462%3A%20n%2Fa&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30352-na-1bc61c5e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30352%3A%20n%2Fa&amp;severity=critical&amp;id=69ef811fba26a39fba3a6d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30351-na-680c71aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30351%3A%20n%2Fa&amp;severity=high&amp;id=69ef811fba26a39fba3a6d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30350-na-e69a022c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30350%3A%20n%2Fa&amp;severity=high&amp;id=69ef79fcba26a39fba368b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42363-cwe-656-reliance-on-security-throug-65391bf4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42363%3A%20CWE-656%20-%20Reliance%20on%20Security%20Through%20Obscurity%20in%20GeoVision%20Inc.%20GV-IP%20Device%20Utility&amp;severity=critical&amp;id=69eeaaaaba26a39fba9c68c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7068-buffer-overflow-in-d-link-dir-825-1a940c5e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7068%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=69eea706ba26a39fba9906fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7067-command-injection-in-d-link-dir-822-6f02aaf5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7067%3A%20Command%20Injection%20in%20D-Link%20DIR-822&amp;severity=medium&amp;id=69eea382ba26a39fba976be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7066-os-command-injection-in-choieastsea--fafc2924</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7066%3A%20OS%20Command%20Injection%20in%20choieastsea%20simple-openstack-mcp&amp;severity=medium&amp;id=69eea002ba26a39fba956ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7065-server-side-request-forgery-in-bidin-041b1434</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7065%3A%20Server-Side%20Request%20Forgery%20in%20BidingCC%20BuildingAI&amp;severity=medium&amp;id=69eea002ba26a39fba956eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7064-os-command-injection-in-agentdeskai--9eadfc8c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7064%3A%20OS%20Command%20Injection%20in%20AgentDeskAI%20browser-tools-mcp&amp;severity=medium&amp;id=69eeadd1ba26a39fbaa2f0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7063-sql-injection-in-code-projects-emplo-0d2afcee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7063%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ee9572ba26a39fba8f2ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7062-os-command-injection-in-intina47-con-ac80d435</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7062%3A%20OS%20Command%20Injection%20in%20Intina47%20context-sync&amp;severity=medium&amp;id=69ee91eeba26a39fba8cb337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7061-os-command-injection-in-toowiredd-ch-48df32bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7061%3A%20OS%20Command%20Injection%20in%20Toowiredd%20chatgpt-mcp-server&amp;severity=medium&amp;id=69ee8e6bba26a39fba8975f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7060-sql-injection-in-liyupi-yu-picture-dbdc3180</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7060%3A%20SQL%20Injection%20in%20liyupi%20yu-picture&amp;severity=medium&amp;id=69ee75ceba26a39fba5bc32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7059-path-traversal-in-666ghj-mirofish-5143a0ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7059%3A%20Path%20Traversal%20in%20666ghj%20MiroFish&amp;severity=medium&amp;id=69ee724bba26a39fba567e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7058-command-injection-in-666ghj-mirofish-6bc975c4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7058%3A%20Command%20Injection%20in%20666ghj%20MiroFish&amp;severity=medium&amp;id=69ee71e2ba26a39fba561eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7057-buffer-overflow-in-tenda-f456-e219dd08</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7057%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee621e87115cfb6856c81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7056-buffer-overflow-in-tenda-f456-355ff71c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7056%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee5b1487115cfb68535b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7055-buffer-overflow-in-tenda-f456-67b64e39</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7055%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee57b087115cfb6851cbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7054-buffer-overflow-in-tenda-f456-e91360f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7054%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee45fc87115cfb6847c30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7053-buffer-overflow-in-tenda-f456-5370694f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7053%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee37ec87115cfb683e66ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7045-injection-in-baomidou-dynamic-dataso-2afc7b63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7045%3A%20Injection%20in%20baomidou%20dynamic-datasource&amp;severity=medium&amp;id=69ee6bb668edb0b8f2495f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7044-unrestricted-upload-in-greencms-52d34c16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7044%3A%20Unrestricted%20Upload%20in%20GreenCMS&amp;severity=medium&amp;id=69ee6bb668edb0b8f2495f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7043-unrestricted-upload-in-greencms-c941e9bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7043%3A%20Unrestricted%20Upload%20in%20GreenCMS&amp;severity=medium&amp;id=69ee14c487115cfb680e0632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7042-missing-authentication-in-666ghj-mir-8f11be22</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7042%3A%20Missing%20Authentication%20in%20666ghj%20MiroFish&amp;severity=medium&amp;id=69ee14c487115cfb680e062b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7041-information-disclosure-in-666ghj-mir-3b60f7d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7041%3A%20Information%20Disclosure%20in%20666ghj%20MiroFish&amp;severity=medium&amp;id=69ee0dbc87115cfb680961fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7039-command-injection-in-tufantunc-ssh-m-16dbd528</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7039%3A%20Command%20Injection%20in%20tufantunc%20ssh-mcp&amp;severity=high&amp;id=69ee0dbc87115cfb680961f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7038-insufficiently-protected-credentials-752e881d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7038%3A%20Insufficiently%20Protected%20Credentials%20in%20tufantunc%20ssh-mcp&amp;severity=medium&amp;id=69ee033387115cfb680257b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7037-os-command-injection-in-totolink-a80-052cff94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7037%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69edffdb87115cfb6800b221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7036-path-traversal-in-tenda-i9-eba328f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7036%3A%20Path%20Traversal%20in%20Tenda%20i9&amp;severity=medium&amp;id=69edf8a587115cfb68fcf281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7035-stack-based-buffer-overflow-in-tenda-d6d434e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7035%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69edf54187115cfb68fad254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7034-stack-based-buffer-overflow-in-tenda-6132cf1a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7034%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69edf54187115cfb68fad24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7033-buffer-overflow-in-tenda-f456-2b3dae2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7033%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee6bb668edb0b8f2495f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7032-buffer-overflow-in-tenda-f456-0c01bedd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7032%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee6bb668edb0b8f2495f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7031-buffer-overflow-in-tenda-f456-f28ef6c0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7031%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ede38b87115cfb68ef539f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7030-buffer-overflow-in-tenda-f456-f9be112a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7030%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee6bb668edb0b8f2495f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7029-buffer-overflow-in-tenda-f456-1c484f6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7029%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69edd92187115cfb68e9d5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7028-sql-injection-in-codeastro-online-jo-7d79de51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7028%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Job%20Portal&amp;severity=medium&amp;id=69edd1f887115cfb68e48e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7027-cross-site-scripting-in-d-link-dsl-2-f9973473</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7027%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DSL-2740R&amp;severity=medium&amp;id=69edce7487115cfb68e0e8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7026-cross-site-scripting-in-d-link-dgs-3-10e9ee49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7026%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DGS-3420&amp;severity=medium&amp;id=69edbd2687115cfb68d77b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7025-server-side-request-forgery-in-typec-6c76a6c0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7025%3A%20Server-Side%20Request%20Forgery%20in%20Typecho&amp;severity=medium&amp;id=69edbd2687115cfb68d77b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7024-path-traversal-in-rawchen-sims-65c58b88</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7024%3A%20Path%20Traversal%20in%20rawchen%20sims&amp;severity=medium&amp;id=69edb5dc87115cfb68d4ecb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7023-sql-injection-in-bytedance-coze-stud-3540e2ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7023%3A%20SQL%20Injection%20in%20ByteDance%20coze-studio&amp;severity=medium&amp;id=69edb5dc87115cfb68d4ecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7022-improper-authentication-in-smythos-s-bad63838</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7022%3A%20Improper%20Authentication%20in%20SmythOS%20sre&amp;severity=medium&amp;id=69edab4b87115cfb68cf682d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7021-information-disclosure-in-smythos-sr-7a3264ff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7021%3A%20Information%20Disclosure%20in%20SmythOS%20sre&amp;severity=medium&amp;id=69edab4b87115cfb68cf6827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7020-path-traversal-in-ollama-dfbf96db</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7020%3A%20Path%20Traversal%20in%20Ollama&amp;severity=medium&amp;id=69eda0e087115cfb68ca3f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7019-buffer-overflow-in-tenda-f456-8fc2e156</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7019%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eda0e087115cfb68ca3f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7018-use-of-hard-coded-cryptographic-key--acca4acd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7018%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Datavane%20Datavines&amp;severity=medium&amp;id=69ed8f2c87115cfb68a3f653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7016-cross-site-scripting-in-maxsite-cms-896efbcb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7016%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed8f2c87115cfb68a3f64a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42255-cwe-684-incorrect-provision-of-spec-30347b11</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42255%3A%20CWE-684%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Technitium%20DnsServer&amp;severity=high&amp;id=69ed8f2c87115cfb68a3f647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7015-cross-site-scripting-in-maxsite-cms-49304643</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7015%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed7d9287115cfb68904a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42254-cwe-706-use-of-incorrectly-resolved-3c76de85</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42254%3A%20CWE-706%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Hickory%20Project%20Hickory%20DNS&amp;severity=medium&amp;id=69ed7d9287115cfb68904a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7014-cross-site-scripting-in-maxsite-cms-221bc3cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7014%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed7d9287115cfb68904a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7013-cross-site-scripting-in-maxsite-cms-01c1b586</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7013%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed7d9287115cfb68904a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7012-cross-site-scripting-in-maxsite-cms-9c082817</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7012%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed6f8887115cfb687c46f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7011-cross-site-scripting-in-maxsite-cms-5250b75b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7011%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed68a087115cfb6872b091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-27-bd6d318f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-27&amp;severity=medium&amp;id=69f04fe4cbff5d8610bdb174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-26-e4006804</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-26&amp;severity=medium&amp;id=69eeaa81ba26a39fba9bce8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-26-c0c72cd5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-26&amp;severity=low&amp;id=69edd1f087115cfb68e465f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7002-sql-injection-in-klik-socialmediaweb-d1184727</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7002%3A%20SQL%20Injection%20in%20KLiK%20SocialMediaWebsite&amp;severity=medium&amp;id=69ed374887115cfb6846976d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7001-cross-site-scripting-in-datacom-dm41-31cb1d88</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7001%3A%20Cross%20Site%20Scripting%20in%20Datacom%20DM4100&amp;severity=medium&amp;id=69ed33c487115cfb68444c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7000-cross-site-scripting-in-datacom-dm41-8f3d0752</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7000%3A%20Cross%20Site%20Scripting%20in%20Datacom%20DM4100&amp;severity=medium&amp;id=69ed306687115cfb6842b9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6999-cross-site-scripting-in-bivocom-tr32-ba3ee97d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6999%3A%20Cross%20Site%20Scripting%20in%20BIVOCOM%20TR321&amp;severity=medium&amp;id=69ed2cbd87115cfb6840ee4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6998-cross-site-scripting-in-bdcom-p3310d-e7cffb2b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6998%3A%20Cross%20Site%20Scripting%20in%20BDCOM%20P3310D&amp;severity=medium&amp;id=69ed416587115cfb684e5d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6997-cross-site-scripting-in-bdcom-p3310d-eda1bac3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6997%3A%20Cross%20Site%20Scripting%20in%20BDCOM%20P3310D&amp;severity=medium&amp;id=69ed416587115cfb684e5d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6996-cross-site-scripting-in-bdcom-p3310d-a27e5bc3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6996%3A%20Cross%20Site%20Scripting%20in%20BDCOM%20P3310D&amp;severity=medium&amp;id=69ed1b2987115cfb6837500b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6995-cross-site-scripting-in-bdcom-p3310d-9755913c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6995%3A%20Cross%20Site%20Scripting%20in%20BDCOM%20P3310D&amp;severity=medium&amp;id=69ed17a487115cfb6834fba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6994-injection-in-envoy-9dad88c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6994%3A%20Injection%20in%20Envoy&amp;severity=medium&amp;id=69ed146687115cfb6832f109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6993-unintended-intermediary-in-go-kratos-61465598</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6993%3A%20Unintended%20Intermediary%20in%20go-kratos%20kratos&amp;severity=medium&amp;id=69ed0d1987115cfb682ea5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6992-os-command-injection-in-linksys-mr96-18ae6106</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6992%3A%20OS%20Command%20Injection%20in%20Linksys%20MR9600&amp;severity=high&amp;id=69ed065d87115cfb682a963d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6991-sql-injection-in-colinhacks-zod-78af498c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6991%3A%20SQL%20Injection%20in%20colinhacks%20Zod&amp;severity=medium&amp;id=69ed028c87115cfb682860ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6990-cross-site-scripting-in-projeto-siga-b9e930ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6990%3A%20Cross%20Site%20Scripting%20in%20projeto-siga%20siga&amp;severity=medium&amp;id=69ecfb8487115cfb6823da6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6989-command-injection-in-tenda-f453-466759f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6989%3A%20Command%20Injection%20in%20Tenda%20F453&amp;severity=medium&amp;id=69ecf82f87115cfb6822369c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6988-buffer-overflow-in-tenda-hg10-324a24f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6988%3A%20Buffer%20Overflow%20in%20Tenda%20HG10&amp;severity=high&amp;id=69ecf82f87115cfb68223695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6987-command-injection-in-picoclaw-3df152f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6987%3A%20Command%20Injection%20in%20PicoClaw&amp;severity=medium&amp;id=69ecf47c87115cfb68206f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6986-improper-verification-of-cryptograph-6083b074</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6986%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ecf11887115cfb681e8335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6985-infinite-loop-in-cesanta-mongoose-b75a22e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6985%3A%20Infinite%20Loop%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ed416587115cfb684e5d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6984-improper-neutralization-of-special-e-65960fde</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6984%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69ece2e887115cfb68f279a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6983-server-side-request-forgery-in-pagek-ee0e4a4b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6983%3A%20Server-Side%20Request%20Forgery%20in%20pagekit&amp;severity=medium&amp;id=69ecdf6487115cfb68e623aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6982-sql-injection-in-star7th-showdoc-f8f8a2e0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6982%3A%20SQL%20Injection%20in%20star7th%20ShowDoc&amp;severity=medium&amp;id=69ecd4d987115cfb68ca117c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6981-server-side-request-forgery-in-ihate-0e7916d8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6981%3A%20Server-Side%20Request%20Forgery%20in%20IhateCreatingUserNames2%20AiraHub2&amp;severity=medium&amp;id=69ecd15487115cfb68bf7abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/token-bingo-dont-let-your-code-be-the-winner-12ab2a46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Token%20Bingo%3A%20Don&apos;t%20Let%20Your%20Code%20be%20the%20Winner&amp;severity=medium&amp;id=69ef1e8dba26a39fba0bf968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6980-command-injection-in-divyanshu-hash--4c1bd623</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6980%3A%20Command%20Injection%20in%20Divyanshu-hash%20GitPilot-MCP&amp;severity=medium&amp;id=69ed416587115cfb684e5d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6979-server-side-request-forgery-in-devli-2bf836ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6979%3A%20Server-Side%20Request%20Forgery%20in%20devlikeapro%20WAHA&amp;severity=medium&amp;id=69ecb1da87115cfb685f7fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6978-sql-injection-in-jizhicms-70505da8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6978%3A%20SQL%20Injection%20in%20JiZhiCMS&amp;severity=medium&amp;id=69ecae2c87115cfb685e0990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-gopherwhisper-abuses-legitimate-s-b3d27373</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT%20GopherWhisper%20Abuses%20Legitimate%20Services%20in%20Government%20Attacks&amp;severity=medium&amp;id=69ec9c9787115cfb68578991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6977-improper-authorization-in-vanna-ai-v-dc0ac5a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6977%3A%20Improper%20Authorization%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69ec991487115cfb6856948f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6951-remote-code-execution-rce-in-simple--178a7d4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6951%3A%20Remote%20Code%20Execution%20(RCE)%20in%20simple-git&amp;severity=critical&amp;id=69ec52c387115cfb68273f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amos-stealer-delivered-via-cursor-ai-agent-session-1b6f01c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AMOS%20Stealer%20delivered%20via%20Cursor%20AI%20agent%20session&amp;severity=medium&amp;id=69ef2218ba26a39fba0e588f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-npm-threat-landscape-attack-surface-and-mitiga-a64585bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20npm%20Threat%20Landscape%3A%20Attack%20Surface%20and%20Mitigations&amp;severity=medium&amp;id=69ef2218ba26a39fba0e5886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-26-db596018</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-26&amp;severity=medium&amp;id=69edd1f087115cfb68e46617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-25-17859590</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-25&amp;severity=medium&amp;id=69ed56e387115cfb6859f41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-25-b6055f05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-25&amp;severity=low&amp;id=69ec250887115cfb68aa806f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42171-cwe-427-uncontrolled-search-path-el-8bd0ed64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42171%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Nullsoft%20Nullsoft%20Scriptable%20Install%20System&amp;severity=high&amp;id=69ebe24487115cfb68759c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41248-cwe-436-interpretation-conflict-in--1e1431c1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41248%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20clerk%20astro&amp;severity=critical&amp;id=69ebdedf87115cfb6874835e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41488-cwe-918-server-side-request-forgery-b7a78a3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41488%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchain-openai&amp;severity=low&amp;id=69ebdedf87115cfb68748364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41481-cwe-918-server-side-request-forgery-9716de86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41481%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchain-text-splitters&amp;severity=medium&amp;id=69ebdedf87115cfb68748361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41473-cwe-306-missing-authentication-for--b01631b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41473%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20usmannasir%20cyberpanel&amp;severity=high&amp;id=69ebdb3b87115cfb687367da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41472-cwe-79-improper-neutralization-of-i-85294878</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41472%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20usmannasir%20cyberpanel&amp;severity=medium&amp;id=69ebdb3b87115cfb687367d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eavesdropping-via-fiber-optic-cables-kaspersky-off-82f0270e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eavesdropping%20via%20fiber-optic%20cables%20%7C%20Kaspersky%20official%20blog&amp;severity=low&amp;id=69ebd44b87115cfb68707b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6968-cwe-22-improper-limitation-of-a-path-df28a2c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6968%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AWS%20tough&amp;severity=medium&amp;id=69ebcd2c87115cfb686cfc1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6967-cwe-345-insufficient-verification-of-e7059be6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6967%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20AWS%20tough&amp;severity=medium&amp;id=69ebcd2c87115cfb686cfc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6966-cwe-347-improper-verification-of-cry-2b020c60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6966%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20AWS%20tough&amp;severity=medium&amp;id=69ebcd2c87115cfb686cfc0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41433-cwe-22-improper-limitation-of-a-pat-9b11eb85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41433%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20open-telemetry%20opentelemetry-ebpf-instrumentation&amp;severity=high&amp;id=69ebeffb87115cfb687b9d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41429-cwe-121-stack-based-buffer-overflow-c334fe04</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41429%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20espressif%20arduino-esp32&amp;severity=high&amp;id=69ebeffb87115cfb687b9d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41244-cwe-208-observable-timing-discrepan-9215300f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41244%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20notamitgamer%20mojic&amp;severity=medium&amp;id=69ebd11387115cfb686f0be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41894-cwe-22-improper-limitation-of-a-pat-eedfe9e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41894%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69ebc30587115cfb68680b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41421-cwe-78-improper-neutralization-of-s-715daed2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41421%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69ebc30587115cfb68680b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41419-cwe-22-improper-limitation-of-a-pat-496faa47</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41419%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RARgames%204gaBoards&amp;severity=high&amp;id=69ebc30587115cfb68680b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41418-cwe-208-observable-timing-discrepan-a2526397</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41418%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20RARgames%204gaBoards&amp;severity=medium&amp;id=69ebc30587115cfb68680b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41416-cwe-190-integer-overflow-or-wraparo-6ad50ff9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41416%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69ebbba787115cfb68655ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41415-cwe-125-out-of-bounds-read-in-pjsip-4b889a16</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41415%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=69ebbba787115cfb68655ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41414-cwe-94-improper-control-of-generati-a3e6d80c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41414%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20skim-rs%20skim&amp;severity=high&amp;id=69ebbba787115cfb68655cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41492-cwe-200-exposure-of-sensitive-infor-932f1edf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41492%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69ebbba787115cfb68655cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41327-cwe-943-improper-neutralization-of--8885efbe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41327%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69ebbba787115cfb68655cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41328-cwe-943-improper-neutralization-of--c8d19cb1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41328%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69ebb81d87115cfb68646f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33666-cwe-190-integer-overflow-or-wraparo-9ce31bd3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33666%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20ndsev%20zserio&amp;severity=high&amp;id=69ebb81d87115cfb68646f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33524-cwe-789-memory-allocation-with-exce-ead75c69</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33524%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20ndsev%20zserio&amp;severity=high&amp;id=69ebb81d87115cfb68646f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33662-cwe-190-integer-overflow-or-wraparo-c408c7d4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33662%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20OP-TEE%20optee_os&amp;severity=high&amp;id=69ebb81d87115cfb68646f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41907-cwe-823-use-of-out-of-range-pointer-92fb380a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41907%3A%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20uuidjs%20uuid&amp;severity=high&amp;id=69ebb81d87115cfb68646f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41680-cwe-400-uncontrolled-resource-consu-1a65f320</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41680%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20markedjs%20marked&amp;severity=high&amp;id=69ebaa0487115cfb685ef42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41140-cwe-22-improper-limitation-of-a-pat-097bbdaa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41140%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20python-poetry%20poetry&amp;severity=low&amp;id=69ebaa0487115cfb685ef421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41322-cwe-525-use-of-web-browser-cache-co-65157ecf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41322%3A%20CWE-525%3A%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20withastro%20astro&amp;severity=medium&amp;id=69ebaa0487115cfb685ef427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41321-cwe-918-server-side-request-forgery-e695a4ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41321%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20%40astrojs%2Fcloudflare&amp;severity=low&amp;id=69ebaa0487115cfb685ef424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41067-cwe-79-improper-neutralization-of-i-40957d3d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41067%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=69eba2fd87115cfb68542cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41079-cwe-125-out-of-bounds-read-in-openp-cad461df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41079%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69eba2fd87115cfb68542cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40897-cwe-915-improperly-controlled-modif-3c19a5fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40897%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20josdejong%20mathjs&amp;severity=high&amp;id=69eba2fd87115cfb68542cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6912-cwe-915-improperly-controlled-modifi-2e64f97e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6912%3A%20CWE-915%20Improperly%20controlled%20modification%20of%20Dynamically-Determined%20object%20attributes%20in%20AWS%20AWS%20Ops%20Wheel&amp;severity=high&amp;id=69eba2fd87115cfb68542cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6911-cwe-347-improper-verification-of-cry-0f0da004</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6911%3A%20CWE-347%20Improper%20verification%20of%20cryptographic%20signature%20in%20AWS%20AWS%20Ops%20Wheel&amp;severity=critical&amp;id=69eb98a187115cfb684afa55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39920-cwe-1188-initialization-of-a-resour-596011eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39920%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20BridgeHead%20Software%20FileStore&amp;severity=critical&amp;id=69eb916f87115cfb68470f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pre-stuxnet-sabotage-malware-fast16-linked-to-us-i-5e800738</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pre-Stuxnet%20Sabotage%20Malware%20%E2%80%98Fast16%E2%80%99%20Linked%20to%20US-Iran%20Cyber%20Tensions&amp;severity=high&amp;id=69eb86db87115cfb6842d52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-unauthorized-mythos-access-plankey-c-aa30b52f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Unauthorized%20Mythos%20Access%2C%20Plankey%20CISA%20Nomination%20Ends%2C%20New%20Display%20Security%20Device&amp;severity=medium&amp;id=69eb7fd387115cfb683ff65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31534-6808856e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31534&amp;severity=low&amp;id=69ec59f587115cfb6837f8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25660-cwe-290-authentication-bypass-by-sp-881e021f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25660%3A%20CWE-290%20Authentication%20bypass%20by%20spoofing%20in%20Ericsson%20CodeChecker&amp;severity=critical&amp;id=69eb754a87115cfb6838d4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21515-cwe-200-exposure-of-sensitive-infor-f9f6e427</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21515%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20IOT%20Central&amp;severity=critical&amp;id=69eb6ac987115cfb68343e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38743-cwe-1220-insufficient-granularity-o-d949f440</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38743%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69eb6ac987115cfb68343e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40690-cwe-1220-insufficient-granularity-o-88635206</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40690%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69eb6ac987115cfb68343e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-cybersecurity-must-rethink-defense-in-the-age--01515f17</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Cybersecurity%20Must%20Rethink%20Defense%20in%20the%20Age%20of%20Autonomous%20Agents&amp;severity=medium&amp;id=69eb63b387115cfb68316c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/locked-shields-2026-41-nations-strengthen-cyber-re-bcaeb7ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Locked%20Shields%202026%3A%2041%20Nations%20Strengthen%20Cyber%20Resilience%20in%20World%E2%80%99s%20Biggest%20Exercise&amp;severity=medium&amp;id=69eb63b387115cfb68316c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5265-improper-handling-of-length-paramete-b91961df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5265%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Red%20Hat%20Fast%20Datapath%20for%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=69eb6ac987115cfb68343e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5367-improper-handling-of-length-paramete-2c43198d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5367%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Red%20Hat%20Fast%20Datapath%20for%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=69eb6ac987115cfb68343e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-federal-agencys-cisco-firewall-infected-with-fi-b03e6cae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Federal%20Agency%E2%80%99s%20Cisco%20Firewall%20Infected%20With%20%E2%80%98Firestarter%E2%80%99%20Backdoor&amp;severity=medium&amp;id=69eb55a387115cfb6825d794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trump-administration-vows-crackdown-on-chinese-com-126adcd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trump%20Administration%20Vows%20Crackdown%20on%20Chinese%20Companies%20%E2%80%98Exploiting%E2%80%99%20AI%20Models%20Made%20in%20US&amp;severity=medium&amp;id=69eb527a87115cfb68248e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4313-cwe-79-improper-neutralization-of-in-63c8a389</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4313%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20C%26F%20AdaptiveGRC&amp;severity=low&amp;id=69eb605587115cfb682faffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6043-cwe-1188-initialization-of-a-resourc-0fa48590</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6043%3A%20CWE-1188%20Initialization%20of%20a%20resource%20with%20an%20insecure%20default%20in%20Perforce%20Helix%20Core%20Server%20(P4D)&amp;severity=high&amp;id=69eb592887115cfb682aba36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23902-cwe-863-incorrect-authorization-in--a9014525</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23902%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=high&amp;id=69eb592887115cfb682aba32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62233-cwe-502-deserialization-of-untruste-dd0afc45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62233%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=medium&amp;id=69eb4e9b87115cfb6822f45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41044-cwe-20-improper-input-validation-in-da662a29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41044%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=high&amp;id=69eb479387115cfb681fd011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41043-cwe-79-improper-neutralization-of-i-c556bffc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41043%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=medium&amp;id=69eb479387115cfb681fd00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40466-cwe-20-improper-input-validation-in-2c6e5a9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40466%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Broker&amp;severity=high&amp;id=69eb479387115cfb681fd00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-patched-in-crowdstrike-tenable-pro-da7dee84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20Patched%20in%20CrowdStrike%2C%20Tenable%20Products&amp;severity=critical&amp;id=69eb3d0787115cfb6815467d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6272-cwe-306-missing-authentication-for-c-708a5e19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6272%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Eclipse%20Foundation%20Eclipse%20KUKSA%20-%20Databroker&amp;severity=high&amp;id=69eb2efb87115cfb68096495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitwarden-npm-package-hit-in-supply-chain-attack-bdf7147b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitwarden%20NPM%20Package%20Hit%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69eb27ef87115cfb68036d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21728-vulnerability-in-grafana-tempo-7584ca75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21728%3A%20Vulnerability%20in%20Grafana%20Tempo&amp;severity=high&amp;id=69eb2efb87115cfb68096492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3569-cwe-862-missing-authorization-in-lia-5a1588b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3569%3A%20CWE-862%20Missing%20Authorization%20in%20liaison%20Liaison%20Site%20Prober&amp;severity=medium&amp;id=69eb246b87115cfb6801d63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11762-cwe-862-missing-authorization-in-hu-81cd36ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11762%3A%20CWE-862%20Missing%20Authorization%20in%20hubspotdev%20HubSpot%20All-In-One%20Marketing%20%E2%80%93%20Forms%2C%20Popups%2C%20Live%20Chat&amp;severity=medium&amp;id=69eb246b87115cfb6801d636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1951-cwe-121-stack-based-buffer-overflow--c6177746</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1951%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20AS320T&amp;severity=critical&amp;id=69eb0f5487115cfb68f533a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1952-cwe-912-hidden-functionality-in-delt-72d86c2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1952%3A%20CWE-912%20Hidden%20Functionality%20in%20DeltaWW%20AS320T&amp;severity=critical&amp;id=69eb0f5487115cfb68f533a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1950-cwe-121-stack-based-buffer-overflow--901f4898</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1950%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20AS320T&amp;severity=critical&amp;id=69eb0f5487115cfb68f5339f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1949-cwe-131-incorrect-calculation-of-buf-624c285a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1949%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20DeltaWW%20AS320T&amp;severity=critical&amp;id=69eb095d87115cfb68f0d935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5428-cwe-79-improper-neutralization-of-in-d9eb2fe2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5428%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69eb095d87115cfb68f0d94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6810-cwe-639-authorization-bypass-through-2c779cfe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6810%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codepeople%20Booking%20Calendar%20Contact%20Form&amp;severity=medium&amp;id=69eb095d87115cfb68f0d954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5347-cwe-862-missing-authorization-in-mhm-97b554ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5347%3A%20CWE-862%20Missing%20Authorization%20in%20mhmrajib%20WP%20Books%20Gallery%20%E2%80%93%20Build%20Stunning%20Book%20Showcases%20%26%20Libraries%20in%20Minutes&amp;severity=medium&amp;id=69eb095d87115cfb68f0d938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5364-cwe-434-unrestricted-upload-of-file--d0fb4c0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5364%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20addonsorg%20Drag%20and%20Drop%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69eb095d87115cfb68f0d940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fast16-mystery-shadowbrokers-reference-reveals-hig-0de02932</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=fast16%20%7C%20Mystery%20ShadowBrokers%20Reference%20Reveals%20High-Precision%20Software%20Sabotage%205%20Years%20Before%20Stuxnet&amp;severity=medium&amp;id=69eb280887115cfb68038e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ai-frame-campaign-continues-bff99c05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20AI%20Frame%20Campaign%20Continues&amp;severity=medium&amp;id=69eb280887115cfb68038e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6947-cwe-307-improper-restriction-of-exce-ea9fc740</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6947%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20D-Link%20DWM-222W&amp;severity=high&amp;id=69eaec2d87115cfb68c0d956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41324-cwe-400-uncontrolled-resource-consu-35173a6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41324%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20patrickjuchli%20basic-ftp&amp;severity=high&amp;id=69eaec2d87115cfb68c0d93d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2028-cwe-639-authorization-bypass-through-e72d70be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2028%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ckp267%20MaxiBlocks%20Builder%20%7C%2017%2C000%2B%20Design%20Assets%2C%20Patterns%2C%20Icons%20%26%20Starter%20Sites&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5488-cwe-862-missing-authorization-in-smu-08b9e390</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5488%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6393-cwe-862-missing-authorization-in-wpd-09590bba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6393%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20%20Knowledge%20Base%20Docs%20%26%20FAQ%20Solution%20for%20Elementor%20%26%20Block%20Editor&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41319-cwe-74-improper-neutralization-of-s-f3044b31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41319%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20jstedfast%20MailKit&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41318-cwe-79-improper-neutralization-of-i-62fa196f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41318%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41430-cwe-79-improper-neutralization-of-i-7aeea481</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41430%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20press&amp;severity=low&amp;id=69eaec2d87115cfb68c0d940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41317-cwe-352-cross-site-request-forgery--c1bd36c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41317%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frappe%20press&amp;severity=medium&amp;id=69eada9887115cfb68a5e99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41316-cwe-693-protection-mechanism-failur-2253af9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41316%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20ruby%20erb&amp;severity=high&amp;id=69eada9887115cfb68a5e99c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33317-cwe-125-out-of-bounds-read-in-op-te-a8bc0973</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33317%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OP-TEE%20optee_os&amp;severity=high&amp;id=69eada9887115cfb68a5e992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33318-cwe-284-improper-access-control-in--33eb08a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33318%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20actualbudget%20actual&amp;severity=high&amp;id=69eada9887115cfb68a5e998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-friday-april-24th-2026-httpsiscs-cf677b51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Friday%2C%20April%2024th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9906%2C%20(Fri%2C%20Apr%2024th)&amp;severity=medium&amp;id=69ead00c87115cfb689af5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32952-cwe-190-integer-overflow-or-wraparo-7c7a42ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32952%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Azure%20go-ntlmssp&amp;severity=medium&amp;id=69eada9887115cfb68a5e98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41325-cwe-863-incorrect-authorization-in--38c782c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41325%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20getkirby%20kirby&amp;severity=high&amp;id=69eac1fc87115cfb688c86f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40099-cwe-863-incorrect-authorization-in--18080aa1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40099%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20getkirby%20kirby&amp;severity=medium&amp;id=69eac1fc87115cfb688c86f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34587-cwe-1336-improper-neutralization-of-edccacb4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34587%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20getkirby%20kirby&amp;severity=high&amp;id=69eac1fc87115cfb688c86ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32870-cwe-91-xml-injection-aka-blind-xpat-0712fce2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32870%3A%20CWE-91%3A%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20getkirby%20kirby&amp;severity=medium&amp;id=69eac1fc87115cfb688c86e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31956-cwe-639-authorization-bypass-throug-74ef1c37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31956%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20xibosignage%20xibo-cms&amp;severity=medium&amp;id=69eac1fc87115cfb688c86e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31955-cwe-918-server-side-request-forgery-f97d366f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31955%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20xibosignage%20xibo-cms&amp;severity=medium&amp;id=69eac1fc87115cfb688c86e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31953-cwe-79-improper-neutralization-of-i-d742715a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31953%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xibosignage%20xibo-cms&amp;severity=medium&amp;id=69eac1fc87115cfb688c86dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25775-cwe-306-missing-authentication-for--773ccfcd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25775%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a187115cfb68850e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31952-cwe-89-improper-neutralization-of-s-adcc797f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31952%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xibosignage%20xibo-cms&amp;severity=high&amp;id=69eab7a187115cfb68850e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35064-cwe-306-missing-authentication-for--7d4c0034</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35064%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SenseLive%20X3050&amp;severity=high&amp;id=69eab7a187115cfb68850e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40620-cwe-306-missing-authentication-for--0af2786c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40620%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a387115cfb68850ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27841-cwe-352-cross-site-request-forgery--72dc62e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27841%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20SenseLive%20X3050&amp;severity=high&amp;id=69eab7a187115cfb68850e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29051-cwe-22-improper-limitation-of-a-pat-31e1dbb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29051%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=69eab7a187115cfb68850e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-25-f8dd5b34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-25&amp;severity=medium&amp;id=69ecb52c87115cfb68608f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-24-2cf5fd4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-24&amp;severity=medium&amp;id=69ec056387115cfb68817142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67259-na-4149753f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67259%3A%20n%2Fa&amp;severity=medium&amp;id=69eb9c3d87115cfb684e032b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59308-na-dbc38f63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59308%3A%20n%2Fa&amp;severity=medium&amp;id=69eb98a187115cfb684afa5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30368-na-de124fcd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30368%3A%20CWE-863%20Incorrect%20Authorization%20in%20Lightspeed%20Lightspeed%20Classroom&amp;severity=medium&amp;id=69eb916f87115cfb68470f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31052-na-504835fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31052%3A%20n%2Fa&amp;severity=medium&amp;id=69eb86f087115cfb6842e45a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31051-na-ef98ba05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31051%3A%20n%2Fa&amp;severity=low&amp;id=69eb86f087115cfb6842e452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31050-na-65163af5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31050%3A%20n%2Fa&amp;severity=medium&amp;id=69eb86f087115cfb6842e44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61872-na-0f63272c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61872%3A%20n%2Fa&amp;severity=medium&amp;id=69eb86f087115cfb6842e446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42095-cwe-306-missing-authentication-for--c3667dc3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42095%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20KDE%20Arianna&amp;severity=medium&amp;id=69eb7c9b87115cfb683e60a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-24-9aa8fb12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-24&amp;severity=low&amp;id=69eb0bc787115cfb68f2dff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40623-cwe-862-missing-authorization-in-se-3624bc83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40623%3A%20CWE-862%20Missing%20Authorization%20in%20SenseLive%20X3050&amp;severity=high&amp;id=69eab7a387115cfb68850ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29050-cwe-22-improper-limitation-of-a-pat-b3665099</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29050%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=69eab7a187115cfb68850e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40431-cwe-319-cleartext-transmission-of-s-9862a146</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40431%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20SenseLive%20X3050&amp;severity=medium&amp;id=69eab7a187115cfb68850e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27843-cwe-306-missing-authentication-for--e4fcb515</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27843%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a187115cfb68850e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39462-cwe-522-insufficiently-protected-cr-cedf02e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39462%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a187115cfb68850e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35503-cwe-798-use-of-hard-coded-credentia-feae2abb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35503%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a187115cfb68850e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25720-cwe-613-insufficient-session-expira-e2b83cfa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25720%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20SenseLive%20X3050&amp;severity=medium&amp;id=69eab07687115cfb687ad29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40630-cwe-288-authentication-bypass-using-b2eedf7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40630%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab07687115cfb687ad2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1789-cwe-807-reliance-on-untrusted-inputs-39295111</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1789%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Canon%20Inc.%20imagePRESS%20Series&amp;severity=medium&amp;id=69eab07687115cfb687ad296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6732-access-of-resource-using-incompatibl-db1e901f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6732%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69ea9ed487115cfb686fffd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2708-inconsistent-interpretation-of-http--7b266904</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2708%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69ea97db87115cfb68681ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32172-cwe-427-uncontrolled-search-path-el-088a79ce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32172%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Microsoft%20Power%20Apps&amp;severity=high&amp;id=69ea97db87115cfb68681bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35431-cwe-918-server-side-request-forgery-ecd1dd29</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35431%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=69ea97db87115cfb68681bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24303-cwe-284-improper-access-control-in--460583b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24303%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Partner%20Center&amp;severity=critical&amp;id=69ea97db87115cfb68681ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26150-cwe-918-server-side-request-forgery-affb6348</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26150%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview%20eDiscovery&amp;severity=high&amp;id=69ea97db87115cfb68681ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33819-cwe-502-deserialization-of-untruste-a7ea77f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33819%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Bing&amp;severity=critical&amp;id=69ea97db87115cfb68681bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33102-cwe-601-url-redirection-to-untruste-cf8cfee5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33102%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&amp;severity=critical&amp;id=69ea97db87115cfb68681bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32210-cwe-918-server-side-request-forgery-92bdf4e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32210%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(online)&amp;severity=critical&amp;id=69ea97db87115cfb68681bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26210-cwe-502-deserialization-of-untruste-0013131b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26210%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20kvcache-ai%20ktransformers&amp;severity=critical&amp;id=69ea90c487115cfb6861c6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41274-cwe-943-improper-neutralization-of--1fbbff2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41274%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69ea90c487115cfb6861c6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28525-cwe-191-integer-underflow-wrap-or-w-1c86680c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28525%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20sbabic%20swupdate&amp;severity=high&amp;id=69ea8d5f87115cfb685fc9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6942-improper-neutralization-of-special-e-6e1a54b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6942%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20radareorg%20radare2&amp;severity=critical&amp;id=69ea8d5f87115cfb685fc9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6941-cwe-59-improper-link-resolution-befo-54c7eb3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6941%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20radareorg%20radare2&amp;severity=medium&amp;id=69ea89bd87115cfb685d0b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6940-cwe-22-improper-limitation-of-a-path-fafc07b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6940%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20radareorg%20radare2&amp;severity=medium&amp;id=69ea89bd87115cfb685d0b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6376-cwe-306-missing-authentication-for-c-a38350f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6376%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SpiceJet%20Online%20Booking%20System&amp;severity=high&amp;id=69ea89bd87115cfb685d0b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6375-cwe-639-authorization-bypass-through-bb68022b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6375%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20SpiceJet%20Online%20Booking%20System&amp;severity=high&amp;id=69ea89bd87115cfb685d0b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41264-cwe-184-incomplete-list-of-disallow-7f177023</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41264%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69ea9e7887115cfb686fc345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41265-cwe-77-improper-neutralization-of-s-19dd647d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41265%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69ea89bd87115cfb685d0b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41279-cwe-639-authorization-bypass-throug-34d1bb3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41279%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea89bd87115cfb685d0b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41278-cwe-200-exposure-of-sensitive-infor-bd64edda</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41278%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea9e7887115cfb686fc398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41276-cwe-287-improper-authentication-in--13083407</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41276%3A%20CWE-287%3A%20Improper%20Authentication%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea9e7887115cfb686fc367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41277-cwe-284-improper-access-control-in--9470e14c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41277%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea9e7887115cfb686fc38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25874-cwe-502-deserialization-of-untruste-df0e19a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25874%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20LeRobot&amp;severity=critical&amp;id=69ea8d5f87115cfb685fc9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41275-cwe-319-cleartext-transmission-of-s-3b8e81f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41275%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782a87115cfb6850f85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41273-cwe-306-missing-authentication-for--ee0237e2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41273%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crypto-drainers-as-a-converging-threat-insights-in-b6f47dca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crypto%20Drainers%20as%20a%20Converging%20Threat%3A%20Insights%20into%20Emerging%20Hybrid%20Attack%20Ecosystems&amp;severity=medium&amp;id=69eb2ef987115cfb680962cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snow-flurries-how-unc6692-employed-social-engineer-b41b1549</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Snow%20Flurries%3A%20How%20UNC6692%20Employed%20Social%20Engineering%20to%20Deploy%20a%20Custom%20Malware%20Suite&amp;severity=medium&amp;id=69eb327b87115cfb680bf745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hold-the-phone-international-revenue-share-fraud-d-def3a767</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hold%20the%20Phone!%20International%20Revenue%20Share%20Fraud%20Driven%20by%20Fake%20CAPTCHAs&amp;severity=medium&amp;id=69eb2b7387115cfb6806c5fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41271-cwe-918-server-side-request-forgery-0022e04f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41271%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41272-cwe-918-server-side-request-forgery-2890a669</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41272%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41270-cwe-284-improper-access-control-in--5c95242a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41270%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41269-cwe-434-unrestricted-upload-of-file-420ecc51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41269%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41268-cwe-20-improper-input-validation-in-20ba4b4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41268%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f82a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41267-cwe-639-authorization-bypass-throug-48d20453</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41267%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41266-cwe-200-exposure-of-sensitive-infor-547a4968</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41266%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41137-cwe-94-improper-control-of-generati-e79779d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41137%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69ea782987115cfb6850f81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41138-cwe-94-improper-control-of-generati-6fce0c16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41138%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41205-cwe-22-improper-limitation-of-a-pat-754f5f32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41205%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sqlalchemy%20mako&amp;severity=high&amp;id=69ea89bd87115cfb685d0b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41247-cwe-78-improper-neutralization-of-s-a542372d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41247%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Studio-42%20elFinder&amp;severity=high&amp;id=69ea9e7887115cfb686fc3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41246-cwe-94-improper-control-of-generati-992ab429</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41246%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20projectcontour%20contour&amp;severity=high&amp;id=69ea9e7887115cfb686fc39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41213-cwe-307-improper-restriction-of-exc-098ec1dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41213%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20node-oauth%20node-oauth2-server&amp;severity=medium&amp;id=69ea6a1b87115cfb68455bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41173-cwe-770-allocation-of-resources-wit-c7d0046f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41173%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-telemetry%20opentelemetry-dotnet-contrib&amp;severity=medium&amp;id=69ea6a1b87115cfb68455bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6074-cwe-35-path-traversal-in-intrado-911-771091bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6074%3A%20CWE-35%20Path%20traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Intrado%20911%20Emergency%20Gateway&amp;severity=critical&amp;id=69ea6a1b87115cfb68455bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40886-cwe-129-improper-validation-of-arra-e4b6aa6a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40886%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=69ea6a1a87115cfb68455b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33694-cwe-59-improper-link-resolution-bef-dff081f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33694%3A%20CWE-59%20Improper%20link%20resolution%20before%20file%20access%20(&apos;link%20following&apos;)%20in%20Tenable%2C%20Inc.%20Tenable%20Nessus%2C%20Tenable%20Nessus%20Agent&amp;severity=high&amp;id=69ea6a1a87115cfb68455b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41078-cwe-770-allocation-of-resources-wit-6ec21a19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41078%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-telemetry%20opentelemetry-dotnet&amp;severity=medium&amp;id=69ea6a1b87115cfb68455be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40894-cwe-789-memory-allocation-with-exce-72b1ace5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40894%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-dotnet&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40891-cwe-789-memory-allocation-with-exce-ea6273cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40891%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-dotnet&amp;severity=medium&amp;id=69ea5fae87115cfb683e85c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40182-cwe-789-memory-allocation-with-exce-ee3f9d35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40182%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-dotnet&amp;severity=medium&amp;id=69ea5fae87115cfb683e85c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6921-race-in-google-chrome-828e0fe2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6921%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=69ea5c0887115cfb683ce452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6920-out-of-bounds-read-in-google-chrome-d0bf5523</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6920%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=critical&amp;id=69ea5c0887115cfb683ce44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6919-use-after-free-in-google-chrome-07f5509c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6919%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69ea9e7887115cfb686fc3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5039-cwe-1394-use-of-default-cryptographi-93bf2c5f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5039%3A%20CWE-1394%20Use%20of%20default%20cryptographic%20key%20in%20TP-Link%20Systems%20Inc.%20TL-WL841N%20v13&amp;severity=medium&amp;id=69ea5fae87115cfb683e85cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-and-phishing-targeting-taxpayers-kaspersky-of-21018b0d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%20and%20phishing%20targeting%20taxpayers%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ea437387115cfb682da704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudsmith-raises-72-million-in-series-c-funding-596b797b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudsmith%20Raises%20%2472%20Million%20in%20Series%20C%20Funding&amp;severity=medium&amp;id=69ea355c87115cfb682493de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40472-cwe-79-improper-neutralization-of-i-2ecaa282</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40472%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)&amp;severity=critical&amp;id=69ea9e7887115cfb686fc410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40471-cwe-352-cross-site-request-forgery--4ca0bc45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40471%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)&amp;severity=critical&amp;id=69ea9e7887115cfb686fc40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41240-cwe-183-permissive-list-of-allowed--b335c129</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41240%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69ea588387115cfb683b9248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34003-out-of-bounds-read-in-red-hat-red-h-3a485ffc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34003%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69ea588387115cfb683b9244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34001-expired-pointer-dereference-in-red--a6236a0e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34001%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69ea9e7887115cfb686fc3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33999-integer-underflow-wrap-or-wraparoun-ba2406e3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33999%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69ea9e7887115cfb686fc422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40470-cwe-79-improper-neutralization-of-i-7e7b9272</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40470%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)&amp;severity=critical&amp;id=69ea9e7887115cfb686fc40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41239-cwe-79-improper-neutralization-of-i-e42b3ab6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41239%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69ea9e7b87115cfb686fc58b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23751-cwe-306-missing-authentication-for--a63016e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23751%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Tungsten%20Automation%20Kofax%20Capture&amp;severity=critical&amp;id=69ea9e7887115cfb686fc41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41238-cwe-79-improper-neutralization-of-i-2a57f974</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41238%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69ea9e7887115cfb686fc413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62373-cwe-502-deserialization-of-untruste-cd5dc5f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62373%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pipecat-ai%20pipecat&amp;severity=critical&amp;id=69ea6a1b87115cfb68455bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trigona-affiliates-deploy-custom-exfiltration-tool-38cb885a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trigona%20Affiliates%20Deploy%20Custom%20Exfiltration%20Tool%20to%20Streamline%20Data%20Theft&amp;severity=medium&amp;id=69eb327b87115cfb680bf4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gopherwhisper-a-burrow-full-of-malware-baa9851f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GopherWhisper%3A%20A%20burrow%20full%20of%20malware&amp;severity=medium&amp;id=69eb327b87115cfb680bf510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-a-full-clickfix-attack-chain-part-1-3673b1da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20a%20Full%20ClickFix%20Attack%20Chain%20-%20Part%201&amp;severity=medium&amp;id=69ea31d787115cfb68230e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dindoor-backdoor-deno-runtime-abuse-and-20-active--23a45870</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DinDoor%20Backdoor%3A%20Deno%20Runtime%20Abuse%20and%2020%20Active%20C2%20Servers&amp;severity=medium&amp;id=69eb361f87115cfb680ef893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35225-cwe-754-improper-check-for-unusual--e5706d3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35225%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20CODESYS%20CODESYS%20EtherNetIP&amp;severity=high&amp;id=69ea9e7887115cfb686fc403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-cybersecurity-firms-ai-hacking-claims-draw-5a7b144a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Cybersecurity%20Firm%E2%80%99s%20AI%20Hacking%20Claims%20Draw%20Comparisons%20to%20Claude%20Mythos&amp;severity=medium&amp;id=69ea15b887115cfb681181fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66286-authorization-bypass-through-user-c-c82237e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66286%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69ea15c187115cfb68118427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39440-cwe-94-improper-control-of-generati-fce0c635</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39440%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Funnelforms%20LLC%20FunnelFormsPro&amp;severity=critical&amp;id=69ea15c187115cfb6811842c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rilian-raises-175-million-for-ai-native-security-o-1c48bbcf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rilian%20Raises%20%2417.5%20Million%20for%20AI-Native%20Security%20Orchestration&amp;severity=medium&amp;id=69ea07a887115cfb680b704e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-behavioral-shift-why-trusted-relationships-are-7a6e9a99</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Behavioral%20Shift%3A%20Why%20Trusted%20Relationships%20Are%20the%20Newest%20Attack%20Surface&amp;severity=low&amp;id=69ea011d87115cfb6807e86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62110-cwe-79-improper-neutralization-of-i-59aa3e13</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62110%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rescue%20Themes%20Rescue%20Shortcodes&amp;severity=medium&amp;id=69ea016587115cfb68083e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/luxury-cosmetics-giant-rituals-discloses-data-brea-b2ccbdf1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Luxury%20Cosmetics%20Giant%20Rituals%20Discloses%20Data%20Breach&amp;severity=medium&amp;id=69e9fd1c87115cfb68054a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62104-cwe-862-missing-authorization-in-na-01158fea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62104%3A%20CWE-862%20Missing%20Authorization%20in%20Navneil%20Naicker%20ACF%20Galerie%204&amp;severity=medium&amp;id=69ea016587115cfb68083e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28040-cwe-79-improper-neutralization-of-i-691c7a4c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28040%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Magepeople%20inc.%20Taxi%20Booking%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=69ea016587115cfb68083e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-exploited-notification-flaw-thu-apr--f24425d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Exploited%20Notification%20Flaw%2C%20(Thu%2C%20Apr%2023rd)&amp;severity=medium&amp;id=69e9f30987115cfb68fefd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-can-autonomously-hack-cloud-systems-with-minima-16006173</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Can%20Autonomously%20Hack%20Cloud%20Systems%20With%20Minimal%20Oversight%3A%20Researchers&amp;severity=medium&amp;id=69e9f30487115cfb68fef74f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6903-cwe-22-improper-limitation-of-a-path-74e74900</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6903%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zurich%20Instruments%20LabOne&amp;severity=high&amp;id=69e9eb8887115cfb68f9fc5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6887-cwe-89-improper-neutralization-of-sp-f0a62364</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6887%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20BorG%20Technology%20Corporation%20Borg%20SPM%202007&amp;severity=critical&amp;id=69e9eb8887115cfb68f9fc59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6886-cwe-1390-weak-authentication-in-borg-2caa495c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6886%3A%20CWE-1390%20Weak%20Authentication%20in%20BorG%20Technology%20Corporation%20Borg%20SPM%202007&amp;severity=critical&amp;id=69e9eb8887115cfb68f9fc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6885-cwe-434-unrestricted-upload-of-file--bea8ee1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6885%3A%20CWE-434%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20BorG%20Technology%20Corporation%20Borg%20SPM%202007&amp;severity=critical&amp;id=69e9eb8887115cfb68f9fc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/foxit-impersonation-fake-pdf-installer-deploys-vnc-8622a185</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Foxit%20Impersonation%3A%20Fake%20PDF%20Installer%20Deploys%20VNC&amp;severity=medium&amp;id=69ea2aee87115cfb681ee463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indirect-prompt-injection-in-the-wild-10-ipi-paylo-b1d36285</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indirect%20Prompt%20Injection%20in%20the%20Wild%3A%2010%20IPI%20Payloads%20Found&amp;severity=medium&amp;id=69ea2aee87115cfb681ee470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-ios-flaw-allowing-recovery-of-delete-fcb8e108</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20iOS%20Flaw%20Allowing%20Recovery%20of%20Deleted%20Chats&amp;severity=low&amp;id=69e9dd7a87115cfb68e747d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3960-cwe-94-improper-control-of-generatio-98800b0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3960%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=medium&amp;id=69e9eb8887115cfb68f9fc46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3259-cwe-209-generation-of-error-message--1455facc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3259%3A%20CWE-209%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20Google%20Cloud%20BigQuery&amp;severity=high&amp;id=69e9eb8887115cfb68f9fc43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-campaign-deploying-adaptixc2-beacon-and--ce02325b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Campaign%20Deploying%20AdaptixC2%20Beacon%20and%20VS%20Code%20via%20Trojanized%20SumatraPDF&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5464-cwe-862-missing-authorization-in-smu-3d3ceddb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5464%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=high&amp;id=69e9eb8887115cfb68f9fc4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-attack-via-adobe-themed-lure-delivering-s-6024f2b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Attack%20via%20Adobe-Themed%20Lure%20Delivering%20ScreenConnect%20and%20Credential%20Harvesting%20Tools&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-microsoft-defender-vulnerability-exploited--49a0cdc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Microsoft%20Defender%20Vulnerability%20Exploited%20as%20Zero-Day&amp;severity=low&amp;id=69e9d2ec87115cfb68d325e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41564-cwe-335-incorrect-usage-of-seeds-in-0949d2a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41564%3A%20CWE-335%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20MIK%20CryptX&amp;severity=high&amp;id=69e9cfd487115cfb68ce4194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41040-inefficient-regular-expression-comp-1476ba25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41040%3A%20Inefficient%20regular%20expression%20complexity%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=high&amp;id=69e9c86d87115cfb68c533f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10549-cwe-427-uncontrolled-search-path-el-e8e67463</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10549%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20EfficientLab%2C%20LLC%20Controlio&amp;severity=medium&amp;id=69e9c86d87115cfb68c533f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34488-uncontrolled-search-path-element-in-9431a581</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34488%3A%20Uncontrolled%20Search%20Path%20Element%20in%20i-PRO%20Co.%2C%20Ltd.%20IP%20Setting%20Software&amp;severity=high&amp;id=69e9bdd387115cfb68b66bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4512-cwe-79-cross-site-scripting-xss-in-r-bdf28973</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4512%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20reCaptcha%20by%20WebDesignBy&amp;severity=low&amp;id=69e9bdd387115cfb68b66c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4106-cwe-200-information-exposure-in-ht-m-c5eea5ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4106%3A%20CWE-200%20Information%20Exposure%20in%20HT%20Mega%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69e9bdd387115cfb68b66c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41990-cwe-787-out-of-bounds-write-in-gnup-648d4b9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41990%3A%20CWE-787%20Out-of-bounds%20Write%20in%20gnupg%20Libgcrypt&amp;severity=medium&amp;id=69e9a8be87115cfb68a60134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41989-cwe-787-out-of-bounds-write-in-gnup-9e7a9f02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41989%3A%20CWE-787%20Out-of-bounds%20Write%20in%20gnupg%20Libgcrypt&amp;severity=medium&amp;id=69e9a8be87115cfb68a6012f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40529-improper-neutralization-of-special--f25db596</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40529%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20KANATA%20Limited%20CMS%20ALAYA&amp;severity=medium&amp;id=69e9a8be87115cfb68a60128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41988-cwe-670-always-incorrect-control-fl-19277837</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41988%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20uuidjs%20uuid&amp;severity=low&amp;id=69e9a8be87115cfb68a6012b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-dprk-cyber-threat-actors-fake-it-worker--485f6111</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20DPRK%20Cyber%20Threat%20Actors%3A%20Fake%20IT%20Worker%20Infrastructure&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-powershell-analyzing-the-multi-action-click-c8f4b2c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20PowerShell%3A%20Analyzing%20the%20Multi-Action%20ClickFix%20Variant&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3361-cwe-79-improper-neutralization-of-in-78924b0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3361%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tijmensmit%20WP%20Store%20Locator&amp;severity=medium&amp;id=69e99ab387115cfb687fff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3007-vulnerability-in-three-learning-kool-639937d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3007%3A%20Vulnerability%20in%20Three%20Learning%20Koollab%20Learning%20Management%20System&amp;severity=medium&amp;id=69e99ab387115cfb687fff96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3844-cwe-434-unrestricted-upload-of-file--8e6074b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3844%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20cloudways%20Breeze%20Cache&amp;severity=critical&amp;id=69e9891887115cfb6867f663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2951-cwe-79-improper-neutralization-of-in-1a078f97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2951%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gutentor%20Gutentor%20%E2%80%93%20Gutenberg%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=69e9891887115cfb6867f65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-23rd-2026-httpsis-c187c921</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%2023rd%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9904%2C%20(Thu%2C%20Apr%2023rd)&amp;severity=medium&amp;id=69e97e8c87115cfb685dbae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1923-cwe-79-improper-neutralization-of-in-5423a21a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1923%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20socialrocket%20Social%20Rocket%20%E2%80%93%20Social%20Sharing%20Plugin&amp;severity=medium&amp;id=69e97b6f87115cfb685bd761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41211-cwe-22-improper-limitation-of-a-pat-88fc9487</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41211%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20voidzero-dev%20vite-plus&amp;severity=high&amp;id=69e9707c87115cfb68522147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41679-cwe-287-improper-authentication-in--09e9d7e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41679%3A%20CWE-287%3A%20Improper%20Authentication%20in%20paperclipai%20paperclip&amp;severity=critical&amp;id=69e9707c87115cfb6852214e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41208-cwe-78-improper-neutralization-of-s-850f967b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20paperclipai%20%40paperclipai%2Fserver&amp;severity=high&amp;id=69e9707c87115cfb68522144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41206-cwe-184-incomplete-list-of-disallow-d1a9d658</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41206%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20ParzivalHack%20PySpector&amp;severity=medium&amp;id=69e9707c87115cfb6852213f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41200-cwe-79-improper-neutralization-of-i-9cafd22a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41200%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NUWCDIVNPT%20stig-manager&amp;severity=high&amp;id=69e9707c87115cfb6852213c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41197-cwe-131-incorrect-calculation-of-bu-282b810c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41197%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20noir-lang%20noir&amp;severity=critical&amp;id=69e9707c87115cfb68522138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41196-cwe-94-improper-control-of-generati-70ec6155</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41196%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20luanti-org%20luanti&amp;severity=critical&amp;id=69e9707c87115cfb68522134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41182-cwe-200-exposure-of-sensitive-infor-8e8ca26e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41182%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20langchain-ai%20langsmith-sdk&amp;severity=medium&amp;id=69e9707c87115cfb68522131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41180-cwe-22-improper-limitation-of-a-pat-1ff3f9c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41180%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20psi-4ward%20psitransfer&amp;severity=high&amp;id=69e9707c87115cfb6852212c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41243-cwe-284-improper-access-control-in--17f3e53b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41243%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20siemvk%20OpenLearn&amp;severity=medium&amp;id=69e9707c87115cfb6852214a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32679-uncontrolled-search-path-element-in-3ff2da85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32679%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Japan%20Media%20Systems%20Corporation%20Downloader5Installer.exe&amp;severity=high&amp;id=69ea9e7887115cfb686fc3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40062-improper-limitation-of-a-pathname-t-d9e7ba4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40062%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Ziosoft%2C%20Inc.%20Ziostation2&amp;severity=high&amp;id=69ea9e7887115cfb686fc407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6878-sandbox-issue-in-bytedance-verl-81afb8d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6878%3A%20Sandbox%20Issue%20in%20ByteDance%20verl&amp;severity=medium&amp;id=69ea193c87115cfb681377a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-24-3e3ffd10</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-24&amp;severity=medium&amp;id=69ec2f0987115cfb68b8523d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-23-632826cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-23&amp;severity=medium&amp;id=69eab3e387115cfb687c711c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50229-na-b00595ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50229%3A%20n%2Fa&amp;severity=critical&amp;id=69ea9e7887115cfb686fc417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70994-na-cca94a75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70994%3A%20n%2Fa&amp;severity=high&amp;id=69ea9e7887115cfb686fc3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39087-na-befb301f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39087%3A%20n%2Fa&amp;severity=critical&amp;id=69ea9e7887115cfb686fc3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31173-na-2cc52968</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31173%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31169-na-f962979a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31169%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31168-na-9bef328b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31168%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31167-na-058ab7be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31167%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31166-na-8c86bc42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31166%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31163-na-eaeeee31</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31163%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31162-na-30f58b88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31162%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31179-na-1e3eff11</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31179%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5fae87115cfb683e85cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31175-na-8558c681</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31175%3A%20n%2Fa&amp;severity=critical&amp;id=69ea5fae87115cfb683e85be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31174-na-61de1c87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31174%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5fae87115cfb683e85bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31172-na-7aa971f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31172%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5fae87115cfb683e85b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31171-na-eae63db6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31171%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5fae87115cfb683e85b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31165-na-daa1c506</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31165%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5c0887115cfb683ce44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31164-na-6ccadb5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31164%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5c0887115cfb683ce448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31160-na-e95be85a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31160%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5c0887115cfb683ce445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31181-na-e16bbcb2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31181%3A%20n%2Fa&amp;severity=critical&amp;id=69ea588387115cfb683b9241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31178-na-1cc71843</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31178%3A%20n%2Fa&amp;severity=critical&amp;id=69ea588387115cfb683b923e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31177-na-b0ff6662</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31177%3A%20n%2Fa&amp;severity=critical&amp;id=69ea588387115cfb683b923b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31176-na-d8307adf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31176%3A%20n%2Fa&amp;severity=medium&amp;id=69ea588387115cfb683b9238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31159-na-c6ec11f7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31159%3A%20n%2Fa&amp;severity=medium&amp;id=69ea588387115cfb683b9235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-23-c3f3ed20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-23&amp;severity=low&amp;id=69e9eb7f87115cfb68f9c85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1726-cwe-269-improper-privilege-managemen-dff16851</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1726%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IBM%20Guardium%20Key%20Lifecycle%20Manager&amp;severity=medium&amp;id=69e95f0887115cfb6814189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36074-cwe-434-unrestricted-upload-of-file-ebdda370</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36074%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20Security%20Verify%20Directory%20(Container)&amp;severity=medium&amp;id=69e95f0887115cfb68141890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5926-vulnerability-in-ibm-verify-identity-b2fee278</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5926%3A%20Vulnerability%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69e95f0887115cfb681418a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1352-cwe-1284-improper-validation-of-spec-bff0e4b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1352%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2&amp;severity=medium&amp;id=69e95f0887115cfb68141899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1272-cwe-613-insufficient-session-expirat-ef765271</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1272%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=low&amp;id=69e95f0887115cfb68141893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1274-cwe-840-business-logic-errors-in-ibm-001fd6e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1274%3A%20CWE-840%20Business%20Logic%20Errors%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=69e95f0887115cfb68141896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6874-reliance-on-reverse-dns-resolution-i-b780d4cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6874%3A%20Reliance%20on%20Reverse%20DNS%20Resolution%20in%20ericc-ch%20copilot-api&amp;severity=medium&amp;id=69e95f0987115cfb681418a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5935-cwe-78-improper-neutralization-of-sp-2a79deef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5935%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Total%20Storage%20Service%20Console%20(TSSC)%20%2F%20TS4500%20IMC&amp;severity=high&amp;id=69e95f0987115cfb681418a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4917-cwe-22-improper-limitation-of-a-path-4277155a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4917%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=69e95f0887115cfb6814189f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4918-cwe-79-improper-neutralization-of-in-5d4bd3b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4918%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=69e95b6487115cfb68ea1883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4919-cwe-79-improper-neutralization-of-in-cb0da51f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4919%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=69e95b6487115cfb68ea1886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3621-cwe-269-improper-privilege-managemen-c403a841</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3621%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=high&amp;id=69e95b6487115cfb68ea1880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-artifacts-found-in-official-kics-docker--8683cb6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Artifacts%20Found%20in%20Official%20KICS%20Docker%20Repository%20and%20Code%20Extensions&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild-16aa45</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Untangling%20a%20Linux%20Incident%20With%20an%20OpenAI%20Twist%20(Part%202)&amp;severity=medium&amp;id=682c992c7960f6956616aa45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40517-cwe-78-improper-neutralization-of-s-e9c54683</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40517%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radareorg%20radare2&amp;severity=high&amp;id=69e9490f19fe3cd2cdf886c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41175-cwe-470-use-of-externally-controlle-757022e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41175%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69e9419f19fe3cd2cdf48808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41314-cwe-789-memory-allocation-with-exce-dd9018a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41314%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e93e1919fe3cd2cdf2afe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41313-cwe-834-excessive-iteration-in-py-p-6924f313</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41313%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e93e1919fe3cd2cdf2afdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41312-cwe-789-memory-allocation-with-exce-2df18452</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41312%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e93e1919fe3cd2cdf2afd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41168-cwe-834-excessive-iteration-in-py-p-7c5b58c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41168%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e9371d19fe3cd2cdefb1f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41167-cwe-89-improper-neutralization-of-s-51b08aed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41167%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CyferShepard%20Jellystat&amp;severity=critical&amp;id=69e9371d19fe3cd2cdefb1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41134-cwe-94-improper-control-of-generati-e0092852</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41134%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20microsoft%20kiota&amp;severity=high&amp;id=69e9338e19fe3cd2cdedf9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34068-cwe-347-improper-verification-of-cr-faf5604c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34068%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20nimiq%20nimiq-transaction&amp;severity=medium&amp;id=69e92c8e19fe3cd2cdeac9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34067-cwe-617-reachable-assertion-in-nimi-d41d9655</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34067%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20nimiq%20nimiq-transaction&amp;severity=low&amp;id=69e92c8e19fe3cd2cdeac9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34066-cwe-20-improper-input-validation-in-1a32bdac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34066%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nimiq%20nimiq-blockchain&amp;severity=medium&amp;id=69e9290319fe3cd2cde955ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34065-cwe-252-unchecked-return-value-in-n-b2c2f3d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34065%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20nimiq%20nimiq-primitives&amp;severity=high&amp;id=69e9290319fe3cd2cde955a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34064-cwe-191-integer-underflow-wrap-or-w-a4237264</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34064%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20nimiq%20nimiq-account&amp;severity=medium&amp;id=69e9290319fe3cd2cde9559f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34063-cwe-617-reachable-assertion-in-nimi-bc442c35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34063%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20nimiq%20network-libp2p&amp;severity=high&amp;id=69e9290319fe3cd2cde95599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6019-cwe-150-improper-neutralization-of-e-602e438c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6019%3A%20CWE-150%20Improper%20neutralization%20of%20escape%2C%20meta%2C%20or%20control%20sequences%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=69e9290319fe3cd2cde955b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34062-cwe-770-allocation-of-resources-wit-1356ecd8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34062%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nimiq%20network-libp2p&amp;severity=medium&amp;id=69e9290319fe3cd2cde95594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33471-cwe-20-improper-input-validation-in-2bd8708b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33471%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nimiq%20nimiq-block&amp;severity=critical&amp;id=69e921fb19fe3cd2cde59f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34413-cwe-497-exposure-of-sensitive-syste-4b21189a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34413%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20thexerteproject%20xerteonlinetoolkits&amp;severity=high&amp;id=69e91af419fe3cd2cde2a8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34415-cwe-184-incomplete-list-of-disallow-f774ae94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34415%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20thexerteproject%20xerteonlinetoolkits&amp;severity=critical&amp;id=69e91af419fe3cd2cde2a8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34414-cwe-22-improper-limitation-of-a-pat-0a7e813a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34414%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thexerteproject%20xerteonlinetoolkits&amp;severity=high&amp;id=69e91af419fe3cd2cde2a8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41459-cwe-497-exposure-of-sensitive-syste-2d4a5aa9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41459%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20thexerteproject%20xerteonlinetoolkits&amp;severity=medium&amp;id=69e91af419fe3cd2cde2a8c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28950-notifications-marked-for-deletion-c-2c06203a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28950%3A%20Notifications%20marked%20for%20deletion%20could%20be%20unexpectedly%20retained%20on%20the%20device%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69e913ed19fe3cd2cddf58dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26354-cwe-121-stack-based-buffer-overflow-0d554218</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26354%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e913ed19fe3cd2cddf58d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41468-cwe-1104-use-of-unmaintained-third--1563ff90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41468%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third-Party%20Components%20in%20Beghelli%20SicuroWeb%20(Sicuro24)&amp;severity=critical&amp;id=69e913ed19fe3cd2cddf58e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41469-cwe-693-protection-mechanism-failur-ac18e619</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41469%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20Beghelli%20SicuroWeb%20(Sicuro24)&amp;severity=medium&amp;id=69e913ed19fe3cd2cddf58e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-packages-hit-with-teampcp-style-canisterworm-m-7d4ed757</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%20Packages%20Hit%20with%20TeamPCP-Style%20CanisterWorm%20Malware&amp;severity=medium&amp;id=69e9e47e87115cfb68f3d15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targeting-developers-real-world-cases-tactics-and--0de05a7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targeting%20developers%3A%20real-world%20cases%2C%20tactics%2C%20and%20defense%20strategies%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69e8f46c19fe3cd2cdced25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35381-cwe-684-incorrect-provision-of-spec-02f007c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35381%3A%20CWE-684%3A%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d719fe3cd2cdd02535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35380-cwe-20-improper-input-validation-in-0c5404b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35380%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d719fe3cd2cdd02531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35379-cwe-684-incorrect-provision-of-spec-ae05b54f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35379%3A%20CWE-684%3A%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d719fe3cd2cdd0252d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35378-cwe-768-incorrect-short-circuit-eva-51d9a39d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35378%3A%20CWE-768%3A%20Incorrect%20Short%20Circuit%20Evaluation%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d719fe3cd2cdd02529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35377-cwe-20-improper-input-validation-in-94960f0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35377%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d519fe3cd2cdd00d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35376-cwe-367-time-of-check-time-of-use-t-2aa7d04d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35376%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35375-cwe-176-improper-handling-of-unicod-af2daa2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35375%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d519fe3cd2cdd00d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35374-cwe-367-time-of-check-time-of-use-t-3ad00346</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35374%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35373-cwe-176-improper-handling-of-unicod-47ec4bf4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35373%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d519fe3cd2cdd00d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35372-cwe-61-unix-symbolic-link-symlink-f-6b0f898e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35372%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35371-cwe-451-user-interface-ui-misrepres-c8dbd129</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35371%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d519fe3cd2cdd00d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35370-cwe-863-incorrect-authorization-in--17f882aa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35370%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35369-cwe-20-improper-input-validation-in-f4e500ea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35369%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35368-cwe-426-untrusted-search-path-in-uu-fc8d78ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35368%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Uutils%20coreutils&amp;severity=high&amp;id=69e8f7d519fe3cd2cdd00d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35367-cwe-732-incorrect-permission-assign-5bf25456</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35367%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d319fe3cd2cdd00d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35366-cwe-754-improper-check-for-unusual--f944d272</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35366%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35365-cwe-59-improper-link-resolution-bef-3ccb2f69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35365%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35364-cwe-367-time-of-check-time-of-use-t-a7877f35</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35364%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35363-cwe-22-improper-limitation-of-a-pat-f3d92ffe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35363%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35362-cwe-367-time-of-check-time-of-use-t-8d6557dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35362%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d319fe3cd2cdd00cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35361-cwe-281-improper-preservation-of-pe-f6d833a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35361%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d319fe3cd2cdd00cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35360-cwe-367-time-of-check-time-of-use-t-347ec03e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35360%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35359-cwe-367-time-of-check-time-of-use-t-f2d68315</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35359%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35358-cwe-706-use-of-incorrectly-resolved-806512e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35358%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35357-cwe-367-time-of-check-time-of-use-t-8a74a812</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35357%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35356-cwe-367-time-of-check-time-of-use-t-161d31ee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35356%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35355-cwe-367-time-of-check-time-of-use-t-f30b6900</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35355%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35354-cwe-367-time-of-check-time-of-use-t-41b623b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35354%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35353-cwe-367-time-of-check-time-of-use-t-ee198c91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35353%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d019fe3cd2cdd00c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35352-cwe-367-time-of-check-time-of-use-t-47bf3c3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35352%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=high&amp;id=69e8f7d019fe3cd2cdd00c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35351-cwe-281-improper-preservation-of-pe-0431ef0b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35351%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35350-cwe-281-improper-preservation-of-pe-ee6908b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35350%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35349-cwe-59-improper-link-resolution-bef-2dbf7ea9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35349%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35348-cwe-248-uncaught-exception-in-uutil-d7ee53a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35348%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35347-cwe-20-improper-input-validation-in-49c9e047</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35347%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7ce19fe3cd2cdd00c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35346-cwe-176-improper-handling-of-unicod-6258c245</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35346%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7ce19fe3cd2cdd00c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35345-cwe-367-time-of-check-time-of-use-t-cfd4056b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35345%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7ce19fe3cd2cdd00c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35344-cwe-252-unchecked-return-value-in-u-04cf1750</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35344%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7ce19fe3cd2cdd00c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35343-cwe-670-always-incorrect-control-fl-12e9acb5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35343%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7ce19fe3cd2cdd00c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35342-cwe-377-insecure-temporary-file-in--873d258b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35342%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7ce19fe3cd2cdd00c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35341-cwe-732-incorrect-permission-assign-f0bd459e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35341%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Uutils%20coreutils&amp;severity=high&amp;id=69e8f7ce19fe3cd2cdd00c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35340-cwe-253-incorrect-check-of-function-640b29cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35340%3A%20CWE-253%3A%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7ce19fe3cd2cdd00c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35339-cwe-253-incorrect-check-of-function-dd2f7a2e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35339%3A%20CWE-253%3A%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7ce19fe3cd2cdd00c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35338-cwe-22-improper-limitation-of-a-pat-0f5ba1fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35338%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Uutils%20coreutils&amp;severity=high&amp;id=69e8f7ce19fe3cd2cdd00bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58922-cwe-352-cross-site-request-forgery--9fb81152</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58922%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeFusion%20Avada&amp;severity=medium&amp;id=69e8f0d819fe3cd2cdcd58b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58344-improper-neutralization-of-input-du-c6bafb31</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58344%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2094Cb%20Carbon%20Forum&amp;severity=medium&amp;id=69e8e9bb19fe3cd2cdc88f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/after-bluesky-mastodon-targeted-in-ddos-attack-756f23ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=After%20Bluesky%2C%20Mastodon%20Targeted%20in%20DDoS%20Attack&amp;severity=medium&amp;id=69e8dbaa19fe3cd2cdbeb7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33611-integer-overflow-or-wraparound-in-p-3870a7e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33611%3A%20Integer%20Overflow%20or%20Wraparound%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdacaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33610-uncontrolled-resource-consumption-i-013089b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33610%3A%20Uncontrolled%20Resource%20Consumption%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdaca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33609-improper-neutralization-of-special--ba687410</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33609%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdaca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33608-improper-control-of-generation-of-c-947cf7dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33608%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PowerDNS%20Authoritative&amp;severity=high&amp;id=69e8d83619fe3cd2cdbdaca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33593-divide-by-zero-in-powerdns-dnsdist-524fafa6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33593%3A%20Divide%20By%20Zero%20in%20PowerDNS%20DNSdist&amp;severity=high&amp;id=69e8d83319fe3cd2cdbdac07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33594-allocation-of-resources-without-lim-bbf529a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33594%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33595-allocation-of-resources-without-lim-e15366a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33595%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33597-improper-encoding-or-escaping-of-ou-1e7009fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33597%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69e8d83319fe3cd2cdbdac13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33596-integer-overflow-or-wraparound-in-p-f4d21ff1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33596%3A%20Integer%20Overflow%20or%20Wraparound%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69e8d83319fe3cd2cdbdac10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33598-out-of-bounds-read-in-powerdns-dnsd-c09eb9ab</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33598%3A%20Out-of-bounds%20Read%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33599-out-of-bounds-read-in-powerdns-dnsd-684d3aa2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33599%3A%20Out-of-bounds%20Read%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69e8d83319fe3cd2cdbdac19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6862-uncontrolled-recursion-in-red-hat-re-8491e1ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6862%3A%20Uncontrolled%20Recursion%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdacb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33602-heap-based-buffer-overflow-in-power-8ad725f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33602%3A%20Heap-based%20Buffer%20Overflow%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33254-allocation-of-resources-without-lim-e90b103c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33254%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6861-off-by-one-error-in-red-hat-red-hat--7a4da0f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6861%3A%20Off-by-one%20Error%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdacad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6859-inclusion-of-functionality-from-untr-6b02868a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6859%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%20AI%20(RHEL%20AI)%203&amp;severity=high&amp;id=69e8d12119fe3cd2cdb88e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0539-cwe-276-incorrect-default-permission-bf1a7aff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0539%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20pcvisit%20pcvisit%20Remote%20Host%20Modul&amp;severity=high&amp;id=69e8d12119fe3cd2cdb88e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/most-serious-cyberattacks-against-the-uk-now-from--1571ea56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Most%20Serious%20Cyberattacks%20Against%20the%20UK%20Now%20From%20Russia%2C%20Iran%20and%20China%2C%20Cyber%20Chief%20Says&amp;severity=medium&amp;id=69e8c69219fe3cd2cdaeae95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6857-deserialization-of-untrusted-data-in-5f5d291d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6857%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%204%20for%20Quarkus%203&amp;severity=high&amp;id=69e8c6b019fe3cd2cdaed3f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-fudcrypt-a-real-world-malware-crypting--fcd20fed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20FudCrypt%3A%20A%20Real-World%20Malware%20Crypting%20Service%20Analysis&amp;severity=medium&amp;id=69e8e63519fe3cd2cdc20ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/formbook-malware-uses-phishing-dll-side-loading-ja-e6840a88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FormBook%20Malware%20Uses%20Phishing%2C%20DLL%20Side-Loading%2C%20JavaScript&amp;severity=medium&amp;id=69e8e9b919fe3cd2cdc882b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/twizadmin-multi-stage-crypto-clipper-infostealer-r-28b2953c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TwizAdmin%20--%20Multi-Stage%20Crypto%20Clipper%2C%20Infostealer%20%26%20Ransomware%20Operation&amp;severity=medium&amp;id=69e8e9b919fe3cd2cdc8829a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kyber-ransomware-double-trouble-windows-and-esxi-a-e5530819</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kyber%20Ransomware%20Double%20Trouble%3A%20Windows%20and%20ESXi%20Attacks%20Explained&amp;severity=medium&amp;id=69e8e9b919fe3cd2cdc88293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6855-improper-limitation-of-a-pathname-to-d100c9c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6855%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%20AI%20(RHEL%20AI)%203&amp;severity=high&amp;id=69e8c30f19fe3cd2cdab6d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wiper-malware-targeted-venezuelan-energy-secto-9d79bd8a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Wiper%20Malware%20Targeted%20Venezuelan%20Energy%20Sector%20Prior%20to%20US%20Intervention&amp;severity=medium&amp;id=69e8bc0619fe3cd2cda4a29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mirai-botnet-targets-flaw-in-discontinued-d-link-r-2d869803</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mirai%20Botnet%20Targets%20Flaw%20in%20Discontinued%20D-Link%20Routers&amp;severity=medium&amp;id=69e8b4fe19fe3cd2cd9de4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-group-expands-toolset-with-new-gogra-linux-bac-b7868bf8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20Group%20Expands%20Toolset%20With%20New%20GoGra%20Linux%20Backdoor&amp;severity=medium&amp;id=69e8e9b919fe3cd2cdc88289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/are-sboms-failing-supply-chain-attacks-rise-as-sec-0385b359</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Are%20SBOMs%20Failing%3F%20Supply%20Chain%20Attacks%20Rise%20as%20Security%20Teams%20Struggle%20With%20SBOM%20Data&amp;severity=medium&amp;id=69e957ed87115cfb68e5707d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-mythos-finds-271-firefox-vulnerabilities-ae74571f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Mythos%20Finds%20271%20Firefox%20Vulnerabilities&amp;severity=medium&amp;id=69e8b17a19fe3cd2cd9b534a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-use-applescript-clickfix-in-f-8ca1fe25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Use%20AppleScript%2C%20ClickFix%20in%20Fresh%20macOS%20Attacks&amp;severity=medium&amp;id=69e8aa7219fe3cd2cd951a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-antigravity-in-crosshairs-of-security-resea-49e17863</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Antigravity%20in%20Crosshairs%20of%20Security%20Researchers%2C%20Cybercriminals&amp;severity=critical&amp;id=69e89c6219fe3cd2cd8ddf84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33262-null-pointer-dereference-in-powerdn-72a50870</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33262%3A%20NULL%20Pointer%20Dereference%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33261-missing-support-for-integrity-check-be8bd4d0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33261%3A%20Missing%20Support%20for%20Integrity%20Check%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33260-allocation-of-resources-without-lim-19d1bdb2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33260%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33259-use-after-free-in-powerdns-recursor-95c1b6d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33259%3A%20Use%20After%20Free%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33258-allocation-of-resources-without-lim-07514143</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33258%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33257-allocation-of-resources-without-lim-9b25e45b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33257%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33256-allocation-of-resources-without-lim-c592daf9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33256%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33601-null-pointer-dereference-in-powerdn-0f9ceb69</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33601%3A%20NULL%20Pointer%20Dereference%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33600-null-pointer-dereference-in-powerdn-c8ce4796</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33600%3A%20NULL%20Pointer%20Dereference%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e898dd19fe3cd2cd8c392f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1913-cwe-79-improper-neutralization-of-in-235596af</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gallagherwebsitedesign%20Gallagher%20Website%20Design&amp;severity=medium&amp;id=69e898dd19fe3cd2cd8c3920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1930-cwe-862-missing-authorization-in-han-23ecaff9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1930%3A%20CWE-862%20Missing%20Authorization%20in%20hanicker%20Emailchef&amp;severity=medium&amp;id=69e898dd19fe3cd2cd8c3927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6848-insufficient-session-expiration-in-r-dfc7c1c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6848%3A%20Insufficient%20Session%20Expiration%20in%20Red%20Hat%20Red%20Hat%20Quay%203&amp;severity=medium&amp;id=69e898dd19fe3cd2cd8c3932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-patches-450-vulnerabilities-with-april-2026-b6816a27</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Patches%20450%20Vulnerabilities%20With%20April%202026%20CPU&amp;severity=medium&amp;id=69e88ace19fe3cd2cd81f365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6846-heap-based-buffer-overflow-in-red-ha-6c30367e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6846%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69e88e5219fe3cd2cd83b858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6844-uncontrolled-resource-consumption-in-4106dfa8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6844%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e88e5219fe3cd2cd83b854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6843-use-of-externally-controlled-format--65b65110</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6843%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e88e5219fe3cd2cd83b850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6845-null-pointer-dereference-in-red-hat--7021dda0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6845%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4353-cwe-79-improper-neutralization-of-in-0a52d99e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cihubconnector%20CI%20HUB%20Connector&amp;severity=medium&amp;id=69e8877019fe3cd2cd80901f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4138-cwe-352-cross-site-request-forgery-c-bed04b69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4138%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nofearinc%20DX%20Unanswered%20Comments&amp;severity=medium&amp;id=69e8877019fe3cd2cd808fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6294-cwe-352-cross-site-request-forgery-c-c621007a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6294%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20byybora%20Google%20PageRank%20Display&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6236-cwe-79-improper-neutralization-of-in-a51a39a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lucdecri%20Posts%20map&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4117-cwe-862-missing-authorization-in-cal-77f5a788</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4117%3A%20CWE-862%20Missing%20Authorization%20in%20calj%20CalJ%20Shabbat%20Times&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4119-cwe-862-missing-authorization-in-jpp-12851972</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4119%3A%20CWE-862%20Missing%20Authorization%20in%20jppreus%20Create%20DB%20Tables&amp;severity=critical&amp;id=69e8876e19fe3cd2cd808e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4132-cwe-73-external-control-of-file-name-ede0442a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4132%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20zinoui%20HTTP%20Headers&amp;severity=high&amp;id=69e8877019fe3cd2cd808fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2719-cwe-79-improper-neutralization-of-in-64c1f05d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2719%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fpoller%20Private%20WP%20suite&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4121-cwe-352-cross-site-request-forgery-c-45c1a3d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4121%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ksolves%20Kcaptcha&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5748-cwe-79-improper-neutralization-of-in-885a583a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snedled%20Text%20Snippets&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4074-cwe-79-improper-neutralization-of-in-701c115c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4074%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karim42%20Quran%20Live%20Multilanguage&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4085-cwe-79-improper-neutralization-of-in-3ee50d45</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4085%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maltathemes%20Easy%20Social%20Photos%20Gallery%20%E2%80%93%20MIF&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6246-cwe-79-improper-neutralization-of-in-50f52a53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6246%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mkerstner%20Simple%20Random%20Posts%20Shortcode&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4142-cwe-79-improper-neutralization-of-in-716de4a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eazyserver%20Sentence%20To%20SEO%20(keywords%2C%20description%20and%20tags)&amp;severity=medium&amp;id=69e8877019fe3cd2cd809002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6235-cwe-862-missing-authorization-in-sen-1e57aff5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6235%3A%20CWE-862%20Missing%20Authorization%20in%20sendmachine%20Sendmachine%20for%20WordPress&amp;severity=critical&amp;id=69e8877219fe3cd2cd8093d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4090-cwe-352-cross-site-request-forgery-c-da9068d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4090%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ravster%20Inquiry%20cart&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2717-cwe-93-improper-neutralization-of-cr-71816c3c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2717%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20zinoui%20HTTP%20Headers&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4118-cwe-352-cross-site-request-forgery-c-ba11849e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4118%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tmarek%20Call%20To%20Action%20Plugin&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4139-cwe-352-cross-site-request-forgery-c-5640d79d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4139%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chsxf%20mCatFilter&amp;severity=medium&amp;id=69e8877019fe3cd2cd808ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4125-cwe-79-improper-neutralization-of-in-426b77f1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmkorg%20WPMK%20Block&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4128-cwe-862-missing-authorization-in-tpl-a47c6cb5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4128%3A%20CWE-862%20Missing%20Authorization%20in%20tplugins%20TP%20Restore%20Categories%20And%20Taxonomies&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5767-cwe-79-improper-neutralization-of-in-64b4f930</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5767%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20luetkemj%20SlideShowPro%20SC&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4089-cwe-79-improper-neutralization-of-in-434c6e6e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4089%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnnie2u%20Twittee%20Text%20Tweet&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3362-cwe-79-improper-neutralization-of-in-b499ef92</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itsananderson%20Short%20Comment%20Filter&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6396-cwe-352-cross-site-request-forgery-c-8c92df71</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6396%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webarea%20Fast%20%26%20Fancy%20Filter%20%E2%80%93%203F&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4280-cwe-22-improper-limitation-of-a-path-40a9b427</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4280%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20doctorwp%20Breaking%20News%20WP&amp;severity=medium&amp;id=69e8877019fe3cd2cd809016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4140-cwe-352-cross-site-request-forgery-c-408358f1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4140%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anzia%20Ni%20WooCommerce%20Order%20Export&amp;severity=medium&amp;id=69e8877019fe3cd2cd808ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4133-cwe-352-cross-site-request-forgery-c-cdc53135</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4133%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20textp2p%20TextP2P%20Texting%20Widget&amp;severity=medium&amp;id=69e8877019fe3cd2cd808fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4076-cwe-79-improper-neutralization-of-in-2e43ab74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20felipermendes%20Slider%20Bootstrap%20Carousel&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4126-cwe-200-exposure-of-sensitive-inform-5593e4bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4126%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20primisdigital%20Table%20Manager&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2714-cwe-79-improper-neutralization-of-in-aeaf694c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2714%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weblizar%20Institute%20Management%20%E2%80%93%20Learning%20Management%20System&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4088-cwe-79-improper-neutralization-of-in-1f2fc762</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpshouter%20Switch%20CTA%20Box&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1845-cwe-79-improper-neutralization-of-in-714efc56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bhubbard%20Real%20Estate%20Pro&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6041-cwe-79-improper-neutralization-of-in-9819e976</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6041%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mixer2%20Buzz%20Comments&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4131-cwe-352-cross-site-request-forgery-c-70210ccf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4131%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sphex1987%20WP%20Responsive%20Popup%20%2B%20Optin&amp;severity=medium&amp;id=69e8877019fe3cd2cd808fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4082-cwe-79-improper-neutralization-of-in-3b98007d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20erithq%20ER%20Swiffy%20Insert&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4279-cwe-79-improper-neutralization-of-in-e4682dd8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4279%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20breadbutter%20Bread%20%26%20Butter%3A%20AI-Powered%20Lead%20Intelligence&amp;severity=medium&amp;id=69e8877019fe3cd2cd80900f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1379-cwe-79-improper-neutralization-of-in-1f846bba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zinoui%20HTTP%20Headers&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5820-cwe-79-improper-neutralization-of-in-23a26644</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sproutient%20Zypento%20Blocks&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6842-incorrect-permission-assignment-for--d9d71f2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6842%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69e87cbe19fe3cd2cd7bf973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6023-cwe-502-deserialization-of-untrusted-b293ba7b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6023%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Progress%20Software%20Telerik%20UI%20for%20ASP.NET%20AJAX&amp;severity=high&amp;id=69e87cbe19fe3cd2cd7bf970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6022-cwe-400-uncontrolled-resource-consum-dee17416</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6022%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Progress%20Software%20Telerik%20UI%20for%20ASP.NET%20AJAX&amp;severity=high&amp;id=69e87cbe19fe3cd2cd7bf96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40542-cwe-304-missing-critical-step-in-au-39bc90aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40542%3A%20CWE-304%3A%20Missing%20Critical%20Step%20in%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20HttpClient&amp;severity=high&amp;id=69e87cbe19fe3cd2cd7bf96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/march-2026-phishing-email-trends-report-39487dbc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=March%202026%20Phishing%20Email%20Trends%20Report&amp;severity=medium&amp;id=69e8876919fe3cd2cd808c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6840-cwe-129-improper-validation-of-array-e00e6759</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6840%3A%20CWE-129%20Improper%20validation%20of%20array%20index%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6839-cwe-1284-improper-validation-of-spec-e332e4dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6839%3A%20CWE-1284%20Improper%20validation%20of%20specified%20quantity%20in%20input%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41667-cwe-190-integer-overflow-or-wraparo-767ef7b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41667%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41666-cwe-190-integer-overflow-or-wraparo-ef409e56</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41666%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41665-cwe-190-integer-overflow-or-wraparo-5acdbd90</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41665%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41664-cwe-190-integer-overflow-or-wraparo-a27f5e6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41664%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40450-cwe-190-integer-overflow-or-wraparo-f0f40248</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40450%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40449-cwe-190-integer-overflow-or-wraparo-610b3f4b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40449%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40448-cwe-190-integer-overflow-or-wraparo-5092d529</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40448%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22754-vulnerability-in-spring-spring-secu-e2bbf647</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22754%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=high&amp;id=69e8609e19fe3cd2cd714520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22753-vulnerability-in-spring-spring-secu-0e49ffc5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22753%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=high&amp;id=69e8609e19fe3cd2cd71451d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22748-vulnerability-in-spring-spring-secu-aa05584e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22748%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=medium&amp;id=69e8609e19fe3cd2cd71451a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22747-vulnerability-in-spring-spring-secu-54eefe85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22747%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=medium&amp;id=69e8609e19fe3cd2cd714517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22746-vulnerability-in-spring-spring-secu-ccb3f5cb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22746%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=low&amp;id=69e8609e19fe3cd2cd714513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40451-cross-site-scripting-xss-in-deepl-c-0dc2de5b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40451%3A%20Cross-site%20scripting%20(XSS)%20in%20DeepL%20Chrome%20browser%20extension&amp;severity=medium&amp;id=69e85dc119fe3cd2cd708088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6835-cwe-434-unrestricted-upload-of-file--64dc3deb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6835%3A%20CWE-434%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20aEnrich%20a%2BHCM&amp;severity=medium&amp;id=69e8480219fe3cd2cd4cd5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6834-cwe-862-missing-authorization-in-aen-34aab48f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6834%3A%20CWE-862%20Missing%20Authorization%20in%20aEnrich%20a%2BHRD&amp;severity=high&amp;id=69e8480219fe3cd2cd4cd5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6833-cwe-89-improper-neutralization-of-sp-c4644e6c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6833%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20aEnrich%20a%2BHRD&amp;severity=high&amp;id=69e8480219fe3cd2cd4cd5a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-22nd-2026-httpsi-dc448848</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%2022nd%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9902%2C%20(Wed%2C%20Apr%2022nd)&amp;severity=medium&amp;id=69e82be219fe3cd2cd2e78ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6408-insufficiently-protected-credentials-5ee5cc77</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6408%3A%20Insufficiently%20Protected%20Credentials%20in%20Tanium%20Tanium%20Server&amp;severity=low&amp;id=69e8366d19fe3cd2cd3e6df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6392-exposure-of-sensitive-information-to-7a7525e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6392%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Tanium%20Threat%20Response&amp;severity=low&amp;id=69e8366d19fe3cd2cd3e6df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41458-cwe-362-concurrent-execution-using--d9b20473</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41458%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20owntone%20owntone-server&amp;severity=high&amp;id=69e8366d19fe3cd2cd3e6dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6416-uncontrolled-resource-consumption-in-6d82babd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6416%3A%20Uncontrolled%20Resource%20Consumption%20in%20Tanium%20Interact&amp;severity=low&amp;id=69e8366d19fe3cd2cd3e6df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41457-cwe-89-improper-neutralization-of-s-639e77d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41457%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20owntone%20owntone-server&amp;severity=medium&amp;id=69e8366d19fe3cd2cd3e6de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/same-packet-different-magic-hits-indias-banking-se-82b03368</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Same%20packet%2C%20different%20magic%3A%20Hits%20India&apos;s%20banking%20sector%20and%20Korea%20geopolitics&amp;severity=medium&amp;id=69e88ad519fe3cd2cd81f4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mach-o-man-malware-what-cisos-need-to-know-befa2a25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mach-O%20Man%20Malware%3A%20What%20CISOs%20Need%20to%20Know&amp;severity=medium&amp;id=69e88ad519fe3cd2cd81f509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41146-cwe-400-uncontrolled-resource-consu-3c0472f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41146%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20boazsegev%20facil.io&amp;severity=high&amp;id=69e8285d19fe3cd2cd272487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-beyond-cryptojacking-telegram-td-95c3a6d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Beyond%20Cryptojacking%3A%20Telegram%20tdata%20as%20a%20Credential%20Harvesting%20Vector%2C%20Lessons%20from%20a%20Honeypot%20Incident%2C%20(Wed%2C%20Apr%2022nd)&amp;severity=medium&amp;id=69e8134b19fe3cd2cd08f0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/avast-antivirus-2511-unquoted-service-path-41e04973</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AVAST%20Antivirus%2025.11%20-%20Unquoted%20Service%20Path&amp;severity=medium&amp;id=69ec2f5087115cfb68b9e9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-plugin-520-broken-access-control-3ecc7f5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Plugin%20%205.2.0%20-%20Broken%20Access%20Control&amp;severity=medium&amp;id=69ec2f5087115cfb68b9e9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/throttlestop-kernel-driver-kernel-out-of-bounds-wr-2241e2d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Throttlestop%20Kernel%20Driver%20-%20Kernel%20Out-of-Bounds%20Write%20Privilege%20Escalation&amp;severity=high&amp;id=69ec2f5087115cfb68b9e9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-23-1228cb05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-23&amp;severity=medium&amp;id=69e9eb7f87115cfb68f9c891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-22-0db1dee2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-22&amp;severity=medium&amp;id=69e9626387115cfb6817f928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30139-na-f75ac939</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30139%3A%20n%2Fa&amp;severity=medium&amp;id=69e8e9bb19fe3cd2cdc88f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35548-na-ba622a4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35548%3A%20n%2Fa&amp;severity=high&amp;id=69e8e2b519fe3cd2cdc0df55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31192-na-9ab09595</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31192%3A%20n%2Fa&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdabfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-22-2d71dc32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-22&amp;severity=low&amp;id=69e83d6d19fe3cd2cd447496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41136-cwe-440-expected-behavior-violation-583653d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41136%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20free5gc%20amf&amp;severity=medium&amp;id=69e8135419fe3cd2cd08f850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41135-cwe-400-uncontrolled-resource-consu-7d3553d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41135%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20free5gc%20pcf&amp;severity=high&amp;id=69e80fc419fe3cd2cd07fdbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40343-cwe-754-improper-check-for-unusual--89e3a13b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40343%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20free5gc%20udr&amp;severity=medium&amp;id=69e80fc419fe3cd2cd07fdbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41130-cwe-918-server-side-request-forgery-dd054ecd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41130%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69e80c4119fe3cd2cd06bb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41129-cwe-918-server-side-request-forgery-f671e853</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41129%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69e80c4119fe3cd2cd06bb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41128-cwe-862-missing-authorization-in-cr-4617a4c3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41128%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craftcms%20cms&amp;severity=medium&amp;id=69e80c4119fe3cd2cd06bb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41304-cwe-77-improper-neutralization-of-s-2adf3dc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41304%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e808b919fe3cd2cd05c6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41064-cwe-78-improper-neutralization-of-s-446caa6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41064%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69e808b919fe3cd2cd05c6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41063-cwe-79-improper-neutralization-of-i-f71f7022</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41063%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e8053519fe3cd2cd036939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41062-cwe-22-improper-limitation-of-a-pat-d34d858e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41062%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e8053519fe3cd2cd036933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41061-cwe-79-improper-neutralization-of-i-d5bdc732</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41061%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e8053519fe3cd2cd03692f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41060-cwe-918-server-side-request-forgery-4dd6fe68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41060%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e85dc119fe3cd2cd70809d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41058-cwe-22-improper-limitation-of-a-pat-0ca30d9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41058%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e85dc119fe3cd2cd708097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5845-cwe-639-authorization-bypass-through-af17f908</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5845%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69e85dc119fe3cd2cd7080a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41057-cwe-346-origin-validation-error-in--1586919e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41057%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e85dc119fe3cd2cd708093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41056-cwe-942-permissive-cross-domain-pol-0bdc9acc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41056%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e85dc119fe3cd2cd70808f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41055-cwe-918-server-side-request-forgery-386487f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41055%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e7faaa19fe3cd2cd001495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3307-cwe-639-authorization-bypass-through-79d756ce</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3307%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd00147c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40935-cwe-804-guessable-captcha-in-wwbn-a-c3ef0f78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40935%3A%20CWE-804%3A%20Guessable%20CAPTCHA%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd001491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40929-cwe-352-cross-site-request-forgery--c54c9475</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40929%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd00148d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40928-cwe-352-cross-site-request-forgery--08aee507</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40928%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd001489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5512-cwe-201-insertion-of-sensitive-infor-945674e9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5512%3A%20CWE-201%20Insertion%20of%20sensitive%20information%20into%20sent%20data%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd0014af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4296-cwe-185-incorrect-regular-expression-05c5a682</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4296%3A%20CWE-185%20Incorrect%20Regular%20Expression%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69e7faaa19fe3cd2cd00149b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40926-cwe-352-cross-site-request-forgery--6b4a43fa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40926%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e7faaa19fe3cd2cd001485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4821-cwe-78-improper-neutralization-of-sp-1de2eb07</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4821%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69e7faaa19fe3cd2cd0014a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5921-cwe-918-server-side-request-forgery--4913fb27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5921%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69e7faad19fe3cd2cd001605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6832-cwe-22-improper-limitation-of-a-path-f71eef8c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6832%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nesquena%20hermes-webui&amp;severity=high&amp;id=69e7f3aa19fe3cd2cdfdaad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1354-cwe-322-in-zero-motorcycles-zero-mot-a0abde9a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1354%3A%20CWE-322%20in%20Zero%20Motorcycles%20Zero%20Motorcycles%20firmware&amp;severity=medium&amp;id=69e7f3aa19fe3cd2cdfdaacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6830-cwe-668-exposure-of-resource-to-wron-99db2e89</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6830%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20nesquena%20hermes-webui&amp;severity=medium&amp;id=69e7f01d19fe3cd2cdfcab55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40946-cwe-287-improper-authentication-in--d724c488</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40946%3A%20CWE-287%3A%20Improper%20Authentication%20in%20oxia-db%20oxia&amp;severity=critical&amp;id=69e7f01d19fe3cd2cdfcab4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40945-cwe-532-insertion-of-sensitive-info-eeb85fa3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40945%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20oxia-db%20oxia&amp;severity=high&amp;id=69e7f01d19fe3cd2cdfcab4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40944-cwe-295-improper-certificate-valida-a43a96b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40944%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20oxia-db%20oxia&amp;severity=medium&amp;id=69e7f01d19fe3cd2cdfcab47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40943-cwe-362-concurrent-execution-using--5e16ae68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40943%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20oxia-db%20oxia&amp;severity=high&amp;id=69e7e91619fe3cd2cdfaec56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6829-cwe-22-improper-limitation-of-a-path-1c81624f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6829%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nesquena%20hermes-webui&amp;severity=medium&amp;id=69e7e91619fe3cd2cdfaec5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40942-cwe-670-always-incorrect-control-fl-d86330eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40942%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20datasharingframework%20dsf&amp;severity=medium&amp;id=69e7e91619fe3cd2cdfaec51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40939-cwe-613-insufficient-session-expira-d36951cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40939%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20datasharingframework%20dsf&amp;severity=medium&amp;id=69e7e91619fe3cd2cdfaec4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40933-cwe-78-improper-neutralization-of-s-3bdaeff3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40933%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69e7e91619fe3cd2cdfaec46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6799-command-injection-in-comfast-cf-n1-s-d58e7057</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6799%3A%20Command%20Injection%20in%20Comfast%20CF-N1-S&amp;severity=medium&amp;id=69e7e91619fe3cd2cdfaec59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40931-cwe-59-improper-link-resolution-bef-1362973b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40931%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20node-modules%20compressing&amp;severity=high&amp;id=69e7e91619fe3cd2cdfaec43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40923-cwe-22-improper-limitation-of-a-pat-14596e0a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40923%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40924-cwe-400-uncontrolled-resource-consu-d9d1d16c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40924%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40938-cwe-88-improper-neutralization-of-a-83a710cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40938%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20tektoncd%20pipeline&amp;severity=high&amp;id=69e7e5b119fe3cd2cdfa01c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6797-resource-consumption-in-sanluan-publ-05f04de8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6797%3A%20Resource%20Consumption%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33519-cwe-266-incorrect-privilege-assignm-042ac0c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33519%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20(4.19.1)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=critical&amp;id=69e7e5a019fe3cd2cdf9f736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33518-cwe-266-incorrect-privilege-assignm-c42454a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33518%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20(4.19.1)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=critical&amp;id=69e7e5a019fe3cd2cdf9f733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6823-cwe-276-incorrect-default-permission-92b68079</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6823%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e7e5b119fe3cd2cdfa01ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35252-difficult-to-exploit-vulnerability--f1d78ce3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35252%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Security%20Service.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Security%20Service%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Security%20Service%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Security%20Service&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35251-difficult-to-exploit-vulnerability--741c5d88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35251%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5b119fe3cd2cdfa01b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35250-easily-exploitable-vulnerability-al-9400abd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35250%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=low&amp;id=69e7e5b119fe3cd2cdfa01b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35249-easily-exploitable-vulnerability-al-08381c47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35249%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=low&amp;id=69e7e5b119fe3cd2cdfa01b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35248-difficult-to-exploit-vulnerability--bcf69cdc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35248%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20VM%20VirtualBox%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20VM%20VirtualBox%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35247-easily-exploitable-vulnerability-al-dafc7f29</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35247%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa017c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35246-difficult-to-exploit-vulnerability--3c3a6a8f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35246%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5af19fe3cd2cdfa0178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35245-easily-exploitable-vulnerability-al-3cd45455</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35245%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20RDP%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5af19fe3cd2cdfa0174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35244-easily-exploitable-vulnerability-al-f55951e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35244%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hyperion%20Infrastructure%20Technology.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Hyperion%20Infrastructure%20Technology%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Hyperion%20Infrastructure%20Technology%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Hyperion%20Infrastructure%20Technology&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa016f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35243-easily-exploitable-vulnerability-al-bde9ac3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35243%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Application%20Development%20Framework%20(ADF)%20executes%20to%20compromise%20Oracle%20Application%20Development%20Framework%20(ADF).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Application%20Development%20Framework%20(ADF).%20in%20Oracle%20Corporation%20Oracle%20Application%20Development%20Framework%20(ADF)&amp;severity=high&amp;id=69e7e5af19fe3cd2cdfa016b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35242-difficult-to-exploit-vulnerability--616450eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35242%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5af19fe3cd2cdfa0164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35241-easily-exploitable-vulnerability-al-680ee5e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35241%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20CS%20Student%20Records.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20CS%20Student%20Records%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20CS%20Student%20Records&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa0160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35240-easily-exploitable-vulnerability-al-1a43e1c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35240%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa015c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35239-easily-exploitable-vulnerability-al-ae52294e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35239%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa0159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35238-easily-exploitable-vulnerability-al-b0056cbb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35238%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa0156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35237-easily-exploitable-vulnerability-al-cb542661</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35237%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35236-easily-exploitable-vulnerability-al-cd31b948</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35236%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35235-easily-exploitable-vulnerability-al-4a1fef17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35235%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35234-easily-exploitable-vulnerability-al-4cc52e09</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35234%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35232-easily-exploitable-vulnerability-al-c19d6b44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35232%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Fusion%20Middleware.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Fusion%20Middleware%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Fusion%20Middleware%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Fusion%20Middleware%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Fusion%20Middleware&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35231-easily-exploitable-vulnerability-al-ca27511c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35231%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Transaction%20Filtering.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Transaction%20Filtering%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Transaction%20Filtering&amp;severity=high&amp;id=69e7e5ad19fe3cd2cdfa00d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35230-difficult-to-exploit-vulnerability--e0211fb0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35230%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5ad19fe3cd2cdfa00cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35229-easily-exploitable-vulnerability-al-ee698b4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35229%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Java%20VM.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Java%20VM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=69e7e5ad19fe3cd2cdfa00ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34325-easily-exploitable-vulnerability-al-abff44fc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34325%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20executes%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34324-easily-exploitable-vulnerability-al-51d56e29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34324%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20InForm.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20InForm&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34323-easily-exploitable-vulnerability-al-6b8cb532</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34323%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20InForm.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Life%20Sciences%20InForm.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20InForm&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34321-difficult-to-exploit-vulnerability--111fb184</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34321%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34320-easily-exploitable-vulnerability-al-bda45419</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34320%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Customer%20Screening.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Customer%20Screening%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Customer%20Screening&amp;severity=high&amp;id=69e7e5ab19fe3cd2cdf9fa0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34319-easily-exploitable-vulnerability-al-4e4c2f90</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34319%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Shell%20executes%20to%20compromise%20MySQL%20Shell.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Shell.%20in%20Oracle%20Corporation%20MySQL%20Shell&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34318-difficult-to-exploit-vulnerability--dc47f419</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34318%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Shell.%20%20While%20the%20vulnerability%20is%20in%20MySQL%20Shell%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20MySQL%20Shell%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Shell&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34317-easily-exploitable-vulnerability-al-65f524db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34317%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Shell%20executes%20to%20compromise%20MySQL%20Shell.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Shell.%20in%20Oracle%20Corporation%20MySQL%20Shell&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34315-easily-exploitable-vulnerability-al-68ca386d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34315%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9f9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34314-difficult-to-exploit-vulnerability--1605401c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34314%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9f9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34313-easily-exploitable-vulnerability-al-ea2ce21c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34313%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9f9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34312-easily-exploitable-vulnerability-al-a6403caa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34312%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20Row%20Access%20Method%20privilege%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20RDBMS.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20RDBMS%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=69e7e5ab19fe3cd2cdf9f9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34310-easily-exploitable-vulnerability-al-517f6a28</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34310%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=69e7e5a819fe3cd2cdf9f9bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34309-easily-exploitable-vulnerability-al-25188087</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34309%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=high&amp;id=69e7e5a819fe3cd2cdf9f9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34308-easily-exploitable-vulnerability-al-6d2ecc90</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34308%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34307-easily-exploitable-vulnerability-al-2ea9f00c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34307%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34306-easily-exploitable-vulnerability-al-867314f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34306%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Project%20Costing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20Project%20Costing%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Project%20Costing&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34305-easily-exploitable-vulnerability-al-fba24128</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34305%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=high&amp;id=69e7e5a819fe3cd2cdf9f9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34304-easily-exploitable-vulnerability-al-5b4cfd00</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34304%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34303-easily-exploitable-vulnerability-al-35d5403d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34303%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34302-easily-exploitable-vulnerability-al-60adad84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34302%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Workflow.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Workflow%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Workflow%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Workflow.%20in%20Oracle%20Corporation%20Oracle%20Workflow&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34301-easily-exploitable-vulnerability-al-9c1caf91</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34301%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34300-easily-exploitable-vulnerability-al-43d3b9df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34300%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Contracts.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20Contracts%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Contracts&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34299-easily-exploitable-vulnerability-al-34588aa0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34299%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34298-easily-exploitable-vulnerability-al-e08eb1ed</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34298%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Applications%20Framework%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Applications%20Framework.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34297-easily-exploitable-vulnerability-al-c5c480b4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34297%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20HCM%20Common%20Architecture.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20HCM%20Common%20Architecture%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20HCM%20Common%20Architecture&amp;severity=high&amp;id=69e7e5a619fe3cd2cdf9f944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34296-easily-exploitable-vulnerability-al-b30c9df5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34296%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34295-easily-exploitable-vulnerability-al-6c672982</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34295%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20SCM%20Purchasing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20SCM%20Purchasing%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20SCM%20Purchasing&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34294-difficult-to-exploit-vulnerability--4500c6f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34294%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20LDAP%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34293-easily-exploitable-vulnerability-al-1ae4a929</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34293%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34292-easily-exploitable-vulnerability-al-6bf0d821</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34292%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20WebLogic%20Server.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=high&amp;id=69e7e5a619fe3cd2cdf9f935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34291-difficult-to-exploit-vulnerability--a9179d48</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34291%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20HTTP%20Server.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20HTTP%20Server%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20HTTP%20Server%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20HTTP%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20HTTP%20Server&amp;severity=high&amp;id=69e7e5a619fe3cd2cdf9f932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34290-easily-exploitable-vulnerability-al-470c16d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34290%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20TCP%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Identity%20Manager%20Connector.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=high&amp;id=69e7e5a419fe3cd2cdf9f897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34289-difficult-to-exploit-vulnerability--05decebe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34289%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34288-difficult-to-exploit-vulnerability--203b1528</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34288%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34287-easily-exploitable-vulnerability-al-550119fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34287%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=critical&amp;id=69e7e5a419fe3cd2cdf9f88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34286-easily-exploitable-vulnerability-al-d881b9c0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34286%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=critical&amp;id=69e7e5a419fe3cd2cdf9f88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34285-easily-exploitable-vulnerability-al-35cc1d95</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34285%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=critical&amp;id=69e7e5a419fe3cd2cdf9f888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34284-easily-exploitable-vulnerability-al-4dc75d71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34284%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Business%20Process%20Management%20Suite.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Business%20Process%20Management%20Suite%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Business%20Process%20Management%20Suite%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Business%20Process%20Management%20Suite%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Business%20Process%20Management%20Suite&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34283-easily-exploitable-vulnerability-al-5588ac23</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34283%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Identity%20Manager.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Identity%20Manager%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Identity%20Manager%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Identity%20Manager%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34282-easily-exploitable-vulnerability-al-3c3041bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34282%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=69e7e5a419fe3cd2cdf9f87f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34281-easily-exploitable-vulnerability-al-ba202de7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34281%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Solaris%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f87c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34280-easily-exploitable-vulnerability-al-5a2fbe50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34280%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34279-easily-exploitable-vulnerability-al-747999fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34279%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Enterprise%20Manager%20Base%20Platform.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Enterprise%20Manager%20Base%20Platform%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Enterprise%20Manager%20Base%20Platform.%20in%20Oracle%20Corporation%20Oracle%20Enterprise%20Manager%20Base%20Platform&amp;severity=critical&amp;id=69e7e5a219fe3cd2cdf9f7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34278-easily-exploitable-vulnerability-al-a5e5aab1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34278%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34277-easily-exploitable-vulnerability-al-33d3fe45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34277%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20While%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20PeopleSoft%20Enterprise%20PeopleTools.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34276-easily-exploitable-vulnerability-al-e6614517</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34276%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34275-easily-exploitable-vulnerability-al-c3b09337</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34275%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Advanced%20Inbound%20Telephony.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Advanced%20Inbound%20Telephony.%20in%20Oracle%20Corporation%20Oracle%20Advanced%20Inbound%20Telephony&amp;severity=critical&amp;id=69e7e5a219fe3cd2cdf9f7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34274-easily-exploitable-vulnerability-al-ac7ffdd2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34274%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Configurator.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Configurator%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Configurator%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Configurator%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Configurator&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34273-easily-exploitable-vulnerability-al-e6893b84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34273%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20GoldenGate.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20GoldenGate%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20GoldenGate&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34272-easily-exploitable-vulnerability-al-504539ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34272%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34271-easily-exploitable-vulnerability-al-e1275dcd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34271%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34270-easily-exploitable-vulnerability-al-52dd5e0e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34270%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34269-easily-exploitable-vulnerability-al-767fe6df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34269%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34268-difficult-to-exploit-vulnerability--fe0f71c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34268%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=69e7e5a019fe3cd2cdf9f73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34267-easily-exploitable-vulnerability-al-abc37fab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34267%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f73c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34266-easily-exploitable-vulnerability-al-3a9864e9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34266%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Absence%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20HCM%20Absence%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20HCM%20Absence%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Absence%20Management&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22021-easily-exploitable-vulnerability-al-a4ccec3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22021%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22019-easily-exploitable-vulnerability-al-954919a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22019%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22018-difficult-to-exploit-vulnerability--7e8eda12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22018%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=69e7e5a019fe3cd2cdf9f72a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22017-easily-exploitable-vulnerability-al-eff7e52b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22017%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59e19fe3cd2cdf9f6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22016-easily-exploitable-vulnerability-al-0284ad33</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22016%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=69e7e59e19fe3cd2cdf9f6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22015-easily-exploitable-vulnerability-al-7475e114</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22015%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59e19fe3cd2cdf9f6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22014-easily-exploitable-vulnerability-al-7b8e4ec4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22014%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20User%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20User%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20User%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20User%20Management&amp;severity=low&amp;id=69e7e59e19fe3cd2cdf9f6eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22013-difficult-to-exploit-vulnerability--0c471c87</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22013%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69e7e59e19fe3cd2cdf9f6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22011-difficult-to-exploit-vulnerability--4aca61a3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22011%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20DBA.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Applications%20DBA%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Applications%20DBA.%20in%20Oracle%20Corporation%20Oracle%20Applications%20DBA&amp;severity=high&amp;id=69e7e59e19fe3cd2cdf9f6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22010-easily-exploitable-vulnerability-al-9dc3a036</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22010%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=69e7e59e19fe3cd2cdf9f6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22009-easily-exploitable-vulnerability-al-fe131e6a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22009%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59e19fe3cd2cdf9f6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22008-difficult-to-exploit-vulnerability--a130f8c7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22008%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=69e7e59e19fe3cd2cdf9f6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22007-difficult-to-exploit-vulnerability--2c72cd1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22007%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=69e7e59e19fe3cd2cdf9f6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22006-easily-exploitable-vulnerability-al-36a607fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22006%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22005-easily-exploitable-vulnerability-al-ae98800c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22005%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22004-easily-exploitable-vulnerability-al-014291e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22004%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f61a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22003-difficult-to-exploit-vulnerability--5c9d19cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22003%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22002-easily-exploitable-vulnerability-al-c5acb921</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22002%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22001-easily-exploitable-vulnerability-al-efde5d7a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22001%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=69e7e59b19fe3cd2cdf9f611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21999-difficult-to-exploit-vulnerability--fe96ff08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21999%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20XML%20Database.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20XML%20Database%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21998-easily-exploitable-vulnerability-al-53e27637</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21998%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21997-easily-exploitable-vulnerability-al-824cd0dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21997%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Empirica%20Signal.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Life%20Sciences%20Empirica%20Signal%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Life%20Sciences%20Empirica%20Signal%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20Empirica%20Signal%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Empirica%20Signal&amp;severity=high&amp;id=69e7e59b19fe3cd2cdf9f608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6796-cleartext-storage-in-a-file-or-on-di-93cd932a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6796%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69e7e20f19fe3cd2cdf8e298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40910-cwe-287-improper-authentication-in--c0f68c00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40910%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fatedier%20frp&amp;severity=medium&amp;id=69e7e20f19fe3cd2cdf8e2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40906-cwe-89-improper-neutralization-of-s-06dc3129</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40906%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20electric-sql%20electric&amp;severity=critical&amp;id=69e85dc119fe3cd2cd7080aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40905-cwe-601-url-redirection-to-untruste-9f74800f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40905%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69e7e5b319fe3cd2cdfa0215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40925-cwe-352-cross-site-request-forgery--d3211bbb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40925%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e7e5b319fe3cd2cdfa0218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40911-cwe-94-improper-control-of-generati-3a34b5ff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40911%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69e85dc119fe3cd2cd7080ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40892-cwe-121-stack-based-buffer-overflow-0b664e79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40892%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69e7e20f19fe3cd2cdf8e29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40909-cwe-22-improper-limitation-of-a-pat-cd494b92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40909%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e7d78519fe3cd2cdf5b338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40908-cwe-200-exposure-of-sensitive-infor-617b1d07</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40908%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7d78519fe3cd2cdf5b335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40890-cwe-125-out-of-bounds-read-in-gomar-d544ae9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40890%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gomarkdown%20markdown&amp;severity=high&amp;id=69e7d78519fe3cd2cdf5b32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40907-cwe-639-authorization-bypass-throug-6904107b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40907%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7d78519fe3cd2cdf5b331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40903-cwe-829-inclusion-of-functionality--b78a4e14</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40903%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69e7d78519fe3cd2cdf5b32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6819-cwe-276-incorrect-default-permission-bab31088</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6819%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e7d78819fe3cd2cdf5b386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40885-cwe-200-exposure-of-sensitive-infor-a89dd21b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40885%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69e7d78519fe3cd2cdf5b322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40884-cwe-306-missing-authentication-for--2f6a8641</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40884%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69e7d78519fe3cd2cdf5b31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40883-cwe-352-cross-site-request-forgery--6def37d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40883%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20patrickhener%20goshs&amp;severity=medium&amp;id=69e7d78519fe3cd2cdf5b31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40876-cwe-22-improper-limitation-of-a-pat-b9e7a983</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40876%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69e7d78519fe3cd2cdf5b319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41320-cwe-89-improper-neutralization-of-s-2bd55248</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41320%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20frappe%20hrms&amp;severity=medium&amp;id=69e7d78819fe3cd2cdf5b383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40889-cwe-284-improper-access-control-in--64817524</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40889%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20frappe%20hrms&amp;severity=medium&amp;id=69e7d78519fe3cd2cdf5b325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40888-cwe-284-improper-access-control-in--9ee9be60</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40888%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20frappe%20hrms&amp;severity=medium&amp;id=69e7d08b19fe3cd2cdf3fbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40887-cwe-89-improper-neutralization-of-s-38303427</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40887%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vendurehq%20vendure&amp;severity=critical&amp;id=69e7d08b19fe3cd2cdf3fbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40878-cwe-79-improper-neutralization-of-i-7784261b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40878%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=low&amp;id=69e7d08919fe3cd2cdf3fb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33812-cwe-789-memory-allocation-with-exce-17d95bcb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33812%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20golang.org%2Fx%2Fimage%20golang.org%2Fx%2Fimage%2Ffont%2Fsfnt&amp;severity=medium&amp;id=69e7d08919fe3cd2cdf3fb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33813-cwe-190-integer-overflow-or-wraparo-0df99465</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33813%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20golang.org%2Fx%2Fimage%20golang.org%2Fx%2Fimage%2Fwebp&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40881-cwe-770-allocation-of-resources-wit-d7ab014b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40881%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ZcashFoundation%20zebrad&amp;severity=medium&amp;id=69e7d08b19fe3cd2cdf3fbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40372-cwe-347-improper-verification-of-cr-0bd8d1a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40372%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20ASP.NET%20Core%2010.0&amp;severity=critical&amp;id=69e7d08919fe3cd2cdf3fb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40875-cwe-79-improper-neutralization-of-i-9045547c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40875%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40880-cwe-1025-comparison-using-wrong-fac-76709282</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40880%3A%20CWE-1025%3A%20Comparison%20Using%20Wrong%20Factors%20in%20ZcashFoundation%20zebrad&amp;severity=high&amp;id=69e7d08b19fe3cd2cdf3fbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40874-cwe-284-improper-access-control-in--d9bb75f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40874%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20mailcow%20mailcow-dockerized&amp;severity=medium&amp;id=69e7d08919fe3cd2cdf3fb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40873-cwe-79-improper-neutralization-of-i-33d3fed3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40873%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40872-cwe-79-improper-neutralization-of-i-ba112c91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40872%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=critical&amp;id=69e7d08919fe3cd2cdf3fb16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40879-cwe-674-uncontrolled-recursion-in-n-f4701631</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40879%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20nestjs%20nest&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40871-cwe-20-improper-input-validation-in-d8f4f9f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40871%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20mailcow%20mailcow-dockerized&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22751-vulnerability-in-spring-spring-secu-5bf72cfe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22751%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=medium&amp;id=69e7c5ee19fe3cd2cdf0babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6745-cross-site-scripting-in-bagisto-02bed925</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6745%3A%20Cross%20Site%20Scripting%20in%20Bagisto&amp;severity=medium&amp;id=69e7c5ee19fe3cd2cdf0bad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40867-cwe-284-improper-access-control-in--21cbe18f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40867%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=69e7c5ee19fe3cd2cdf0bacc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40866-cwe-284-improper-access-control-in--700fc40a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40866%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=69e7c5ee19fe3cd2cdf0bac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40865-cwe-284-improper-access-control-in--5574dc11</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40865%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=69e7c5ee19fe3cd2cdf0bac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40614-cwe-122-heap-based-buffer-overflow--1e2849e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40614%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69e7c5ee19fe3cd2cdf0bac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6744-server-side-request-forgery-in-bagis-7c5ba74f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6744%3A%20Server-Side%20Request%20Forgery%20in%20Bagisto&amp;severity=medium&amp;id=69e7c5ee19fe3cd2cdf0bacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40611-cwe-22-improper-limitation-of-a-pat-6f07a5f7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40611%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20go-acme%20lego&amp;severity=high&amp;id=69e7bb7219fe3cd2cdedac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40608-cwe-770-allocation-of-resources-wit-a616a4f7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40608%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20DayuanJiang%20next-ai-draw-io&amp;severity=medium&amp;id=69e7bb7219fe3cd2cdedac8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40604-cwe-693-protection-mechanism-failur-03a23c53</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40604%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69e7bb7219fe3cd2cdedac8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40602-cwe-94-improper-control-of-generati-0f481d7d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40602%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20home-assistant-ecosystem%20home-assistant-cli&amp;severity=medium&amp;id=69e7bb7219fe3cd2cdedac86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40599-cwe-863-incorrect-authorization-in--53044a58</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40599%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69e7bb7219fe3cd2cdedac83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41194-cwe-352-cross-site-request-forgery--0f8a82fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41194%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b7ed19fe3cd2cdec7cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41193-cwe-22-improper-limitation-of-a-pat-0985c242</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41193%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69e7b7ed19fe3cd2cdec7cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41192-cwe-862-missing-authorization-in-fr-164129b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41192%3A%20CWE-862%3A%20Missing%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b7ed19fe3cd2cdec7ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40588-cwe-620-unverified-password-change--85d449f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40588%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20blueprintue%20blueprintue-self-hosted-edition&amp;severity=high&amp;id=69e7b7ed19fe3cd2cdec7cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40587-cwe-613-insufficient-session-expira-f3fe64bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40587%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20blueprintue%20blueprintue-self-hosted-edition&amp;severity=medium&amp;id=69e7b7ed19fe3cd2cdec7cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40586-cwe-307-improper-restriction-of-exc-0a194121</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40586%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20blueprintue%20blueprintue-self-hosted-edition&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41191-cwe-863-incorrect-authorization-in--8ff90e23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41191%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e619fe3cd2cde9a4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40585-cwe-640-weak-password-recovery-mech-ef87095c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40585%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20blueprintue%20blueprintue-self-hosted-edition&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41190-cwe-863-incorrect-authorization-in--6a3ccd65</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41190%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e619fe3cd2cde9a4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41189-cwe-863-incorrect-authorization-in--a66c49d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41189%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e619fe3cd2cde9a4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41183-cwe-200-exposure-of-sensitive-infor-45bcd11f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41183%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b0e619fe3cd2cde9a4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21571-os-command-injection-in-atlassian-b-ae340b39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21571%3A%20OS%20Command%20Injection%20in%20Atlassian%20Bamboo%20Data%20Center&amp;severity=critical&amp;id=69e7b0e319fe3cd2cde9a455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40583-cwe-460-improper-cleanup-on-thrown--e62ad37f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40583%3A%20CWE-460%3A%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20UltraDAGcom%20core&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40592-cwe-862-missing-authorization-in-fr-8688a807</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40592%3A%20CWE-862%3A%20Missing%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b0e619fe3cd2cde9a4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40591-cwe-639-authorization-bypass-throug-a6329c29</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40591%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e619fe3cd2cde9a4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40590-cwe-639-authorization-bypass-throug-4f251147</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40590%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b0e619fe3cd2cde9a4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40589-cwe-639-authorization-bypass-throug-73df512f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40589%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40050-cwe-306-missing-authentication-for--9cf60429</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40050%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20CrowdStrike%20LogScale%20Self-Hosted&amp;severity=critical&amp;id=69e7b0e319fe3cd2cde9a45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40570-cwe-639-authorization-bypass-throug-bdcd0606</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40570%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b0e319fe3cd2cde9a467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40569-cwe-284-improper-access-control-in--03df557d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40569%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69e7b0e319fe3cd2cde9a462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40576-cwe-22-improper-limitation-of-a-pat-5a20dab2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40576%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20haris-musa%20excel-mcp-server&amp;severity=critical&amp;id=69e7a9cf19fe3cd2cde6d34d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5652-cwe-639-authorization-bypass-through-99c29aa9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5652%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=critical&amp;id=69e7a9cf19fe3cd2cde6d350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ngate-variant-hides-in-a-trojanized-nfc-paymen-67781914</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20NGate%20variant%20hides%20in%20a%20trojanized%20NFC%20payment%20app&amp;severity=medium&amp;id=69e8876919fe3cd2cd808c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6743-cross-site-scripting-in-websystems-w-c738537f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6743%3A%20Cross%20Site%20Scripting%20in%20WebSystems%20WebTOTUM&amp;severity=medium&amp;id=69e7a9cf19fe3cd2cde6d353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40161-cwe-201-insertion-of-sensitive-info-d982eabc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40161%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20tektoncd%20pipeline&amp;severity=high&amp;id=69e7a9cf19fe3cd2cde6d348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35451-cwe-79-improper-neutralization-of-i-61801c57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35451%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20twentyhq%20twenty&amp;severity=medium&amp;id=69e7a9cf19fe3cd2cde6d344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29179-cwe-863-incorrect-authorization-in--0ff5534d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29179%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20octobercms%20october&amp;severity=low&amp;id=69e7a64f19fe3cd2cde569c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24189-cwe-125-out-of-bounds-read-in-nvidi-3d3c5fe9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24189%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20CUDA-Q&amp;severity=high&amp;id=69e7a64f19fe3cd2cde569b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24177-cwe-306-missing-authentication-for--2939e8de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24177%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NVIDIA%20KAI%20Scheduler&amp;severity=high&amp;id=69e7a64f19fe3cd2cde569ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27937-cwe-79-improper-neutralization-of-i-7782ad1c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27937%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=low&amp;id=69e7a64f19fe3cd2cde569c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24176-cwe-863-incorrect-authorization-in--8c82f828</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24176%3A%20CWE-863%20Incorrect%20Authorization%20in%20NVIDIA%20KAI%20Scheduler&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26274-cwe-184-incomplete-list-of-disallow-8bd90ae5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26274%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20octobercms%20october&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26067-cwe-863-incorrect-authorization-in--83ab9d20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26067%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20octobercms%20october&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40568-cwe-79-improper-neutralization-of-i-88d3a761</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40568%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7a65119fe3cd2cde569fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40567-cwe-116-improper-encoding-or-escapi-816aa455</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40567%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25542-cwe-185-incorrect-regular-expressio-f6516f4c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25542%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40566-cwe-918-server-side-request-forgery-a36f6f36</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40566%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40565-cwe-79-improper-neutralization-of-i-5b151c9e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40565%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e79f4219fe3cd2cde2398a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15638-cwe-1395-dependency-on-vulnerable-t-9d7fb978</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15638%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20ATRODO%20Net%3A%3ADropbear&amp;severity=critical&amp;id=69e79f4219fe3cd2cde23981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40498-cwe-200-exposure-of-sensitive-infor-522bd98d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40498%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7983919fe3cd2cddfb24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41029-cwe-89-improper-neutralization-of-s-bd938344</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41029%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Zeon%20Global%20Tech%20Zeon%20Academy%20Pro&amp;severity=critical&amp;id=69e7983919fe3cd2cddfb248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3298-cwe-787-out-of-bounds-write-in-pytho-b8d27af6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3298%3A%20CWE-787%20Out-of-bounds%20write%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69e7913319fe3cd2cddd4302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/third-us-security-expert-admits-helping-ransomware-74f42e2e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Third%20US%20Security%20Expert%20Admits%20Helping%20Ransomware%20Gang&amp;severity=medium&amp;id=69e78daf19fe3cd2cddbe9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31981-cwe-319-cleartext-transmission-of-s-2e6e3d9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31981%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20HCLSoftware%20BigFix%20Service%20Management%20(SM)&amp;severity=medium&amp;id=69e7913319fe3cd2cddd42f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1089-cwe-74-improper-neutralization-of-sp-8cd96290</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1089%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0972-cwe-307-improper-restriction-of-exce-c937cc23</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0972%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0971-cwe-613-insufficient-session-expirat-b43043cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0971%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14362-cwe-307-improper-restriction-of-exc-13ac78f7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14362%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=high&amp;id=69e78a2b19fe3cd2cdda97df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1241-cwe-326-inadequate-encryption-streng-4a3e3d6d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1241%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dozens-of-malicious-crypto-apps-land-in-apple-app--efc49ec6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dozens%20of%20Malicious%20Crypto%20Apps%20Land%20in%20Apple%20App%20Store&amp;severity=medium&amp;id=69e786a719fe3cd2cdd94797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31958-cwe-444-inconsistent-interpretation-780bdea3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31958%3A%20CWE-444%20Inconsistent%20interpretation%20of%20HTTP%20requests%20(&apos;HTTP%20Request%2FResponse%20smuggling&apos;)%20in%20HCLSoftware%20BigFix%20Service%20Management%20(SM)&amp;severity=low&amp;id=69e78a2b19fe3cd2cdda97e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6786-vulnerability-in-mozilla-firefox-c7dc35e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6786%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a419fe3cd2cdd1666b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6785-vulnerability-in-mozilla-firefox-6e2b9d34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6785%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a419fe3cd2cdd16665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6784-vulnerability-in-mozilla-firefox-e6175a94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6784%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd1662e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6783-vulnerability-in-mozilla-firefox-afc57616</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6783%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6782-vulnerability-in-mozilla-firefox-28f5a500</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6782%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd16625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6781-vulnerability-in-mozilla-firefox-9197f035</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6781%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd16621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6780-vulnerability-in-mozilla-firefox-d3eae43f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6780%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd1661d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6779-vulnerability-in-mozilla-firefox-79181267</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6779%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6778-vulnerability-in-mozilla-firefox-43480df6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6778%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6777-vulnerability-in-mozilla-firefox-6c2ce61a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6777%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6776-vulnerability-in-mozilla-firefox-f98abd05</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6776%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd1660c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6775-vulnerability-in-mozilla-firefox-5d98590c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6775%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6774-vulnerability-in-mozilla-firefox-5199b680</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6774%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789e19fe3cd2cdd164ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6773-vulnerability-in-mozilla-firefox-33037a25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6773%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789e19fe3cd2cdd164c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40520-cwe-78-improper-neutralization-of-s-099f84e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40520%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20api&amp;severity=high&amp;id=69e7789819fe3cd2cdd1623b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6772-vulnerability-in-mozilla-firefox-0f432745</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6772%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789e19fe3cd2cdd164c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6771-vulnerability-in-mozilla-firefox-18267380</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6771%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69e7789e19fe3cd2cdd164bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6770-vulnerability-in-mozilla-firefox-82935fdd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6770%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789e19fe3cd2cdd164b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6769-vulnerability-in-mozilla-firefox-7d15a9d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6769%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789e19fe3cd2cdd164b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6768-vulnerability-in-mozilla-firefox-55047e0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6768%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69e7789e19fe3cd2cdd164ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6767-vulnerability-in-mozilla-firefox-4e761dc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6767%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789e19fe3cd2cdd164a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6766-vulnerability-in-mozilla-firefox-88974ce9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6766%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789e19fe3cd2cdd164a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6765-vulnerability-in-mozilla-firefox-29539157</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6765%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789e19fe3cd2cdd1649d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6764-vulnerability-in-mozilla-firefox-ece1348c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6764%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6763-vulnerability-in-mozilla-firefox-ffe9f141</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6763%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6762-vulnerability-in-mozilla-firefox-6371567f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6762%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6761-vulnerability-in-mozilla-firefox-567e17b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6761%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789c19fe3cd2cdd163e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6760-vulnerability-in-mozilla-firefox-2a44a5a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6760%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69e7789c19fe3cd2cdd163df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6759-vulnerability-in-mozilla-firefox-c42f7b28</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6759%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789c19fe3cd2cdd163da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6758-vulnerability-in-mozilla-firefox-73a7faa7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6758%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789c19fe3cd2cdd163d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6757-vulnerability-in-mozilla-firefox-536b8d82</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6757%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6756-vulnerability-in-mozilla-firefox-5a5960e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6756%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789c19fe3cd2cdd163cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6755-vulnerability-in-mozilla-firefox-6af9a412</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6755%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6754-vulnerability-in-mozilla-firefox-cde18b2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6754%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd1626d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6753-vulnerability-in-mozilla-firefox-ce0c3cfc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6753%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6752-vulnerability-in-mozilla-firefox-c6833d24</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6752%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6751-vulnerability-in-mozilla-firefox-c3bd5d8b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6751%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd1625d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6750-vulnerability-in-mozilla-firefox-be82c19c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6750%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6749-vulnerability-in-mozilla-firefox-a12ebed7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6749%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6748-vulnerability-in-mozilla-firefox-a414d93c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6748%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69e7789819fe3cd2cdd1624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6747-vulnerability-in-mozilla-firefox-6911b2ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6747%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6746-vulnerability-in-mozilla-firefox-7da0070b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6746%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unsecured-perforce-servers-expose-sensitive-data-f-f9a1d370</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unsecured%20Perforce%20Servers%20Expose%20Sensitive%20Data%20From%20Major%20Orgs&amp;severity=low&amp;id=69e7718d19fe3cd2cdcf669d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/progress-patches-multiple-vulnerabilities-in-movei-0865d57c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Progress%20Patches%20Multiple%20Vulnerabilities%20in%20MOVEit%20WAF%2C%20LoadMaster&amp;severity=critical&amp;id=69e76a8619fe3cd2cdcd2f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/highly-destructive-lotus-wiper-used-in-a-targeted--55ae9b6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Highly%20destructive%20Lotus%20Wiper%20used%20in%20a%20targeted%20attack&amp;severity=medium&amp;id=69e794b519fe3cd2cdde14d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/void-dokkaebi-uses-fake-job-interview-lure-to-spre-e0c358ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Void%20Dokkaebi%20Uses%20Fake%20Job%20Interview%20Lure%20to%20Spread%20Malware%20via%20Code%20Repositories&amp;severity=medium&amp;id=69e7983919fe3cd2cddfb206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32147-cwe-22-improper-limitation-of-a-pat-3bf12671</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32147%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69e76a9219fe3cd2cdcd3204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-cisco-kentico-zi-bdb1bac9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Cisco%2C%20Kentico%2C%20Zimbra%20Vulnerabilities&amp;severity=medium&amp;id=69e75ffc19fe3cd2cdc9da8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-breaches-at-healthcare-organizations-in-illin-a2987dbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Breaches%20at%20Healthcare%20Organizations%20in%20Illinois%20and%20Texas%20Affect%20600%2C000&amp;severity=medium&amp;id=69e75c7919fe3cd2cdc919ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41039-cwe-306-missing-authentication-for--80836606</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41039%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Quantum%20Networks%20Router%20QN-I-470&amp;severity=high&amp;id=69e7556d19fe3cd2cdc6eda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41038-cwe-521-weak-password-requirements--6f560b49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41038%3A%20CWE-521%20Weak%20password%20requirements%20in%20Quantum%20Networks%20Router%20QN-I-470&amp;severity=high&amp;id=69e7556d19fe3cd2cdc6eda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41036-cwe-78-improper-neutralization-of-s-3995b27c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41036%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Quantum%20Networks%20Router%20QN-I-470&amp;severity=high&amp;id=69e74ecd19fe3cd2cdc4b538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41037-cwe-78-improper-neutralization-of-s-9a175a9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41037%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20Quantum%20Networks%20Router%20QN-I-470&amp;severity=high&amp;id=69e74ecd19fe3cd2cdc4b53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6553-cwe-312-cleartext-storage-of-sensiti-cf5d9eb4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6553%3A%20CWE-312%20Cleartext%20storage%20of%20sensitive%20information%20in%20TYPO3%20TYPO3%20CMS&amp;severity=high&amp;id=69e74ecd19fe3cd2cdc4b53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/290-million-kelp-dao-crypto-heist-blamed-on-north--c8351c6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%24290%20Million%20Kelp%20DAO%20Crypto%20Heist%20Blamed%20on%20North%20Korea&amp;severity=medium&amp;id=69e74e6619fe3cd2cdc490b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39467-cwe-502-deserialization-of-untruste-b052f27b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39467%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20MetaSlider%20Responsive%20Slider%20by%20MetaSlider&amp;severity=high&amp;id=69e85dc119fe3cd2cd7080b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3317-cwe-79-improper-neutralization-of-in-bc0d6fff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3317%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Navigate%20Navigate%20CMS&amp;severity=medium&amp;id=69e77fa019fe3cd2cdd6c936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-day-local-privilege-escalation-exploit-7e8bc202</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero-Day%20Local%20Privilege%20Escalation%20Exploit&amp;severity=medium&amp;id=69e743d919fe3cd2cdbf5fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stepdrainer-maas-platform-targeting-multi-chain-cr-8e2c0d64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StepDrainer%20MaaS%20Platform%20Targeting%20Multi-Chain%20Crypto%20Wallets%20and%20NFT%20Assets&amp;severity=medium&amp;id=69e743d919fe3cd2cdbf5f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13826-cwe-20-improper-input-validation-in-e8122402</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13826%3A%20CWE-20%20Improper%20input%20validation%20in%20Zervit%20portable%20HTTP%2FWeb%20server&amp;severity=high&amp;id=69e7405619fe3cd2cdbc7e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-wav-with-a-payload-tue-apr-21st-23f911ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20.WAV%20With%20A%20Payload%2C%20(Tue%2C%20Apr%2021st)&amp;severity=medium&amp;id=69e7243619fe3cd2cdad0936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6711-cwe-79-improper-neutralization-of-in-36876d7f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ryhowa%20Website%20LLMs.txt&amp;severity=medium&amp;id=69e7244019fe3cd2cdad1062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6712-cwe-79-improper-neutralization-of-in-d4d456a7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6712%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ryhowa%20Website%20LLMs.txt&amp;severity=medium&amp;id=69e7244019fe3cd2cdad1066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6703-cwe-862-missing-authorization-in-cyb-07334513</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6703%3A%20CWE-862%20Missing%20Authorization%20in%20cyberchimps%20Responsive%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=69e7244019fe3cd2cdad1058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31368-vulnerability-in-honor-aiassistant-1df3a7cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31368%3A%20Vulnerability%20in%20Honor%20AIAssistant&amp;severity=high&amp;id=69e7244019fe3cd2cdad104e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31370-vulnerability-in-honor-honor-e-c66083f6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31370%3A%20Vulnerability%20in%20Honor%20Honor%20E&amp;severity=medium&amp;id=69e7244019fe3cd2cdad1055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31369-vulnerability-in-honor-pcmanager-613082f0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31369%3A%20Vulnerability%20in%20Honor%20PcManager&amp;severity=low&amp;id=69e7244019fe3cd2cdad1052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5965-cwe-78-improper-neutralization-of-sp-2ef8e92f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5965%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20NewSoft%20NewSoftOA&amp;severity=critical&amp;id=69e6f68219fe3cd2cd7b7460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6674-cwe-89-improper-neutralization-of-sp-bfb6e268</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6674%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tholstkabelbwde%20Plugin%3A%20CMS%20f%C3%BCr%20Motorrad%20Werkst%C3%A4tten&amp;severity=medium&amp;id=69e6e4ee19fe3cd2cd6b0ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6675-cwe-20-improper-input-validation-in--4090eec6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6675%3A%20CWE-20%20Improper%20Input%20Validation%20in%20cyberchimps%20Responsive%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=69e6e4ee19fe3cd2cd6b0eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-clickfix-campaign-applescript-stealers-new-t-be54c1be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS%20ClickFix%20Campaign%3A%20AppleScript%20Stealers%20%26%20New%20Terminal%20Protections&amp;severity=medium&amp;id=69e743d919fe3cd2cdbf5f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-21st-2026-httpsisc-777f2247</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%2021st%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9900%2C%20(Tue%2C%20Apr%2021st)&amp;severity=medium&amp;id=69e6da6219fe3cd2cd678755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40497-cwe-79-improper-neutralization-of-i-2ec0f6d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40497%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e6e4ee19fe3cd2cd6b0ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6058-cwe-116-improper-encoding-or-escapin-11e72fb4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6058%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Zyxel%20WRE6505%20v2%20firmware&amp;severity=medium&amp;id=69e6d6dd19fe3cd2cd64f73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40496-cwe-330-use-of-insufficiently-rando-3f3ecc92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40496%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39973-cwe-22-improper-limitation-of-a-pat-c6436e92</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39973%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iBotPeaches%20Apktool&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40250-cwe-190-integer-overflow-or-wraparo-2b457c47</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40250%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40244-cwe-190-integer-overflow-or-wraparo-b0178a70</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40244%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39886-cwe-190-integer-overflow-or-wraparo-340b0101</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39886%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69e6d6dd19fe3cd2cd64f723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39866-cwe-77-improper-neutralization-of-s-81df236e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39866%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20LawnchairLauncher%20lawnchair&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39861-cwe-22-improper-limitation-of-a-pat-fe7bb571</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39861%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69e70c3119fe3cd2cda1991b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39386-cwe-20-improper-input-validation-in-3dff969c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39386%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20m1k1o%20neko&amp;severity=high&amp;id=69e70c3119fe3cd2cda19916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39378-cwe-22-improper-limitation-of-a-pat-8ec9e358</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39378%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jupyter%20nbconvert&amp;severity=medium&amp;id=69e70c3119fe3cd2cda19912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39377-cwe-22-improper-limitation-of-a-pat-ab7b12da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39377%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jupyter%20nbconvert&amp;severity=medium&amp;id=69e70c3119fe3cd2cda1990e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39320-cwe-400-uncontrolled-resource-consu-192a946e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39320%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20SignalK%20signalk-server&amp;severity=high&amp;id=69e70c3119fe3cd2cda19908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-22-81c87d26</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-22&amp;severity=medium&amp;id=69e95b5c87115cfb68e9a40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-21-bc5489f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-21&amp;severity=medium&amp;id=69e8133c19fe3cd2cd08e488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41527-cwe-670-always-incorrect-control-fl-d691b0ff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41527%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20KDE%20Kleopatra&amp;severity=medium&amp;id=69e7f01d19fe3cd2cdfcab50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40706-cwe-122-heap-based-buffer-overflow--1677622f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40706%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Tuxera%20NTFS-3G&amp;severity=high&amp;id=69e7e91619fe3cd2cdfaec3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70420-na-4e0e2207</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70420%3A%20n%2Fa&amp;severity=high&amp;id=69e7e59b19fe3cd2cdf9f604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38835-na-76ac3533</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38835%3A%20n%2Fa&amp;severity=critical&amp;id=69e7b0e319fe3cd2cde9a45c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38834-na-8ec8315b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38834%3A%20n%2Fa&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30452-na-063586c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30452%3A%20n%2Fa&amp;severity=medium&amp;id=69e7a9cf19fe3cd2cde6d340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37748-na-307786c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37748%3A%20n%2Fa&amp;severity=high&amp;id=69e79f4219fe3cd2cde23986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31019-na-95fdcbf8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31019%3A%20n%2Fa&amp;severity=high&amp;id=69e7913319fe3cd2cddd42fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31014-na-5cd81c30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31014%3A%20n%2Fa&amp;severity=medium&amp;id=69e7913319fe3cd2cddd42fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31013-na-1bff2a7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31013%3A%20n%2Fa&amp;severity=medium&amp;id=69e7913319fe3cd2cddd42f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31018-na-5cedfc61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31018%3A%20n%2Fa&amp;severity=high&amp;id=69e78a2b19fe3cd2cdda97f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29644-na-9220de1b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29644%3A%20n%2Fa&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-21-67550afc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-21&amp;severity=low&amp;id=69e720a919fe3cd2cdab8fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35570-cwe-22-improper-limitation-of-a-pat-9690475b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35570%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Gitlawb%20openclaude&amp;severity=high&amp;id=69e6b73b19fe3cd2cd3f2d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35588-cwe-89-improper-neutralization-of-s-d5dd4191</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35588%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=medium&amp;id=69e6b73b19fe3cd2cd3f2d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35587-cwe-918-server-side-request-forgery-b45389c5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35587%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69e6b73b19fe3cd2cd3f2d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34839-cwe-200-exposure-of-sensitive-infor-610ff57b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34839%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69e6b73b19fe3cd2cd3f2d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34082-cwe-863-incorrect-authorization-in--40639301</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34082%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20langgenius%20dify&amp;severity=medium&amp;id=69e6b3b619fe3cd2cd3c6984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5721-cwe-79-improper-neutralization-of-in-22e6e920</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdatatables%20wpDataTables%20%E2%80%93%20WordPress%20Data%20Table%2C%20Dynamic%20Tables%20%26%20Table%20Charts%20Plugin&amp;severity=medium&amp;id=69e70c3119fe3cd2cda1991e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6729-improper-authentication-cwe-287-in-h-9f443589</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6729%3A%20Improper%20Authentication%20(CWE-287)%20in%20HKUDS%20OpenHarness&amp;severity=medium&amp;id=69e6a5a619fe3cd2cd37e7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0930-cwe-126-buffer-over-read-in-wolfssl--45e6df06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0930%3A%20CWE-126%20Buffer%20over-read%20in%20wolfSSL%20wolfSSH&amp;severity=low&amp;id=69e69e9e19fe3cd2cd35b3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22051-213-in-netapp-storagegrid-formerly--21cb3eaf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22051%3A%20213%20in%20NETAPP%20StorageGRID%20(formerly%20StorageGRID%20Webscale)&amp;severity=low&amp;id=69e69e9e19fe3cd2cd35b3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5450-cwe-122-heap-based-buffer-overflow-i-519d630a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5450%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=critical&amp;id=69e6941f19fe3cd2cd32c4a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5928-cwe-127-buffer-under-read-in-the-gnu-718b9b46</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5928%3A%20CWE-127%20Buffer%20under-read%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69e6942119fe3cd2cd32c4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5358-cwe-120-buffer-copy-without-checking-f66644ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5358&amp;severity=null&amp;id=69e6941f19fe3cd2cd32c49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-oauth-device-code-flow-47c06045</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20OAuth%20Device%20Code%20Flow&amp;severity=medium&amp;id=69e743d919fe3cd2cdbf5f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33626-cwe-918-server-side-request-forgery-8b34f83e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33626%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20InternLM%20lmdeploy&amp;severity=high&amp;id=69e6941f19fe3cd2cd32c48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4852-cwe-79-improper-neutralization-of-in-a8bf03ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4852%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webzunft%20Image%20Source%20Control%20Lite%20%E2%80%93%20Show%20Image%20Credits%20and%20Captions&amp;severity=medium&amp;id=69e6941f19fe3cd2cd32c499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34403-cwe-1385-missing-origin-validation--246430aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34403%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69e6941f19fe3cd2cd32c495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33031-cwe-284-improper-access-control-in--72cf9b52</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33031%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69e6941f19fe3cd2cd32c48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6249-cwe-434-unrestricted-upload-of-file--37387f6f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6249%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Vvveb%20Vvveb%20CMS&amp;severity=high&amp;id=69e6860319fe3cd2cd2e53c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32311-cwe-78-improper-neutralization-of-s-db639b7a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32311%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20reconurge%20flowsint&amp;severity=critical&amp;id=69e6860319fe3cd2cd2e53c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5478-cwe-22-improper-limitation-of-a-path-efdce342</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5478%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%2C%20Quiz%2C%20Survey%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=69e6827f19fe3cd2cd2c9b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6550-cwe-757-selection-of-less-secure-alg-f7428a18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6550%3A%20CWE-757%20Selection%20of%20Less-Secure%20algorithm%20during%20negotiation%20(&apos;algorithm%20downgrade&apos;)%20in%20AWS%20AWS%20Encryption%20SDK%20for%20Python&amp;severity=medium&amp;id=69e6827f19fe3cd2cd2c9b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6257-cwe-434-unrestricted-upload-of-file--a5467518</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6257%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Vvveb%20Vvveb%20CMS&amp;severity=critical&amp;id=69e6827f19fe3cd2cd2c9b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6248-cwe-22-improper-limitation-of-a-path-6a56cf6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6248%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=69e6746e19fe3cd2cd270d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6060-cwe-400-uncontrolled-resource-consum-095d4529</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6060%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20OTRS%20AG%20OTRS&amp;severity=medium&amp;id=69e6746e19fe3cd2cd270d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23753-cwe-79-improper-neutralization-of-i-e0904d43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e669e219fe3cd2cd1fdd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23752-cwe-79-improper-neutralization-of-i-bc58662f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e669e219fe3cd2cd1fdd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23756-cwe-79-improper-neutralization-of-i-3fda2202</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e6665f19fe3cd2cd1d0af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23758-cwe-79-improper-neutralization-of-i-2b15cc21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23758%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e6665f19fe3cd2cd1d0af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23757-cwe-79-improper-neutralization-of-i-cb7aff71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e669e219fe3cd2cd1fdd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6662-permissive-cross-domain-policy-with--ecf1bf74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6662%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20ericc-ch%20copilot-api&amp;severity=medium&amp;id=69e65f5619fe3cd2cd181516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35154-cwe-269-improper-privilege-manageme-1398659d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35154%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20PowerProtect%20Data%20Domain%20appliances&amp;severity=medium&amp;id=69e65f5619fe3cd2cd181513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26951-cwe-121-stack-based-buffer-overflow-b7d3a9fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26951%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e65f5619fe3cd2cd18150b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22761-cwe-78-improper-neutralization-of-s-276732a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22761%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e65f5619fe3cd2cd181508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26942-cwe-78-improper-neutralization-of-s-0c3802de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26942%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e6585319fe3cd2cd13fc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26943-cwe-78-improper-neutralization-of-s-e6401189</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26943%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28684-cwe-59-improper-link-resolution-bef-53f39769</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28684%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20theskumar%20python-dotenv&amp;severity=medium&amp;id=69e6585319fe3cd2cd13fc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40488-cwe-434-unrestricted-upload-of-file-92009658</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40488%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20OpenMage%20magento-lts&amp;severity=high&amp;id=69e6585619fe3cd2cd13fdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24506-cwe-78-improper-neutralization-of-s-6ab75aac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24506%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40098-cwe-862-missing-authorization-in-op-fd04dcee</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40098%3A%20CWE-862%3A%20Missing%20Authorization%20in%20OpenMage%20magento-lts&amp;severity=medium&amp;id=69e6585619fe3cd2cd13fde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41445-cwe-190-integer-overflow-or-wraparo-01c0a012</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41445%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20mborgerding%20kissfft&amp;severity=high&amp;id=69e6585619fe3cd2cd13fdef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24505-cwe-20-improper-input-validation-in-c6a9ba55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24505%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25525-cwe-22-improper-limitation-of-a-pat-a9976697</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25525%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenMage%20magento-lts&amp;severity=medium&amp;id=69e6585319fe3cd2cd13fc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25524-cwe-502-deserialization-of-untruste-3dde7b9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25524%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20OpenMage%20magento-lts&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24504-cwe-20-improper-input-validation-in-aaecaf65</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24504%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25883-cwe-918-server-side-request-forgery-e4d85caa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25883%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Vexa-ai%20vexa&amp;severity=medium&amp;id=69e6514819fe3cd2cd0f546a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25058-cwe-306-missing-authentication-for--43e38c98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25058%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vexa-ai%20vexa&amp;severity=high&amp;id=69e6514819fe3cd2cd0f5467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23774-cwe-78-improper-neutralization-of-s-21982f3d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23774%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6514819fe3cd2cd0f5458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26944-cwe-306-missing-authentication-for--b54222f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26944%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6514819fe3cd2cd0f546d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24468-cwe-204-observable-response-discrep-14e76056</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24468%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20OpenAEV-Platform%20openaev&amp;severity=medium&amp;id=69e6514819fe3cd2cd0f5461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/serial-to-ip-converter-flaws-expose-ot-and-healthc-418cd40b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Serial-to-IP%20Converter%20Flaws%20Expose%20OT%20and%20Healthcare%20Systems%20to%20Hacking&amp;severity=medium&amp;id=69e64a3d19fe3cd2cd0b92f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24467-cwe-640-weak-password-recovery-mech-f6c2c6a1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24467%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20OpenAEV-Platform%20openaev&amp;severity=critical&amp;id=69e6514819fe3cd2cd0f545b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6066-cwe-319-cleartext-transmission-of-se-33382bd5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6066%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20ConnectWise%20Automate&amp;severity=high&amp;id=69e64a4819fe3cd2cd0b9550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40896-cwe-367-time-of-check-time-of-use-t-00e246fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40896%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20opf%20openproject&amp;severity=medium&amp;id=69e64a4819fe3cd2cd0b954c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-gentlemen-systembc-a-sneak-peek-behind-the-pro-8855cd3b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Gentlemen%20%26%20SystemBC%3A%20A%20Sneak%20Peek%20Behind%20the%20Proxy&amp;severity=medium&amp;id=69e654cd19fe3cd2cd11382a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6652-improper-neutralization-of-directive-fc5b0bb7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6652%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20Pagekit%20CMS&amp;severity=medium&amp;id=69e6433a19fe3cd2cd0895a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3219-vulnerability-in-python-packaging-au-c2c2a79a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3219%3A%20Vulnerability%20in%20Python%20Packaging%20Authority%20pip&amp;severity=medium&amp;id=69e6433a19fe3cd2cd089595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39918-cwe-94-improper-control-of-generati-40adcadb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39918%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20givanz%20Vvveb&amp;severity=critical&amp;id=69e6433a19fe3cd2cd089590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6651-cross-site-scripting-in-erponlinexyz-2be03bc3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6651%3A%20Cross%20Site%20Scripting%20in%20erponline.xyz%20ERP%20Online&amp;severity=medium&amp;id=69e6433a19fe3cd2cd08959e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6650-unrestricted-upload-in-z-blogphp-5877ecba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6650%3A%20Unrestricted%20Upload%20in%20Z-BlogPHP&amp;severity=medium&amp;id=69e6433a19fe3cd2cd089598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/20th-april-threat-intelligence-report-cca5eb65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=20th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69e7196619fe3cd2cda7fa5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34428-cwe-918-server-side-request-forgery-d80a5e6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34428%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20givanz%20Vvveb&amp;severity=high&amp;id=69e6390b19fe3cd2cd032865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34427-cwe-915-improperly-controlled-modif-93e46d07</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34427%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20givanz%20Vvveb&amp;severity=high&amp;id=69e6390b19fe3cd2cd032860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34429-cwe-79-improper-neutralization-of-i-98ae1cc2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=69e6390b19fe3cd2cd03286a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6369-cwe-306-missing-authentication-for-c-433fed26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6369%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Canonical%20canonical-livepatch&amp;severity=medium&amp;id=69e631a519fe3cd2cdff2615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4048-cwe-77-in-progress-software-loadmast-147ff8ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4048%3A%20CWE-77%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=69e631a519fe3cd2cdff2612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3519-cwe-77-in-progress-software-loadmast-bb82ec04</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3519%3A%20CWE-77%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=69e631a519fe3cd2cdff260f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6649-server-side-request-forgery-in-qibo--08a5f1b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6649%3A%20Server-Side%20Request%20Forgery%20in%20Qibo%20CMS&amp;severity=medium&amp;id=69e631a519fe3cd2cdff2618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3518-cwe-77-in-progress-software-loadmast-bd0fbf2f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3518%3A%20CWE-77%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=69e631a519fe3cd2cdff260c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33557-cwe-1285-improper-validation-of-spe-1e576c60</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33557%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Apache%20Software%20Foundation%20Apache%20Kafka&amp;severity=critical&amp;id=69e631a519fe3cd2cdff25ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66335-cwe-89-improper-neutralization-of-s-9d5744c2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66335%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Doris%20MCP%20Server&amp;severity=medium&amp;id=69e631a519fe3cd2cdff25fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3517-cwe-77-in-progress-software-loadmast-5d7a71cc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3517%3A%20CWE-77%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=69e631a519fe3cd2cdff2609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33558-cwe-533-deprecated-information-expo-cc938213</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33558%3A%20CWE-533%20DEPRECATED%3A%20Information%20Exposure%20Through%20Server%20Log%20Files%20in%20Apache%20Software%20Foundation%20Apache%20Kafka&amp;severity=medium&amp;id=69e631a519fe3cd2cdff2604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flowerstorm-phishing-kit-targeting-microsoft-crede-9e17756a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FlowerStorm%20Phishing%20Kit%20Targeting%20Microsoft%20Credentials%20via%20Cloudflare-Backed%20Infrastructure&amp;severity=medium&amp;id=69e62e1d19fe3cd2cdfced09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6648-cross-site-scripting-in-qibo-cms-269e177a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6648%3A%20Cross%20Site%20Scripting%20in%20Qibo%20CMS&amp;severity=medium&amp;id=69e6271719fe3cd2cdf8df91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dfir-report-the-gentlemen-systembc-a-sneak-peek-be-e15f14f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DFIR%20Report%20%E2%80%93%20The%20Gentlemen%20%26%20SystemBC%3A%20A%20Sneak%20Peek%20Behind%20the%20Proxy&amp;severity=medium&amp;id=69e7196619fe3cd2cda7fa61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/british-scattered-spider-hacker-pleads-guilty-in-t-e1fa3b76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=British%20Scattered%20Spider%20Hacker%20Pleads%20Guilty%20in%20the%20US&amp;severity=medium&amp;id=69e61c8a19fe3cd2cdefb19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6636-path-traversal-in-p2r3-convert-d00184c9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6636%3A%20Path%20Traversal%20in%20p2r3%20convert&amp;severity=medium&amp;id=69e6190619fe3cd2cdecc9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5958-cwe-367-time-of-check-time-of-use-to-e65de13f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5958%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20GNU%20Sed&amp;severity=low&amp;id=69e6190619fe3cd2cdecc9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6635-improper-authentication-in-rowboatla-9b05aca8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6635%3A%20Improper%20Authentication%20in%20rowboatlabs%20rowboat&amp;severity=medium&amp;id=69e631a719fe3cd2cdff2662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-qemu-for-defense-evasion-673cbf51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Abuse%20QEMU%20for%20Defense%20Evasion&amp;severity=medium&amp;id=69e611fe19fe3cd2cde6140f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6634-improper-authorization-in-usememos-m-7b131960</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6634%3A%20Improper%20Authorization%20in%20usememos%20memos&amp;severity=medium&amp;id=69e64a4819fe3cd2cd0b9562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6633-cross-site-scripting-in-yifang-cms-e0555989</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6633%3A%20Cross%20Site%20Scripting%20in%20Yifang%20CMS&amp;severity=medium&amp;id=69e6271719fe3cd2cdf8df97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bluesky-disrupted-by-sophisticated-ddos-attack-2013c9dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bluesky%20Disrupted%20by%20Sophisticated%20DDoS%20Attack&amp;severity=medium&amp;id=69e60af619fe3cd2cde01c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6632-buffer-overflow-in-tenda-f451-bee9b5ea</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6632%3A%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69e60aff19fe3cd2cde02e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6631-buffer-overflow-in-tenda-f451-8a352ca6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6631%3A%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69e60aff19fe3cd2cde02e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/senate-extends-surveillance-powers-until-april-30--2b6753d8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Senate%20Extends%20Surveillance%20Powers%20Until%20April%2030%20After%20Chaotic%20Votes%20in%20House&amp;severity=medium&amp;id=69e603ee19fe3cd2cdd9697f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6630-buffer-overflow-in-tenda-f451-1cedec4e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6630%3A%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69e603f619fe3cd2cdd9a5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fakewallet-crypto-stealer-spreading-in-the-app-sto-5237263b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FakeWallet%20crypto%20stealer%20spreading%20in%20the%20App%20Store&amp;severity=medium&amp;id=69e60e8319fe3cd2cde3130b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6629-sql-injection-in-metasoft-metacrm-f3e54b0d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6629%3A%20SQL%20Injection%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=69e603f619fe3cd2cdd9a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6654-vulnerability-in-mozilla-thin-vec-bd2ecbfa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6654%3A%20Vulnerability%20in%20Mozilla%20thin-vec&amp;severity=medium&amp;id=69e603f619fe3cd2cdd9a5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6628-sql-injection-in-phili67-ecclesia-cr-e229716e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6628%3A%20SQL%20Injection%20in%20phili67%20Ecclesia%20CRM&amp;severity=medium&amp;id=69e5fce519fe3cd2cdd0602e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6626-improper-neutralization-of-special-e-f2e20b81</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6626%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Cockpit-HQ%20Cockpit&amp;severity=medium&amp;id=69e5fce519fe3cd2cdd06028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/half-of-the-6-million-internet-facing-ftp-servers--79509a68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Half%20of%20the%206%20Million%20Internet-Facing%20FTP%20Servers%20Lack%20Encryption&amp;severity=medium&amp;id=69e5f5de19fe3cd2cdc89678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6625-server-side-request-forgery-in-moxi6-e3814803</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6625%3A%20Server-Side%20Request%20Forgery%20in%20moxi624%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=69e5fce519fe3cd2cdd06022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6624-cross-site-scripting-in-bichitrogan--354d0f6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6624%3A%20Cross%20Site%20Scripting%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69e5f25919fe3cd2cdc4c104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6623-cross-site-scripting-in-bichitrogan--8ea58ada</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6623%3A%20Cross%20Site%20Scripting%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69e5f25919fe3cd2cdc4c0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13480-cwe-863-incorrect-authorization-in--3f01e592</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13480%3A%20CWE-863%20Incorrect%20Authorization%20in%20Fudo%20Security%20Fudo%20Enterprise&amp;severity=medium&amp;id=69e5f25919fe3cd2cdc4c0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6622-cross-site-scripting-in-bichitrogan--c25daae2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6622%3A%20Cross%20Site%20Scripting%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69e5f25919fe3cd2cdc4c0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6621-improperly-controlled-modification-o-7c91d3f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6621%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%201024bit%20extend-deep&amp;severity=medium&amp;id=69e64a4819fe3cd2cd0b955c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nextjs-creator-vercel-hacked-e4246dae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Next.js%20Creator%20Vercel%20Hacked&amp;severity=medium&amp;id=69e5e44a19fe3cd2cdb517b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6620-path-traversal-in-soniccloudorg-soni-febe8664</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6620%3A%20Path%20Traversal%20in%20SonicCloudOrg%20sonic-server&amp;severity=medium&amp;id=69e64a4819fe3cd2cd0b9556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39454-incorrect-default-permissions-in-sk-929f8394</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39454%3A%20Incorrect%20default%20permissions%20in%20Sky%20Co.%2CLTD.%20SKYSEA%20Client%20View&amp;severity=high&amp;id=69e631a519fe3cd2cdff261e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6619-cross-site-scripting-in-langgenius-d-65fd59e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6619%3A%20Cross%20Site%20Scripting%20in%20langgenius%20dify&amp;severity=medium&amp;id=69e631a719fe3cd2cdff265c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-fail-to-exploit-flaw-in-discontinued-tp-li-e1fa8e2a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Fail%20to%20Exploit%20Flaw%20in%20Discontinued%20TP-Link%20Routers&amp;severity=medium&amp;id=69e5dd5619fe3cd2cdad2cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6618-server-side-request-forgery-in-langg-3b12c24f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6618%3A%20Server-Side%20Request%20Forgery%20in%20langgenius%20dify&amp;severity=medium&amp;id=69e6585619fe3cd2cd13fdf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5967-cwe-78-improper-neutralization-of-sp-375a9a75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5967%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TeamT5%20ThreatSonar%20Anti-Ransomware&amp;severity=high&amp;id=69e631a719fe3cd2cdff2658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5966-cwe-23-relative-path-traversal-in-te-c8f3e690</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5966%3A%20CWE-23%20Relative%20path%20traversal%20in%20TeamT5%20ThreatSonar%20Anti-Ransomware&amp;severity=high&amp;id=69e5d9d119fe3cd2cda9cb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5964-cwe-89-improper-neutralization-of-sp-398bc6f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5964%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Digiwin%20EasyFlow%20.NET&amp;severity=critical&amp;id=69e5d9d119fe3cd2cda9cb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5963-cwe-89-improper-neutralization-of-sp-69f9977c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5963%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Digiwin%20EasyFlow%20.NET&amp;severity=critical&amp;id=69e5d9d119fe3cd2cda9cb39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6617-server-side-request-forgery-in-langg-75bf2804</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6617%3A%20Server-Side%20Request%20Forgery%20in%20langgenius%20dify&amp;severity=medium&amp;id=69e5d9d119fe3cd2cda9cb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6616-server-side-request-forgery-in-trans-20d98e02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6616%3A%20Server-Side%20Request%20Forgery%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5d9d119fe3cd2cda9cb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41282-cwe-94-improper-control-of-generati-446e408b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41282%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ProjectDiscovery%20Nuclei&amp;severity=medium&amp;id=69e5d9d119fe3cd2cda9cb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6615-path-traversal-in-transformeroptimus-9ba57721</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6615%3A%20Path%20Traversal%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5d9d119fe3cd2cda9cb45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6644-cwe-78-improper-neutralization-of-sp-fee0276d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6644%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20ASUSTOR%20Inc.%20ADM&amp;severity=critical&amp;id=69e5cf3219fe3cd2cda1169c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6614-authorization-bypass-in-transformero-c24b9dcf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6614%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5cf3219fe3cd2cda11693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/handling-the-cve-flood-with-epss-mon-apr-20th-3cd777cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Handling%20the%20CVE%20Flood%20With%20EPSS%2C%20(Mon%2C%20Apr%2020th)&amp;severity=medium&amp;id=69e5cbad19fe3cd2cd9ed738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6643-cwe-121-stack-based-buffer-overflow--b118ebfd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6643%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20ASUSTOR%20Inc.%20ADM&amp;severity=high&amp;id=69e5cf3219fe3cd2cda11699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6613-authorization-bypass-in-transformero-89a74328</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6613%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5cf3219fe3cd2cda1168d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6612-authorization-bypass-in-transformero-9d91632f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6612%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5cf3219fe3cd2cda11687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6611-use-of-hard-coded-cryptographic-key--a0a79e86</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6611%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20liangliangyy%20DjangoBlog&amp;severity=low&amp;id=69e5cf3219fe3cd2cda11681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7083-cwe-79-cross-site-scripting-xss-in-e-63ce6c06</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7083%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Email%20Encoder&amp;severity=low&amp;id=69e5cf3219fe3cd2cda1167e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6610-hard-coded-credentials-in-liangliang-a2b730a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6610%3A%20Hard-coded%20Credentials%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5c14919fe3cd2cd962e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6609-improper-authorization-in-liangliang-a15a7437</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6609%3A%20Improper%20Authorization%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5c14919fe3cd2cd962e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6608-incorrect-control-flow-in-lm-sys-fas-aa6c9d8b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6608%3A%20Incorrect%20Control%20Flow%20in%20lm-sys%20fastchat&amp;severity=medium&amp;id=69e5c14919fe3cd2cd962e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6607-resource-consumption-in-lm-sys-fastc-4da4a4dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6607%3A%20Resource%20Consumption%20in%20lm-sys%20fastchat&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e69b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6606-server-side-request-forgery-in-model-695ac09a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6606%3A%20Server-Side%20Request%20Forgery%20in%20modelscope%20agentscope&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e69b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6605-server-side-request-forgery-in-model-6fb273db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6605%3A%20Server-Side%20Request%20Forgery%20in%20modelscope%20agentscope&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e69aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6604-server-side-request-forgery-in-model-881679f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6604%3A%20Server-Side%20Request%20Forgery%20in%20modelscope%20agentscope&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e69a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6603-code-injection-in-modelscope-agentsc-3170df70</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6603%3A%20Code%20Injection%20in%20modelscope%20agentscope&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e699b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6602-unrestricted-upload-in-rickxy-hospit-45f45410</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6602%3A%20Unrestricted%20Upload%20in%20rickxy%20Hospital%20Management%20System&amp;severity=medium&amp;id=69e5a50519fe3cd2cd673708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6601-resource-consumption-in-lagom-whmcs--f4276070</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6601%3A%20Resource%20Consumption%20in%20Lagom%20WHMCS%20Template&amp;severity=medium&amp;id=69e5a50519fe3cd2cd673702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32956-heap-based-buffer-overflow-in-silex-2da79db9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32956%3A%20Heap-based%20buffer%20overflow%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=critical&amp;id=69e5a50219fe3cd2cd673633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32955-stack-based-buffer-overflow-in-sile-b2529213</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32955%3A%20Stack-based%20buffer%20overflow%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=high&amp;id=69e5a50219fe3cd2cd67362c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32957-missing-authentication-for-critical-9dcf34bb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32957%3A%20Missing%20authentication%20for%20critical%20function%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32958-use-of-hard-coded-cryptographic-key-805cec1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32958%3A%20Use%20of%20hard-coded%20cryptographic%20key%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32959-use-of-a-broken-or-risky-cryptograp-82a33d15</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32959%3A%20Use%20of%20a%20broken%20or%20risky%20cryptographic%20algorithm%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32960-sensitive-information-in-resource-n-8d82b9fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32960%3A%20Sensitive%20information%20in%20resource%20not%20removed%20before%20reuse%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd67365c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32961-heap-based-buffer-overflow-in-silex-cb51ce4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32961%3A%20Heap-based%20buffer%20overflow%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32962-missing-authentication-for-critical-c133ad14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32962%3A%20Missing%20authentication%20for%20critical%20function%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32963-cross-site-scripting-xss-in-silex-t-81271128</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32963%3A%20Cross-site%20scripting%20(XSS)%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd67366b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32964-improper-neutralization-of-crlf-seq-0a04f4b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32964%3A%20Improper%20neutralization%20of%20CRLF%20sequences%20(&apos;CRLF%20Injection&apos;)%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32965-initialization-of-a-resource-with-a-addb8b09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32965%3A%20Initialization%20of%20a%20resource%20with%20an%20insecure%20default%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=high&amp;id=69e5a50519fe3cd2cd6736eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6600-cross-site-scripting-in-langflow-ai--78b00a64</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6600%3A%20Cross%20Site%20Scripting%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5a50519fe3cd2cd6736fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6599-injection-in-langflow-ai-langflow-bac58919</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6599%3A%20Injection%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5a50519fe3cd2cd6736f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6598-cleartext-storage-in-a-file-or-on-di-48f0305d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6598%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5a50519fe3cd2cd6736f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6597-unprotected-storage-of-credentials-i-fc1cbce7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6597%3A%20Unprotected%20Storage%20of%20Credentials%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5936f19fe3cd2cd4fde16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6596-unrestricted-upload-in-langflow-ai-l-b4176c6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6596%3A%20Unrestricted%20Upload%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5936f19fe3cd2cd4fde10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6595-sql-injection-in-projectsandprograms-5088e0c9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6595%3A%20SQL%20Injection%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=69e5936f19fe3cd2cd4fde0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-april-20th-2026-httpsiscs-97618251</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20April%2020th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9898%2C%20(Mon%2C%20Apr%2020th)&amp;severity=medium&amp;id=69e588e319fe3cd2cd49d321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6594-improperly-controlled-modification-o-3776681f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6594%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20brikcss%20merge&amp;severity=medium&amp;id=69e5badb19fe3cd2cd92727a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6593-cross-site-scripting-in-comfyui-b35dbf78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6593%3A%20Cross%20Site%20Scripting%20in%20ComfyUI&amp;severity=medium&amp;id=69e5badb19fe3cd2cd927274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6592-cross-site-scripting-in-comfyui-80457360</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6592%3A%20Cross%20Site%20Scripting%20in%20ComfyUI&amp;severity=medium&amp;id=69e5badb19fe3cd2cd92726e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6591-path-traversal-in-comfyui-480d807d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6591%3A%20Path%20Traversal%20in%20ComfyUI&amp;severity=medium&amp;id=69e57e5719fe3cd2cd43e17a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6590-path-traversal-in-comfyui-c208732b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6590%3A%20Path%20Traversal%20in%20ComfyUI&amp;severity=medium&amp;id=69e57e5719fe3cd2cd43e174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6589-cross-site-request-forgery-in-comfyu-7a448fff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6589%3A%20Cross-Site%20Request%20Forgery%20in%20ComfyUI&amp;severity=medium&amp;id=69e57e5719fe3cd2cd43e16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6588-missing-authentication-in-serge-chat-2fbbea1e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6588%3A%20Missing%20Authentication%20in%20serge-chat%20serge&amp;severity=medium&amp;id=69e57e5719fe3cd2cd43e168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6587-server-side-request-forgery-in-vibra-e572bea3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6587%3A%20Server-Side%20Request%20Forgery%20in%20vibrantlabsai%20RAGAS&amp;severity=medium&amp;id=69e5704619fe3cd2cd3006c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-21-462c7584</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-21&amp;severity=medium&amp;id=69e720a919fe3cd2cdab8fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-20-e7e0f2d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-20&amp;severity=medium&amp;id=69e6c1bc19fe3cd2cd41d874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41285-na-02530dbb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41285%3A%20n%2Fa&amp;severity=medium&amp;id=69e6b73b19fe3cd2cd3f2d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29643-na-27c40415</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29643%3A%20n%2Fa&amp;severity=high&amp;id=69e69e9e19fe3cd2cd35b3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29648-na-7f29b57d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29648%3A%20n%2Fa&amp;severity=high&amp;id=69e6941f19fe3cd2cd32c487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29647-na-52884ff4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29647%3A%20n%2Fa&amp;severity=medium&amp;id=69e6941f19fe3cd2cd32c482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29646-na-03a49919</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29646%3A%20n%2Fa&amp;severity=critical&amp;id=69e6941f19fe3cd2cd32c479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29642-na-9942bec8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29642%3A%20n%2Fa&amp;severity=high&amp;id=69e6941f19fe3cd2cd32c473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29649-na-3ea96a6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29649%3A%20n%2Fa&amp;severity=critical&amp;id=69e6860319fe3cd2cd2e53bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29645-na-31235a89</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29645%3A%20n%2Fa&amp;severity=high&amp;id=69e6827f19fe3cd2cd2c9b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39112-na-d492f597</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39112%3A%20n%2Fa&amp;severity=medium&amp;id=69e6665f19fe3cd2cd1d0b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39111-na-19ab1b65</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39111%3A%20n%2Fa&amp;severity=high&amp;id=69e6665f19fe3cd2cd1d0b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39110-na-e8d4396c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39110%3A%20n%2Fa&amp;severity=high&amp;id=69e6665f19fe3cd2cd1d0b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39109-na-15450aee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39109%3A%20n%2Fa&amp;severity=critical&amp;id=69e6665f19fe3cd2cd1d0b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26399-na-50a687f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26399%3A%20n%2Fa&amp;severity=medium&amp;id=69e6665f19fe3cd2cd1d0afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30266-na-35614bad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30266%3A%20n%2Fa&amp;severity=high&amp;id=69e65f5619fe3cd2cd18150e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30269-na-bedba322</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30269%3A%20n%2Fa&amp;severity=critical&amp;id=69e6585319fe3cd2cd13fc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66954-na-9252c01a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66954%3A%20n%2Fa&amp;severity=medium&amp;id=69e6585319fe3cd2cd13fc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-20-3025abad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-20&amp;severity=low&amp;id=69e573c219fe3cd2cd351de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6586-authorization-bypass-in-transformero-53bfb267</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6586%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e56cc819fe3cd2cd2de213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6585-authorization-bypass-in-transformero-ce26c4a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6585%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5693e19fe3cd2cd2c6f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6584-authorization-bypass-in-transformero-6aead21f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6584%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e565b919fe3cd2cd2a8db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6583-authorization-bypass-in-transformero-c549fd31</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6583%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5624119fe3cd2cd287964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6582-missing-authentication-in-transforme-149e0106</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6582%3A%20Missing%20Authentication%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e55ec119fe3cd2cd267291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6581-buffer-overflow-in-h3c-magic-b1-6a61fe35</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6581%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69e55b2e19fe3cd2cd24f831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6580-use-of-hard-coded-cryptographic-key--825a2bad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6580%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e557a919fe3cd2cd19a331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6579-missing-authentication-in-liangliang-d5252b3e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6579%3A%20Missing%20Authentication%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5542619fe3cd2cd0cb4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6578-hard-coded-credentials-in-liangliang-58ec81a5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6578%3A%20Hard-coded%20Credentials%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5499d19fe3cd2cde78631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6577-missing-authentication-in-liangliang-d57330cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6577%3A%20Missing%20Authentication%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5badb19fe3cd2cd927280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6576-command-injection-in-liangliangyy-dj-9d686e18</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6576%3A%20Command%20Injection%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e529f619fe3cd2cd68c633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6574-hard-coded-credentials-in-osuuu-ligh-b66f67a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6574%3A%20Hard-coded%20Credentials%20in%20osuuu%20LightPicture&amp;severity=medium&amp;id=69e4dc9d19fe3cd2cd590f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6573-server-side-request-forgery-in-phpem-e98897b9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6573%3A%20Server-Side%20Request%20Forgery%20in%20PHPEMS&amp;severity=medium&amp;id=69e4d59519fe3cd2cd54e679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6572-improper-authorization-in-collabora--c07f449a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6572%3A%20Improper%20Authorization%20in%20Collabora%20KodExplorer&amp;severity=medium&amp;id=69e4cb0a19fe3cd2cd4ea455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6571-authorization-bypass-in-kodcloud-kod-e6ff1cbb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6571%3A%20Authorization%20Bypass%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=69e4c78619fe3cd2cd4d1d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6570-authorization-bypass-in-kodcloud-kod-786c22b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6570%3A%20Authorization%20Bypass%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=69e4bcf919fe3cd2cd48691d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6569-improper-authentication-in-kodcloud--0db7b657</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6569%3A%20Improper%20Authentication%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=69e4aee819fe3cd2cd406c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6568-path-traversal-in-kodcloud-kodexplor-1b477f95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6568%3A%20Path%20Traversal%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=69e4ab6519fe3cd2cd3e5cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6564-improper-authorization-in-emq-emqx-e-50d714fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6564%3A%20Improper%20Authorization%20in%20EMQ%20EMQX%20Enterprise&amp;severity=medium&amp;id=69e4a45d19fe3cd2cd38c81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6563-buffer-overflow-in-h3c-magic-b1-2ad2f98e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6563%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69e4964d19fe3cd2cd310932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6562-sql-injection-in-dameng100-muucmf-c09ef714</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6562%3A%20SQL%20Injection%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69e4964d19fe3cd2cd31092c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6561-unrestricted-upload-in-eyoucms-280f408b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6561%3A%20Unrestricted%20Upload%20in%20EyouCMS&amp;severity=medium&amp;id=69e484bd19fe3cd2cd25f971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6560-buffer-overflow-in-h3c-magic-b0-f38a59da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6560%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B0&amp;severity=high&amp;id=69e47db819fe3cd2cd0ae874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6559-cross-site-scripting-in-wavlink-wl-w-3f20100a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6559%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69e46c1d19fe3cd2cde78368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0868-cwe-79-improper-neutralization-of-in-3458e49a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20turn2honey%20EMC%20%E2%80%93%20Easily%20Embed%20Calendly%20Scheduling&amp;severity=medium&amp;id=69e45526bdfbbecc5954aa8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-20-d4ceb546</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-20&amp;severity=medium&amp;id=69e6006119fe3cd2cdd3a36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-19-f8492fcf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-19&amp;severity=medium&amp;id=69e5703c19fe3cd2cd2fe55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-19-e2614695</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-19&amp;severity=low&amp;id=69e4551ebdfbbecc5954a64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41242-cwe-94-improper-control-of-generati-3ca40985</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41242%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20protobufjs%20protobuf.js&amp;severity=critical&amp;id=69e46a7a19fe3cd2cde33d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-phantomclr-stealth-execution-via-appdoma-bca267b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20PhantomCLR%3A%20Stealth%20Execution%20via%20AppDomain%20Hijacking%20and%20In-Memory%20.NET%20Abuse&amp;severity=medium&amp;id=69e603f419fe3cd2cdd9a2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40948-cwe-352-cross-site-request-forgery--1d13b30e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40948%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Keycloak&amp;severity=medium&amp;id=69e38cc4bdfbbecc5977d883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2986-cwe-79-improper-neutralization-of-in-55e6dfdd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajay%20Contextual%20Related%20Posts&amp;severity=medium&amp;id=69e3699bbdfbbecc5948ef72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tycoon-2fa-loses-phishing-kit-crown-amid-surge-in--4fc6dca0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tycoon%202FA%20Loses%20Phishing%20Kit%20Crown%20Amid%20Surge%20in%20Attacks&amp;severity=low&amp;id=69e35f0fbdfbbecc593a5dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2505-cwe-79-improper-neutralization-of-in-ce86bd04</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elzahlan%20Categories%20Images&amp;severity=medium&amp;id=69e350febdfbbecc5928ea79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0894-cwe-79-improper-neutralization-of-in-d357c715</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vanderwijk%20Content%20Blocks%20(Custom%20Post%20Widget)&amp;severity=medium&amp;id=69e350febdfbbecc5928ea75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41254-cwe-696-incorrect-behavior-order-in-c1167541</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41254%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20littlecms%20little%20cms%20color%20engine&amp;severity=medium&amp;id=69e32a52bdfbbecc59fc2b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32690-cwe-668-exposure-of-resource-to-wro-f351e5c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32690%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=low&amp;id=69e32a52bdfbbecc59fc2b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30898-cwe-77-improper-neutralization-of-s-51fb13b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30898%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e32a52bdfbbecc59fc2b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30912-cwe-668-exposure-of-resource-to-wro-513606f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30912%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e32a52bdfbbecc59fc2b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25917-cwe-502-deserialization-of-untruste-00460742</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25917%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e32a52bdfbbecc59fc2b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32228-cwe-863-incorrect-authorization-in--de69187e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32228%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e32a52bdfbbecc59fc2b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6048-cwe-79-improper-neutralization-of-in-68a26ee3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dragwyb%20Flipbox%20Addon%20for%20Elementor&amp;severity=medium&amp;id=69e30ab8bdfbbecc59e84c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6518-cwe-434-unrestricted-upload-of-file--f3d41796</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6518%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20niteo%20CMP%20%E2%80%93%20Coming%20Soon%20%26%20Maintenance%20Plugin%20by%20NiteoThemes&amp;severity=high&amp;id=69e30ab8bdfbbecc59e84c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4801-cwe-79-improper-neutralization-of-in-4fb83809</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20godaddy%20Page%20Builder%20Gutenberg%20Blocks%20%E2%80%93%20CoBlocks&amp;severity=medium&amp;id=69e30ab8bdfbbecc59e84c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40494-cwe-787-out-of-bounds-write-in-happ-d7181ae5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40494%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20HappySeaFox%20sail&amp;severity=critical&amp;id=69e2ee8ebdfbbecc59cda5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40493-cwe-787-out-of-bounds-write-in-happ-da0d28a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40493%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20HappySeaFox%20sail&amp;severity=critical&amp;id=69e2ee8ebdfbbecc59cda5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40492-cwe-787-out-of-bounds-write-in-happ-780830ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40492%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20HappySeaFox%20sail&amp;severity=critical&amp;id=69e2ee8ebdfbbecc59cda5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40491-cwe-22-improper-limitation-of-a-pat-8fb3f370</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40491%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wkentaro%20gdown&amp;severity=medium&amp;id=69e2ee8ebdfbbecc59cda5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40490-cwe-200-exposure-of-sensitive-infor-4c645570</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40490%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20AsyncHttpClient%20async-http-client&amp;severity=medium&amp;id=69e2e080bdfbbecc59c723b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1559-cwe-79-improper-neutralization-of-in-ac5deafd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69e2e080bdfbbecc59c72393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1838-cwe-79-improper-neutralization-of-in-b0d19334</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1838%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasunsen%20Hostel&amp;severity=medium&amp;id=69e2e080bdfbbecc59c7239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40489-cwe-121-stack-based-buffer-overflow-63bc89f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40489%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20editorconfig%20editorconfig-core-c&amp;severity=high&amp;id=69e2e080bdfbbecc59c723af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40487-cwe-79-improper-neutralization-of-i-d95bc08f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40487%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69e2e080bdfbbecc59c723ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35582-cwe-78-improper-neutralization-of-s-8a32499e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35582%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=high&amp;id=69e2e080bdfbbecc59c723a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35465-cwe-73-external-control-of-file-nam-276a142e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35465%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20freedomofpress%20securedrop-client&amp;severity=high&amp;id=69e2d977bdfbbecc59bbf816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40572-cwe-269-improper-privilege-manageme-6ff979fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40572%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20MinecAnton209%20NovumOS&amp;severity=critical&amp;id=69e2d977bdfbbecc59bbf825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40317-cwe-269-improper-privilege-manageme-d4098dd0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40317%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20MinecAnton209%20NovumOS&amp;severity=critical&amp;id=69e2d977bdfbbecc59bbf81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40350-cwe-863-incorrect-authorization-in--410a207f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40350%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20leepeuker%20movary&amp;severity=high&amp;id=69e2d977bdfbbecc59bbf81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40349-cwe-862-missing-authorization-in-le-02f722bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40349%3A%20CWE-862%3A%20Missing%20Authorization%20in%20leepeuker%20movary&amp;severity=high&amp;id=69e389f6bdfbbecc5976511a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40593-cwe-79-improper-neutralization-of-i-66d417db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40593%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69e389f6bdfbbecc59765137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40348-cwe-918-server-side-request-forgery-d56b3db1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40348%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20leepeuker%20movary&amp;severity=high&amp;id=69e389f6bdfbbecc597650fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-19-fb6aae4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-19&amp;severity=medium&amp;id=69e4e39d19fe3cd2cd5beb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-18-260f1eb3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-18&amp;severity=medium&amp;id=69e41cddbdfbbecc59f94a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-18-674dd18f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-18&amp;severity=low&amp;id=69e3385abdfbbecc5904514a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40347-cwe-400-uncontrolled-resource-consu-dd3e1813</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40347%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Kludex%20python-multipart&amp;severity=medium&amp;id=69e389f6bdfbbecc597650d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40346-cwe-918-server-side-request-forgery-4c00a4d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40346%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nocobase%20%40nocobase%2Fplugin-workflow-request&amp;severity=medium&amp;id=69e389f6bdfbbecc597650b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40581-cwe-352-cross-site-request-forgery--655587d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40581%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69e389f6bdfbbecc5976522a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40337-cwe-283-unverified-ownership-in-cam-9fdaee9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40337%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20camelot-os%20sentry-kernel&amp;severity=medium&amp;id=69e389f6bdfbbecc59765143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40341-cwe-126-buffer-over-read-in-gphoto--d243331d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40341%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20gphoto%20libgphoto2&amp;severity=low&amp;id=69e389f6bdfbbecc59765178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40340-cwe-125-out-of-bounds-read-in-gphot-5cade0b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40340%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e389f6bdfbbecc5976516c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40339-cwe-125-out-of-bounds-read-in-gphot-ed5c11f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40339%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e389f6bdfbbecc59765160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40338-cwe-125-out-of-bounds-read-in-gphot-6a685a62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40338%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e389f6bdfbbecc59765158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40485-cwe-307-improper-restriction-of-exc-cf6d1aaa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40485%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69e2c47fbdfbbecc59a12f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40336-cwe-401-missing-release-of-memory-a-a2494142</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40336%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20gphoto%20libgphoto2&amp;severity=low&amp;id=69e2c47fbdfbbecc59a12f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2262-cwe-200-exposure-of-sensitive-inform-bf4d032f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2262%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20easyappointments%20Easy%20Appointments&amp;severity=high&amp;id=69e2c47fbdfbbecc59a12f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40484-cwe-269-improper-privilege-manageme-9bb4be14</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40484%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69e2c47fbdfbbecc59a12f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40483-cwe-79-improper-neutralization-of-i-cb8800e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40483%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69e2c47fbdfbbecc59a12f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40335-cwe-125-out-of-bounds-read-in-gphot-7d4c84a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40335%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e2c47fbdfbbecc59a12f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40334-cwe-170-improper-null-termination-i-ecdcb16f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40334%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20gphoto%20libgphoto2&amp;severity=low&amp;id=69e2c0dabdfbbecc599fc050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40582-cwe-288-authentication-bypass-using-58dc9576</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40582%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69e2c0dabdfbbecc599fc05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40333-cwe-125-out-of-bounds-read-in-gphot-d0b9db38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40333%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e2c0dabdfbbecc599fc04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40480-cwe-639-authorization-bypass-throug-7ebb7a44</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40480%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69e2c0dabdfbbecc599fc054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40324-cwe-674-uncontrolled-recursion-in-c-0796aaf1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40324%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20ChilliCream%20graphql-platform&amp;severity=critical&amp;id=69e2c0dabdfbbecc599fc03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40482-cwe-89-improper-neutralization-of-s-efd3f903</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40482%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69e2c0dabdfbbecc599fc05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40323-cwe-345-insufficient-verification-o-ab02000f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40323%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20succinctlabs%20sp1&amp;severity=high&amp;id=69e2c0dabdfbbecc599fc03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2434-cwe-79-improper-neutralization-of-in-459b3fb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20poporon%20Pz-LinkCard&amp;severity=medium&amp;id=69e389f6bdfbbecc5976522f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40476-cwe-407-inefficient-algorithmic-com-930c0f33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40476%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20webonyx%20graphql-php&amp;severity=medium&amp;id=69e2af46bdfbbecc59986553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5720-cwe-191-integer-underflow-wrap-or-wr-5076503c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5720%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20miniupnp%20project%20miniupnpd&amp;severity=high&amp;id=69e2abc2bdfbbecc5996b9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40474-cwe-284-improper-access-control-in--3a8ced96</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40474%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20wger-project%20wger&amp;severity=high&amp;id=69e2abc2bdfbbecc5996b9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40353-cwe-79-improper-neutralization-of-i-32ce955d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40353%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wger-project%20wger&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40258-cwe-22-improper-limitation-of-a-pat-00f841f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40258%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gramps-project%20gramps-web-api&amp;severity=critical&amp;id=69e2a83ebdfbbecc5994f12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40321-cwe-87-improper-neutralization-of-a-2d570284</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40321%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=69e2a83ebdfbbecc5994f140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40352-cwe-943-improper-neutralization-of--85ada05a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40352%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20labring%20FastGPT&amp;severity=high&amp;id=69e2a83ebdfbbecc5994f149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40306-cwe-330-use-of-insufficiently-rando-0a094187</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40306%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f13c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40305-cwe-285-improper-authorization-in-d-259f7178</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40305%3A%20CWE-285%3A%20Improper%20Authorization%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40351-cwe-943-improper-neutralization-of--9a2571c7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40351%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20labring%20FastGPT&amp;severity=critical&amp;id=69e2a83ebdfbbecc5994f144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40304-cwe-284-improper-access-control-in--69c6782f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40304%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20openziti%20zrok&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40303-cwe-400-uncontrolled-resource-consu-a3ee6743</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40303%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20openziti%20zrok&amp;severity=high&amp;id=69e2a136bdfbbecc5990836b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40196-cwe-708-incorrect-ownership-assignm-e4b4344c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40196%3A%20CWE-708%3A%20Incorrect%20Ownership%20Assignment%20in%20sysadminsmedia%20homebox&amp;severity=high&amp;id=69e2a136bdfbbecc59908358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40302-cwe-79-improper-neutralization-of-i-859f7360</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40302%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openziti%20zrok&amp;severity=medium&amp;id=69e2a136bdfbbecc59908367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40155-cwe-863-incorrect-authorization-in--178dd218</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40155%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20auth0%20nextjs-auth0&amp;severity=medium&amp;id=69e2a136bdfbbecc59908353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40301-cwe-79-improper-neutralization-of-i-bf3bd796</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40301%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rhukster%20dom-sanitizer&amp;severity=medium&amp;id=69e2a136bdfbbecc59908362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40299-cwe-601-url-redirection-to-untruste-c7560376</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40299%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20amannn%20next-intl&amp;severity=medium&amp;id=69e2a136bdfbbecc5990835c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35603-cwe-426-untrusted-search-path-in-an-d7db04c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35603%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20anthropics%20claude-code&amp;severity=medium&amp;id=69e29db8bdfbbecc598ee1bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35402-cwe-284-improper-access-control-in--3725f4c7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35402%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20neo4j-contrib%20mcp-neo4j&amp;severity=low&amp;id=69e29db8bdfbbecc598ee1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33436-cwe-20-improper-input-validation-in-995166fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33436%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=low&amp;id=69e29db8bdfbbecc598ee1b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40286-cwe-79-improper-neutralization-of-i-b05f9ace</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40286%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69e29db8bdfbbecc598ee1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40285-cwe-89-improper-neutralization-of-s-36595b32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40285%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69e29db8bdfbbecc598ee1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40527-cwe-78-improper-neutralization-of-s-8835a9bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40527%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radareorg%20radare2&amp;severity=high&amp;id=69e29db8bdfbbecc598ee1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40284-cwe-79-improper-neutralization-of-i-a78ebb3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40284%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69e29db8bdfbbecc598ee1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35512-cwe-122-heap-based-buffer-overflow--c91ef269</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35512%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29a32bdfbbecc598cc5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40282-cwe-79-improper-neutralization-of-i-a407d8de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40282%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69e29a32bdfbbecc598cc5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33689-cwe-125-out-of-bounds-read-in-neutr-038fd12f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33689%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29a32bdfbbecc598cc5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33145-cwe-78-improper-neutralization-of-s-356aab43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33145%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=69e29a32bdfbbecc598cc5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40283-cwe-79-improper-neutralization-of-i-881385d3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40283%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69e29327bdfbbecc59895032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32624-cwe-122-heap-based-buffer-overflow--cb3226cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32624%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=69e29327bdfbbecc5989501f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33516-cwe-125-out-of-bounds-read-in-neutr-043d919d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33516%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29327bdfbbecc59895028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32650-cwe-757-in-anviz-anviz-crosschex-st-9f992419</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32650%3A%20CWE-757%20in%20Anviz%20Anviz%20CrossChex%20Standard&amp;severity=high&amp;id=69e29327bdfbbecc59895023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40434-cwe-940-in-anviz-anviz-crosschex-st-bb1f864a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40434%3A%20CWE-940%20in%20Anviz%20Anviz%20CrossChex%20Standard&amp;severity=high&amp;id=69e29327bdfbbecc59895035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35682-cwe-77-in-anviz-anviz-cx2-lite-firm-73192145</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35682%3A%20CWE-77%20in%20Anviz%20Anviz%20CX2%20Lite%20Firmware&amp;severity=high&amp;id=69e29327bdfbbecc5989502c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32623-cwe-122-heap-based-buffer-overflow--e8ed9695</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32623%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29327bdfbbecc5989501b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40066-cwe-494-in-anviz-anviz-cx7-firmware-8338be60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40066%3A%20CWE-494%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=high&amp;id=69e28fa4bdfbbecc59867cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35546-cwe-306-in-anviz-anviz-cx7-firmware-147e04a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35546%3A%20CWE-306%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=critical&amp;id=69e28fa4bdfbbecc59867cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40461-cwe-306-in-anviz-anviz-cx7-firmware-c1966de7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40461%3A%20CWE-306%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=high&amp;id=69e28fa7bdfbbecc59867d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32648-cwe-862-in-anviz-anviz-cx7-firmware-aaa03fdc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32648%3A%20CWE-862%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33569-cwe-319-in-anviz-anviz-cx7-firmware-b7940a80</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33569%3A%20CWE-319%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32105-cwe-354-improper-validation-of-inte-71bf3dd4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32105%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20neutrinolabs%20xrdp&amp;severity=critical&amp;id=69e28fa3bdfbbecc59867c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32107-cwe-273-improper-check-for-dropped--30bf230c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32107%3A%20CWE-273%3A%20Improper%20Check%20for%20Dropped%20Privileges%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e28fa3bdfbbecc59867c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31927-cwe-23-in-anviz-anviz-cx7-firmware-64eea7cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31927%3A%20CWE-23%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40342-cwe-22-improper-limitation-of-a-pat-aa1db711</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40342%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FirebirdSQL%20firebird&amp;severity=critical&amp;id=69e28fa4bdfbbecc59867cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32324-cwe-321-use-of-hard-coded-cryptogra-6037edd2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32324%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=high&amp;id=69e28fa3bdfbbecc59867ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35061-cwe-862-in-anviz-anviz-cx7-firmware-3ac096cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35061%3A%20CWE-862%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33093-cwe-862-in-anviz-anviz-cx7-firmware-d552bc73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33093%3A%20CWE-862%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e2889bbdfbbecc59818af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/white-house-chief-of-staff-to-meet-with-anthropic--a17193c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=White%20House%20Chief%20of%20Staff%20to%20Meet%20With%20Anthropic%20CEO%20Over%20Its%20New%20AI%20Technology&amp;severity=medium&amp;id=69e39ad9bdfbbecc59850336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35215-cwe-369-divide-by-zero-in-firebirds-3a7b530a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35215%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e2889bbdfbbecc59818afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-kata-and-kedr-to-detect-the-adaptixc2-agent-9d6969c9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20KATA%20and%20KEDR%20to%20detect%20the%20AdaptixC2%20agent&amp;severity=medium&amp;id=69e603f419fe3cd2cdd9a2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34232-cwe-228-improper-handling-of-syntac-b5b28669</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34232%3A%20CWE-228%3A%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e2889bbdfbbecc59818af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33337-cwe-120-buffer-copy-without-checkin-5abedb12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33337%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e28194bdfbbecc597b95dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6437-cwe-88-improper-neutralization-of-ar-9d56e73b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6437%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Amazon%20AWS%20EFS%20CSI%20Driver&amp;severity=medium&amp;id=69e28194bdfbbecc597b95e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28224-cwe-476-null-pointer-dereference-in-bc196dc8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28224%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e28194bdfbbecc597b95d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28214-cwe-190-integer-overflow-or-wraparo-2b0bca7e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28214%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20FirebirdSQL%20firebird&amp;severity=medium&amp;id=69e28194bdfbbecc597b95d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40525-cwe-636-not-failing-securely-fail-o-ce5e8d5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40525%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Fail%20Open&apos;)%20in%20volcengine%20OpenViking&amp;severity=critical&amp;id=69e27e0fbdfbbecc5978c959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27890-cwe-119-improper-restriction-of-ope-87051bc6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27890%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e27e0fbdfbbecc5978c94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28212-cwe-476-null-pointer-dereference-in-d3281e4a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28212%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e27e0fbdfbbecc5978c953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65104-cwe-200-exposure-of-sensitive-infor-818cb5d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65104%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e27e0fbdfbbecc5978c95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5718-cwe-434-unrestricted-upload-of-file--1133bfad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5718%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69e273aebdfbbecc5970e963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5710-cwe-22-improper-limitation-of-a-path-1345068b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5710%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69e273aebdfbbecc5970e95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40320-cwe-1336-improper-neutralization-of-7c3e97b3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40320%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Giskard-AI%20giskard-oss&amp;severity=medium&amp;id=69e273aebdfbbecc5970e958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40319-cwe-1333-inefficient-regular-expres-c4bed657</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40319%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Giskard-AI%20giskard-oss&amp;severity=low&amp;id=69e26ffebdfbbecc596e17be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40518-cwe-22-improper-limitation-of-a-pat-95c4c5a3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bytedance%20deer-flow&amp;severity=high&amp;id=69e26909bdfbbecc5968fd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3464-cwe-22-improper-limitation-of-a-path-16d32bc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3464%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aguilatechnologies%20WP%20Customer%20Area&amp;severity=high&amp;id=69e28194bdfbbecc597b95e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21733-cwe-280-improper-handling-of-insuff-ad2adca4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21733%3A%20Vulnerability%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69e25e76bdfbbecc595f3fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40516-cwe-918-server-side-request-forgery-74d5147e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40516%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e25e76bdfbbecc595f3fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40515-cwe-863-incorrect-authorization-in--67f24981</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40515%3A%20CWE-863%20Incorrect%20Authorization%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e25e76bdfbbecc595f3fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21709-cwe-77-command-injection-generic-in-3efaa943</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21709%3A%20CWE-77%20Command%20Injection%20-%20Generic%20in%20Veeam%20Backup%20and%20Replication&amp;severity=medium&amp;id=69e253e3bdfbbecc593fb259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6497-server-side-request-forgery-in-prasa-47b23fe1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6497%3A%20Server-Side%20Request%20Forgery%20in%20prasathmani%20TinyFileManager&amp;severity=medium&amp;id=69e253e3bdfbbecc593fb262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6284-cwe-521-in-horner-automation-cscape-17ab7886</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6284%3A%20CWE-521%20in%20Horner%20Automation%20Cscape&amp;severity=critical&amp;id=69e253e3bdfbbecc593fb25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cochat-launches-ai-collaboration-platform-to-comba-be9f2b7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CoChat%20Launches%20AI%20Collaboration%20Platform%20to%20Combat%20Shadow%20AI&amp;severity=medium&amp;id=69e24cd8bdfbbecc5936df5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6496-path-traversal-in-prasathmani-tinyfi-efd352ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6496%3A%20Path%20Traversal%20in%20prasathmani%20TinyFileManager&amp;severity=medium&amp;id=69e2495cbdfbbecc5932f325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41153-cwe-77-in-jetbrains-junie-621e3a60</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41153%3A%20CWE-77%20in%20JetBrains%20Junie&amp;severity=medium&amp;id=69e2495cbdfbbecc5932f319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-seedworm-targets-global-organizations--329f9990</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20Seedworm%20Targets%20Global%20Organizations%20via%20Microsoft%20Teams&amp;severity=medium&amp;id=69e60afe19fe3cd2cde02d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6493-cross-site-scripting-in-lukevella-ra-55aea1e3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6493%3A%20Cross%20Site%20Scripting%20in%20lukevella%20rallly&amp;severity=medium&amp;id=69e2495cbdfbbecc5932f31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6492-information-disclosure-in-arnobt78-h-8be294ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6492%3A%20Information%20Disclosure%20in%20arnobt78%20Hotel%20Booking%20Management%20System&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6491-heap-based-buffer-overflow-in-libvip-10e77d09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6491%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6490-sql-injection-in-querymine-sms-bc581eac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6490%3A%20SQL%20Injection%20in%20QueryMine%20sms&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leverage-leaked-government-intelligence-to-b4f7d6c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20leverage%20leaked%20government%20intelligence%20tools%20to%20target%20everyday%20iOS%20users%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69e232d082d89c981ff8363c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6489-unrestricted-upload-in-querymine-sms-e4c4a996</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6489%3A%20Unrestricted%20Upload%20in%20QueryMine%20sms&amp;severity=medium&amp;id=69e232c582d89c981ff828a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6488-sql-injection-in-querymine-sms-fe0ba541</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6488%3A%20SQL%20Injection%20in%20QueryMine%20sms&amp;severity=medium&amp;id=69e232c582d89c981ff828a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6487-path-traversal-in-qihui-jtbc5-cms-3548fc5d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6487%3A%20Path%20Traversal%20in%20Qihui%20jtbc5%20CMS&amp;severity=medium&amp;id=69e22bbf82d89c981ff3d63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6507-out-of-bounds-write-in-red-hat-red-h-280b3ba7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6507%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69e22bbf82d89c981ff3d640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6486-cross-site-scripting-in-classroomboo-de02e171</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6486%3A%20Cross%20Site%20Scripting%20in%20classroombookings&amp;severity=medium&amp;id=69e22bbf82d89c981ff3d630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-satellite-cybersecurity-act-90k-chro-613e8ad0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Satellite%20Cybersecurity%20Act%2C%20%2490K%20Chrome%20Flaw%2C%20Teen%20Hacker%20Arrested&amp;severity=medium&amp;id=69e2213282d89c981fe4aa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23777-cwe-200-exposure-of-sensitive-infor-cd82fbb5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23777%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2213882d89c981fe4b085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28263-cwe-79-improper-neutralization-of-i-1acafaea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28263%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2213882d89c981fe4b088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46606-cwe-307-improper-restriction-of-exc-307f50dc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46606%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2213882d89c981fe4b082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46605-cwe-384-session-fixation-in-dell-po-5b99807b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46605%3A%20CWE-384%3A%20Session%20Fixation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e21daf82d89c981fdb2544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46641-cwe-287-improper-authentication-in--c16ae6fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46641%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e21daf82d89c981fdb254a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46607-cwe-287-improper-authentication-in--00ff1038</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46607%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e21daf82d89c981fdb2547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35073-cwe-78-improper-neutralization-of-s-c1ee811f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35073%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e216a682d89c981fce5844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35074-cwe-78-improper-neutralization-of-s-c4f8a7e5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35074%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e216a682d89c981fce5847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35072-cwe-78-improper-neutralization-of-s-8793ed88</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35072%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e216a682d89c981fce5841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5131-cwe-918-server-side-request-forgery--eefe7b1a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5131%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Nomios%20Poland%20GREENmod&amp;severity=medium&amp;id=69e216a682d89c981fce584a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-draftkings-hacker-sentenced-to-prison-6dbd7bd3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20DraftKings%20Hacker%20Sentenced%20to%20Prison&amp;severity=medium&amp;id=69e20f9d82d89c981fc9fc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35153-cwe-88-improper-neutralization-of-a-7210f906</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35153%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e20fa682d89c981fca00e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6483-os-command-injection-in-wavlink-wl-w-2cff4fef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6483%3A%20OS%20Command%20Injection%20in%20Wavlink%20WL-WN530H4&amp;severity=high&amp;id=69e20fa682d89c981fca00eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lawmakers-gathered-quietly-to-talk-about-ai-angst--ccf87bec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lawmakers%20Gathered%20Quietly%20to%20Talk%20About%20AI.%20Angst%20and%20Fears%20of%20%E2%80%98Destruction%E2%80%99%20Followed&amp;severity=low&amp;id=69e2089582d89c981fc3e568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-apache-activemq-vulnerability-exploited-in--98176e07</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Apache%20ActiveMQ%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=69e2051182d89c981fbef2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/direct-sys-loader-and-cgrabber-stealer-five-stage--50867bbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Direct-Sys%20Loader%20and%20CGrabber%20Stealer%20Five-Stage%20Malware%20Chain&amp;severity=medium&amp;id=69e20c1982d89c981fc7230c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-north-korean-it-worker-scheme-facilitators-jai-6bb45449</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20North%20Korean%20IT%20Worker%20Scheme%20Facilitators%20Jailed%20in%20the%20US&amp;severity=medium&amp;id=69e1fe0982d89c981fb5bea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23779-cwe-77-improper-neutralization-of-s-9bc42051</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23779%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2142082d89c981fcd7c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23776-cwe-295-improper-certificate-valida-1a2a1c1a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23776%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e2142082d89c981fcd7c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15625-cwe-89-improper-neutralization-of-s-bf191582</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15625%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Pro%20Cloud%20Server&amp;severity=critical&amp;id=69e1f70182d89c981fb0d48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15624-cwe-256-plaintext-storage-of-a-pass-907ae5f0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15624%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Pro%20Cloud%20Server&amp;severity=critical&amp;id=69e1f70182d89c981fb0d48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-macos-intrusion-from-lure-to-compromise-3c857763</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20macOS%20intrusion%20from%20lure%20to%20compromise&amp;severity=medium&amp;id=69e20c1982d89c981fc722f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15623-cwe-359-exposure-of-private-persona-24f01d16</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15623%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Pro%20Cloud%20Server&amp;severity=critical&amp;id=69e1f70182d89c981fb0d489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/takes-aim-at-the-ransomware-throne-f043d8a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Takes%20Aim%20at%20the%20Ransomware%20Throne&amp;severity=medium&amp;id=69e216a482d89c981fce57d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/joomla-seo-spam-injector-obfuscated-php-backdoor-h-3d3ff1e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Joomla%20SEO%20Spam%20Injector%3A%20Obfuscated%20PHP%20Backdoor%20Hijacking%20Site%20Visitors&amp;severity=medium&amp;id=69e20c1982d89c981fc722ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15622-cwe-522-insufficiently-protected-cr-996dbedb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15622%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Enterprise%20Architect&amp;severity=medium&amp;id=69e1f70182d89c981fb0d486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23778-cwe-77-improper-neutralization-of-s-56720612</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23778%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e1f70182d89c981fb0d498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zionsiphon-malware-targets-ics-in-water-facilities-233fe40a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZionSiphon%20Malware%20Targets%20ICS%20in%20Water%20Facilities&amp;severity=medium&amp;id=69e1eff982d89c981faac8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6439-cwe-79-improper-neutralization-of-in-d245a58b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jconti%20VideoZen&amp;severity=medium&amp;id=69e1f70182d89c981fb0d49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23775-cwe-532-insertion-of-sensitive-info-d2230f77</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23775%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20PowerProtect%20Data%20Domain%20appliances&amp;severity=high&amp;id=69e1f70182d89c981fb0d495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6494-improper-output-neutralization-for-l-4b481af2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6494%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=medium&amp;id=69e1f70182d89c981fb0d4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36568-cwe-522-insufficiently-protected-cr-2289d391</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36568%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Dell%20PowerProtect%20Data%20Domain%20BoostFS&amp;severity=high&amp;id=69e1f70182d89c981fb0d492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33392-cwe-1336-in-jetbrains-youtrack-3a31f8ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33392%3A%20CWE-1336%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=69e1ec7982d89c981fa85cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6451-cwe-352-cross-site-request-forgery-c-12074053</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6451%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tholstkabelbwde%20Plugin%3A%20CMS%20f%C3%BCr%20Motorrad%20Werkst%C3%A4tten&amp;severity=medium&amp;id=69e1ec7982d89c981fa85cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40002-cwe-269-improper-privilege-manageme-d0b7c01c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40002%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ZTE%20Red%20Magic%2011%20Pro%20(NX809J)&amp;severity=medium&amp;id=69e1ec7982d89c981fa85cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cursor-ai-vulnerability-exposed-developer-devices-fd612bab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cursor%20AI%20Vulnerability%20Exposed%20Developer%20Devices&amp;severity=medium&amp;id=69e1e1ea82d89c981fa15800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23853-cwe-1391-use-of-weak-credentials-in-0ee220b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23853%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e1e1f282d89c981fa18deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6441-cwe-862-missing-authorization-in-fli-d2f596ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6441%3A%20CWE-862%20Missing%20Authorization%20in%20flightbycanto%20Canto&amp;severity=medium&amp;id=69e1dae182d89c981f9ddccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4659-cwe-22-improper-limitation-of-a-path-b8b0c25b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4659%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=high&amp;id=69e1dae182d89c981f9ddcbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6443-cwe-506-embedded-malicious-code-in-e-b2b69859</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6443%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20essentialplugin%20Accordion%20and%20Accordion%20Slider&amp;severity=critical&amp;id=69e1dae182d89c981f9ddcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/53-ddos-domains-taken-down-by-law-enforcement-27effe64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=53%20DDoS%20Domains%20Taken%20Down%20by%20Law%20Enforcement&amp;severity=medium&amp;id=69e1d75d82d89c981f9c927a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6421-uncontrolled-search-path-in-mobatek--798d08a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6421%3A%20Uncontrolled%20Search%20Path%20in%20Mobatek%20MobaXterm%20Home%20Edition&amp;severity=high&amp;id=69e1d07582d89c981f98f522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5797-cwe-74-improper-neutralization-of-sp-6841ef43</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5797%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=69e1d07582d89c981f98f516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6482-cwe-829-inclusion-of-functionality-f-9df924df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6482%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20Rapid7%20Insight%20Agent&amp;severity=high&amp;id=69e1d07582d89c981f98f52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35496-improper-limitation-of-a-pathname-t-248f1cf1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35496%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20CubeCart%20Limited%20CubeCart&amp;severity=low&amp;id=69e1c5c782d89c981f8f173b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34018-improper-neutralization-of-special--6f9210ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34018%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20CubeCart%20Limited%20CubeCart&amp;severity=medium&amp;id=69e1c5c782d89c981f8f1737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21719-improper-neutralization-of-special--543f1327</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21719%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CubeCart%20Limited%20CubeCart&amp;severity=high&amp;id=69e1c5c782d89c981f8f1733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5502-cwe-862-missing-authorization-in-the-6f6eb17c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5502%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5427-cwe-862-missing-authorization-in-ext-b61f377a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5427%3A%20CWE-862%20Missing%20Authorization%20in%20extendthemes%20Kubio%20AI%20Page%20Builder&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5234-cwe-639-authorization-bypass-through-f0db2f8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5234%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6080-cwe-89-improper-neutralization-of-sp-ec35d5cc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6080%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3330-cwe-89-improper-neutralization-of-sp-fc732859</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3330%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4853-cwe-22-improper-limitation-of-a-path-b235121a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4853%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20backupguard%20JetBackup%20%E2%80%93%20Backup%2C%20Restore%20%26%20Migrate&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5807-cwe-770-allocation-of-resources-with-1203bc9f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5807%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=69e1b7b882d89c981f6ce769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4525-cwe-201-insertion-of-sensitive-infor-f43b0959</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4525%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=69e2142082d89c981fcd7c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5052-cwe-918-server-side-request-forgery--f41ab259</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5052%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=69e2142082d89c981fcd7c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3605-cwe-288-authentication-bypass-using--3597885d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3605%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=69e2142082d89c981fcd7c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4666-cwe-862-missing-authorization-in-tom-a89a54e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4666%3A%20CWE-862%20Missing%20Authorization%20in%20tomdever%20wpForo%20Forum&amp;severity=medium&amp;id=69e2142082d89c981fcd7c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-friday-april-17th-2026-httpsiscs-6ec453ea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Friday%2C%20April%2017th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9896%2C%20(Fri%2C%20Apr%2017th)&amp;severity=medium&amp;id=69e1948f82d89c981f187ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3488-cwe-862-missing-authorization-in-ver-4c95e6b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3488%3A%20CWE-862%20Missing%20Authorization%20in%20veronalabs%20WP%20Statistics%20%E2%80%93%20Simple%2C%20privacy-friendly%20Google%20Analytics%20alternative&amp;severity=medium&amp;id=69e2142082d89c981fcd7c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5231-cwe-79-improper-neutralization-of-in-a4f49703</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20WP%20Statistics%20%E2%80%93%20Simple%2C%20privacy-friendly%20Google%20Analytics%20alternative&amp;severity=high&amp;id=69e2142082d89c981fcd7c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4817-cwe-89-improper-neutralization-of-sp-15c87136</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4817%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=69e2142082d89c981fcd7c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5162-cwe-79-improper-neutralization-of-in-2911a812</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5162%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69e2142082d89c981fcd7c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-infection-with-sectop-rat-arechclien-841ddb7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20infection%20with%20Sectop%20RAT%20(ArechClient2)%2C%20(Fri%2C%20Apr%2017th)&amp;severity=medium&amp;id=69e228ca82d89c981fea5e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-18-8df3d9b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-18&amp;severity=medium&amp;id=69e3385abdfbbecc59045186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-17-13b60f86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-17&amp;severity=medium&amp;id=69e2cb5dbdfbbecc59a38896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37749-na-c4c6e5dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37749%3A%20n%2Fa&amp;severity=critical&amp;id=69e24cdfbdfbbecc5936e931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31317-na-298e2b28</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31317%3A%20n%2Fa&amp;severity=high&amp;id=69e2424ebdfbbecc592bf51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70795-na-3b058274</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70795%3A%20n%2Fa&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-17-3b7ad22d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-17&amp;severity=low&amp;id=69e189fb82d89c981f03051b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40265-cwe-862-missing-authorization-in-en-645b045f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40265%3A%20CWE-862%3A%20Missing%20Authorization%20in%20enchant97%20note-mark&amp;severity=medium&amp;id=69e1786e82d89c981fe335c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40263-cwe-208-observable-timing-discrepan-cfedb65e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40263%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20enchant97%20note-mark&amp;severity=low&amp;id=69e1786e82d89c981fe335c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40262-cwe-79-improper-neutralization-of-i-795a0901</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40262%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enchant97%20note-mark&amp;severity=high&amp;id=69e1786e82d89c981fe335c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22734-cwe-290-authentication-bypass-by-sp-5e7666ae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22734%3A%20CWE-290%20Authentication%20bypass%20by%20spoofing%20in%20Cloud%20Foundry%20UUA&amp;severity=high&amp;id=69e174eb82d89c981fe07a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40260-cwe-776-improper-restriction-of-rec-0042eef4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40260%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e1716682d89c981fde6ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40922-cwe-79-improper-neutralization-of-i-4ec62a5e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40922%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69e1716682d89c981fde6ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40322-cwe-79-improper-neutralization-of-i-7309fd84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40322%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69e2142282d89c981fcd7cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40318-cwe-24-path-traversal-filedir-in-si-705041eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40318%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69e2142282d89c981fcd7cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40259-cwe-285-improper-authorization-in-s-895cf1a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40259%3A%20CWE-285%3A%20Improper%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69e2142282d89c981fcd7ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58343-cwe-425-direct-request-forced-brows-9cba515d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58343%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Vision%20Helpdesk&amp;severity=medium&amp;id=69e166dc82d89c981fd8594b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40255-cwe-601-url-redirection-to-untruste-2655ea65</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40255%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20adonisjs%20http-server&amp;severity=medium&amp;id=69e166dc82d89c981fd8594f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41113-cwe-78-improper-neutralization-of-s-94bbf1c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41113%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sagredo%20qmail&amp;severity=high&amp;id=69e15fdc82d89c981fd52eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40308-cwe-639-authorization-bypass-throug-2a3d8569</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40308%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20joedolson%20my-calendar&amp;severity=high&amp;id=69e158cb82d89c981fcfb81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39313-cwe-770-allocation-of-resources-wit-d82a0598</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39313%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20QuantGeekDev%20mcp-framework&amp;severity=high&amp;id=69e1554682d89c981fce0d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35469-cwe-770-allocation-of-resources-wit-42aeeefc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35469%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20moby%20spdystream&amp;severity=high&amp;id=69e1554682d89c981fce0d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34164-cwe-532-insertion-of-sensitive-info-7422ab0f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34164%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20valtimo-platform%20valtimo&amp;severity=medium&amp;id=69e1554682d89c981fce0d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-compromised-dvrs-and-finding-the-90c96254</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Compromised%20DVRs%20and%20Finding%20Them%20in%20the%20Wild%2C%20(Thu%2C%20Apr%2016th)&amp;severity=medium&amp;id=69e026f282d89c981fac32b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54502-cwe-668-exposure-of-resource-to-wro-81812557</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54502%3A%20CWE-668%20%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=high&amp;id=69e135ad82d89c981fbaa760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54510-cwe-414-missing-lock-check-in-amd-a-02b6fcae</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54510%3A%20CWE-414%20%20Missing%20Lock%20Check%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=69e135ad82d89c981fbaa767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6442-improper-validation-of-syntactic-cor-5ef413e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6442%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Snowflake%20Cortex%20Code%20CLI&amp;severity=high&amp;id=69e135ad82d89c981fbaa76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43937-cwe-532-insertion-of-sensitive-info-e934c167</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43937%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69e12b2c82d89c981fb4018a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43935-cwe-404-improper-resource-shutdown--7a666ab7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43935%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69e12b2c82d89c981fb40187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43883-cwe-754-improper-check-for-unusual--f3e6c01f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43883%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69e1241082d89c981fafb50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41082-cwe-24-path-traversal-filedir-in-oc-bd86f374</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41082%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20OCaml%20opam&amp;severity=high&amp;id=69e1241082d89c981fafb517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27820-cwe-120-buffer-copy-without-checkin-64d72ec9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27820%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ruby%20zlib&amp;severity=low&amp;id=69e1241082d89c981fafb513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24749-cwe-863-incorrect-authorization-in--5b90cce9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24749%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20silverstripe%20silverstripe-assets&amp;severity=medium&amp;id=69e11d0782d89c981fabdc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2336-cwe-331-insufficient-entropy-in-micr-ec06bd07</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2336%3A%20CWE-331%20Insufficient%20entropy%20in%20Microchip%20IStaX&amp;severity=high&amp;id=69e11d0782d89c981fabdc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/government-cant-win-the-cyber-war-without-the-priv-64dfa608</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Government%20Can%E2%80%99t%20Win%20the%20Cyber%20War%20Without%20the%20Private%20Sector&amp;severity=medium&amp;id=69e2289d82d89c981fe9c065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41080-cwe-331-insufficient-entropy-in-lib-c31d4d69</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41080%3A%20CWE-331%20Insufficient%20Entropy%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=69e1160082d89c981fa7a67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36579-cwe-640-weak-password-recovery-mech-2b6472cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36579%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Dell%20Dell%20Pro%2014%20Essential%20PV14250&amp;severity=medium&amp;id=69e10ef782d89c981fa32a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5426-cwe-321-use-of-hard-coded-cryptograp-c04eb03f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5426%3A%20CWE-321%20Use%20of%20hard-coded%20cryptographic%20key%20in%20Digital%20Knowledge%20KnowledgeDeliver&amp;severity=high&amp;id=69e107ef82d89c981f9dd1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3324-cwe-288-authentication-bypass-using--8de21145</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3324%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20Zohocorp%20ManageEngine%20Log360&amp;severity=high&amp;id=69e0fd6982d89c981f97e31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6409-cwe-20-improper-input-validation-in--22b0fb12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6409%3A%20CWE-20%20Improper%20input%20validation%20in%20Protocol%20Buffers%20Protobuf-php%20(Pecl)&amp;severity=high&amp;id=69e0fd6982d89c981f97e325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-widens-access-to-cybersecurity-model-after--1f8de97c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Widens%20Access%20to%20Cybersecurity%20Model%20After%20Anthropic%E2%80%99s%20Mythos%20Reveal&amp;severity=low&amp;id=69e0f2d882d89c981f918a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2840-cwe-79-improper-neutralization-of-in-a5c9240c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2840%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onlineoptimisation%20Email%20Encoder%20%E2%80%93%20Protect%20Email%20Addresses%20and%20Phone%20Numbers&amp;severity=medium&amp;id=69e0f2f482d89c981f91994c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5785-cwe-89-improper-neutralization-of-sp-0f41a3b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5785%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Zohocorp%20ManageEngine%20PAM360&amp;severity=high&amp;id=69e0ebd382d89c981f8ceb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31987-cwe-532-insertion-of-sensitive-info-033f814f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31987%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e0ebd382d89c981f8ceb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4160-cwe-639-authorization-bypass-through-737667b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4160%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=69e0ebd382d89c981f8ceb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31843-cwe-284-improper-access-control-lea-f84d8bc9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31843%3A%20CWE-284%20Improper%20Access%20Control%20leading%20to%20unauthorized%20modification%20of%20executable%20application%20files%20in%20goodoneuz%20pay-uz&amp;severity=critical&amp;id=69e0e14482d89c981f87fef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-the-breach-inside-a-cargo-theft-actors-post-8348f717</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20the%20breach%3A%20inside%20a%20cargo%20theft%20actor&apos;s%20post-compromise%20playbook&amp;severity=medium&amp;id=69e0fd6282d89c981f97da61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-breach-at-tennessee-hospital-affects-337000-2215ef61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Breach%20at%20Tennessee%20Hospital%20Affects%20337%2C000&amp;severity=medium&amp;id=69e0da3c82d89c981f841d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15621-cwe-522-insufficiently-protected-cr-9776e2a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15621%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Enterprise%20Architect&amp;severity=medium&amp;id=69e0dabc82d89c981f8468d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/artemis-emerges-from-stealth-with-70-million-in-fu-27c08fc2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Artemis%20Emerges%20From%20Stealth%20With%20%2470%20Million%20in%20Funding&amp;severity=medium&amp;id=69e0d5b782d89c981f81d0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/splunk-enterprise-update-patches-code-execution-vu-33e172b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Splunk%20Enterprise%20Update%20Patches%20Code%20Execution%20Vulnerability&amp;severity=critical&amp;id=69e0cfb082d89c981f7e8c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-paid-out-23-million-at-zero-day-quest-20-e0e428a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Paid%20Out%20%242.3%20Million%20at%20Zero%20Day%20Quest%202026%20Hacking%20Contest&amp;severity=high&amp;id=69e0c8a882d89c981f7bc401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3155-cwe-862-missing-authorization-in-one-0aec828d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3155%3A%20CWE-862%20Missing%20Authorization%20in%20onesignal%20OneSignal%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=low&amp;id=69e0cc2b82d89c981f7cd61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3369-cwe-79-improper-neutralization-of-in-c1a5e10f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codesolz%20Better%20Find%20and%20Replace%20%E2%80%93%20AI-Powered%20Suggestions&amp;severity=medium&amp;id=69e0cc2b82d89c981f7cd620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3489-cwe-89-improper-neutralization-of-sp-65d3fe0f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3489%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20designinvento%20DirectoryPress%20%E2%80%93%20Business%20Directory%20And%20Classified%20Ad%20Listing&amp;severity=high&amp;id=69e0cc2b82d89c981f7cd625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nist-prioritizes-nvd-enrichment-for-cves-in-cisa-k-99bc1f23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NIST%20Prioritizes%20NVD%20Enrichment%20for%20CVEs%20in%20CISA%20KEV%2C%20Critical%20Software&amp;severity=critical&amp;id=69e0c1a082d89c981f784255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12624-cwe-613-insufficient-session-expira-f9b47282</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12624%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=69e0be2882d89c981f771dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-vulnerabilities-in-webex-is-37a04699</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20Vulnerabilities%20in%20Webex%2C%20ISE&amp;severity=critical&amp;id=69e0b71482d89c981f73ee5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6024-cwe-79-improper-neutralization-of-in-7fcbb74f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6024%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=69e0c29882d89c981f78d921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10242-cwe-79-improper-neutralization-of-i-2529889f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10242%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=69e0c29882d89c981f78d917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8010-cwe-611-improper-restriction-of-xml--bce8385c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8010%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=low&amp;id=69e0c29882d89c981f78d91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4867-cwe-79-improper-neutralization-of-in-2c045398</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4867%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=69e0c29882d89c981f78d91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-hits-automotive-data-expert-autovista-cfd6d3fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Hits%20Automotive%20Data%20Expert%20Autovista&amp;severity=medium&amp;id=69e0ac8882d89c981f7004c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39987-update-how-attackers-weaponized-mar-14d626d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39987%20update%3A%20How%20attackers%20weaponized%20marimo%20to%20deploy%20a%20blockchain%20botnet%20via%20HuggingFace&amp;severity=medium&amp;id=69e0be2682d89c981f771daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-code-gemini-cli-github-copilot-agents-vulne-9c48456f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Code%2C%20Gemini%20CLI%2C%20GitHub%20Copilot%20Agents%20Vulnerable%20to%20Prompt%20Injection%20via%20Comments&amp;severity=medium&amp;id=69e0a1fc82d89c981f6a5fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23772-cwe-269-improper-privilege-manageme-a3c398f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23772%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20Storage%20Manager&amp;severity=high&amp;id=69e0a58082d89c981f6c48ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2374-cwe-611-improper-restriction-of-xml--936e0b78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2374%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=high&amp;id=69e09e7782d89c981f68cc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0718-cwe-862-missing-authorization-in-wpx-3e9ed909</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0718%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20for%20News%2C%20Magazines%2C%20Blog%20Websites%20%E2%80%93%20PostX&amp;severity=medium&amp;id=69e093ed82d89c981f63c7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14868-cwe-22-improper-limitation-of-a-pat-9bfe3656</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14868%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20shahinurislam%20Career%20Section&amp;severity=high&amp;id=69e093ed82d89c981f63c7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41035-cwe-130-improper-handling-of-length-bf643584</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41035%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Samba%20rsync&amp;severity=high&amp;id=69e08ce482d89c981f5edf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3876-cwe-79-improper-neutralization-of-in-8cfb67a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Prismatic&amp;severity=high&amp;id=69e08ce482d89c981f5edf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3355-cwe-79-improper-neutralization-of-in-af9beb0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=69e08ce482d89c981f5edf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13364-cwe-79-improper-neutralization-of-i-fce87c81</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=medium&amp;id=69e08ce482d89c981f5edf06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3875-cwe-79-improper-neutralization-of-in-5cd448ae</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20%20Knowledge%20Base%20Docs%20%26%20FAQ%20Solution%20for%20Elementor%20%26%20Block%20Editor&amp;severity=medium&amp;id=69e08ce482d89c981f5edf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3995-cwe-79-improper-neutralization-of-in-936a3d6f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3995%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20faridsaniee%20OPEN-BRAIN&amp;severity=medium&amp;id=69e08ce482d89c981f5edf28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1572-cwe-79-improper-neutralization-of-in-ca6fef49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1572%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20by%20Elementor&amp;severity=medium&amp;id=69e08ce482d89c981f5edf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1620-cwe-98-improper-control-of-filename--b5a6957f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1620%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20livemesh%20Livemesh%20Addons%20by%20Elementor&amp;severity=high&amp;id=69e08ce482d89c981f5edf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41034-cwe-125-out-of-bounds-read-in-ascen-1f86e56a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41034%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Ascensio%20ONLYOFFICE%20DocumentServer&amp;severity=medium&amp;id=69e0825782d89c981f59691a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3861-na-in-line-corporation-line-client-f-6f37bce9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3861%3A%20CWE-400%20in%20LY%20Corporation%20LINE%20client%20for%20iOS&amp;severity=high&amp;id=69e0825782d89c981f596914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41030-cwe-669-incorrect-resource-transfer-c35faeb6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41030%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Ascensio%20ONLYOFFICE%20DesktopEditors&amp;severity=medium&amp;id=69e0825782d89c981f596917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3581-cwe-862-missing-authorization-in-ian-14ed62cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3581%3A%20CWE-862%20Missing%20Authorization%20in%20iandunn%20Basic%20Google%20Maps%20Placemarks&amp;severity=medium&amp;id=69e077cc82d89c981f4f924c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3773-cwe-89-improper-neutralization-of-sp-7b7b79ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3773%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20onlineada%20Accessibility%20Suite%20by%20Ability%2C%20Inc&amp;severity=medium&amp;id=69e077cc82d89c981f4f9278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3614-cwe-862-missing-authorization-in-acy-936592c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3614%3A%20CWE-862%20Missing%20Authorization%20in%20acyba%20AcyMailing%20%E2%80%93%20An%20Ultimate%20Newsletter%20Plugin%20and%20Marketing%20Automation%20Solution%20for%20WordPress&amp;severity=high&amp;id=69e077cc82d89c981f4f926f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3599-cwe-89-improper-neutralization-of-sp-80174081</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3599%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=high&amp;id=69e077cc82d89c981f4f9266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5050-cwe-347-improper-verification-of-cry-f44f9812</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5050%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20jconti%20Payment%20Gateway%20for%20Redsys%20%26%20WooCommerce%20Lite&amp;severity=high&amp;id=69e077cf82d89c981f4f92a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3551-cwe-79-improper-neutralization-of-in-6127ed29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rafasashi%20Custom%20New%20User%20Notification&amp;severity=medium&amp;id=69e077cc82d89c981f4f9239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3595-cwe-862-missing-authorization-in-imp-ae1beb14</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3595%3A%20CWE-862%20Missing%20Authorization%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=medium&amp;id=69e077cc82d89c981f4f9250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3596-cwe-862-missing-authorization-in-imp-80944579</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3596%3A%20CWE-862%20Missing%20Authorization%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=critical&amp;id=69e077cc82d89c981f4f9259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22619-vulnerability-in-eaton-ipp-software-16180eb8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22619%3A%20Vulnerability%20in%20Eaton%20IPP%20software&amp;severity=high&amp;id=69e077cc82d89c981f4f9236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22618-cwe-358-improperly-implemented-secu-cf580bd1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22618%3A%20CWE-358%20Improperly%20implemented%20security%20check%20for%20standard%20in%20Eaton%20IPP%20software&amp;severity=medium&amp;id=69e077cc82d89c981f4f9233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22617-cwe-614-sensitive-cookie-in-https-s-c480a253</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22617%3A%20CWE-614%20Sensitive%20cookie%20in%20HTTPS%20session%20without%20&apos;secure&apos;%20attribute%20in%20Eaton%20IPP%20Software&amp;severity=medium&amp;id=69e077cc82d89c981f4f9230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22616-cwe-307-improper-restriction-of-exc-cae52f06</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22616%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20Eaton%20IPP%20Software&amp;severity=medium&amp;id=69e06d5282d89c981f32f34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22615-cwe-20-improper-input-validation-in-d8d9bd6d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22615%3A%20CWE-20%20Improper%20input%20validation%20in%20Eaton%20IPP%20Software&amp;severity=medium&amp;id=69e06d5282d89c981f32f34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40118-incorrectly-specified-destination-i-7da8b7a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40118%3A%20Incorrectly%20specified%20destination%20in%20a%20communication%20channel%20in%20Arcserve%20UDP%20Console&amp;severity=medium&amp;id=69e06d5282d89c981f32f352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5070-cwe-79-improper-neutralization-of-in-86851c8e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5070%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siteorigin%20Vantage&amp;severity=medium&amp;id=69e05f2f82d89c981f1f01cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3878-cwe-79-improper-neutralization-of-in-fb75070d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20WP%20Docs&amp;severity=medium&amp;id=69e05f2f82d89c981f1f01c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4032-cwe-79-improper-neutralization-of-in-838a1846</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kpumuk%20CodeColorer&amp;severity=medium&amp;id=69e05f2f82d89c981f1f01c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6351-cwe-93-improper-neutralization-of-cr-9661b33d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6351%3A%20CWE-93%20Improper%20neutralization%20of%20CRLF%20sequences%20(&apos;CRLF%20injection&apos;)%20in%20Openfind%20MailGates&amp;severity=high&amp;id=69e04d9c82d89c981f080c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41015-cwe-78-improper-neutralization-of-s-9268043e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41015%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radare%20radare2&amp;severity=high&amp;id=69e04d9c82d89c981f080c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6350-cwe-121-stack-based-buffer-overflow--d51a62db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6350%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20Openfind%20MailGates&amp;severity=critical&amp;id=69e04d9c82d89c981f080c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3885-cwe-79-improper-neutralization-of-in-e174da38</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69e04d9c82d89c981f080c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6349-cwe-78-improper-neutralization-of-sp-76bba57a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6349%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20HGiga%20iSherlock-base-4.5&amp;severity=critical&amp;id=69e04d9c82d89c981f080c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3428-cwe-494-download-of-code-without-int-26258474</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3428%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ASUS%20Member%20Center(%E5%8D%8E%E7%A1%95%E5%A4%A7%E5%8E%85)&amp;severity=medium&amp;id=69e04d9c82d89c981f080c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1880-cwe-367-time-of-check-time-of-use-to-1419a365</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1880%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20ASUS%20DriverHub&amp;severity=medium&amp;id=69e04d9c82d89c981f080c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-16th-2026-httpsis-4e785520</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%2016th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9894%2C%20(Thu%2C%20Apr%2016th)&amp;severity=medium&amp;id=69e0431082d89c981f00a466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6348-cwe-306-missing-authentication-for-c-2cb15b3d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6348%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Simopro%20Technology%20WinMatrix&amp;severity=critical&amp;id=69e04d9c82d89c981f080c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3299-cwe-79-improper-neutralization-of-in-00f10b35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3299%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20futtta%20WP%20YouTube%20Lyte&amp;severity=medium&amp;id=69e03f8c82d89c981fff3a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40505-cwe-150-improper-neutralization-of--b7f1cec7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40505%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Artifex%20Software%20Inc.%20MuPDF&amp;severity=medium&amp;id=69e03f8c82d89c981fff3a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40504-cwe-122-heap-based-buffer-overflow--7b35deb9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40504%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20marcobambini%20gravity&amp;severity=critical&amp;id=69e03f8c82d89c981fff3a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40502-cwe-862-missing-authorization-in-hk-1a5016b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40502%3A%20CWE-862%20Missing%20Authorization%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e0388582d89c981fe55b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40503-cwe-22-improper-limitation-of-a-pat-3b442db8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40503%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e0388582d89c981fe55b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-17-acac79e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-17&amp;severity=medium&amp;id=69e21a1f82d89c981fcfb12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-16-957528d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-16&amp;severity=medium&amp;id=69e17bea82d89c981fe59751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37100-na-83e19342</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37100%3A%20n%2Fa&amp;severity=medium&amp;id=69e107ef82d89c981f9dd1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37347-na-0e02ab98</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37347%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6982d89c981f97e31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37346-na-f05890a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37346%3A%20n%2Fa&amp;severity=medium&amp;id=69e0fd6982d89c981f97e318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37345-na-9f6b0dc7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37345%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6982d89c981f97e313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37344-na-260a4c1a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37344%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37343-na-f53e37eb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37343%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37342-na-2ee2645c</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37342%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37341-na-f0dfe489</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37341%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37340-na-a90f9964</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37340%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6682d89c981f97e29e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37339-na-e993110f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37339%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6682d89c981f97e29b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37338-na-4930560d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37338%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6682d89c981f97e298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37337-na-30fec7c9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37337%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37336-na-8799e560</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37336%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30656-na-0ee1621e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30656%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30459-na-928f9818</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30459%3A%20n%2Fa&amp;severity=high&amp;id=69e0f2f482d89c981f919951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-16-211f6192</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-16&amp;severity=low&amp;id=69e06d3782d89c981f3256c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5363-cwe-326-inadequate-encryption-streng-e67227b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5363%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20TP-Link%20Systems%20Inc.%20Archer%20C7%20v5%20and%20v5.8&amp;severity=medium&amp;id=69e0271282d89c981fac389c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4880-cwe-269-improper-privilege-managemen-a28ccef6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4880%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ukrsolution%20Barcode%20Scanner%20(%2BMobile%20App)%20%E2%80%93%20Inventory%20manager%2C%20Order%20fulfillment%20system%2C%20POS%20(Point%20of%20Sale)&amp;severity=critical&amp;id=69e01ffb82d89c981fa83038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40193-cwe-90-improper-neutralization-of-s-daa16910</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40193%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20foxcpp%20maddy&amp;severity=high&amp;id=69e01ffb82d89c981fa83030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40947-cwe-426-untrusted-search-path-in-yu-5b9a0d86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40947%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Yubico%20libfido2&amp;severity=low&amp;id=69e01ffb82d89c981fa83035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40192-cwe-770-allocation-of-resources-wit-c6717f27</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40192%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20python-pillow%20Pillow&amp;severity=high&amp;id=69e01c6582d89c981fa691af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40316-cwe-94-improper-control-of-generati-262d4fe9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40316%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OWASP-BLT%20BLT&amp;severity=high&amp;id=69e018e182d89c981fa55552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4949-cwe-862-missing-authorization-in-pro-c72eecd1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4949%3A%20CWE-862%20Missing%20Authorization%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=69e0c29882d89c981f78d924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6388-insufficient-granularity-of-access-c-fbeba818</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6388%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20GitOps&amp;severity=critical&amp;id=69e00aeb82d89c981f9f944b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1711-cwe-79-improper-neutralization-of-in-a6f1d39f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1711%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69e0074d82d89c981f9e1a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1564-cwe-80-improper-neutralization-of-sc-141c02ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1564%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script%20Related%20HTML%20Tags%20in%20a%20Web%20Page%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69e0074d82d89c981f9e1a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22676-cwe-732-incorrect-permission-assign-a3f7b3d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22676%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Barracuda%20Networks%20RMM&amp;severity=high&amp;id=69dffcc482d89c981f9a5a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40173-cwe-200-exposure-of-sensitive-infor-65dfad21</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40173%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69dffcc482d89c981f9a5a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40186-cwe-79-improper-neutralization-of-i-da6eb63e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40186%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dff5b982d89c981f9734d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39857-cwe-200-exposure-of-sensitive-infor-77d7fde2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39857%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dfeeb382d89c981f942281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35569-cwe-79-improper-neutralization-of-i-cf7e3ec0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35569%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apostrophecms%20apostrophe&amp;severity=high&amp;id=69dfeeb382d89c981f94227d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33889-cwe-79-improper-neutralization-of-i-6ee4b412</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33889%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dfeeb382d89c981f942279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33888-cwe-863-incorrect-authorization-in--35d4ea2d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33888%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dfeeb382d89c981f942274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21726-vulnerability-in-grafana-loki-8cebd2e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21726%3A%20Vulnerability%20in%20Grafana%20Loki&amp;severity=medium&amp;id=69dfeeb382d89c981f942271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6385-integer-overflow-or-wraparound-in-re-80c34cf6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6385%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Lightspeed%20Core&amp;severity=medium&amp;id=69dfe7c182d89c981f913eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41118-vulnerability-in-grafana-pyroscope-a9a6cd4c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41118%3A%20Vulnerability%20in%20Grafana%20Pyroscope&amp;severity=critical&amp;id=69dfe7b682d89c981f913c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33877-cwe-208-observable-timing-discrepan-455d361c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33877%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20apostrophecms%20apostrophe&amp;severity=low&amp;id=69dfe7b682d89c981f913c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6384-buffer-copy-without-checking-size-of-180df722</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6384%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=69dfe7be82d89c981f913e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6364-out-of-bounds-read-in-google-chrome-ee9b22e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6364%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=69dfe7be82d89c981f913e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6319-use-after-free-in-google-chrome-70128cb4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6319%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6318-use-after-free-in-google-chrome-647ef04f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6318%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6363-type-confusion-in-google-chrome-778cc2b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6363%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6317-use-after-free-in-google-chrome-6551e6e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6317%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6362-use-after-free-in-google-chrome-418d3b95</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6362%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=69dfe7be82d89c981f913e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6361-heap-buffer-overflow-in-google-chrom-ed6c176c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6361%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6316-use-after-free-in-google-chrome-cc03a7ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6316%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6315-use-after-free-in-google-chrome-50d74272</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6315%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6314-out-of-bounds-write-in-google-chrome-2215667b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6314%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6313-insufficient-policy-enforcement-in-g-06ed9486</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6313%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=low&amp;id=69dfe7bc82d89c981f913de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6312-insufficient-policy-enforcement-in-g-6255dea0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6312%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=low&amp;id=69dfe7bc82d89c981f913de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6311-uninitialized-use-in-google-chrome-2d3a856f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6311%3A%20Uninitialized%20Use%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6310-use-after-free-in-google-chrome-484f6da9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6310%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6360-use-after-free-in-google-chrome-d3ebcedf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6360%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6309-use-after-free-in-google-chrome-d73ce66a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6309%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6308-out-of-bounds-read-in-google-chrome-168f3bc3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6308%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6307-type-confusion-in-google-chrome-57982440</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6307%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6306-heap-buffer-overflow-in-google-chrom-06f9de62</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6306%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6305-heap-buffer-overflow-in-google-chrom-df697c78</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6305%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6304-use-after-free-in-google-chrome-2d9bad9b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6304%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6303-use-after-free-in-google-chrome-c3150b44</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6303%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6302-use-after-free-in-google-chrome-df0b9544</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6302%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6301-type-confusion-in-google-chrome-6e9014de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6301%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6300-use-after-free-in-google-chrome-d818b9fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6300%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6359-use-after-free-in-google-chrome-b470779c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6359%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6358-use-after-free-in-google-chrome-d445e92b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6358%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6299-use-after-free-in-google-chrome-b43675e1</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6299%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6298-heap-buffer-overflow-in-google-chrom-4814b240</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6298%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69dfe7b982d89c981f913cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6297-use-after-free-in-google-chrome-aec32456</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6297%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b682d89c981f913c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6296-heap-buffer-overflow-in-google-chrom-7fb66fda</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6296%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=critical&amp;id=69dfe7b682d89c981f913c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40919-out-of-bounds-write-in-red-hat-red--99c9240b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40919%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40918-incorrect-calculation-of-buffer-siz-7e419a48</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40918%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40917-out-of-bounds-read-in-red-hat-red-h-b32d4ab9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40917%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40916-out-of-bounds-write-in-red-hat-red--f6a28f76</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40916%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40915-integer-overflow-or-wraparound-in-r-da9bffb8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40915%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21727-vulnerability-in-grafana-grafana-co-e8f95c9c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21727%3A%20Vulnerability%20in%20Grafana%20Grafana%20Correlations&amp;severity=low&amp;id=69dfe7b682d89c981f913c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5189-cwe-798-use-of-hard-coded-credential-1496b711</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5189%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Sonatype%20Nexus%20Repository&amp;severity=critical&amp;id=69dfe0a382d89c981f8dffa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33667-cwe-307-improper-restriction-of-exc-7202229d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33667%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20opf%20openproject&amp;severity=high&amp;id=69dfe0a382d89c981f8dff94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40256-cwe-22-improper-limitation-of-a-pat-021af117</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40256%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfe0a382d89c981f8dff9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34632-cwe-427-uncontrolled-search-path-el-f84269c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34632%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Adobe%20Adobe%20Photoshop%20Installer&amp;severity=high&amp;id=69dfe0a382d89c981f8dff97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6245-buffer-access-with-incorrect-length--3f4db62e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6245%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69dfe0a382d89c981f8dffa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39845-cwe-918-server-side-request-forgery-d91487e0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39845%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfe0a382d89c981f8dff9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34393-cwe-269-improper-privilege-manageme-05526187</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34393%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69dfd9a582d89c981f8a79e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34244-cwe-200-exposure-of-sensitive-infor-a0c0c367</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34244%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6383-incorrect-authorization-in-red-hat-r-194df434</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6383%3A%20Incorrect%20Authorization%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Virtualization%204&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34242-cwe-22-improper-limitation-of-a-pat-6f9f4f5e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34242%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69dfd9a582d89c981f8a79df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33440-cwe-918-server-side-request-forgery-7310feef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33440%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33435-cwe-23-relative-path-traversal-in-w-8a812be9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33435%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69dfd9a582d89c981f8a79d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4857-cwe-863-incorrect-authorization-in-s-b29d7e7e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4857%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SailPoint%20Technologies%20IdentityIQ&amp;severity=high&amp;id=69dfd9a582d89c981f8a79eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33220-cwe-22-improper-limitation-of-a-pat-206cb2f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33220%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33214-cwe-862-missing-authorization-in-we-09b74691</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33214%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd29182d89c981f86fbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33212-cwe-284-improper-access-control-in--d4da3688</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33212%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=69dfd29182d89c981f86fbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spotting-cyberthreats-a-guide-for-blind-and-low-vi-a2afe435</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spotting%20cyberthreats%3A%20a%20guide%20for%20blind%20and%20low-vision%20users%20%7C%20Kaspersky%20official%20blog&amp;severity=low&amp;id=69dfcf2182d89c981f8542bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6290-cwe-863-in-rapid7-velociraptor-16ce8299</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6290%3A%20CWE-863%20in%20Rapid7%20Velociraptor&amp;severity=high&amp;id=69dfcf1982d89c981f85412e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32631-cwe-200-exposure-of-sensitive-infor-535ad14c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32631%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20git-for-windows%20git&amp;severity=high&amp;id=69dfcf1982d89c981f854123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5758-cwe-200-exposure-of-sensitive-inform-05642342</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5758%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Mafintosh%20Protocol-buffers-schema%20parser&amp;severity=medium&amp;id=69dfcf1982d89c981f85412a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-crypto-wallet-takeover-unlimited-usdt-appro-80de48d7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Crypto%20Wallet%20Takeover%20Unlimited%20USDT%20Approval%20Exploitation%20via%20Trust%20Wallet%20QR%20Code%20Phishing&amp;severity=medium&amp;id=69dfcba782d89c981f83460d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-youtube-copyright-notices-can-steal-your-goog-4259ffad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20YouTube%20copyright%20notices%20can%20steal%20your%20Google%20login&amp;severity=medium&amp;id=69dfc80282d89c981f7dd9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sweden-blames-pro-russian-group-for-cyberattack-la-83236afa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sweden%20Blames%20Pro-Russian%20Group%20for%20Cyberattack%20Last%20Year%20on%20Its%20Energy%20Infrastructure&amp;severity=medium&amp;id=69dfc0fc82d89c981f74ea7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15610-cwe-502-deserialization-of-untruste-8e29d51c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15610%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20OpenText%2C%20Inc%20RightFax&amp;severity=critical&amp;id=69dfc10382d89c981f750b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63029-cwe-89-improper-neutralization-of-s-00805d70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63029%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WC%20Lovers%20WCFM%20Marketplace&amp;severity=high&amp;id=69dfc10382d89c981f750b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6372-cwe-862-missing-authorization-in-pli-a5a0a62f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6372%3A%20CWE-862%20Missing%20Authorization%20in%20Plisio%20Accept%20Cryptocurrencies%20with%20Plisio&amp;severity=high&amp;id=69dfc10382d89c981f750b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-fake-proton-vpn-sites-to-gaming-mods-this-win-37383ac0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20fake%20Proton%20VPN%20sites%20to%20gaming%20mods%2C%20this%20Windows%20infostealer%20is%20everywhere&amp;severity=medium&amp;id=69dfcba782d89c981f834603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20136-improper-encoding-or-escaping-of-ou-f5759eaa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20136%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20059-improper-neutralization-of-input-du-294c602d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20061-improper-neutralization-of-special--d2f61c7d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20061%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20060-url-redirection-to-untrusted-site-o-28f4102f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20060%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20170-improper-neutralization-of-script-r-0491a1ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20170%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Webex%20Contact%20Center&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20184-improper-certificate-validation-in--c47eb2ce</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20184%3A%20Improper%20Certificate%20Validation%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=critical&amp;id=69dfb9f882d89c981f6ee6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20180-improper-limitation-of-a-pathname-t-7c0f2b38</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20180%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69dfb9f882d89c981f6ee6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20152-authentication-bypass-by-primary-we-7ab53c44</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20152%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Cisco%20Cisco%20Secure%20Web%20Appliance&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20161-improper-link-resolution-before-fil-285f4f28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20161%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Cisco%20Cisco%20ThousandEyes%20Enterprise%20Agent&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20186-improper-neutralization-of-special--fe838f1c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20186%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69dfb9f882d89c981f6ee6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20148-improper-limitation-of-a-pathname-t-77613593</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20148%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20147-improper-neutralization-of-special--69d7d44e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20147%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69dfb9f682d89c981f6ee687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20081-relative-path-traversal-in-cisco-ci-ca9c26bb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20081%3A%20Relative%20Path%20Traversal%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20078-relative-path-traversal-in-cisco-ci-32eb30c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20078%3A%20Relative%20Path%20Traversal%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20132-improper-neutralization-of-input-du-851bc956</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20132%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6370-cwe-79-improper-neutralization-of-in-d5a504fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6370%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HashThemes%20Mini%20Ajax%20Cart%20for%20WooCommerce&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15636-cwe-79-improper-neutralization-of-i-88c38273</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20YouTube%20Showcase&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15635-cwe-352-cross-site-request-forgery--3a3da392</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15635%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZAYTECH%20Smart%20Online%20Order%20for%20Clover&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53444-cwe-352-cross-site-request-forgery--55989ef9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53444%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DeluxeThemes%20Userpro&amp;severity=medium&amp;id=69dfb67782d89c981f6a459c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5387-cwe-862-in-aveva-pipeline-simulation-929b8708</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5387%3A%20CWE-862%20in%20AVEVA%20Pipeline%20Simulation%202025&amp;severity=critical&amp;id=69dfb67782d89c981f6a45a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20205-information-written-to-log-files-ca-c01d3c95</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20205%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20MCP%20Server&amp;severity=high&amp;id=69dfaf6882d89c981f612b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20203-the-software-does-not-restrict-or-i-356224a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20203%3A%20The%20software%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69dfaf6882d89c981f612b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20204-creating-and-using-insecure-tempora-f5cdc3ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20204%3A%20Creating%20and%20using%20insecure%20temporary%20files%20can%20leave%20application%20and%20system%20data%20vulnerable%20to%20attack.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69dfaf6882d89c981f612b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20202-the-software-does-not-properly-hand-a86b1619</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20202%3A%20The%20software%20does%20not%20properly%20handle%20when%20an%20input%20contains%20Unicode%20encoding.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69dfaf6882d89c981f612b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-n8n-n8mare-how-threat-actors-are-misusing-ai-w-78030375</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20n8n%20n8mare%3A%20How%20threat%20actors%20are%20misusing%20AI%20workflow%20automation&amp;severity=medium&amp;id=69dfcba782d89c981f8345f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ransomware-targets-turkey-via-adwind-rat-840bf63c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ransomware%20targets%20Turkey%20via%20Adwind%20RAT&amp;severity=medium&amp;id=69dfb66f82d89c981f6a420e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12141-cwe-200-information-disclosure-in-g-8996e2d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12141%3A%20CWE-200%3A%20Information%20Disclosure%20in%20Grafana%20Grafana%20Alerting&amp;severity=low&amp;id=69dfaf6882d89c981f612b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-mac-stealer-targeting-10k-crypto-wallets-2027ccd4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20Mac%20stealer%20targeting%20%2410K%2B%20crypto%20wallets&amp;severity=medium&amp;id=69dfb2ea82d89c981f6662d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-vulnerability-exposes-nginx-servers-to-h-33c1d10c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20Vulnerability%20Exposes%20Nginx%20Servers%20to%20Hacking&amp;severity=critical&amp;id=69dfa4dc82d89c981f4d965c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4682-cwe-121-stack-based-buffer-overflow--e9f0af64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4682%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20HP%20Inc%20HP%20DeskJet%202800e%20All-in-One%20Printer%20series&amp;severity=high&amp;id=69dfa86082d89c981f539bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4667-cwe-250-execution-with-unnecessary-p-749e3fc7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4667%3A%20CWE-250%20Execution%20with%20unnecessary%20privileges%20in%20HP%20Inc.%20OMEN%20Gaming%20Hub&amp;severity=high&amp;id=69dfa86082d89c981f539bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/capsule-security-emerges-from-stealth-with-7-milli-2250a1fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Capsule%20Security%20Emerges%20From%20Stealth%20With%20%247%20Million%20in%20Funding&amp;severity=medium&amp;id=69df9a5082d89c981f38985c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/by-design-flaw-in-mcp-could-enable-widespread-ai-s-5fc67ebf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98By%20Design%E2%80%99%20Flaw%20in%20MCP%20Could%20Enable%20Widespread%20AI%20Supply%20Chain%20Attacks&amp;severity=low&amp;id=69df96cc82d89c981f30469f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/100-chrome-extensions-steal-user-data-create-backd-7c4e8817</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=100%20Chrome%20Extensions%20Steal%20User%20Data%2C%20Create%20Backdoor&amp;severity=medium&amp;id=69df934882d89c981f291bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ciso-conversations-ross-mckerchar-ciso-at-sophos-d4cf0ac2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISO%20Conversations%3A%20Ross%20McKerchar%2C%20CISO%20at%20Sophos&amp;severity=medium&amp;id=69dfb6c182d89c981f6adf90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25219-cwe-200-exposure-of-sensitive-infor-fd73ca6d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25219%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69df88bc82d89c981f17bd58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4145-cwe-88-improper-neutralization-of-ar-2139207c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4145%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Software%20Fix&amp;severity=high&amp;id=69df88bc82d89c981f17bd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4135-cwe-59-improper-link-resolution-befo-04d17efd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4135%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Lenovo%20Software%20Fix&amp;severity=medium&amp;id=69df88bc82d89c981f17bd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4134-cwe-427-uncontrolled-search-path-ele-29084f0b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4134%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20Software%20Fix&amp;severity=high&amp;id=69df88bc82d89c981f17bd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1636-cwe-427-uncontrolled-search-path-ele-54c44a16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1636%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20Service%20Bridge&amp;severity=medium&amp;id=69df88bc82d89c981f17bd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0827-cwe-59-improper-link-resolution-befo-2f40ea17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0827%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Lenovo%20Diagnostics&amp;severity=medium&amp;id=69df88bc82d89c981f17bd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mirax-rat-targeting-android-users-in-europe-af1aa70b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mirax%20RAT%20Targeting%20Android%20Users%20in%20Europe&amp;severity=medium&amp;id=69df81b482d89c981f0e2b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-vulnerabilities-patched-in-ivanti-neurons-for--9bbfd3ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Vulnerabilities%20Patched%20in%20Ivanti%20Neurons%20for%20ITSM&amp;severity=low&amp;id=69df7aac82d89c981ffeb537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1852-cwe-352-cross-site-request-forgery-c-da2bdb61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1852%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20woobeewoo%20Product%20Pricing%20Table%20by%20WooBeWoo&amp;severity=medium&amp;id=69df7ad282d89c981fff5f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-domain-could-have-handed-hackers-25k-endpoints--8d5021f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2410%20Domain%20Could%20Have%20Handed%20Hackers%2025k%20Endpoints%2C%20Including%20in%20OT%20and%20Gov%20Networks&amp;severity=medium&amp;id=69df702082d89c981feb85ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30778-cwe-202-exposure-of-sensitive-infor-b8fdce1f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30778%3A%20CWE-202%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20Apache%20Software%20Foundation%20Apache%20SkyWalking&amp;severity=high&amp;id=69df703082d89c981fec17be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trump-urges-extending-foreign-surveillance-program-b2cdc3b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trump%20Urges%20Extending%20Foreign%20Surveillance%20Program%20as%20Some%20Lawmakers%20Push%20for%20US%20Privacy%20Protections&amp;severity=medium&amp;id=69df691882d89c981fdff00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40786-missing-authorization-in-long-watch-21ffcda2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40786%3A%20Missing%20Authorization%20in%20Long%20Watch%20Studio%20MyRewards&amp;severity=medium&amp;id=69df6ca082d89c981fe573b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40784-authorization-bypass-through-user-c-0d8e9d5d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40784%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mahmudul%20Hasan%20Arif%20FluentBoards&amp;severity=high&amp;id=69df6ca082d89c981fe573b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40764-cross-site-request-forgery-csrf-in--fe9b06a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40764%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=high&amp;id=69df6c9d82d89c981fe572fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40763-missing-authorization-in-wp-royal-r-ec477ac2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40763%3A%20Missing%20Authorization%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=medium&amp;id=69df6c9d82d89c981fe572f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40745-improper-neutralization-of-special--dc1439ea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40745%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons&amp;severity=high&amp;id=69df6c9d82d89c981fe572f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40742-missing-authorization-in-nelio-soft-356877bd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40742%3A%20Missing%20Authorization%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=medium&amp;id=69df6c9d82d89c981fe572f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40740-missing-authorization-in-themeum-tu-ca37fc88</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40740%3A%20Missing%20Authorization%20in%20Themeum%20Tutor%20LMS&amp;severity=medium&amp;id=69df6c9d82d89c981fe572f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40737-authorization-bypass-through-user-c-1c7de437</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40737%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20VillaTheme%20COMPE&amp;severity=medium&amp;id=69df6c9d82d89c981fe572ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40734-improper-neutralization-of-input-du-5fd327d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zahlan%20Categories%20Images&amp;severity=medium&amp;id=69df6c9d82d89c981fe572ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40730-missing-authorization-in-themegrill-046aebce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40730%3A%20Missing%20Authorization%20in%20ThemeGrill%20ThemeGrill%20Demo%20Importer&amp;severity=medium&amp;id=69df6c9d82d89c981fe572e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40729-missing-authorization-in-bplugins-3-72f54865</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40729%3A%20Missing%20Authorization%20in%20bPlugins%203D%20viewer%20%E2%80%93%20Embed%203D%20Models&amp;severity=medium&amp;id=69df6c9d82d89c981fe572e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40728-missing-authorization-in-blockart-m-cc1c2b87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40728%3A%20Missing%20Authorization%20in%20BlockArt%20Magazine%20Blocks&amp;severity=medium&amp;id=69df6c9d82d89c981fe572e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33807-cwe-436-interpretation-conflict-in--e2fb5055</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33807%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20fastify%20%40fastify%2Fexpress&amp;severity=critical&amp;id=69df621082d89c981fd4ed1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33618-cwe-400-uncontrolled-resource-consu-7254c62d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33618%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Bosch%20BVMS&amp;severity=high&amp;id=69df621082d89c981fd4ed18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-fortisandbox-vulnerabili-634b7980</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20FortiSandbox%20Vulnerabilities&amp;severity=critical&amp;id=69df5e8c82d89c981fce644e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33808-cwe-436-interpretation-conflict-in--328b2649</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33808%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20fastify%20%40fastify%2Fexpress&amp;severity=critical&amp;id=69df621082d89c981fd4ed20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chasing-an-angry-spark-3c7d252d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chasing%20an%20Angry%20Spark&amp;severity=medium&amp;id=69dfcba782d89c981f8345df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3505-cwe-770-allocation-of-resources-with-d473995c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3505%3A%20CWE-770%20Allocation%20of%20resources%20without%20limits%20or%20throttling%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=high&amp;id=69df5b0f82d89c981fca1f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5588-cwe-327-use-of-a-broken-or-risky-cry-873364df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5588%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=medium&amp;id=69df5b0f82d89c981fca1f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5598-cwe-385-covert-timing-channel-in-leg-bc1f0a9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5598%3A%20CWE-385%20Covert%20timing%20channel%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=high&amp;id=69df5b0f82d89c981fca1f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0636-cwe-90-improper-neutralization-of-sp-cfb737a7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0636%3A%20CWE-90%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20LDAP%20query%20(&apos;LDAP%20injection&apos;)%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=medium&amp;id=69df5b0f82d89c981fca1f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14813-cwe-327-use-of-a-broken-or-risky-cr-dcd827cc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14813%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=critical&amp;id=69df5b0f82d89c981fca1f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52641-vulnerability-in-hcl-aion-64bbe7c4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52641%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69df540182d89c981fbdb3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3643-cwe-79-improper-neutralization-of-in-68c05e6e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onthemapmarketing%20Accessibly%20%E2%80%93%20WordPress%20Website%20Accessibility&amp;severity=high&amp;id=69df540182d89c981fbdb3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4011-cwe-79-improper-neutralization-of-in-7e0088fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4011%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgwyer%20Power%20Charts%20%E2%80%93%20Responsive%20Beautiful%20Charts%20%26%20Graphs&amp;severity=medium&amp;id=69df540482d89c981fbdb58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3998-cwe-79-improper-neutralization-of-in-c6990476</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3998%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webmindpt%20WM%20JqMath&amp;severity=medium&amp;id=69df540182d89c981fbdb400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1782-cwe-20-improper-input-validation-in--eeab536b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1782%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Wpmet%20MetForm%20Pro&amp;severity=medium&amp;id=69df540182d89c981fbdb3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3649-cwe-862-missing-authorization-in-col-aa0e913c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3649%3A%20CWE-862%20Missing%20Authorization%20in%20colbeinformatik%20Katalogportal-pdf-sync%20Widget&amp;severity=medium&amp;id=69df540182d89c981fbdb3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4091-cwe-352-cross-site-request-forgery-c-040ecd99</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4091%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20faridsaniee%20OPEN-BRAIN&amp;severity=medium&amp;id=69df540482d89c981fbdb595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3461-cwe-288-authentication-bypass-using--9f822f26</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3461%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20visaacceptancesolutions%20Visa%20Acceptance%20Solutions&amp;severity=critical&amp;id=69df540182d89c981fbdb3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3642-cwe-862-missing-authorization-in-for-b375c293</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3642%3A%20CWE-862%20Missing%20Authorization%20in%20forfront%20e-shot&amp;severity=medium&amp;id=69df540182d89c981fbdb3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4005-cwe-79-improper-neutralization-of-in-e039b1ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4005%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coachific%20Coachific%20Shortcode&amp;severity=medium&amp;id=69df540482d89c981fbdb587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4002-cwe-352-cross-site-request-forgery-c-5683203e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4002%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20petjeaf%20Petje.af&amp;severity=medium&amp;id=69df540482d89c981fbdb57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3659-cwe-79-improper-neutralization-of-in-ae3b6448</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3659%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bappidgreat%20WP%20Circliful&amp;severity=medium&amp;id=69df540182d89c981fbdb3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40899-cwe-79-improper-neutralization-of-i-1ebcb453</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40899%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=69df540182d89c981fbdb3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40897-cwe-863-incorrect-authorization-in--1c69b20c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40897%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=69df540182d89c981fbdb3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5694-cwe-79-improper-neutralization-of-in-5e6ec16b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5694%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aerin%20Quick%20Interest%20Slider&amp;severity=high&amp;id=69df733482d89c981ff25ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5617-cwe-639-authorization-bypass-through-c449e74b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5617%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20royalnavneet%20Login%20as%20User%20%E2%80%93%20Switch%20User%20%26%20WooCommerce%20Login%20as%20Customer&amp;severity=high&amp;id=69df733482d89c981ff25cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5717-cwe-79-improper-neutralization-of-in-46aa3ef6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5717%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20knighthawk%20VI%3A%20Include%20Post%20By&amp;severity=medium&amp;id=69df733482d89c981ff25cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-8-industrial-giants-publish-new--d3308aef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%208%20Industrial%20Giants%20Publish%20New%20Security%20Advisories&amp;severity=medium&amp;id=69df3b6482d89c981f8eec0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5088-cwe-338-use-of-cryptographically-wea-16c9eece</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5088%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20JDEGUEST%20Apache%3A%3AAPI%3A%3APassword&amp;severity=high&amp;id=69df426b82d89c981f9c89ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6293-cwe-352-cross-site-request-forgery-c-8623502d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6293%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20udamadu%20Inquiry%20form%20to%20posts%20or%20pages&amp;severity=medium&amp;id=69df37e082d89c981f89f024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5160-cross-site-scripting-xss-in-githubco-45eede9b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5160%3A%20Cross-site%20Scripting%20(XSS)%20in%20github.com%2Fyuin%2Fgoldmark%2Frenderer%2Fhtml&amp;severity=medium&amp;id=69df264b82d89c981f697e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26291-cross-site-scripting-xss-in-growi-i-00b9c4e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26291%3A%20Cross-site%20scripting%20(XSS)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=69df1bce82d89c981f4dca69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5397-cwe-427-uncontrolled-search-path-ele-1f281f99</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5397%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20OMRON%20SOCIAL%20SOLUTIONS%20CO.%2C%20Ltd.%20PowerAttendant%20Standard%20Edition&amp;severity=high&amp;id=69df1bce82d89c981f4dca6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1555-cwe-434-unrestricted-upload-of-file--be10bbcf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1555%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Owen%20WebStack&amp;severity=critical&amp;id=69df0daf82d89c981f2a19ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6328-cwe-20-improper-input-validation-in--ad367d4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6328%3A%20CWE-20%20Improper%20input%20validation%20in%20XQUIC%20Project%20XQUIC&amp;severity=high&amp;id=69df0daf82d89c981f2a19d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40499-cwe-78-improper-neutralization-of-s-c450c02e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40499%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radareorg%20radare2&amp;severity=high&amp;id=69defc3b82d89c981ff96336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-15th-2026-httpsi-ba6ef2fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%2015th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9892%2C%20(Wed%2C%20Apr%2015th)&amp;severity=medium&amp;id=69def19182d89c981fe564ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1509-cwe-94-improper-control-of-generatio-77599009</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1509%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=69deee0b82d89c981fde9f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1541-cwe-639-authorization-bypass-through-426c90f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1541%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=69deee0b82d89c981fde9f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4812-cwe-862-missing-authorization-in-wpe-838ccd66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4812%3A%20CWE-862%20Missing%20Authorization%20in%20wpengine%20Advanced%20Custom%20Fields%20(ACF%C2%AE)&amp;severity=medium&amp;id=69deee0b82d89c981fde9f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2834-cwe-79-improper-neutralization-of-in-ddccbea9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2834%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tokenoftrust%20Age%20Verification%20%26%20Identity%20Verification%20by%20Token%20of%20Trust&amp;severity=high&amp;id=69deee0b82d89c981fde9f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54550-cwe-94-improper-control-of-generati-3a6749d9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54550%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69dee70482d89c981fce52d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-for-ai-models-tue-apr-14th-f0af681b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20for%20AI%20Models%2C%20(Tue%2C%20Apr%2014th)&amp;severity=medium&amp;id=69dedc7882d89c981f4f4c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40105-cwe-80-improper-neutralization-of-s-7ff39b0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40105%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=69dee70482d89c981fce52d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40104-cwe-770-allocation-of-resources-wit-de9859be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40104%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20xwiki%20org.xwiki.platform%3Axwiki-platform-oldcore&amp;severity=medium&amp;id=69ded8f482d89c981f22eddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-16-f3d2223b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-16&amp;severity=medium&amp;id=69e2285782d89c981fe85812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-15-a05f99ea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-15&amp;severity=medium&amp;id=69e02a6a82d89c981fad373c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30993-na-5eef5dae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30993%3A%20n%2Fa&amp;severity=critical&amp;id=69dfcf1982d89c981f85411f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30995-na-594a4b29</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30995%3A%20n%2Fa&amp;severity=high&amp;id=69dfc80582d89c981f7ddbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30994-na-059d58d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30994%3A%20n%2Fa&amp;severity=high&amp;id=69dfc80582d89c981f7ddbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30996-na-7d1dfe4a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30996%3A%20n%2Fa&amp;severity=high&amp;id=69dfc10382d89c981f750b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30461-na-2320544e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30461%3A%20n%2Fa&amp;severity=high&amp;id=69dfb67782d89c981f6a45a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67841-na-90086889</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67841%3A%20n%2Fa&amp;severity=high&amp;id=69dfb67782d89c981f6a459f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30625-na-5f09f954</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30625%3A%20n%2Fa&amp;severity=critical&amp;id=69dfaf6882d89c981f612b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30624-na-874e93a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30624%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30617-na-a6d25840</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30617%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30616-na-6a957f7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30616%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30615-na-cfcaae0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30615%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30364-na-d86929a4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30364%3A%20n%2Fa&amp;severity=high&amp;id=69dfa86082d89c981f539bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53412-na-b7eb1768</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53412%3A%20n%2Fa&amp;severity=high&amp;id=69dfa86082d89c981f539bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-15-80bc2060</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-15&amp;severity=low&amp;id=69df507382d89c981fb85c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40096-cwe-79-improper-neutralization-of-i-9694f3f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40096%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20immich-app%20immich&amp;severity=medium&amp;id=69ded8f482d89c981f22edd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40091-cwe-532-insertion-of-sensitive-info-ee619b09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40091%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20authzed%20spicedb&amp;severity=medium&amp;id=69ded8f482d89c981f22edd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40090-cwe-22-improper-limitation-of-a-pat-c8ab49a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40090%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zarf-dev%20zarf&amp;severity=high&amp;id=69ded57682d89c981f20b4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39984-cwe-295-improper-certificate-valida-1bc99de0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39984%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20sigstore%20timestamp-authority&amp;severity=medium&amp;id=69ded57682d89c981f20b4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39971-cwe-113-improper-neutralization-of--47ba53ee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39971%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20s9y%20Serendipity&amp;severity=high&amp;id=69ded57682d89c981f20b4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39963-cwe-565-reliance-on-cookies-without-d37d563e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39963%3A%20CWE-565%3A%20Reliance%20on%20Cookies%20without%20Validation%20and%20Integrity%20Checking%20in%20s9y%20Serendipity&amp;severity=medium&amp;id=69ded57682d89c981f20b4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1314-cwe-862-missing-authorization-in-ibe-155c7412</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1314%3A%20CWE-862%20Missing%20Authorization%20in%20iberezansky%203D%20FlipBook%20%E2%80%93%20PDF%20Embedder%2C%20PDF%20Flipbook%20Viewer%2C%20Flipbook%20Image%20Gallery&amp;severity=medium&amp;id=69dece6882d89c981f1bf9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2396-cwe-79-improper-neutralization-of-in-cb40c8a9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kimipooh%20List%20View%20Google%20Calendar&amp;severity=medium&amp;id=69dece6882d89c981f1bf9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15470-cwe-22-improper-limitation-of-a-pat-f1f9ed0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15470%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DesigningMedia%20Eleganzo&amp;severity=medium&amp;id=69dece6882d89c981f1bf9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39884-cwe-88-improper-neutralization-of-a-0e46c7ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39884%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Flux159%20mcp-server-kubernetes&amp;severity=high&amp;id=69dece6882d89c981f1bf9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39399-cwe-20-improper-input-validation-in-f5d85126</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39399%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20NuGet%20NuGetGallery&amp;severity=critical&amp;id=69decae882d89c981f18b33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27297-integer-underflow-wrap-or-wraparoun-b9acb282</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27297%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27300-access-of-uninitialized-pointer-cwe-304f0a0a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27300%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=69decae582d89c981f18b2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27296-integer-underflow-wrap-or-wraparoun-992b6cdb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27296%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27290-untrusted-search-path-cwe-426-in-ad-f194852f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27290%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27298-access-of-resource-using-incompatib-860e7c92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27298%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20(CWE-843)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27294-out-of-bounds-read-cwe-125-in-adobe-e15e9d93</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27294%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27295-out-of-bounds-write-cwe-787-in-adob-53061293</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27295%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27301-heap-based-buffer-overflow-cwe-122--828495a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27301%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=69decae882d89c981f18b33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27299-improper-input-validation-cwe-20-in-d362f7f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27299%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=69decae582d89c981f18b2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27293-heap-based-buffer-overflow-cwe-122--2afa605c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27293%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27292-use-after-free-cwe-416-in-adobe-ado-2db526ee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27292%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35589-cwe-1385-missing-origin-validation--cb68aa18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35589%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20HKUDS%20nanobot&amp;severity=high&amp;id=69dec76b82d89c981f15e829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33414-cwe-78-improper-neutralization-of-s-cc0c50f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33414%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20containers%20podman&amp;severity=medium&amp;id=69dec76b82d89c981f15e825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40688-execute-unauthorized-code-or-comman-bd6906da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40688%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69dec76b82d89c981f15e82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33023-cwe-416-use-after-free-in-saitoha-l-125281c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33023%3A%20CWE-416%3A%20Use%20After%20Free%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69debcd482d89c981f0dfd18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33021-cwe-416-use-after-free-in-saitoha-l-76a24acb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33021%3A%20CWE-416%3A%20Use%20After%20Free%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69debcd482d89c981f0dfd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34619-improper-limitation-of-a-pathname-t-f76b20d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34619%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b1a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27308-uncontrolled-resource-consumption-c-bfe4703f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27308%3A%20Uncontrolled%20Resource%20Consumption%20(CWE-400)%20in%20Adobe%20ColdFusion&amp;severity=low&amp;id=69deb96d82d89c981f0b1a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27282-improper-input-validation-cwe-20-in-bd70f457</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27282%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b19f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27305-improper-limitation-of-a-pathname-t-1553d8cb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27305%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b19fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27304-improper-input-validation-cwe-20-in-1237c730</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27304%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=69deb96d82d89c981f0b19fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27306-improper-input-validation-cwe-20-in-a1295e82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27306%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b1a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27307-uncontrolled-resource-consumption-c-0de89358</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27307%3A%20Uncontrolled%20Resource%20Consumption%20(CWE-400)%20in%20Adobe%20ColdFusion&amp;severity=low&amp;id=69deb96d82d89c981f0b1a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33020-cwe-122-heap-based-buffer-overflow--12ac4054</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33020%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69deb96d82d89c981f0b1a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33019-cwe-125-out-of-bounds-read-in-saito-51d22ad7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33019%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69deb96d82d89c981f0b1a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33018-cwe-416-use-after-free-in-saitoha-l-56970cc6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33018%3A%20CWE-416%3A%20Use%20After%20Free%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69deb96d82d89c981f0b1a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40291-cwe-269-improper-privilege-manageme-2c622c0b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40291%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deb97082d89c981f0b1a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35196-cwe-78-improper-neutralization-of-s-ff921618</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35196%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deb5cc82d89c981f06f4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34602-cwe-639-authorization-bypass-throug-a0532f99</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34602%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deb5cc82d89c981f06f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15565-cwe-862-missing-authorization-in-ca-8c9d9668</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15565%3A%20CWE-862%20Missing%20Authorization%20in%20cartasi%20Nexi%20XPay&amp;severity=medium&amp;id=69deb5cc82d89c981f06f4c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34370-cwe-285-improper-authorization-in-c-f70cafa6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34370%3A%20CWE-285%3A%20Improper%20Authorization%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69deb5cc82d89c981f06f4c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39907-cwe-73-external-control-of-file-nam-baea18b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39907%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Unisys%20WebPerfect%20Image%20Suite&amp;severity=high&amp;id=69deb5cc82d89c981f06f4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39906-cwe-441-unintended-proxy-or-interme-ff8fdb0c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39906%3A%20CWE-441%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20Unisys%20WebPerfect%20Image%20Suite&amp;severity=high&amp;id=69deb5cc82d89c981f06f4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34631-out-of-bounds-write-cwe-787-in-adob-a620ceb9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34631%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69deb5cc82d89c981f06f4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34161-cwe-79-improper-neutralization-of-i-b1414ebb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34161%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69deaedd82d89c981f01938a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34160-cwe-306-missing-authentication-for--293e1607</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34160%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deaedd82d89c981f019385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33715-cwe-306-missing-authentication-for--8c8fe980</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33715%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deaedd82d89c981f019381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33714-cwe-89-improper-neutralization-of-s-ac72effa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33714%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deaedd82d89c981f01937d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27287-out-of-bounds-read-cwe-125-in-adobe-6398376a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27287%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69deab4182d89c981ffdeb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25133-cwe-79-improper-neutralization-of-i-aa387956</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25133%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=69deab4182d89c981ffdeb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25125-cwe-200-exposure-of-sensitive-infor-e22a1d73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25125%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20octobercms%20october&amp;severity=medium&amp;id=69deab4182d89c981ffdeb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40683-cwe-843-access-of-resource-using-in-9348968e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40683%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20OpenStack%20Keystone&amp;severity=high&amp;id=69dea0b582d89c981ff4544a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34630-heap-based-buffer-overflow-cwe-122--453b983d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34630%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff45447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27312-heap-based-buffer-overflow-cwe-122--d2990c18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27312%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff45441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27222-divide-by-zero-cwe-369-in-adobe-bri-14b1e4dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27222%3A%20Divide%20By%20Zero%20(CWE-369)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=69dea0b582d89c981ff45438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27310-heap-based-buffer-overflow-cwe-122--3fb0f672</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27310%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff4543b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27311-heap-based-buffer-overflow-cwe-122--4e7b3f13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27311%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff4543e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27313-heap-based-buffer-overflow-cwe-122--c75d6669</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27313%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff45444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27289-out-of-bounds-read-cwe-125-in-adobe-94754a4d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27289%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=69de99bf82d89c981fef099d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34618-out-of-bounds-write-cwe-787-in-adob-e1917b6d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34618%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69de99bf82d89c981fef09a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34625-cross-site-scripting-dom-based-xss--f94b9c5f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34625%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de8b9f82d89c981fe4811d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34623-cross-site-scripting-dom-based-xss--e68699eb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34623%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de8b9f82d89c981fe48117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34624-cross-site-scripting-dom-based-xss--d894ffd1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34624%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de8b9f82d89c981fe4811a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-exploited-sharepoint-zero-day-an-c39d9142</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Exploited%20SharePoint%20Zero-Day%20and%20160%20Other%20Vulnerabilities&amp;severity=medium&amp;id=69de849482d89c981fdf4394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27288-cross-site-scripting-stored-xss-cwe-2673fa14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27288%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de849e82d89c981fdf5f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0207-cwe-532-insertion-of-sensitive-infor-85e65230</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0207%3A%20CWE-532%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20PureStorage%20FlashBlade&amp;severity=high&amp;id=69de849e82d89c981fdf5f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5752-cwe-94-improper-control-of-generatio-b7af0b75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5752%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cohere%20cohere-terrarium&amp;severity=critical&amp;id=69de849e82d89c981fdf5f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0209-cwe-783-operator-precedence-logic-er-43d7927d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0209%3A%20CWE-783%20Operator%20precedence%20logic%20error%20in%20PureStorage%20FlashArray&amp;severity=medium&amp;id=69de849e82d89c981fdf5f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5756-cwe-306-missing-authentication-for-c-3ed63c52</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5756%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Data%20Recognition%20Corporation%20Central%20Office%20Services%20-%20Content%20Hosting%20Component&amp;severity=high&amp;id=69de849e82d89c981fdf5f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5754-cwe-79-improper-neutralization-of-in-1f4c1272</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Radware%20Alteon%20vADC&amp;severity=medium&amp;id=69de849e82d89c981fdf5f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-april-2026-tue-apr-14th-ed4dfe0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20April%202026.%2C%20(Tue%2C%20Apr%2014th)&amp;severity=medium&amp;id=69dfb6ec82d89c981f6b43d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-rowhammer-attacks-targeting-gddr6-kaspersky--5f662a36</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20Rowhammer%20attacks%20targeting%20GDDR6%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69de7db882d89c981fd91337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24907-cwe-79-improper-neutralization-of-i-2ab6df42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24907%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=69de99bf82d89c981fef09a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27303-deserialization-of-untrusted-data-c-dbcf2de2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27303%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de8b9f82d89c981fe48123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34617-cross-site-scripting-xss-cwe-79-in--9611df67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34617%3A%20Cross-site%20Scripting%20(XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=high&amp;id=69de92a582d89c981fe9f16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21331-cross-site-scripting-reflected-xss--73045699</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21331%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=69de8b9f82d89c981fe48120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27246-cross-site-scripting-dom-based-xss--d488fcd6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27246%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de849e82d89c981fdf5f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34614-cross-site-scripting-reflected-xss--c45222b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34614%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=69de99bf82d89c981fef09a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27245-cross-site-scripting-reflected-xss--e445a643</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27245%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de99bf82d89c981fef09a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34615-deserialization-of-untrusted-data-c-e3f24a99</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34615%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de8b9f82d89c981fe48126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27243-cross-site-scripting-reflected-xss--039e8e2c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27243%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de92a582d89c981fe9f167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24906-cwe-79-improper-neutralization-of-i-7323d364</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24906%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=69df733482d89c981ff25cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34628-heap-based-buffer-overflow-cwe-122--823d92b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34628%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34629-heap-based-buffer-overflow-cwe-122--3bf0ac91</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34629%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34627-heap-based-buffer-overflow-cwe-122--f3bc7c57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34627%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27258-out-of-bounds-write-cwe-787-in-adob-f0f6cfde</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27258%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=69de7a1d82d89c981fd6a728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32214-cwe-284-improper-access-control-in--487e8f7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32214%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33829-cwe-200-exposure-of-sensitive-infor-437402c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33829%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3b82d89c981fd6cf4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33824-cwe-415-double-free-in-microsoft-wi-87d9fb32</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33824%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=critical&amp;id=69de7a3b82d89c981fd6cf42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33827-cwe-362-concurrent-execution-using--233b55bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33827%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33115-cwe-416-use-after-free-in-microsoft-7e929fae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33115%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33114-cwe-822-untrusted-pointer-dereferen-23fb5e26</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33114%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33104-cwe-362-concurrent-execution-using--813cfc41</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33104%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33103-cwe-284-improper-access-control-in--7d25ac01</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33103%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.0&amp;severity=medium&amp;id=69de7a3a82d89c981fd6cf23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33101-cwe-416-use-after-free-in-microsoft-f7043ff8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33101%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33100-cwe-416-use-after-free-in-microsoft-3cedc0f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33100%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33099-cwe-416-use-after-free-in-microsoft-b8b53f34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33099%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32225-cwe-693-protection-mechanism-failur-c89d948c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32225%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3882d89c981fd6cef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32203-cwe-121-stack-based-buffer-overflow-e50458b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32203%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a3682d89c981fd6bd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26171-cwe-400-uncontrolled-resource-consu-35b472ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26171%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32201-cwe-20-improper-input-validation-in-2c06b3ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32201%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32200-cwe-416-use-after-free-in-microsoft-8c849f94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32200%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32199-cwe-416-use-after-free-in-microsoft-02ca380a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32199%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32198-cwe-416-use-after-free-in-microsoft-f8733311</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32198%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32197-cwe-416-use-after-free-in-microsoft-f71c4eb2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32197%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32196-cwe-79-improper-neutralization-of-i-59478f29</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32196%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=medium&amp;id=69de7a3482d89c981fd6bcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32190-cwe-416-use-after-free-in-microsoft-cabcfa42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32190%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32176-cwe-89-improper-neutralization-of-s-2b96a9fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32176%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=medium&amp;id=69de7a3282d89c981fd6bcb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32171-cwe-522-insufficiently-protected-cr-cbd219b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32171%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Microsoft%20Azure%20Logic%20Apps&amp;severity=high&amp;id=69de7a3282d89c981fd6bcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32164-cwe-362-concurrent-execution-using--1208c733</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32164%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3282d89c981fd6bca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32163-cwe-362-concurrent-execution-using--7bc136e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32163%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32162-cwe-349-acceptance-of-extraneous-un-4d597109</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32162%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32155-cwe-416-use-after-free-in-microsoft-170d6614</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32155%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69de7a3082d89c981fd6bc80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32153-cwe-416-use-after-free-in-microsoft-864a1c45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32153%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32151-cwe-200-exposure-of-sensitive-infor-733dc983</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32151%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2e82d89c981fd6bc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32150-cwe-362-concurrent-execution-using--895cb39d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32150%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32149-cwe-20-improper-input-validation-in-6d462a7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32149%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32091-cwe-362-concurrent-execution-using--ca8b3dbb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32091%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32088-cwe-362-concurrent-execution-using--98704c94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32088%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69de7a2e82d89c981fd6bc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32086-cwe-362-concurrent-execution-using--8fa5cd49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32086%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2b82d89c981fd6bbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32084-cwe-200-exposure-of-sensitive-infor-e73a4b1e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32084%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2b82d89c981fd6bbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32080-cwe-416-use-after-free-in-microsoft-a3c0dea3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32080%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=69de7a2b82d89c981fd6bba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32079-cwe-200-exposure-of-sensitive-infor-9d61e560</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32079%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2a82d89c981fd6bba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32078-cwe-416-use-after-free-in-microsoft-9e05253d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32078%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2a82d89c981fd6bba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32077-cwe-822-untrusted-pointer-dereferen-4a7c3005</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32077%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2a82d89c981fd6bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32076-cwe-125-out-of-bounds-read-in-micro-e50ab91b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32076%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a2782d89c981fd6ba71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32074-cwe-415-double-free-in-microsoft-wi-6993a728</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32074%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2782d89c981fd6ba6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32072-cwe-287-improper-authentication-in--cb921f80</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32072%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2782d89c981fd6ba65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32070-cwe-416-use-after-free-in-microsoft-c2a86ecf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32070%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32069-cwe-415-double-free-in-microsoft-wi-052e17b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32069%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2782d89c981fd6ba5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32068-cwe-362-concurrent-execution-using--8fa9958c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32068%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27930-cwe-125-out-of-bounds-read-in-micro-a028a6ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27930%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2482d89c981fd6ba0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27928-cwe-20-improper-input-validation-in-3af173ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27928%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=69de7a2482d89c981fd6ba05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27925-cwe-416-use-after-free-in-microsoft-b2af4507</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27925%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2482d89c981fd6b9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27923-cwe-416-use-after-free-in-microsoft-a1d83d45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27923%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27922-cwe-416-use-after-free-in-microsoft-9e17349b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27922%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27920-cwe-822-untrusted-pointer-dereferen-41e8c3a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27920%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27916-cwe-416-use-after-free-in-microsoft-8199ddd9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27916%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27914-cwe-284-improper-access-control-in--0c3c451b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27914%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27913-cwe-20-improper-input-validation-in-4fef816e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27913%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a2182d89c981fd6a7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27912-cwe-285-improper-authorization-in-m-4d0501e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27912%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a2182d89c981fd6a7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27911-cwe-362-concurrent-execution-using--5f29327a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27911%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27910-cwe-280-improper-handling-of-insuff-924af22b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27910%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27909-cwe-416-use-after-free-in-microsoft-5fd4b2ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27909%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26184-cwe-126-buffer-over-read-in-microso-ad60a26c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26184%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1d82d89c981fd6a725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26182-cwe-416-use-after-free-in-microsoft-dc67948f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26182%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26178-cwe-681-incorrect-conversion-betwee-60374287</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26178%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26177-cwe-416-use-after-free-in-microsoft-4466664b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26177%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26176-cwe-122-heap-based-buffer-overflow--3555ecfe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26176%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26173-cwe-362-concurrent-execution-using--bc17a212</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26173%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26172-cwe-362-concurrent-execution-using--d4bfead1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26172%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26170-cwe-20-improper-input-validation-in-bd46df79</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26170%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26169-cwe-126-buffer-over-read-in-microso-d0ca5e4d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26169%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1882d89c981fd6a689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26168-cwe-362-concurrent-execution-using--7b02765b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26168%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26163-cwe-415-double-free-in-microsoft-wi-830867f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26163%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26159-cwe-306-missing-authentication-for--ad6e8baf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26159%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26156-cwe-122-heap-based-buffer-overflow--6a57a6f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26156%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26153-cwe-125-out-of-bounds-read-in-micro-36bba8cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26153%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1682d89c981fd6a630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26152-cwe-922-insecure-storage-of-sensiti-68f2db89</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26152%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26143-cwe-20-improper-input-validation-in-08916d7b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26143%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20PowerShell%207.4&amp;severity=high&amp;id=69de7a1682d89c981fd6a624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23666-cwe-755-improper-handling-of-except-c8599af8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23666%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Microsoft%20Microsoft%20.NET%20Framework%203.5&amp;severity=high&amp;id=69de7a1482d89c981fd6a5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23657-cwe-416-use-after-free-in-microsoft-172fe6dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23657%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a1482d89c981fd6a5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20806-cwe-843-access-of-resource-using-in-2db342f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20806%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20928-cwe-212-improper-removal-of-sensiti-d55f0b35</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20928%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32212-cwe-59-improper-link-resolution-bef-a8315ee6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32212%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33826-cwe-20-improper-input-validation-in-ed85b68e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33826%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33825-cwe-1220-insufficient-granularity-o-73be6db2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33825%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Microsoft%20Microsoft%20Defender%20Antimalware%20Platform&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33822-cwe-125-out-of-bounds-read-in-micro-97400ae0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33822%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=69de7a3a82d89c981fd6cf35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33120-cwe-822-untrusted-pointer-dereferen-338cc6ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33120%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20(GDR)&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33116-cwe-835-loop-with-unreachable-exit--6d2e9668</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33116%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33098-cwe-416-use-after-free-in-microsoft-14fa30d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33098%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3882d89c981fd6ceff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33096-cwe-125-out-of-bounds-read-in-micro-f99fbaaa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33096%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a3882d89c981fd6cefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33095-cwe-416-use-after-free-in-microsoft-72848262</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33095%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3882d89c981fd6cef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32226-cwe-362-concurrent-execution-using--694f061d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32226%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Microsoft%20.NET%20Framework%203.5%20AND%204.7.2&amp;severity=medium&amp;id=69de7a3882d89c981fd6cef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32224-cwe-416-use-after-free-in-microsoft-b1f0a247</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32224%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2026H1&amp;severity=high&amp;id=69de7a3882d89c981fd6cef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32223-cwe-122-heap-based-buffer-overflow--3c007cd2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32223%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69de7a3882d89c981fd6ceed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32222-cwe-822-untrusted-pointer-dereferen-e2689638</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32222%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3882d89c981fd6ceea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32221-cwe-122-heap-based-buffer-overflow--473ffa00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32221%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3882d89c981fd6cee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32220-cwe-284-improper-access-control-in--a2aa9aa4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32220%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69de7a3882d89c981fd6cee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32219-cwe-415-double-free-in-microsoft-wi-31dc6599</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32219%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3682d89c981fd6bd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32218-cwe-532-insertion-of-sensitive-info-269049f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32218%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32217-cwe-532-insertion-of-sensitive-info-8c9fae6c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32217%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32216-cwe-476-null-pointer-dereference-in-37c0ed57</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32216%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2026H1&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32215-cwe-532-insertion-of-sensitive-info-fd4d1ad6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32215%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32202-cwe-693-protection-mechanism-failur-2f0cf818</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32202%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32195-cwe-121-stack-based-buffer-overflow-9606beb6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32195%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2026H1&amp;severity=high&amp;id=69de7a3482d89c981fd6bcd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32192-cwe-502-deserialization-of-untruste-07ba7463</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32192%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=69de7a3482d89c981fd6bcd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32189-cwe-416-use-after-free-in-microsoft-b211091f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32189%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32188-cwe-125-out-of-bounds-read-in-micro-9b236598</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32188%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32184-cwe-502-deserialization-of-untruste-a3c0ec1f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32184%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20HPC%20Pack%202019&amp;severity=high&amp;id=69de7a3282d89c981fd6bcbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32183-cwe-77-improper-neutralization-of-s-4b6f9ccb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32183%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3282d89c981fd6bcba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32181-cwe-269-improper-privilege-manageme-16c18e6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32181%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a3282d89c981fd6bcb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32178-cwe-138-improper-neutralization-of--1098599a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32178%3A%20CWE-138%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a3282d89c981fd6bcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32168-cwe-20-improper-input-validation-in-d5b2309c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32168%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=69de7a3282d89c981fd6bcab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32167-cwe-89-improper-neutralization-of-s-4dfb3470</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32167%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=medium&amp;id=69de7a3282d89c981fd6bca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32165-cwe-416-use-after-free-in-microsoft-c826ca80</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32165%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3282d89c981fd6bca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0390-cwe-807-reliance-on-untrusted-inputs-645ada93</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0390%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32160-cwe-362-concurrent-execution-using--b0e2a872</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32160%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32159-cwe-362-concurrent-execution-using--f1bafff5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32159%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32158-cwe-362-concurrent-execution-using--9e8e2131</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32158%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32157-cwe-416-use-after-free-in-microsoft-c1ea29fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32157%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=69de7a3082d89c981fd6bc86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32156-cwe-416-use-after-free-in-microsoft-1ff5b5c0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32156%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3082d89c981fd6bc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32154-cwe-416-use-after-free-in-microsoft-69fdc6d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32154%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3082d89c981fd6bc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32152-cwe-416-use-after-free-in-microsoft-5e3440ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32152%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32093-cwe-362-concurrent-execution-using--ec561814</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32093%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32090-cwe-362-concurrent-execution-using--cdda107b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32090%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32089-cwe-416-use-after-free-in-microsoft-257d5db1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32089%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32087-cwe-122-heap-based-buffer-overflow--46a63183</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32087%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32085-cwe-200-exposure-of-sensitive-infor-41cb0b72</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32085%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2b82d89c981fd6bbb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32083-cwe-362-concurrent-execution-using--66cd44bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32083%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2b82d89c981fd6bbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32082-cwe-362-concurrent-execution-using--ed659fd9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32082%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2b82d89c981fd6bbac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32081-cwe-200-exposure-of-sensitive-infor-eaa6be22</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32081%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2b82d89c981fd6bba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32075-cwe-416-use-after-free-in-microsoft-f193305b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32075%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32073-cwe-416-use-after-free-in-microsoft-3211bff7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32073%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32071-cwe-476-null-pointer-dereference-in-f3c1af73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32071%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27931-cwe-125-out-of-bounds-read-in-micro-9cddb35d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27931%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a2782d89c981fd6ba56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27929-cwe-367-time-of-check-time-of-use-t-7832f9c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27929%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6ba08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27927-cwe-362-concurrent-execution-using--2bc68001</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27927%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2482d89c981fd6ba02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27926-cwe-362-concurrent-execution-using--e10b68a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27926%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2482d89c981fd6b9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27924-cwe-416-use-after-free-in-microsoft-377a37ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27924%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27921-cwe-362-concurrent-execution-using--62fdd6b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27921%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27919-cwe-822-untrusted-pointer-dereferen-87fe2437</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27919%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27918-cwe-362-concurrent-execution-using--0668203c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27918%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27917-cwe-416-use-after-free-in-microsoft-7740877c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27917%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27915-cwe-416-use-after-free-in-microsoft-71e31363</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27915%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27908-cwe-416-use-after-free-in-microsoft-9fbfd6e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27908%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27907-cwe-191-integer-underflow-wrap-or-w-3c6fcbdb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27907%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1d82d89c981fd6a72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27906-cwe-20-improper-input-validation-in-15b1add6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27906%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a1d82d89c981fd6a72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26183-cwe-284-improper-access-control-in--e52fa728</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26183%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a1d82d89c981fd6a722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26181-cwe-416-use-after-free-in-microsoft-0ec1d3f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26181%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1d82d89c981fd6a71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26180-cwe-122-heap-based-buffer-overflow--9ff59786</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26180%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26179-cwe-415-double-free-in-microsoft-wi-eef77c20</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26179%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26175-cwe-908-use-of-uninitialized-resour-152461da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26175%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1b82d89c981fd6a6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26174-cwe-362-concurrent-execution-using--28417f6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26174%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26167-cwe-362-concurrent-execution-using--55e636ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26167%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26166-cwe-415-double-free-in-microsoft-wi-9232decb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26166%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1882d89c981fd6a680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26165-cwe-416-use-after-free-in-microsoft-abfbc4b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26165%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1882d89c981fd6a67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26162-cwe-843-access-of-resource-using-in-db050af1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26162%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26161-cwe-822-untrusted-pointer-dereferen-41499af6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26161%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1882d89c981fd6a674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26160-cwe-306-missing-authentication-for--0ab417a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26160%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26155-cwe-126-buffer-over-read-in-microso-490c3d1f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26155%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1682d89c981fd6a636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26154-cwe-20-improper-input-validation-in-68836085</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26154%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a1682d89c981fd6a633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26151-cwe-357-insufficient-ui-warning-of--baf70412</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26151%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26149-cwe-150-improper-neutralization-of--adf80a1e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26149%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Microsoft%20Microsoft%20Power%20Apps%20Desktop%20Client&amp;severity=critical&amp;id=69de7a1682d89c981fd6a627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23670-cwe-822-untrusted-pointer-dereferen-0022d68e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23670%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20945-cwe-79-improper-neutralization-of-i-ac52a74d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20945%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25184-cwe-362-concurrent-execution-using--2773ff78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25184%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1682d89c981fd6a621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23653-cwe-77-improper-neutralization-of-s-a7104260</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23653%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20930-cwe-362-concurrent-execution-using--d0dc4957</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20930%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1482d89c981fd6a5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22692-cwe-693-protection-mechanism-failur-9f968e3e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22692%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20octobercms%20october&amp;severity=medium&amp;id=69de731682d89c981fcd5a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-55-vulnerabilities-across-11-product-19dbeb63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%2055%20Vulnerabilities%20Across%2011%20Products&amp;severity=critical&amp;id=69de730182d89c981fcd5435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27284-out-of-bounds-read-cwe-125-in-adobe-7d74c03d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27284%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27285-heap-based-buffer-overflow-cwe-122--d9d30173</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27285%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=69de731682d89c981fcd5a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27286-heap-based-buffer-overflow-cwe-122--4630805d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27286%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=69de731682d89c981fcd5a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27283-use-after-free-cwe-416-in-adobe-ind-6947ba14</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27283%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27238-heap-based-buffer-overflow-cwe-122--f7fd79e9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27238%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27291-out-of-bounds-write-cwe-787-in-adob-27b71255</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27291%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34622-improperly-controlled-modification--0326b95e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34622%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20(CWE-1321)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69de6c0582d89c981fc4d748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34626-improperly-controlled-modification--bd4cf4c2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34626%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20(CWE-1321)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69de6c0582d89c981fc4d74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61624-escalation-of-privilege-in-fortinet-171166f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61624%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=69de650582d89c981fbed4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68649-escalation-of-privilege-in-fortinet-a0698cd6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68649%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiManager%20Cloud&amp;severity=medium&amp;id=69de650582d89c981fbed4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21741-execute-unauthorized-code-or-comman-0f7a52d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21741%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiNAC-F&amp;severity=low&amp;id=69de650582d89c981fbed4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39813-escalation-of-privilege-in-fortinet-082bcf5d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39813%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSandbox&amp;severity=critical&amp;id=69de650a82d89c981fbf0910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61848-execute-unauthorized-code-or-comman-458240a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61848%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=69de650582d89c981fbed4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22828-escalation-of-privilege-in-fortinet-0564d74b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22828%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiAnalyzer%20Cloud&amp;severity=high&amp;id=69de650782d89c981fbf0855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39815-execute-unauthorized-code-or-comman-d6a1fcb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39815%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiDDoS-F&amp;severity=high&amp;id=69de650a82d89c981fbf0916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22573-information-disclosure-in-fortinet--07902490</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22573%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69de650782d89c981fbf084c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61886-execute-unauthorized-code-or-comman-5a3555e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61886%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox%20PaaS&amp;severity=medium&amp;id=69de650582d89c981fbed4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39810-information-disclosure-in-fortinet--75ea6d30</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39810%3A%20Information%20disclosure%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=69de650782d89c981fbf0864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39811-denial-of-service-in-fortinet-forti-2563cace</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39811%3A%20Denial%20of%20service%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69de650a82d89c981fbf090a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23104-information-disclosure-in-fortinet--1b48f58e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23104%3A%20Information%20disclosure%20in%20Fortinet%20FortiVoice&amp;severity=medium&amp;id=69de650582d89c981fbed4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39812-execute-unauthorized-code-or-comman-5b024998</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39812%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69de650a82d89c981fbf090d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23708-escalation-of-privilege-in-fortinet-4da37711</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23708%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf0858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39814-execute-unauthorized-code-or-comman-c67b5e5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39814%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69de650a82d89c981fbf0913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25691-execute-unauthorized-code-or-comman-ba5ba8c1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25691%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf085b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59809-information-disclosure-in-fortinet--f1b923ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59809%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69de650582d89c981fbed4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22155-information-disclosure-in-fortinet--32ef1497</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22155%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69de650782d89c981fbf0849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21742-information-disclosure-in-fortinet--5a5a88a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21742%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650582d89c981fbed4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/108-chrome-extensions-linked-to-data-exfiltration--8c012474</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=108%20Chrome%20Extensions%20Linked%20to%20Data%20Exfiltration%20and%20Session%20Theft%20via%20Shared%20C2%20Infrastructure&amp;severity=medium&amp;id=69de616b82d89c981fbc694d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22574-information-disclosure-in-fortinet--7c8cd4e8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22574%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf084f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22154-escalation-of-privilege-in-fortinet-67e3b19b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22154%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650582d89c981fbed4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53847-execute-unauthorized-code-or-comman-5f90cc02</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53847%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=69de650582d89c981fbed4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22576-information-disclosure-in-fortinet--eccd0793</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22576%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf0852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27316-information-disclosure-in-fortinet--23983c6d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27316%3A%20Information%20disclosure%20in%20Fortinet%20FortiSandbox&amp;severity=low&amp;id=69de650782d89c981fbf085e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39808-execute-unauthorized-code-or-comman-af629bfe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39808%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=critical&amp;id=69de650782d89c981fbf0861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2401-cwe-532-insertion-of-sensitive-infor-d453bf47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2401%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=low&amp;id=69de5dec82d89c981fb97446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2400-cwe-93-improper-neutralization-of-cr-d42f5774</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2400%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5dec82d89c981fb97443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2403-cwe-1284-improper-validation-of-spec-9964a9ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2403%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5def82d89c981fb974be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2405-cwe-400-uncontrolled-resource-consum-f72b6df0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2405%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5def82d89c981fb974c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2402-cwe-307-improper-restriction-of-exce-64f33449</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2402%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5dec82d89c981fb97449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2404-cwe-116-improper-encoding-or-escapin-b02daa7f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2404%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5def82d89c981fb974c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5713-cwe-121-stack-based-buffer-overflow--f68faa6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5713%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69de5df182d89c981fb975c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2399-cwe-22-improper-limitation-of-a-path-c929fbb7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2399%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5dec82d89c981fb97440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39809-execute-unauthorized-code-or-comman-ed3cd125</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39809%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=69de5df182d89c981fb975ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4832-cwe-798-use-of-hard-coded-credential-ebfe7271</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4832%3A%20CWE-798%20Use%20of%20Hard-Coded%20Credentials%20in%20Schneider%20Electric%20Easergy%20MiCOM%20P14x&amp;severity=medium&amp;id=69de5df182d89c981fb975bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37980-improper-neutralization-of-input-du-20974fc9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37980%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69de56e582d89c981fb1904d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4914-cwe-79-improper-neutralization-of-in-71edc76f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4914%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Ivanti%20Neurons%20for%20ITSM%20(On-Premise)&amp;severity=medium&amp;id=69de4ff282d89c981fa84ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4913-cwe-424-improper-protection-of-alter-48b0cd1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4913%3A%20CWE-424%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20Ivanti%20Neurons%20for%20ITSM%20(On-Premise)&amp;severity=medium&amp;id=69de4ff282d89c981fa84c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/59-victims-zero-authentication-a-clickfix-campaign-64ad7f8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=59%20Victims%2C%20Zero%20Authentication%3A%20A%20ClickFix%20Campaign%20Force-Installs%20a%20Chrome%20Extension%20Banking%20Stealer%20and%20Leaves%20the%20Entire%20C2%20Wide%20Open&amp;severity=medium&amp;id=69de4c5382d89c981fa44b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4344-cwe-79-cross-site-scripting-xss-stor-9662e895</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4344%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69de4ff282d89c981fa84c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4345-cwe-79-cross-site-scripting-xss-stor-de128268</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4345%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69de4ff282d89c981fa84c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4369-cwe-79-cross-site-scripting-xss-stor-c9a1cc3b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4369%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69de4ff282d89c981fa84c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8095-cwe-257-in-progress-software-corpora-f20f50ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8095%3A%20CWE-257%20in%20Progress%20Software%20Corporation%20OpenEdge&amp;severity=critical&amp;id=69de455082d89c981f9c8aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7389-cwe-552-in-progress-software-corpora-c6476335</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7389%3A%20CWE-552%20in%20Progress%20Software%20Corporation%20OpenEdge&amp;severity=high&amp;id=69de455082d89c981f9c8a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mythos-ready-security-csa-urges-cisos-to-prepare-f-bf8a68c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Mythos-Ready%E2%80%99%20Security%3A%20CSA%20Urges%20CISOs%20to%20Prepare%20for%20Accelerated%20AI%20Threats&amp;severity=high&amp;id=69de3ac082d89c981f8db41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europes-largest-gym-chain-says-data-breach-impacts-d650bf86</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europe%E2%80%99s%20Largest%20Gym%20Chain%20Says%20Data%20Breach%20Impacts%201%20Million%20Members&amp;severity=medium&amp;id=69de373c82d89c981f5ace10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2450-cwe-520-net-misconfiguration-use-of--335f73f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2450%3A%20CWE-520%20.NET%20misconfiguration%3A%20use%20of%20impersonation%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=high&amp;id=69de374582d89c981f5b1485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2449-cwe-88-improper-neutralization-of-ar-cd196faa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2449%3A%20CWE-88%20Improper%20neutralization%20of%20argument%20delimiters%20in%20a%20command%20(&apos;argument%20injection&apos;)%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=critical&amp;id=69de303282d89c981f2e25f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24069-cwe-863-incorrect-authorization-in--a08b3733</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24069%3A%20CWE-863%20Incorrect%20Authorization%20in%20Kiuwan%20SAST&amp;severity=medium&amp;id=69de292b82d89c981f2a390c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-abap-vulnerability-a01b2740</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20ABAP%20Vulnerability&amp;severity=critical&amp;id=69de25a882d89c981f28f984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2332-cwe-444-inconsistent-interpretation--174fc831</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2332%3A%20CWE-444%20Inconsistent%20interpretation%20of%20HTTP%20requests%20(&apos;HTTP%20Request%2FResponse%20smuggling&apos;)%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=69de25ad82d89c981f28fd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/triad-nexus-evades-sanctions-to-fuel-cybercrime-14f3246a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Triad%20Nexus%20Evades%20Sanctions%20to%20Fuel%20Cybercrime&amp;severity=medium&amp;id=69de1e9f82d89c981f23508f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-adds-rust-dns-parser-to-pixel-phones-for-be-4f83f373</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Adds%20Rust%20DNS%20Parser%20to%20Pixel%20Phones%20for%20Better%20Security&amp;severity=low&amp;id=69de179782d89c981f1f8f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nightclub-giant-rci-hospitality-reports-data-breac-bed7c779</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nightclub%20Giant%20RCI%20Hospitality%20Reports%20Data%20Breach&amp;severity=medium&amp;id=69de0d0c82d89c981f1a3e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-windows-adobe-ac-ff246528</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Windows%2C%20Adobe%20Acrobat%20Vulnerabilities&amp;severity=low&amp;id=69de028082d89c981f1493f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pretexting-based-targeted-intrusion-analysis-of-fa-f57a71c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pretexting-Based%20Targeted%20Intrusion%3A%20Analysis%20of%20Facebook%20Reconnaissance%20and%20Software%20Tampering%20Attacks&amp;severity=medium&amp;id=69de099282d89c981f185723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/q1-2026-malware-statistics-report-for-linux-ssh-se-45d5088d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Q1%202026%20Malware%20Statistics%20Report%20for%20Linux%20SSH%20Servers&amp;severity=medium&amp;id=69de099282d89c981f18573a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/q1-2026-malware-statistics-report-for-windows-data-beb6a9fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Q1%202026%20Malware%20Statistics%20Report%20for%20Windows%20Database%20Servers&amp;severity=medium&amp;id=69de099282d89c981f18573e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33892-cwe-305-authentication-bypass-by-pr-d1d1565e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33892%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Siemens%20Industrial%20Edge%20Management%20Pro%20V1&amp;severity=high&amp;id=69de028682d89c981f14951c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27668-cwe-266-incorrect-privilege-assignm-3966ad74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27668%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Siemens%20RUGGEDCOM%20CROSSBOW%20Secure%20Access%20Manager%20Primary%20(SAM-P)&amp;severity=high&amp;id=69de028682d89c981f149516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25654-cwe-639-authorization-bypass-throug-94590bb2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25654%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=69de028682d89c981f149513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24032-cwe-347-improper-verification-of-cr-59b40820</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24032%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=69de028682d89c981f149510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40745-cwe-295-improper-certificate-valida-40b15c00</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40745%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20Siemens%20Software%20Center&amp;severity=low&amp;id=69de028682d89c981f14950d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31923-cwe-319-cleartext-transmission-of-s-568d8687</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31923%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=high&amp;id=69de028682d89c981f149519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33929-cwe-22-improper-limitation-of-a-pat-2d3fd231</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33929%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20PDFBox%20Examples&amp;severity=medium&amp;id=69ddf7fa82d89c981f0815e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31924-cwe-319-cleartext-transmission-of-s-194e8ae1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31924%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=medium&amp;id=69ddf7fa82d89c981f0815e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31908-cwe-75-failure-to-sanitize-special--741cc648</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31908%3A%20CWE-75%20Failure%20to%20Sanitize%20Special%20Elements%20into%20a%20Different%20Plane%20(Special%20Element%20Injection)%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=critical&amp;id=69ddf7fa82d89c981f0815e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4109-cwe-862-missing-authorization-in-arr-dc2bacc4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4109%3A%20CWE-862%20Missing%20Authorization%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Calendar%2C%20Event%20Registration%2C%20Tickets%20%26%20Booking%20(AI%20Powered)&amp;severity=medium&amp;id=69ddf7fa82d89c981f0815eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2582-cwe-94-improper-control-of-generatio-55d074f6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2582%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vendidero%20Germanized%20for%20WooCommerce&amp;severity=medium&amp;id=69dde66a82d89c981ffc957b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3017-cwe-502-deserialization-of-untrusted-13c099d1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3017%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20shapedplugin%20Smart%20Post%20Show%20%E2%80%93%20Post%20Grid%2C%20Post%20Carousel%20%26%20Slider%2C%20and%20List%20Category%20Posts&amp;severity=high&amp;id=69ddd4cb82d89c981fef0e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4059-cwe-79-improper-neutralization-of-in-714c11b5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4059%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=medium&amp;id=69ddbc3182d89c981fc24dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4479-cwe-79-improper-neutralization-of-in-f0bfaad2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4479%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcodefactory%20WholeSale%20Products%20Dynamic%20Pricing%20Management%20WooCommerce&amp;severity=medium&amp;id=69ddbc3182d89c981fc24de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1607-cwe-79-improper-neutralization-of-in-0a460d9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1607%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surbma%20Surbma%20%7C%20Booking.com%20Shortcode&amp;severity=medium&amp;id=69ddbc3182d89c981fc24dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40313-cwe-829-inclusion-of-functionality--2d33a73b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40313%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69ddbc3182d89c981fc24dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40289-cwe-306-missing-authentication-for--874e515b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40289%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69ddbc3182d89c981fc24dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40288-cwe-78-improper-neutralization-of-s-06bb92e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40288%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69ddbc3182d89c981fc24dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40287-cwe-94-improper-control-of-generati-5261cfa0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40287%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69ddbc3182d89c981fc24dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40315-cwe-89-improper-neutralization-of-s-999a7473</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40315%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69ddbc3182d89c981fc24dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4388-cwe-79-improper-neutralization-of-in-167b94fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=69ddaa9d82d89c981fae6a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6227-cwe-22-improper-limitation-of-a-path-032a5e88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6227%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wp_media%20BackWPup%20%E2%80%93%20WordPress%20Backup%20%26%20Restore%20Plugin&amp;severity=high&amp;id=69ddaa9d82d89c981fae6a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-14th-2026-httpsisc-7c596c94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%2014th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9890%2C%20(Tue%2C%20Apr%2014th)&amp;severity=medium&amp;id=69dda00f82d89c981fa6090a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6264-cwe-306-missing-authentication-for-c-26a424cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6264%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Talend%20Talend%20JobServer&amp;severity=critical&amp;id=69ddaa9d82d89c981fae6a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39426-cwe-79-improper-neutralization-of-i-9106c343</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39426%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd9c8b82d89c981fa1192c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4352-cwe-89-improper-neutralization-of-sp-cdc75f12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4352%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69dd9c8b82d89c981fa11930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4365-cwe-862-missing-authorization-in-thi-8046e47d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4365%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=critical&amp;id=69dd9c8b82d89c981fa11934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39425-cwe-80-improper-neutralization-of-s-7656d9e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39425%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd9c8b82d89c981fa11928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39419-cwe-74-improper-neutralization-of-s-734f4c72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39419%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=low&amp;id=69dd9c8b82d89c981fa11923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39424-cwe-1236-improper-neutralization-of-e6ee8a15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39424%3A%20CWE-1236%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958b82d89c981f9c58a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39423-cwe-79-improper-neutralization-of-i-4b9705b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39423%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c582f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39422-cwe-79-improper-neutralization-of-i-0c702d0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39422%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c582a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39421-cwe-693-protection-mechanism-failur-b21ad8fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39421%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c5825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39420-cwe-693-protection-mechanism-failur-44d68598</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39420%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c5820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34264-cwe-204-observable-response-discrep-8e45814a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34264%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20SAP_SE%20SAP%20Human%20Capital%20Management%20for%20SAP%20S%2F4HANA&amp;severity=medium&amp;id=69dd958882d89c981f9c5817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34262-cwe-522-insufficiently-protected-cr-cde26fc9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34262%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SAP_SE%20SAP%20HANA%20Cockpit%20and%20HANA%20Database%20Explorer&amp;severity=medium&amp;id=69dd958882d89c981f9c5813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34261-cwe-862-missing-authorization-in-sa-c726a93c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34261%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Analytics%20and%20SAP%20Content%20Management&amp;severity=medium&amp;id=69dd958882d89c981f9c580f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39418-cwe-918-server-side-request-forgery-badcbb3e</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39418%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c581b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34257-cwe-601-url-redirection-to-untruste-3a3250f2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34257%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP&amp;severity=medium&amp;id=69dd958882d89c981f9c580b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34256-cwe-862-missing-authorization-in-sa-6bf07d71</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34256%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20ERP%20and%20SAP%20S%2F4%20HANA%20(Private%20Cloud%20and%20On-Premise)&amp;severity=high&amp;id=69dd958882d89c981f9c5807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27683-cwe-79-improper-neutralization-of-i-03fa2e5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27683%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=medium&amp;id=69dd877882d89c981f920dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27681-cwe-89-improper-neutralization-of-s-a7704991</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27681%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20Business%20Planning%20and%20Consolidation%20and%20SAP%20Business%20Warehouse&amp;severity=critical&amp;id=69dd877882d89c981f920dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27679-cwe-862-missing-authorization-in-sa-90db80ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27679%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20Frontend%20OData%20Service%20(Manage%20Reference%20Structures)&amp;severity=medium&amp;id=69dd877482d89c981f91f53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27678-cwe-862-missing-authorization-in-sa-b49825de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27678%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20Backend%20OData%20Service%20(Manage%20Reference%20Structures)&amp;severity=medium&amp;id=69dd877482d89c981f91f538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27677-cwe-862-missing-authorization-in-sa-5a7f4542</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27677%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20OData%20Service%20(Manage%20Reference%20Equipment)&amp;severity=medium&amp;id=69dd877482d89c981f91f534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27676-cwe-862-missing-authorization-in-sa-f0093fbc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27676%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20OData%20Service%20(Manage%20Technical%20Object%20Structures)&amp;severity=medium&amp;id=69dd877482d89c981f91f530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27675-cwe-94-improper-control-of-generati-d79b5e7f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27675%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Landscape%20Transformation&amp;severity=low&amp;id=69dd877482d89c981f91f52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27674-cwe-94-improper-control-of-generati-017daca5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27674%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java%20(Web%20Dynpro%20Java)&amp;severity=medium&amp;id=69dd877482d89c981f91f528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27673-cwe-862-missing-authorization-in-sa-0d3d76b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27673%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20and%20On-Premise)&amp;severity=medium&amp;id=69dd877482d89c981f91f524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27672-cwe-862-missing-authorization-in-sa-cbb9e4e4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27672%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20Material%20Master%20Application&amp;severity=medium&amp;id=69dd877482d89c981f91f520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24318-cwe-539-use-of-persistent-cookies-c-b5e0c8eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24318%3A%20CWE-539%3A%20Use%20of%20Persistent%20Cookies%20Containing%20Sensitive%20Information%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=medium&amp;id=69dd877482d89c981f91f51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0512-cwe-79-improper-neutralization-of-in-f12252f5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0512%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(SICF%20Handler%20in%20SRM%20Catalog)&amp;severity=medium&amp;id=69dd877482d89c981f91f518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39417-cwe-78-improper-neutralization-of-s-4644a8c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39417%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd877882d89c981f920dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-15-4bca6267</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-15&amp;severity=medium&amp;id=69df507382d89c981fb85c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-14-de7e96bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-14&amp;severity=medium&amp;id=69ded8ea82d89c981f22a762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70023-na-8e2b761a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70023%3A%20n%2Fa&amp;severity=critical&amp;id=69de7a1482d89c981fd6a5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38533-na-76357efe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38533%3A%20n%2Fa&amp;severity=medium&amp;id=69de5def82d89c981fb974df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38532-na-9e2b1a7e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38532%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38530-na-2a555f71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38530%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38529-na-707c3506</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38529%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38528-na-96f7457a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38528%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38527-na-61b4f49b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38527%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38526-na-df6c8898</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38526%3A%20n%2Fa&amp;severity=critical&amp;id=69de5def82d89c981fb974c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65136-na-7288dd01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65136%3A%20n%2Fa&amp;severity=medium&amp;id=69de5dec82d89c981fb9743d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65135-na-31ed1bec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65135%3A%20n%2Fa&amp;severity=critical&amp;id=69de5dec82d89c981fb9743a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65134-na-7cf4c1e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65134%3A%20n%2Fa&amp;severity=null&amp;id=69de5dec82d89c981fb97437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65133-na-972d16f1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65133%3A%20n%2Fa&amp;severity=critical&amp;id=69de5dec82d89c981fb97434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65132-na-f679a329</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65132%3A%20n%2Fa&amp;severity=medium&amp;id=69de5dec82d89c981fb97431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63939-na-64059743</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63939%3A%20n%2Fa&amp;severity=critical&amp;id=69de5dec82d89c981fb9742e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69993-na-c06fcbbf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69993%3A%20n%2Fa&amp;severity=medium&amp;id=69de56e582d89c981fb19049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69893-na-68897447</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69893%3A%20n%2Fa&amp;severity=medium&amp;id=69de56e582d89c981fb19045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37602-na-75e0d8cd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37602%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37601-na-c6edace0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37601%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37600-na-9dcd1e03</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37600%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37598-na-a4dc131b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37598%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37597-na-672bf1be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37597%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37596-na-9b822437</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37596%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37595-na-e4e245bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37595%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37594-na-f4237f0c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37594%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37593-na-b3454f76</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37593%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37592-na-24e4e97b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37592%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37591-na-d31493d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37591%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37590-na-442af028</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37590%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37589-na-fc0502ef</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37589%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30480-na-bf48b2a2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30480%3A%20n%2Fa&amp;severity=medium&amp;id=69de4fef82d89c981fa84b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61260-na-0294716d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61260%3A%20n%2Fa&amp;severity=critical&amp;id=69de4fef82d89c981fa84b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31049-na-bfd86452</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31049%3A%20n%2Fa&amp;severity=critical&amp;id=69de455082d89c981f9c8aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-14-62da04f7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-14&amp;severity=low&amp;id=69dda38b82d89c981fa8a874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34069-cwe-617-reachable-assertion-in-nimi-b4043ed2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34069%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20nimiq%20core-rs-albatross&amp;severity=medium&amp;id=69dd877882d89c981f920dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33948-cwe-170-improper-null-termination-i-a19631d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33948%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20jqlang%20jq&amp;severity=low&amp;id=69dd83f182d89c981f8ff256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40164-cwe-328-use-of-weak-hash-in-jqlang--2e4df7f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40164%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20jqlang%20jq&amp;severity=high&amp;id=69dd83f182d89c981f8ff25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5086-cwe-208-observable-timing-discrepanc-a3e1c12b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5086%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20NERDVANA%20Crypt%3A%3ASecretBuffer&amp;severity=high&amp;id=69dd75df82d89c981f793936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6203-cwe-601-url-redirection-to-untrusted-33a1f48a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6203%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69dd725c82d89c981f75a06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39979-cwe-125-out-of-bounds-read-in-jqlan-ef659246</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39979%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20jqlang%20jq&amp;severity=medium&amp;id=69dd725c82d89c981f75a06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39956-cwe-125-out-of-bounds-read-in-jqlan-b9793416</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39956%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20jqlang%20jq&amp;severity=medium&amp;id=69dd6ed782d89c981f72b22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4786-cwe-77-in-python-software-foundation-0859811e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4786%3A%20CWE-77%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69dd67d182d89c981f6a0138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33947-cwe-674-uncontrolled-recursion-in-j-e92b8dcc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33947%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20jqlang%20jq&amp;severity=medium&amp;id=69dd67d182d89c981f6a0134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22563-cwe-20-improper-input-validation-in-4175b900</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22563%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=critical&amp;id=69dd644b82d89c981f67c511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22562-cwe-22-path-traversal-in-ubiquiti-i-464fb9b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22562%3A%20CWE-22%20Path%20Traversal%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=critical&amp;id=69dd644b82d89c981f67c50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22566-cwe-284-improper-access-control-gen-119ad1e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22566%3A%20CWE-284%20Improper%20Access%20Control%20-%20Generic%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=high&amp;id=69dd644b82d89c981f67c51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22565-cwe-20-improper-input-validation-in-bf7c6da9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22565%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=high&amp;id=69dd644b82d89c981f67c517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22564-cwe-284-improper-access-control-gen-9d486d7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22564%3A%20CWE-284%20Improper%20Access%20Control%20-%20Generic%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=critical&amp;id=69dd644b82d89c981f67c514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6224-sandbox-issue-in-nocobase-plugin-wor-972a9f2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6224%3A%20Sandbox%20Issue%20in%20nocobase%20plugin-workflow-javascript&amp;severity=medium&amp;id=69dd60c882d89c981f657d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6220-server-side-request-forgery-in-humme-1003d9ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6220%3A%20Server-Side%20Request%20Forgery%20in%20HummerRisk&amp;severity=medium&amp;id=69dd60c882d89c981f657cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6219-command-injection-in-aandrew-me-ytdo-7fe71fa6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6219%3A%20Command%20Injection%20in%20aandrew-me%20ytDownloader&amp;severity=medium&amp;id=69dd59c182d89c981f5d4d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6218-cross-site-scripting-in-aandrew-me-y-047a4078</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6218%3A%20Cross%20Site%20Scripting%20in%20aandrew-me%20ytDownloader&amp;severity=medium&amp;id=69dd563d82d89c981f59ffe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32272-cwe-89-improper-neutralization-of-s-d6729621</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32272%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69dd563d82d89c981f59ffd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32271-cwe-89-improper-neutralization-of-s-99cfae41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32271%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69dd563d82d89c981f59ffd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6216-cross-site-scripting-in-dbgate-0a91b1d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6216%3A%20Cross%20Site%20Scripting%20in%20DbGate&amp;severity=medium&amp;id=69dd563d82d89c981f59ffe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32270-cwe-200-exposure-of-sensitive-infor-420217a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32270%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20commerce&amp;severity=low&amp;id=69dd4f3582d89c981f535a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6215-server-side-request-forgery-in-dbgat-f0b18b6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6215%3A%20Server-Side%20Request%20Forgery%20in%20DbGate&amp;severity=medium&amp;id=69de21bb82d89c981f275285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6202-sql-injection-in-code-projects-easy--bef2f821</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6202%3A%20SQL%20Injection%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69dd44ab82d89c981f46e105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6201-improper-access-controls-in-codeastr-5f178a95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6201%3A%20Improper%20Access%20Controls%20in%20CodeAstro%20Online%20Job%20Portal&amp;severity=medium&amp;id=69dd44ab82d89c981f46e0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32605-cwe-125-out-of-bounds-read-in-nimiq-f8a5cdff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32605%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69dd44ab82d89c981f46e0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6200-stack-based-buffer-overflow-in-tenda-8a88ed16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6200%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd3da482d89c981f3fccd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6199-stack-based-buffer-overflow-in-tenda-30cccc87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6199%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd3da482d89c981f3fccca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6198-stack-based-buffer-overflow-in-tenda-4cf4d0af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6198%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd369b82d89c981f375085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40044-deserialization-of-untrusted-data-i-ddf575cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40044%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pancho%20Pachno&amp;severity=critical&amp;id=69dd369b82d89c981f37507a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40043-authorization-bypass-through-user-c-cd03f12c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40043%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pancho%20Pachno&amp;severity=high&amp;id=69dd369b82d89c981f375076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40042-exposure-of-file-descriptor-to-unin-57db4884</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40042%3A%20Exposure%20of%20File%20Descriptor%20to%20Unintended%20Control%20Sphere%20(&apos;File%20Descriptor%20Leak&apos;)%20in%20pancho%20Pachno&amp;severity=critical&amp;id=69dd369b82d89c981f375072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40041-cross-site-request-forgery-csrf-in--f30108bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40041%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pancho%20Pachno&amp;severity=medium&amp;id=69dd369b82d89c981f37506e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40040-unrestricted-upload-of-file-with-da-ac271a05</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40040%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pancho%20Pachno&amp;severity=high&amp;id=69dd369b82d89c981f37506a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40039-authentication-bypass-by-primary-we-45f81d73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40039%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20pancho%20Pachno&amp;severity=high&amp;id=69dd369b82d89c981f375066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40038-improper-neutralization-of-input-du-7c227709</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40038%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pancho%20Pachno&amp;severity=medium&amp;id=69dd369b82d89c981f375062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6197-stack-based-buffer-overflow-in-tenda-1b570bd7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6197%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd369b82d89c981f37507e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32316-cwe-122-heap-based-buffer-overflow--67a3b592</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32316%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20jqlang%20jq&amp;severity=high&amp;id=69dd2f9182d89c981f2dce11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6196-stack-based-buffer-overflow-in-tenda-d5008aaf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6196%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd2f9182d89c981f2dce15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6195-os-command-injection-in-totolink-a71-657b0a43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6195%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dd369e82d89c981f37511d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6100-cwe-416-use-after-free-in-python-sof-0f033ecb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6100%3A%20CWE-416%20Use%20after%20free%20in%20Python%20Software%20Foundation%20CPython&amp;severity=critical&amp;id=69dd2f9182d89c981f2dce1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6194-stack-based-buffer-overflow-in-totol-a26bfb9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6194%3A%20Stack-based%20Buffer%20Overflow%20in%20Totolink%20A3002MU&amp;severity=high&amp;id=69dd44ab82d89c981f46e10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28291-cwe-78-improper-neutralization-of-s-96ab636e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28291%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20steveukx%20git-js&amp;severity=high&amp;id=69de21bb82d89c981f27528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3756-cwe-1284-improper-validation-of-spec-7704dd12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3756%3A%20CWE-1284%20Improper%20validation%20of%20specified%20quantity%20in%20input%20in%20ABB%20AC800M%20(System%20800xA)&amp;severity=high&amp;id=69dd369e82d89c981f37511a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6193-sql-injection-in-phpgurukul-daily-ex-c7eac9ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6193%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracking%20System&amp;severity=medium&amp;id=69de21bb82d89c981f275299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6192-integer-overflow-in-uclouvain-openjp-ef28e36c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6192%3A%20Integer%20Overflow%20in%20uclouvain%20openjpeg&amp;severity=medium&amp;id=69de21bb82d89c981f275290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39940-cwe-601-url-redirection-to-untruste-2a35287b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39940%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69dd1e0282d89c981f1b771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6191-sql-injection-in-itsourcecode-constr-e5549c5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6191%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69dd1e0282d89c981f1b772c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6190-sql-injection-in-itsourcecode-constr-0f179bdd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6190%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69dd1e0282d89c981f1b7725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6189-sql-injection-in-sourcecodester-phar-96023dda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6189%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69dd1e0282d89c981f1b771e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31991-cwe-307-improper-restriction-of-exc-c5c21653</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31991%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20HCLSoftware%20Velocity&amp;severity=medium&amp;id=69dd138382d89c981f0e28d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6188-sql-injection-in-sourcecodester-phar-06fa6ee4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6188%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69dd138382d89c981f0e28e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6231-cwe-20-improper-input-validation-in--97f26bbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6231%3A%20CWE-20%20Improper%20input%20validation%20in%20MongoDB%20Inc.%20C%20Driver&amp;severity=medium&amp;id=69dd138382d89c981f0e28ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6187-sql-injection-in-sourcecodester-phar-aea1d8b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6187%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69dd138382d89c981f0e28df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6186-buffer-overflow-in-utt-hiper-1200gw-043a1972</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6186%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201200GW&amp;severity=high&amp;id=69dd0c8782d89c981f09c95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-reader-0-day-96bf67be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Reader%200-day&amp;severity=medium&amp;id=69dd08e282d89c981f03878d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polymarket-trader-funds-at-risk-dprk-npm-package-s-2ee92661</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Polymarket%20Trader%20Funds%20at%20Risk%3A%20DPRK%20npm%20Package%20Steals%20Wallet%20Keys%20and%20Installs%20SSH%20Backdoor&amp;severity=medium&amp;id=69dd171882d89c981f125412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/live-c2-dump-recovering-every-stage-of-the-kill-ch-709bdb72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Live%20C2%20Dump%20Recovering%20Every%20Stage%20of%20the%20Kill%20Chain%3A%20CHM%20Dropper%2C%20VBScript%20Stager%2C%20PowerShell%20Keylogger&amp;severity=medium&amp;id=69dd171882d89c981f12541a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-recruiter-campaign-targets-crypto-developers--85147d94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20recruiter%20campaign%20targets%20crypto%20developers%20with%20RAT&amp;severity=medium&amp;id=69dd137d82d89c981f0e1bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/refundee-inside-a-shadow-panel-phishing-as-a-servi-e71e8c6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=REFUNDEE%3A%20Inside%20a%20Shadow%20Panel%20Phishing-as-a-Service%20Operation&amp;severity=medium&amp;id=69dd0fea82d89c981f0adb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-an-ottercookie-infostealer-campaign-acros-5d5ba2f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20an%20OtterCookie%20Infostealer%20Campaign%20Across%20npm&amp;severity=medium&amp;id=69dd0c6682d89c981f09ae9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6184-cross-site-scripting-in-code-project-ba5c4786</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6184%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Content%20Management%20System&amp;severity=medium&amp;id=69dd0c8782d89c981f09c954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1462-cwe-502-deserialization-of-untrusted-6e6c5fa9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1462%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20keras-team%20keras-team%2Fkeras&amp;severity=high&amp;id=69dd057082d89c981f016d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6183-sql-injection-in-code-projects-simpl-974105a8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6183%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Content%20Management%20System&amp;severity=medium&amp;id=69dd057082d89c981f016da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-targets-arabian-gulf-region-with-plug-40a84b9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Targets%20Arabian%20Gulf%20Region%20With%20PlugX&amp;severity=medium&amp;id=69dd01da82d89c981ff9dcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33858-cwe-502-deserialization-of-untruste-c129833d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33858%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69dd057082d89c981f016d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6182-sql-injection-in-code-projects-simpl-82289a0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6182%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Content%20Management%20System&amp;severity=medium&amp;id=69dd057082d89c981f016d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-android-rat-turning-infected-devices-into-po-1b096751</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20Android%20RAT%20turning%20infected%20devices%20into%20potential%20residential%20proxy%20nodes&amp;severity=medium&amp;id=69dd01db82d89c981ff9dd2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bookingcom-says-hackers-accessed-user-information-fe24f788</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Booking.com%20Says%20Hackers%20Accessed%20User%20Information&amp;severity=medium&amp;id=69dcfe5782d89c981ff7af6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66236-cwe-532-insertion-of-sensitive-info-d9544988</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66236%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69dd057082d89c981f016d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-leverage-claude-code-leak-as-social--8f910002</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20Leverage%20Claude%20Code%20Leak%20as%20Social%20Engineering%20Lure%20to%20Distribute%20Malicious%20Payloads%20via%20GitHub&amp;severity=medium&amp;id=69dd01db82d89c981ff9dd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/browsergate-claims-of-linkedin-spying-clash-with-s-385b7592</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BrowserGate%3A%20Claims%20of%20LinkedIn%20%E2%80%98Spying%E2%80%99%20Clash%20With%20Security%20Research%20Findings&amp;severity=medium&amp;id=69dd0a1182d89c981f054399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/13th-april-threat-intelligence-report-88885a79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=13th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69dceccf82d89c981fdf6988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scans-for-encystphp-webshell-mon-apr-13th-12c43e49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scans%20for%20EncystPHP%20Webshell%2C%20(Mon%2C%20Apr%2013th)&amp;severity=medium&amp;id=69dcecc482d89c981fdf6328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34476-cwe-918-server-side-request-forgery-d592247b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34476%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20SkyWalking%20MCP&amp;severity=high&amp;id=69dcecd082d89c981fdf6a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-impacted-by-north-korea-linked-axios-supply-db914e14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Impacted%20by%20North%20Korea-Linked%20Axios%20Supply%20Chain%20Hack&amp;severity=medium&amp;id=69dce5bb82d89c981fda16e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/international-operation-targets-multimillion-dolla-5525d62a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=International%20Operation%20Targets%20Multimillion-Dollar%20Crypto%20Theft%20Schemes&amp;severity=medium&amp;id=69dcd7ac82d89c981fc769bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-your-privacy-while-using-smart-sex--988c951e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20your%20privacy%20while%20using%20smart%20sex%20toys%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69dcd02982d89c981fbb38ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cpuid-hacked-to-serve-trojanized-cpu-z-and-hwmonit-7573c4c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CPUID%20Hacked%20to%20Serve%20Trojanized%20CPU-Z%20and%20HWMonitor%20Downloads&amp;severity=medium&amp;id=69dccd1f82d89c981fb6579e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-claude-website-distributes-plugx-rat-aa7431ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Claude%20Website%20Distributes%20PlugX%20RAT&amp;severity=medium&amp;id=69dcbf0f82d89c981f99f930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15632-cross-site-scripting-in-1panel-dev--7a3eba1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15632%3A%20Cross%20Site%20Scripting%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dcbf1a82d89c981f9a03c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35337-cwe-502-deserialization-of-untruste-675b4697</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35337%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20Client&amp;severity=high&amp;id=69dcbf1a82d89c981f9a03d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35565-cwe-79-improper-neutralization-of-i-3f694165</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35565%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20UI&amp;severity=medium&amp;id=69dcbf1a82d89c981f9a03e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cpu-z-hwmonitor-cpuidcom-watering-hole-attack-f42e55fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CPU-Z%20%26%20HWMonitor%2C%20cpuid.com%2C%20Watering%20Hole%20Attack&amp;severity=medium&amp;id=69dcb11e82d89c981f84024d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4810-cwe-306-missing-authentication-for-c-90e44d82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4810%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Google%20Cloud%20Agent%20Development%20Kit%20(ADK)&amp;severity=critical&amp;id=69dcb49d82d89c981f86edcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gmail-brings-end-to-end-encryption-to-android-and--0642b6a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gmail%20Brings%20End-to-End%20Encryption%20to%20Android%20and%20iOS%20for%20Enterprise%20Users&amp;severity=low&amp;id=69dca9f782d89c981f7d90e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0232-cwe-15-external-control-of-system-or-7ae8859f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0232%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Agent&amp;severity=medium&amp;id=69dc9f6d82d89c981f660387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0233-cwe-295-improper-certificate-validat-3fa76797</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0233%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Palo%20Alto%20Networks%20Autonomous%20Digital%20Experience%20Manager&amp;severity=low&amp;id=69dc9f6d82d89c981f66038a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0234-cwe-347-improper-verification-of-cry-77c20c64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0234%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Palo%20Alto%20Networks%20Cortex%20XSOAR%20Microsoft%20Teams%20Marketplace&amp;severity=high&amp;id=69dc9f6d82d89c981f66038d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5936-cwe-918-server-side-request-forgery--703e707e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5936%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Services%20API&amp;severity=high&amp;id=69dcd01e82d89c981fbb28e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5085-cwe-340-generation-of-predictable-nu-b0e46b2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5085%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20MCRAWFOR%20Solstice%3A%3ASession&amp;severity=critical&amp;id=69dcd01e82d89c981fbb28d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40436-cwe269-improper-privilege-managemen-3c704b13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40436%3A%20CWE%E2%80%91269%20Improper%20Privilege%20Management%20in%20ZTE%20ZXEDM%20iEMS&amp;severity=high&amp;id=69dcd01e82d89c981fbb28d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6168-stack-based-buffer-overflow-in-totol-926c3f9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6168%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A7000R&amp;severity=high&amp;id=69dcd01f82d89c981fbb2903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6167-sql-injection-in-code-projects-facul-930b857e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6167%3A%20SQL%20Injection%20in%20code-projects%20Faculty%20Management%20System&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34866-cwe-120-buffer-copy-without-checkin-299fb76a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34866%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34865-cwe-122-heap-based-buffer-overflow--f39e88a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34865%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=69dcd01e82d89c981fbb28bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6166-sql-injection-in-code-projects-vehic-a755d753</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6166%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3830-cwe-89-sql-injection-in-product-filt-8d62abb0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3830%3A%20CWE-89%20SQL%20Injection%20in%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=high&amp;id=69dcd01e82d89c981fbb28cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15441-cwe-89-sql-injection-in-form-maker--b9ba0370</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15441%3A%20CWE-89%20SQL%20Injection%20in%20Form%20Maker%20by%2010Web&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6165-sql-injection-in-code-projects-vehic-c4e85e3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6165%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc86f082d89c981f39d666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6164-sql-injection-in-code-projects-lost--96df4a92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6164%3A%20SQL%20Injection%20in%20code-projects%20Lost%20and%20Found%20Thing%20Management&amp;severity=medium&amp;id=69dc86f082d89c981f39d65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6163-sql-injection-in-code-projects-lost--716fd1d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6163%3A%20SQL%20Injection%20in%20code-projects%20Lost%20and%20Found%20Thing%20Management&amp;severity=medium&amp;id=69dc86f082d89c981f39d657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21010-cwe-20-improper-input-validation-in-46318ce4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21010%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21008-cwe-200-exposure-of-sensitive-infor-f4dc6453</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21008%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40447-cwe-190-integer-overflow-or-wraparo-b9281796</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40447%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21014-cwe-284-improper-access-control-in--1fe32321</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21014%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Camera&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21013-cwe-276-incorrect-default-permissio-2eb54624</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21013%3A%20CWE-276%3A%20Incorrect%20Default%20Permission%20in%20Samsung%20Mobile%20Galaxy%20Wearable&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21012-cwe-73-external-control-of-file-nam-0e39053f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21012%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21011-cwe-266-incorrect-privilege-assignm-7ca30c25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21011%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21009-cwe-754-improper-check-for-unusual--5cdeb51a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21009%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21007-cwe-754-improper-check-for-unusual--3067d701</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21007%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21006-cwe-284-improper-access-control-in--f34ac3c1</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21006%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6162-cross-site-scripting-in-phpgurukul-c-943de151</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6162%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=69dc7c4a82d89c981f24c393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21003-cwe-20-improper-input-validation-in-428207a8</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21003%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40446-cwe-843-access-of-resource-using-in-c8f86d8b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40446%3A%20CWE-843%20Access%20of%20resource%20using%20incompatible%20type%20(&apos;type%20confusion&apos;)%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc7c4782d89c981f24c288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25209-cwe-125-out-of-bounds-read-in-samsu-a8f7687c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25209%3A%20CWE-125%20Out-of-bounds%20read%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25208-cwe-190-integer-overflow-or-wraparo-e8a94f50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25208%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=high&amp;id=69dc7c4582d89c981f24c1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25207-cwe-787-out-of-bounds-write-in-sams-4980e58e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25207%3A%20CWE-787%20Out-of-bounds%20write%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=high&amp;id=69dc7c4582d89c981f24c1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6161-sql-injection-in-code-projects-simpl-2248136e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6161%3A%20SQL%20Injection%20in%20code-projects%20Simple%20ChatBox&amp;severity=medium&amp;id=69dc7c4a82d89c981f24c38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25206-cwe-125-out-of-bounds-read-in-samsu-d749862b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25206%3A%20CWE-125%20Out-of-bounds%20read%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25205-cwe-122-heap-based-buffer-overflow--4584a89e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25205%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=high&amp;id=69dc7c4582d89c981f24c1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6160-file-and-directory-information-expos-fa73f35f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6160%3A%20File%20and%20Directory%20Information%20Exposure%20in%20code-projects%20Simple%20ChatBox&amp;severity=medium&amp;id=69dc7c4a82d89c981f24c385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6159-cross-site-scripting-in-code-project-c7655aab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6159%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20ChatBox&amp;severity=medium&amp;id=69dc7c4782d89c981f24c292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34864-cwe-119-improper-restriction-of-ope-7e86aa19</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34864%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34863-cwe-787-out-of-bounds-write-in-huaw-e3f550ca</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34863%3A%20CWE-787%20Out-of-bounds%20write%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34862-cwe-362-concurrent-execution-using--0efce1e5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34862%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34861-cwe-362-concurrent-execution-using--2cbedd77</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34861%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34859-cwe-416-use-after-free-in-huawei-ha-5f3182f4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34859%3A%20CWE-416%20Use%20after%20free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34858-cwe-362-concurrent-execution-using--7cfd5c85</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34858%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34857-cwe-362-concurrent-execution-using--717a190f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34857%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35553-stack-based-buffer-overflow-in-dyna-e28ddf92</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35553%3A%20Stack-based%20buffer%20overflow%20in%20Dynabook%20Inc.%20TOSRFEC.SYS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34855-cwe-20-improper-input-validation-in-fab36aeb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34855%3A%20CWE-20%20Improper%20input%20validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34854-cwe-416-use-after-free-in-huawei-ha-a4c7ceb2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34854%3A%20CWE-416%20Use%20after%20free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6158-os-command-injection-in-totolink-n30-6e3cef0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6158%3A%20OS%20Command%20Injection%20in%20Totolink%20N300RH&amp;severity=medium&amp;id=69dc7c4782d89c981f24c28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34849-cwe-362-concurrent-execution-using--0ae21aaa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34849%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69dc7c4582d89c981f24c1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34856-cwe-362-concurrent-execution-using--b615401f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34856%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69dc6aaf82d89c981fecb079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34853-cwe-270-privilege-context-switching-47f2dae2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34853%3A%20CWE-270%20Privilege%20context%20switching%20error%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69dc6aaf82d89c981fecb075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28553-cwe-275-permission-issues-in-huawei-ad31a06e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28553%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34867-cwe-415-double-free-in-huawei-harmo-34799778</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34867%3A%20CWE-415%20Double%20free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34860-cwe-284-improper-access-control-in--0d2249cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34860%3A%20CWE-284%20Improper%20Access%20Control%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34852-cwe-835-loop-with-unreachable-exit--538938f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34852%3A%20CWE-835%20Loop%20with%20unreachable%20exit%20condition%20(&apos;infinite%20loop&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6157-buffer-overflow-in-totolink-a800r-47a7fe50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6157%3A%20Buffer%20Overflow%20in%20Totolink%20A800R&amp;severity=high&amp;id=69dc6ab182d89c981fecb370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34851-cwe-362-concurrent-execution-using--40f83c52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34851%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69dc6aaf82d89c981fecb06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34850-cwe-362-concurrent-execution-using--4b5d699d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34850%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69dc6aaf82d89c981fecb068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6156-os-command-injection-in-totolink-a71-061dc469</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6156%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc6ab182d89c981fecb369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6155-os-command-injection-in-totolink-a71-7391e9c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6155%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc6ab182d89c981fecb362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6154-os-command-injection-in-totolink-a71-87e9e42c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6154%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc6aaf82d89c981fecb08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6153-sql-injection-in-code-projects-vehic-31081b24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6153%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6152-sql-injection-in-code-projects-vehic-235da6a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6152%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6179-cwe-79-improper-neutralization-of-in-f9fe77cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6179%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20FPT%20Software%20NightWolf%20Penetration%20Testing%20Platform&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6151-sql-injection-in-code-projects-vehic-256441ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6151%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6150-cross-site-scripting-in-code-project-deba8bdf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6150%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-april-13th-2026-httpsiscs-13a5275d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20April%2013th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9888%2C%20(Mon%2C%20Apr%2013th)&amp;severity=medium&amp;id=69dc4e8f82d89c981fb3cbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6149-sql-injection-in-code-projects-vehic-9d23061b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6149%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc4b0b82d89c981fa7dfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6148-sql-injection-in-code-projects-vehic-bd615293</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6148%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc4b0b82d89c981fa7dfd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6143-permissive-cross-domain-policy-with--b3323dd8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6143%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20farion1231%20cc-switch&amp;severity=medium&amp;id=69dc4b0b82d89c981fa7dfc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6142-sql-injection-in-tushar-2223-hotel-m-4439ac4c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6142%3A%20SQL%20Injection%20in%20tushar-2223%20Hotel%20Management%20System&amp;severity=medium&amp;id=69dc440382d89c981fa0ac0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25204-cwe-502-deserialization-of-untruste-10355b57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25204%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc440382d89c981fa0abf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6141-os-command-injection-in-danielmiessl-45304d9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6141%3A%20OS%20Command%20Injection%20in%20danielmiessler%20Personal_AI_Infrastructure&amp;severity=medium&amp;id=69dc440382d89c981fa0ac05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6140-os-command-injection-in-totolink-a71-8e1c7584</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6140%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc440382d89c981fa0abfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6139-os-command-injection-in-totolink-a71-92890d24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6139%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc440382d89c981fa0abf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6138-os-command-injection-in-totolink-a71-a4d695c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6138%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc35f382d89c981f798832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-14-aae7f576</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-14&amp;severity=medium&amp;id=69de33af82d89c981f2f83c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-13-425403c0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-13&amp;severity=medium&amp;id=69dd876a82d89c981f91c0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26460-na-18771092</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26460%3A%20n%2Fa&amp;severity=medium&amp;id=69dd59c182d89c981f5d4d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70936-na-3e41b6df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70936%3A%20n%2Fa&amp;severity=medium&amp;id=69dd59c182d89c981f5d4d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31280-na-efadddcc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31280%3A%20n%2Fa&amp;severity=medium&amp;id=69dd563d82d89c981f59ffce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51414-na-91604ecd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51414%3A%20n%2Fa&amp;severity=high&amp;id=69dd563d82d89c981f59ffca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31048-na-cb39c07b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31048%3A%20n%2Fa&amp;severity=critical&amp;id=69dd44ab82d89c981f46e0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29955-na-ff239336</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29955%3A%20n%2Fa&amp;severity=high&amp;id=69dd369b82d89c981f37505e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36952-na-b681ec7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36952%3A%20n%2Fa&amp;severity=low&amp;id=69dd1e0282d89c981f1b7717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36950-na-ccb4d705</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36950%3A%20n%2Fa&amp;severity=low&amp;id=69dd1e0282d89c981f1b7714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36948-na-73e247d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36948%3A%20n%2Fa&amp;severity=high&amp;id=69dd1e0282d89c981f1b7710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36938-na-6e422029</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36938%3A%20n%2Fa&amp;severity=low&amp;id=69dd138382d89c981f0e28dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36937-na-01c3f985</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36937%3A%20n%2Fa&amp;severity=low&amp;id=69dd138382d89c981f0e28d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63743-na-26e8c8c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63743%3A%20n%2Fa&amp;severity=medium&amp;id=69dd138382d89c981f0e28d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69627-na-7e25f884</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69627%3A%20n%2Fa&amp;severity=high&amp;id=69dd0c8782d89c981f09c950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69624-na-547e4d69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69624%3A%20n%2Fa&amp;severity=high&amp;id=69dd0c8782d89c981f09c94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66769-na-b9a9fdef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66769%3A%20n%2Fa&amp;severity=high&amp;id=69dd0c8782d89c981f09c949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36941-na-44ede602</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36941%3A%20n%2Fa&amp;severity=low&amp;id=69dd057082d89c981f016d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30999-na-8fbedab9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30999%3A%20n%2Fa&amp;severity=high&amp;id=69dd057082d89c981f016d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30998-na-8cbe983f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30998%3A%20n%2Fa&amp;severity=high&amp;id=69dd057082d89c981f016d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30997-na-b89c6367</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30997%3A%20n%2Fa&amp;severity=high&amp;id=69dd057082d89c981f016d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36945-na-17861145</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36945%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36944-na-f9de8d02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36944%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36943-na-41506e89</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36943%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36942-na-b4d79b66</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36942%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31283-na-a7ddfa0d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31283%3A%20n%2Fa&amp;severity=critical&amp;id=69dcfe7a82d89c981ff7d604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31282-na-88dbd640</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31282%3A%20n%2Fa&amp;severity=critical&amp;id=69dcfe7a82d89c981ff7d600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31281-na-2b1c5812</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31281%3A%20n%2Fa&amp;severity=high&amp;id=69dcfe7a82d89c981ff7d5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29628-na-e13f5148</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29628%3A%20n%2Fa&amp;severity=medium&amp;id=69dcfe7a82d89c981ff7d5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36947-na-8bda4b83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36947%3A%20n%2Fa&amp;severity=low&amp;id=69dcf3cf82d89c981fee9b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36946-na-1cc0a2fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36946%3A%20n%2Fa&amp;severity=low&amp;id=69dcf3cf82d89c981fee9b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36923-na-84469258</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36923%3A%20n%2Fa&amp;severity=low&amp;id=69dcecd082d89c981fdf6a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36922-na-ecbf239b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36922%3A%20n%2Fa&amp;severity=low&amp;id=69dcecd082d89c981fdf6a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36920-na-3b139a32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36920%3A%20n%2Fa&amp;severity=low&amp;id=69dcecd082d89c981fdf6a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36919-na-2c9e4158</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36919%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36874-na-12d6a30b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36874%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36873-na-5c465477</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36873%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36872-na-b4ff357e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36872%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-13-91de2cd6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-13&amp;severity=low&amp;id=69dc86e282d89c981f39b609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6137-stack-based-buffer-overflow-in-tenda-189c6cd1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6137%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc327182d89c981f768b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6136-stack-based-buffer-overflow-in-tenda-fb08e76b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6136%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc2f0082d89c981f6be0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6135-stack-based-buffer-overflow-in-tenda-3254f476</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6135%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc2b6782d89c981f6938cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6134-stack-based-buffer-overflow-in-tenda-c1d0d543</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6134%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc27e482d89c981f652da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6133-stack-based-buffer-overflow-in-tenda-3b6543ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6133%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc245f82d89c981f62f978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6132-os-command-injection-in-totolink-a71-401747c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6132%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc20db82d89c981f45ab3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6131-os-command-injection-in-totolink-a71-ce3a9dd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6131%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc1d5782d89c981f304cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6130-os-command-injection-in-chatboxai-ch-705fc80d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6130%3A%20OS%20Command%20Injection%20in%20chatboxai%20chatbox&amp;severity=medium&amp;id=69dc19d482d89c981f05d631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6129-missing-authentication-in-zhayujie-c-9a9de156</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6129%3A%20Missing%20Authentication%20in%20zhayujie%20chatgpt-on-wechat%20CowAgent&amp;severity=medium&amp;id=69dbfa3282d89c981fc610c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40396-cwe-670-always-incorrect-control-fl-7bfc9c43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40396%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=69dbf32682d89c981fb00945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40395-cwe-770-allocation-of-resources-wit-311788da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40395%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20varnish-software%20Varnish%20Enterprise&amp;severity=medium&amp;id=69dbf32682d89c981fb00942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40394-cwe-670-always-incorrect-control-fl-e713a1d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40394%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=69dbf32682d89c981fb0093f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40393-cwe-787-out-of-bounds-write-in-mesa-fa5bea91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40393%3A%20CWE-787%20Out-of-bounds%20Write%20in%20mesa3d%20Mesa&amp;severity=high&amp;id=69dbefa382d89c981fa9bf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40386-cwe-191-integer-underflow-wrap-or-w-d3d5978b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40386%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20libexif%20project%20libexif&amp;severity=medium&amp;id=69dbe51682d89c981fa14164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40385-cwe-190-integer-overflow-or-wraparo-223f5288</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40385%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20libexif%20project%20libexif&amp;severity=medium&amp;id=69dbe51682d89c981fa14161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6126-missing-authentication-in-zhayujie-c-501c13d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6126%3A%20Missing%20Authentication%20in%20zhayujie%20chatgpt-on-wechat%20CowAgent&amp;severity=medium&amp;id=69db781b82d89c981f3d4477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6125-code-injection-in-dromara-warm-flow-8c53d100</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6125%3A%20Code%20Injection%20in%20Dromara%20warm-flow&amp;severity=medium&amp;id=69db6d8f82d89c981f360dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6124-stack-based-buffer-overflow-in-tenda-4ff35eb5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6124%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db630382d89c981f2e65bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6123-stack-based-buffer-overflow-in-tenda-96a0216c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6123%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db7e7c82d89c981f416476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-reader-zero-day-exploited-for-months-cd76f82f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Reader%20Zero-Day%20Exploited%20for%20Months&amp;severity=medium&amp;id=69db4deb82d89c981f1a302e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6122-stack-based-buffer-overflow-in-tenda-40cd8adb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6122%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db517682d89c981f1ce65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6121-stack-based-buffer-overflow-in-tenda-e3f9272e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db4a6682d89c981f186e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6120-stack-based-buffer-overflow-in-tenda-54bc050c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6120%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db38d382d89c981f09b1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6119-server-side-request-forgery-in-astrb-c678b667</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6119%3A%20Server-Side%20Request%20Forgery%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69db31ca82d89c981f05ff23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6118-command-injection-in-astrbotdevs-ast-ac56d615</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6118%3A%20Command%20Injection%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69db273e82d89c981fe5dd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6117-sandbox-issue-in-astrbotdevs-astrbot-00abdc7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6117%3A%20Sandbox%20Issue%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69db273e82d89c981fe5dd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6116-os-command-injection-in-totolink-a71-15ee14e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6116%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db273e82d89c981fe5dd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6115-os-command-injection-in-totolink-a71-2eb78416</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6115%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db273e82d89c981fe5dd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6114-os-command-injection-in-totolink-a71-384165a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6114%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db193e82d89c981fd60368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6113-os-command-injection-in-totolink-a71-16ad03cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6113%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db193e82d89c981fd60361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6112-os-command-injection-in-totolink-a71-83c5f182</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6112%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db193e82d89c981fd6035a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6111-server-side-request-forgery-in-found-2c681ea1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6111%3A%20Server-Side%20Request%20Forgery%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69db079a82d89c981fa08bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1116-cwe-79-improper-neutralization-of-in-c711f067</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69db079a82d89c981fa08be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6110-code-injection-in-foundationagents-m-f4c02c00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6110%3A%20Code%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69db079a82d89c981fa08be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6109-cross-site-request-forgery-in-founda-03848c85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6109%3A%20Cross-Site%20Request%20Forgery%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69daf99182d89c981f7b7ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6108-os-command-injection-in-1panel-dev-m-0d8b3931</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6108%3A%20OS%20Command%20Injection%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69db7e7c82d89c981f416488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6107-cross-site-scripting-in-1panel-dev-m-f1e01e0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6107%3A%20Cross%20Site%20Scripting%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69db7e7c82d89c981f41647e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-13-b0fcb029</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-13&amp;severity=medium&amp;id=69dd136882d89c981f0d7575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-12-7b4cc969</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-12&amp;severity=medium&amp;id=69dc35ea82d89c981f7953ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-12-bd47b229</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-12&amp;severity=low&amp;id=69db667e82d89c981f307658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6106-cross-site-scripting-in-1panel-dev-m-cd592a06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6106%3A%20Cross%20Site%20Scripting%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dacbd682d89c981f306a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6105-improper-authorization-in-perfree-go-21e2d196</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6105%3A%20Improper%20Authorization%20in%20perfree%20go-fastdfs-web&amp;severity=medium&amp;id=69dac85b82d89c981f2de9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31845-cwe-79-improper-neutralization-of-i-5f1f2c55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Rukovoditel%20Rukovoditel%20CRM&amp;severity=critical&amp;id=69da972082d89c981f082366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23900-cwe-79-improper-neutralization-of-i-e50d7564</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phoca.cz%20phoca.cz%20-%20Phoca%20Maps%20for%20Joomla&amp;severity=medium&amp;id=69da4d4882d89c981fd2d7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5809-cwe-73-external-control-of-file-name-7d1ff4ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5809%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=69da00db1cc7ad14da61c7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34621-improperly-controlled-modification--1b9951d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34621%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20(CWE-1321)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69da15f41cc7ad14da6d013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3371-cwe-639-authorization-bypass-through-6e97df2c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3371%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69d9a5741cc7ad14da144113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4979-cwe-918-server-side-request-forgery--5030e4e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4979%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=69d9a5741cc7ad14da144129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5144-cwe-269-improper-privilege-managemen-f1535bf6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5144%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20boonebgorges%20BuddyPress%20Groupblog&amp;severity=high&amp;id=69d9a5741cc7ad14da144131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3498-cwe-79-improper-neutralization-of-in-2f47cf95</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpblockart%20BlockArt%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20Blocks%20%2CWordPress%20Block%20Plugin%2C%20Sections%20%26%20Template%20Library&amp;severity=medium&amp;id=69d9a5741cc7ad14da14411a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4895-cwe-79-improper-neutralization-of-in-4c0d635b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69d9a5741cc7ad14da144120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5217-cwe-79-improper-neutralization-of-in-49825cdd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Optimole%20%E2%80%93%20Optimize%20Images%20in%20Real%20Time&amp;severity=high&amp;id=69d9a5741cc7ad14da144142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5207-cwe-89-improper-neutralization-of-sp-9d26e41a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5207%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WP%20LMS%20for%20eLearning%2C%20Online%20Courses%2C%20%26%20Quizzes&amp;severity=medium&amp;id=69d9a5741cc7ad14da14413b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5226-cwe-79-improper-neutralization-of-in-a73b4818</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Optimole%20%E2%80%93%20Optimize%20Images%20in%20Real%20Time&amp;severity=medium&amp;id=69d9a5741cc7ad14da14414b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3358-cwe-862-missing-authorization-in-the-541a13ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3358%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69d9a5741cc7ad14da14410a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40354-cwe-61-unix-symbolic-link-symlink-f-067082f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40354%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Flatpak%20xdg-desktop-portal&amp;severity=low&amp;id=69d99e6e1cc7ad14da1225aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4157-cwe-78-improper-neutralization-of-sp-e916d229</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4157%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ChargePoint%20Home%20Flex&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4156-cwe-121-stack-based-buffer-overflow--4cc3f2ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4156%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ChargePoint%20Home%20Flex&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4155-cwe-540-inclusion-of-sensitive-infor-6f8550d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4155%3A%20CWE-540%3A%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20ChargePoint%20Home%20Flex&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5495-cwe-787-out-of-bounds-write-in-labce-29682a54</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5495%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5494-cwe-787-out-of-bounds-write-in-labce-1c6b705a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5494%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5493-cwe-787-out-of-bounds-write-in-labce-65326a90</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5493%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5496-cwe-843-access-of-resource-using-inc-83683539</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5496%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4149-cwe-119-improper-restriction-of-oper-dcf90312</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4149%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Sonos%20Era%20300&amp;severity=critical&amp;id=69d99e6e1cc7ad14da1225b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-12-83aa8314</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-12&amp;severity=medium&amp;id=69dbf6a382d89c981fb12448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-11-b2ee18dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-11&amp;severity=medium&amp;id=69dae46a82d89c981f441f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-11-870bf8db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-11&amp;severity=low&amp;id=69d9ba841cc7ad14da1f0f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40199-cwe-130-improper-handling-of-length-73de8518</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40199%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20STIGTSP%20Net%3A%3ACIDR%3A%3ALite&amp;severity=medium&amp;id=69d9743b1cc7ad14daee2672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40198-cwe-1286-improper-validation-of-syn-dbf39b2e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40198%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20STIGTSP%20Net%3A%3ACIDR%3A%3ALite&amp;severity=high&amp;id=69d9743b1cc7ad14daee266d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33118-spoofing-in-microsoft-microsoft-edg-828099eb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33118%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69d96d341cc7ad14daec12be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33119-cwe-451-user-interface-ui-misrepres-3c84bf78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33119%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=69d96d341cc7ad14daec12c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5724-cwe-306-missing-authentication-for-c-2cb7d2d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5724%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Temporal%20Technologies%2C%20Inc.%20temporal&amp;severity=medium&amp;id=69d969b01cc7ad14daeabe2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40252-cwe-284-improper-access-control-in--2ccbdf06</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40252%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20labring%20FastGPT&amp;severity=medium&amp;id=69d9662c1cc7ad14dae9687b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40242-cwe-918-server-side-request-forgery-5eaaa2b0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40242%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20getarcaneapp%20arcane&amp;severity=high&amp;id=69d962a81cc7ad14dae87051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40191-cwe-863-incorrect-authorization-in--1c3e33a9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40191%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=medium&amp;id=69d95f431cc7ad14dae72c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40190-cwe-1321-improperly-controlled-modi-f84ee3e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40190%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20langchain-ai%20langsmith-sdk&amp;severity=medium&amp;id=69d9581c1cc7ad14dae48c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40189-cwe-862-missing-authorization-in-pa-3a1ae9b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40189%3A%20CWE-862%3A%20Missing%20Authorization%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d9581c1cc7ad14dae48c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40188-cwe-1314-missing-write-protection-f-3b40b321</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40188%3A%20CWE-1314%3A%20Missing%20Write%20Protection%20for%20Parametric%20Data%20Values%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69d9581c1cc7ad14dae48c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40185-cwe-862-missing-authorization-in-ma-0fd98725</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40185%3A%20CWE-862%3A%20Missing%20Authorization%20in%20mauriceboe%20TREK&amp;severity=high&amp;id=69d9581c1cc7ad14dae48c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40184-cwe-306-missing-authentication-for--4af6e206</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40184%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20mauriceboe%20TREK&amp;severity=low&amp;id=69d9581c1cc7ad14dae48c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40180-cwe-22-improper-limitation-of-a-pat-9f8db994</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40180%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20quarkiverse%20quarkus-openapi-generator&amp;severity=high&amp;id=69d9581c1cc7ad14dae48c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40168-cwe-918-server-side-request-forgery-e96b88f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40168%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69d9d9721cc7ad14da3f862a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27460-cwe-409-improper-handling-of-highly-1160e850</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27460%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0fae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33737-cwe-611-improper-restriction-of-xml-c825261b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33737%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0faf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33736-cwe-639-authorization-bypass-throug-7ed8eb06</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33736%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0faf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33710-cwe-330-use-of-insufficiently-rando-14b6a24b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33710%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d94d8f1cc7ad14dae0faf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33708-cwe-862-missing-authorization-in-ch-c3c25773</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33708%3A%20CWE-862%3A%20Missing%20Authorization%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0faec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33707-cwe-640-weak-password-recovery-mech-2af5871d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33707%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69d94d8f1cc7ad14dae0fae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33706-cwe-269-improper-privilege-manageme-125a7abd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33706%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d94d8f1cc7ad14dae0fae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33705-cwe-538-insertion-of-sensitive-info-00b761cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33705%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d9d9721cc7ad14da3f8633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33704-cwe-434-unrestricted-upload-of-file-9f5d6a2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33704%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d9d9721cc7ad14da3f862f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33703-cwe-639-authorization-bypass-throug-cb9e803c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33703%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d943121cc7ad14dadcb1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3446-vulnerability-in-python-software-fou-9e529bcb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3446%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69d943121cc7ad14dadcb1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33702-cwe-639-authorization-bypass-throug-925fbc0e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33702%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d943121cc7ad14dadcb19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33698-cwe-552-files-or-directories-access-2b2046ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33698%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69d943121cc7ad14dadcb199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33618-cwe-95-improper-neutralization-of-d-d093150c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33618%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d943121cc7ad14dadcb195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33141-cwe-639-authorization-bypass-throug-8ba8b98b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33141%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d93c061cc7ad14dada4d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32892-cwe-78-improper-neutralization-of-s-5b2019d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32892%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69d93c061cc7ad14dada4d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1502-vulnerability-in-python-software-fou-d29a3a25</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1502%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69d93c061cc7ad14dada4d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32932-cwe-601-url-redirection-to-untruste-630b1042</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32932%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d93c061cc7ad14dada4d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32931-cwe-434-unrestricted-upload-of-file-4bedfb62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32931%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d93c061cc7ad14dada4d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32930-cwe-639-authorization-bypass-throug-898438cc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32930%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d93c061cc7ad14dada4d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32894-cwe-476-null-pointer-dereference-in-cef4e8af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32894%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad95287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32893-cwe-79-improper-neutralization-of-i-7ad4ff8e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32893%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d938791cc7ad14dad95283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31941-cwe-918-server-side-request-forgery-eae47332</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31941%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad9527e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31940-cwe-384-session-fixation-in-chamilo-5447c6f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31940%3A%20CWE-384%3A%20Session%20Fixation%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad95279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5483-insertion-of-sensitive-information-i-7240e491</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5483%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%202.16&amp;severity=high&amp;id=69d938791cc7ad14dad9528c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31939-cwe-22-improper-limitation-of-a-pat-40f7a66b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31939%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad95274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-your-organization-from-airsnitch-wi-37876665</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20your%20organization%20from%20AirSnitch%20Wi-Fi%20vulnerabilities%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d931771cc7ad14dad5c79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40160-cwe-918-server-side-request-forgery-ff80f530</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40160%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=high&amp;id=69d9d9751cc7ad14da3f8720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40159-cwe-200-exposure-of-sensitive-infor-d2289657</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40159%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f871d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40158-cwe-94-improper-control-of-generati-fa9a72f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40158%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d9d9721cc7ad14da3f863d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40157-cwe-22-improper-limitation-of-a-pat-3d24639a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40157%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d9d9751cc7ad14da3f871a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40156-cwe-94-improper-control-of-generati-73f8ee37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40156%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d9d9721cc7ad14da3f8650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40100-cwe-918-server-side-request-forgery-a0467b74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40100%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=69d9d9721cc7ad14da3f864d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40097-cwe-129-improper-validation-of-arra-afec90ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40097%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20smallstep%20certificates&amp;severity=low&amp;id=69d9d9721cc7ad14da3f8637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40074-cwe-755-improper-handling-of-except-ab3c4168</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40074%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20sveltejs%20kit&amp;severity=medium&amp;id=69d9d9721cc7ad14da3f8648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40073-cwe-770-allocation-of-resources-wit-94ac7182</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40073%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20sveltejs%20kit&amp;severity=high&amp;id=69d9d9721cc7ad14da3f8643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40086-cwe-22-improper-limitation-of-a-pat-26967144</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40086%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danielgatis%20rembg&amp;severity=medium&amp;id=69d943121cc7ad14dadcb1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40103-cwe-836-use-of-password-hash-instea-cc9ae4f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40103%3A%20CWE-836%3A%20Use%20of%20Password%20Hash%20Instead%20of%20Password%20for%20Authentication%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35602-cwe-770-allocation-of-resources-wit-179f6de2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35602%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35601-cwe-93-improper-neutralization-of-c-b8fd76dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35601%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f873b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35600-cwe-79-improper-neutralization-of-i-e4d51935</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35600%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35599-cwe-407-inefficient-algorithmic-com-60e6d707</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35599%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d943121cc7ad14dadcb1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35598-cwe-862-missing-authorization-in-go-9155d27b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35598%3A%20CWE-862%3A%20Missing%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f872f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35597-cwe-307-improper-restriction-of-exc-f368b092</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35597%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35596-cwe-863-incorrect-authorization-in--fcc1ca1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35596%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35595-cwe-269-improper-privilege-manageme-a259bb47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35595%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69d943121cc7ad14dadcb1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35594-cwe-613-insufficient-session-expira-e2a90dbd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35594%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40023-cwe-116-improper-encoding-or-escapi-f19f4564</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40023%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4cxx&amp;severity=medium&amp;id=69d91fe11cc7ad14dacba377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34727-cwe-287-improper-authentication-in--cfd9d51e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34727%3A%20CWE-287%3A%20Improper%20Authentication%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69d91fde1cc7ad14dacba297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40021-cwe-116-improper-encoding-or-escapi-a5bdd51d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40021%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4net&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34481-cwe-116-improper-encoding-or-escapi-067c8388</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34481%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20JSON%20Template%20Layout&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34480-cwe-116-improper-encoding-or-escapi-b2386ff0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34480%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34479-cwe-116-improper-encoding-or-escapi-6c8114de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34479%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%201%20to%20Log4j%202%20bridge&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34478-cwe-684-incorrect-provision-of-spec-8f1d16cd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34478%3A%20CWE-684%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34477-cwe-297-improper-validation-of-cert-d4dde496</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34477%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29043-cwe-122-heap-based-buffer-overflow--273d2e09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29043%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20HDFGroup%20hdf5&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-cyberattack-stings-stryker-windows-z-4d4a8d15</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Cyberattack%20Stings%20Stryker%2C%20Windows%20Zero-Day%2C%20China%20Supercomputer%20Hack&amp;severity=medium&amp;id=69d90e481cc7ad14dac44e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-networks-patches-dozens-of-junos-os-vulner-fe030f73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20Networks%20Patches%20Dozens%20of%20Junos%20OS%20Vulnerabilities&amp;severity=critical&amp;id=69d900381cc7ad14dabf8a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40217-cwe-420-unprotected-alternate-chann-f9abccd5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40217%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20BerriAI%20LiteLLM&amp;severity=high&amp;id=69d907431cc7ad14dac20a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58920-cwe-79-improper-neutralization-of-i-c9e7ee08</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zootemplate%20Cerato&amp;severity=high&amp;id=69d900441cc7ad14dabf8fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58913-cwe-98-improper-control-of-filename-a903f3ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58913%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CactusThemes%20VideoPro&amp;severity=high&amp;id=69d900441cc7ad14dabf8fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5804-cwe-98-improper-control-of-filename--57692503</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5804%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Case%20Themes%20Case%20Theme%20User&amp;severity=high&amp;id=69d900441cc7ad14dabf8fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33092-cwe-15-in-acronis-acronis-true-imag-376576fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33092%3A%20CWE-15%20in%20Acronis%20Acronis%20True%20Image%20OEM&amp;severity=high&amp;id=69d900441cc7ad14dabf8fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/industry-reactions-to-iran-hacking-ics-in-critical-f621dd3a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Industry%20Reactions%20to%20Iran%20Hacking%20ICS%20in%20Critical%20Infrastructure%3A%20Feedback%20Friday&amp;severity=critical&amp;id=69d8f2271cc7ad14dab982a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5412-cwe-285-improper-authorization-in-ca-2eb08bc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5412%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Canonical%20Juju&amp;severity=critical&amp;id=69d8f2321cc7ad14dab98423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5774-cwe-362-concurrent-execution-using-s-9ae612a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5774%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Canonical%20Juju&amp;severity=medium&amp;id=69d9d97c1cc7ad14da3f88ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/orthanc-dicom-vulnerabilities-lead-to-crashes-rce-36ef54de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Orthanc%20DICOM%20Vulnerabilities%20Lead%20to%20Crashes%2C%20RCE&amp;severity=low&amp;id=69d8e79b1cc7ad14dab3dbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5777-cwe-306-missing-authentication-for-c-2883531c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5777%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20EGate%20Atom%203X%20Projector&amp;severity=high&amp;id=69d8e7a61cc7ad14dab3dea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39304-denial-of-service-via-out-of-memory-33ee0636</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39304%3A%20Denial%20of%20Service%20via%20Out%20of%20Memory%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Client&amp;severity=high&amp;id=69d8d98b1cc7ad14daad853a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-147-patches-60-vulnerabilities-including-tw-c47f3657</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20147%20Patches%2060%20Vulnerabilities%2C%20Including%20Two%20Critical%20Flaws%20Worth%20%2486%2C000&amp;severity=critical&amp;id=69d8d6081cc7ad14daac3dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-releases-fight-fraud-framework-12271865</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Releases%20Fight%20Fraud%20Framework&amp;severity=medium&amp;id=69d8cb7c1cc7ad14daa783bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4162-cwe-862-missing-authorization-in-roc-0356dad0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4162%3A%20CWE-862%20Missing%20Authorization%20in%20RocketGenius%20Gravity%20SMTP&amp;severity=high&amp;id=69d8c7f71cc7ad14daa5fce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6057-cwe-22-path-traversal-in-falkordb-fa-80645f49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6057%3A%20CWE-22%20Path%20Traversal%20in%20FalkorDB%20FalkorDB%20Browser&amp;severity=critical&amp;id=69d8c7f71cc7ad14daa5fce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-marimo-flaw-exploited-hours-after-public--82162d6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Marimo%20Flaw%20Exploited%20Hours%20After%20Public%20Disclosure&amp;severity=critical&amp;id=69d8c0a51cc7ad14daa30adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6042-inefficient-algorithmic-complexity-i-f62f8871</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6042%3A%20Inefficient%20Algorithmic%20Complexity%20in%20musl%20libc&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6038-sql-injection-in-code-projects-vehic-ca755ced</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6038%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa3534a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33457-cwe-140-improper-neutralization-of--5b1489cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33457%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33456-cwe-140-improper-neutralization-of--0f4aeaea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33456%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33455-cwe-140-improper-neutralization-of--9d5c22ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33455%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6037-sql-injection-in-code-projects-vehic-469cfa07</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6037%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6036-sql-injection-in-code-projects-vehic-c8c5a593</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6036%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-memory-loader-drops-screenconnect-03401746</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-Memory%20Loader%20Drops%20ScreenConnect&amp;severity=medium&amp;id=69d8ceff1cc7ad14daa9150b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-package-supply-chain-compromise-leads-to-rat-d-5471ad80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Package%20Supply%20Chain%20Compromise%20Leads%20to%20RAT%20Deployment&amp;severity=medium&amp;id=69d8cb821cc7ad14daa7855e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6035-cross-site-scripting-in-code-project-4b5e4f61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6035%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-rolls-out-cookie-theft-protections-in-chrom-6d88d9a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Rolls%20Out%20Cookie%20Theft%20Protections%20in%20Chrome&amp;severity=medium&amp;id=69d8abd81cc7ad14da99e7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6034-cross-site-scripting-in-code-project-dc8a4ac6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6034%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa3536d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5525-cwe-121-stack-based-buffer-overflow--eed490de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5525%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Notepad%2B%2B%20Project%20Notepad%2B%2B&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-finds-vulnerability-exposing-millions-of-0f3042e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Finds%20Vulnerability%20Exposing%20Millions%20of%20Android%20Crypto%20Wallet%20Users&amp;severity=medium&amp;id=69d8a8541cc7ad14da97e786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22750-vulnerability-in-vmware-spring-clou-95534ffc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22750%3A%20Vulnerability%20in%20VMware%20Spring%20Cloud%20Gateway&amp;severity=high&amp;id=69d8c0ed1cc7ad14daa35358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6033-sql-injection-in-codeastro-online-cl-ffdda805</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6033%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6032-cross-site-scripting-in-code-project-382797a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6032%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d8a85b1cc7ad14da97ec05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6031-sql-injection-in-code-projects-simpl-075bdf26</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6031%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d8a85b1cc7ad14da97ebfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6030-sql-injection-in-itsourcecode-constr-ef9de984</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6030%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d8a14c1cc7ad14da9459ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/obfuscated-javascript-or-nothing-thu-apr-9th-bb996e09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Obfuscated%20JavaScript%20or%20Nothing%2C%20(Thu%2C%20Apr%209th)&amp;severity=medium&amp;id=69d89dc71cc7ad14da930bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6029-os-command-injection-in-totolink-a71-25809d7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6029%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8a14c1cc7ad14da9459e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1115-cwe-79-improper-neutralization-of-in-d36d67ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1115%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parisneo%20parisneo%2Flollms&amp;severity=critical&amp;id=69d8a14c1cc7ad14da9459dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6028-os-command-injection-in-totolink-a71-9a88a334</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6028%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8a14c1cc7ad14da9459e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6027-os-command-injection-in-totolink-a71-31aeb5d4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6027%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d896c01cc7ad14da90814c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4432-cwe-862-missing-authorization-in-yit-643fc10d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4432%3A%20CWE-862%20Missing%20Authorization%20in%20YITH%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=69d896c01cc7ad14da908142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14545-cwe-94-improper-control-of-generati-3ff76783</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14545%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20YML%20for%20Yandex%20Market&amp;severity=medium&amp;id=69d896c01cc7ad14da90813a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28704-uncontrolled-search-path-element-in-0070be31</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28704%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Japan%20Computer%20Emergency%20Response%20Team%20Coordination%20Center%20(JPCERT%2FCC)%20Emocheck&amp;severity=high&amp;id=69d896c01cc7ad14da90813d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6026-os-command-injection-in-totolink-a71-a189cd98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6026%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d896c01cc7ad14da908145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6025-os-command-injection-in-totolink-a71-da9e8d99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6025%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8c0ef1cc7ad14daa353ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6024-path-traversal-in-tenda-i6-dd97391a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6024%3A%20Path%20Traversal%20in%20Tenda%20i6&amp;severity=medium&amp;id=69d8c0ef1cc7ad14daa353c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6016-stack-based-buffer-overflow-in-tenda-87108250</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6016%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=69d8c0ed1cc7ad14daa35382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6015-stack-based-buffer-overflow-in-tenda-303df20e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6015%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=69d8c0ed1cc7ad14daa3537b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6014-buffer-overflow-in-d-link-dir-513-d6993d66</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6014%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69d881ab1cc7ad14da707af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4482-cwe-732-incorrect-permission-assignm-bd880abd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4482%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Rapid7%20Insight%20Agent&amp;severity=medium&amp;id=69d881ab1cc7ad14da707add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6013-buffer-overflow-in-d-link-dir-513-6c13a0cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6013%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69d881ab1cc7ad14da707af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6012-buffer-overflow-in-d-link-dir-513-ac2f7246</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6012%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69d881ab1cc7ad14da707ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6011-server-side-request-forgery-in-openc-b423bc79</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6011%3A%20Server-Side%20Request%20Forgery%20in%20OpenClaw&amp;severity=medium&amp;id=69d881ab1cc7ad14da707ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2305-cwe-79-improper-neutralization-of-in-ec8c241e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2305%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20addfunc%20AddFunc%20Head%20%26%20Footer%20Code&amp;severity=medium&amp;id=69d873981cc7ad14da5fb241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6010-sql-injection-in-codeastro-online-cl-d106f93e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6010%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d873981cc7ad14da5fb260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6007-sql-injection-in-itsourcecode-constr-62b9a200</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6007%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d873981cc7ad14da5fb259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6006-sql-injection-in-code-projects-patie-2a1a603c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6006%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=69d873981cc7ad14da5fb252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6005-sql-injection-in-code-projects-patie-08e27ebc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6005%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=69d873981cc7ad14da5fb24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6004-sql-injection-in-code-projects-simpl-b10f2cc5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6004%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d862041cc7ad14da50d951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6003-cross-site-scripting-in-code-project-cdc25457</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6003%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d862041cc7ad14da50d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6000-information-disclosure-in-code-proje-37b28a8f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6000%3A%20Information%20Disclosure%20in%20code-projects%20Online%20Library%20Management%20System&amp;severity=medium&amp;id=69d862041cc7ad14da50d943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5999-improper-authorization-in-jeecgboot-8621e765</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5999%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=69d862041cc7ad14da50d93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5998-path-traversal-in-zhayujie-chatgpt-o-0d97bf7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5998%3A%20Path%20Traversal%20in%20zhayujie%20chatgpt-on-wechat%20CowAgent&amp;severity=medium&amp;id=69d8577b1cc7ad14da4a0e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4305-cwe-79-improper-neutralization-of-in-420b397d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4305%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20WordPress%20Backup%2C%20Restore%20%26%20Migration%20Plugin%20%E2%80%93%20Backup%20WordPress%20Sites%20Safely&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4977-cwe-862-missing-authorization-in-sti-a4ee5ded</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4977%3A%20CWE-862%20Missing%20Authorization%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1924-cwe-352-cross-site-request-forgery-c-822f5202</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1924%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20arubadev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1263-cwe-79-improper-neutralization-of-in-11b0b0dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20usystemsgmbh%20Webling&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4057-cwe-862-missing-authorization-in-cod-ad9364fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4057%3A%20CWE-862%20Missing%20Authorization%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3360-cwe-862-missing-authorization-in-the-e76eed5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3360%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=69d857791cc7ad14da4a0d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2712-cwe-863-incorrect-authorization-in-d-fc686a53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2712%3A%20CWE-863%20Incorrect%20Authorization%20in%20davidanderson%20WP-Optimize%20%E2%80%93%20Cache%2C%20Compress%20images%2C%20Minify%20%26%20Clean%20database%20to%20boost%20page%20speed%20%26%20performance&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4664-cwe-287-improper-authentication-in-i-4055877c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4664%3A%20CWE-287%20Improper%20Authentication%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25203-cwe-276-incorrect-default-permissio-03753a3c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25203%3A%20CWE-276%20Incorrect%20default%20permissions%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=69d857791cc7ad14da4a0d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5997-os-command-injection-in-totolink-a71-76c83173</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5997%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8577b1cc7ad14da4a0e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5996-os-command-injection-in-totolink-a71-7853c72c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5996%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d857791cc7ad14da4a0d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5995-os-command-injection-in-totolink-a71-27cc3191</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5995%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d84cee1cc7ad14da453a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5994-os-command-injection-in-totolink-a71-2d1c7675</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5994%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d84cee1cc7ad14da453a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5993-os-command-injection-in-totolink-a71-a914265d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5993%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d84cee1cc7ad14da453a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5992-stack-based-buffer-overflow-in-tenda-c07121b3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5992%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d843721cc7ad14da3fb3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-11-2d3e7714</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-11&amp;severity=medium&amp;id=69da49bb82d89c981fbccd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/d-link-dir-650in-authenticated-command-injection-dcfa2848</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=D-Link%20DIR-650IN%20-%20Authenticated%20Command%20Injection&amp;severity=medium&amp;id=69da14bc1cc7ad14da6c87c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/netbt-e-fatura-privilege-escalation-2d29044b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NetBT%20e-Fatura%20-%20Privilege%20Escalation&amp;severity=high&amp;id=69da14bc1cc7ad14da6c87be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36235-na-0ae03a2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36235%3A%20n%2Fa&amp;severity=critical&amp;id=69d9d97c1cc7ad14da3f88cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36234-na-a5ba7054</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36234%3A%20n%2Fa&amp;severity=critical&amp;id=69d9d97c1cc7ad14da3f88c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23782-na-0fdc13b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23782%3A%20n%2Fa&amp;severity=high&amp;id=69d9d97c1cc7ad14da3f88c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23780-na-ab7a798d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23780%3A%20n%2Fa&amp;severity=high&amp;id=69d9d97c1cc7ad14da3f88c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-10-1d7bbbf2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-10&amp;severity=medium&amp;id=69d990531cc7ad14dafc4172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40200-cwe-670-always-incorrect-control-fl-f042e7c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40200%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20musl-libc%20musl&amp;severity=high&amp;id=69d934f31cc7ad14dad772cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23781-na-c225d0b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23781%3A%20n%2Fa&amp;severity=critical&amp;id=69d91fde1cc7ad14dacba26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36236-na-44ed902d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36236%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36233-na-5f0d3ffa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36233%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36232-na-0e8be59d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36232%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31262-na-06fac518</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31262%3A%20n%2Fa&amp;severity=medium&amp;id=69d911cc1cc7ad14dac5d987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29861-na-674eb41c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29861%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44560-na-078fe07f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44560%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40212-cwe-79-improper-neutralization-of-i-3208d4c2</loc>
    <lastmod>2026-04-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenStack%20Skyline&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa3535c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-10-b8cac7f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-10&amp;severity=low&amp;id=69d89dbf1cc7ad14da92fe8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33551-cwe-863-incorrect-authorization-in--d9f794f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33551%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenStack%20Keystone&amp;severity=low&amp;id=69d862041cc7ad14da50d937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5991-stack-based-buffer-overflow-in-tenda-d9d7beab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5991%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d83edb1cc7ad14da371612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5990-stack-based-buffer-overflow-in-tenda-d9b58ad7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5990%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d83b611cc7ad14da35ec14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5989-stack-based-buffer-overflow-in-tenda-4ab9255d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5989%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d837d41cc7ad14da341bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5988-stack-based-buffer-overflow-in-tenda-f0bea76b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5988%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d830cb1cc7ad14da313a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34424-cwe-506-embedded-malicious-code-in--565778ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34424%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20Nextendweb%20Smart%20Slider%203%20Pro%20for%20WordPress&amp;severity=critical&amp;id=69d830cb1cc7ad14da313a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5987-improper-neutralization-of-special-e-dbbbc8a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5987%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69d830cb1cc7ad14da313a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5986-inefficient-regular-expression-compl-786c5a63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5986%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Zod%20jsVideoUrlParser&amp;severity=medium&amp;id=69d82d481cc7ad14da2fc1d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5985-sql-injection-in-code-projects-simpl-7a020e0b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5985%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d829c91cc7ad14da2ebbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5984-buffer-overflow-in-d-link-dir-605l-1e0e7e69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5984%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d826401cc7ad14da2cd53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5983-buffer-overflow-in-d-link-dir-605l-7db7f7d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5983%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d822bf1cc7ad14da2ad179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39848-cwe-306-missing-authentication-for--f97002da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39848%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%2010ij%20dockyard&amp;severity=medium&amp;id=69d822bf1cc7ad14da2ad173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40154-cwe-829-inclusion-of-functionality--9f489fbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40154%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d822bf1cc7ad14da2ad176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33791-cwe-78-improper-neutralization-of-s-fe83384c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33791%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bf1cc7ad14da2ad16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33790-cwe-754-improper-check-for-unusual--85692ec6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33790%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bf1cc7ad14da2ad16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33787-cwe-754-improper-check-for-unusual--694a92be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33787%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33785-cwe-862-missing-authorization-in-ju-907520bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33785%3A%20CWE-862%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33784-cwe-1393-use-of-default-password-in-a5f42388</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33784%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20Juniper%20Networks%20JSI%20LWC&amp;severity=critical&amp;id=69d822bd1cc7ad14da2ac974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33783-cwe-686-function-call-with-incorrec-e831da69</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33783%3A%20CWE-686%20Function%20Call%20With%20Incorrect%20Argument%20Type%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33781-cwe-754-improper-check-for-unusual--5da4c39e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33781%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33778-cwe-1286-improper-validation-of-syn-7e44dea9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33778%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33776-cwe-862-missing-authorization-in-ju-76a39714</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33776%3A%20CWE-862%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33774-cwe-754-improper-check-for-unusual--42120f1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33774%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33771-cwe-521-weak-password-requirements--2b26f331</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33771%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Juniper%20Networks%20CTP%20OS&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13914-cwe-322-key-exchange-without-entity-37c05f82</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13914%3A%20CWE-322%20Key%20Exchange%20without%20Entity%20Authentication%20in%20Juniper%20Networks%20Apstra&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33797-cwe-20-improper-input-validation-in-032bb2fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33797%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bf1cc7ad14da2ad170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33779-cwe-296-improper-following-of-a-cer-0b4d9e12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33779%3A%20CWE-296%20Improper%20Following%20of%20a%20Certificate&apos;s%20Chain%20of%20Trust%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5982-buffer-overflow-in-d-link-dir-605l-29438337</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5982%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d843771cc7ad14da3fb5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33775-cwe-401-missing-release-of-memory-a-f0fccbf5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33775%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40151-cwe-200-exposure-of-sensitive-infor-41548a8f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40151%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33782-cwe-401-missing-release-of-memory-a-e886ea1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33782%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843751cc7ad14da3fb550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33780-cwe-401-missing-release-of-memory-a-b58b1c8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33780%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33773-cwe-1419-incorrect-initialization-o-03dd345c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33773%3A%20CWE-1419%20Incorrect%20Initialization%20of%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33786-cwe-754-improper-check-for-unusual--ee330a5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33786%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843751cc7ad14da3fb553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21916-cwe-61-unix-symbolic-link-symlink-f-d17287ef</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21916%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d843721cc7ad14da3fb3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40153-cwe-526-cleartext-storage-of-sensit-f8d2a9e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40153%3A%20CWE-526%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20MervinPraison%20PraisonAIAgents&amp;severity=high&amp;id=69d843771cc7ad14da3fb5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33788-cwe-306-missing-authentication-for--9816a849</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33788%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=high&amp;id=69d843751cc7ad14da3fb556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40152-cwe-22-improper-limitation-of-a-pat-c32af342</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40152%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21919-cwe-821-incorrect-synchronization-i-6dad3dbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21919%3A%20CWE-821%20Incorrect%20Synchronization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21915-cwe-183-permissive-list-of-allowed--507f4fbe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21915%3A%20CWE-183%20Permissive%20List%20of%20Allowed%20Input%20in%20Juniper%20Networks%20JSI%20LWC&amp;severity=medium&amp;id=69d843721cc7ad14da3fb3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21904-cwe-79-improper-neutralization-of-i-dd40f02e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=69d843721cc7ad14da3fb3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40150-cwe-918-server-side-request-forgery-f4493f40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40150%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=high&amp;id=69d843771cc7ad14da3fb5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59969-cwe-120-buffer-copy-without-checkin-b5ea3861</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59969%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=69d843721cc7ad14da3fb3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33793-cwe-250-execution-with-unnecessary--3bbff8ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33793%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d843751cc7ad14da3fb559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40149-cwe-396-declaration-of-catch-for-ge-02f2486d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40149%3A%20CWE-396%3A%20Declaration%20of%20Catch%20for%20Generic%20Exception%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843771cc7ad14da3fb5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40148-cwe-409-improper-handling-of-highly-d3e405c0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40148%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40117-cwe-862-missing-authorization-in-me-70fd32bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40117%3A%20CWE-862%3A%20Missing%20Authorization%20in%20MervinPraison%20PraisonAIAgents&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40116-cwe-770-allocation-of-resources-wit-314adf4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40116%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843751cc7ad14da3fb56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40115-cwe-770-allocation-of-resources-wit-b5c41bbe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40115%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843751cc7ad14da3fb568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40114-cwe-918-server-side-request-forgery-7451409a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40114%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843751cc7ad14da3fb565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40113-cwe-88-improper-neutralization-of-a-5a799066</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40113%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843751cc7ad14da3fb562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40112-cwe-79-improper-neutralization-of-i-bf712808</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40112%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843751cc7ad14da3fb55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5981-buffer-overflow-in-d-link-dir-605l-6fa03a4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5981%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d843771cc7ad14da3fb5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40111-cwe-78-improper-neutralization-of-s-03ac2b4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40111%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=critical&amp;id=69d843751cc7ad14da3fb55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40109-cwe-287-improper-authentication-in--838f1a64</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40109%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fluxcd%20notification-controller&amp;severity=low&amp;id=69d818301cc7ad14da2455d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40107-cwe-918-server-side-request-forgery-d79e17bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40107%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69d818301cc7ad14da2455d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5980-buffer-overflow-in-d-link-dir-605l-e4664738</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5980%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d818301cc7ad14da2455de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5979-buffer-overflow-in-d-link-dir-605l-b22fd00b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5979%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d814ae1cc7ad14da21653e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5978-os-command-injection-in-totolink-a71-67e7851c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5978%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d814ae1cc7ad14da216536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40093-cwe-1284-improper-validation-of-spe-f1fcce45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40093%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69d814ae1cc7ad14da21652c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/payroll-pirate-attacks-targeting-canadian-employee-53033fb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Payroll%20pirate%20attacks%20targeting%20Canadian%20employees&amp;severity=medium&amp;id=69d8ceff1cc7ad14daa91506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5977-os-command-injection-in-totolink-a71-090c4d25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5977%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d814ae1cc7ad14da21652f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4436-cwe-306-in-gpl-odorizers-gpl750-xl4-dbe0f47c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4436%3A%20CWE-306%20in%20GPL%20Odorizers%20GPL750%20(XL4)&amp;severity=high&amp;id=69d80a201cc7ad14da1a948e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5976-os-command-injection-in-totolink-a71-3f6a2565</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5976%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d80a201cc7ad14da1a9493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13926-cwe-807-in-contemporary-controls-ba-6c5309fd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13926%3A%20CWE-807%20in%20Contemporary%20Controls%20BASControl20&amp;severity=critical&amp;id=69d806d21cc7ad14da15a557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5975-os-command-injection-in-totolink-a71-9db2234a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5975%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d806d51cc7ad14da15a662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40088-cwe-78-improper-neutralization-of-s-245484f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40088%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d806d21cc7ad14da15a576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40089-cwe-918-server-side-request-forgery-35713674</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40089%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sonicverse-eu%20audiostreaming-stack&amp;severity=critical&amp;id=69d806d21cc7ad14da15a57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35577-cwe-346-origin-validation-error-in--8745ce80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35577%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20apollographql%20apollo-mcp-server&amp;severity=medium&amp;id=69d806d21cc7ad14da15a568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34500-clientcert-authentication-does-not--63ca00a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34500%3A%20CLIENT_CERT%20authentication%20does%20not%20fail%20as%20expected%20for%20some%20scenarios%20when%20soft%20fail%20is%20disabled%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=69d806d21cc7ad14da15a565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34487-cwe-532-insertion-of-sensitive-info-07344d29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34487%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d806d21cc7ad14da15a562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34486-cwe-311-missing-encryption-of-sensi-1ab7897d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34486%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d806d21cc7ad14da15a55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40087-cwe-1336-improper-neutralization-of-fca192b1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40087%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20langchain-ai%20langchain&amp;severity=medium&amp;id=69d806d21cc7ad14da15a56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34483-cwe-116-improper-encoding-or-escapi-c352f5d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34483%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d806d21cc7ad14da15a55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5974-os-command-injection-in-foundationag-8a1cc3ed</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5974%3A%20OS%20Command%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d806d21cc7ad14da15a57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40077-cwe-184-incomplete-list-of-disallow-9c7f4ad8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40077%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20henrygd%20beszel&amp;severity=low&amp;id=69d7ff941cc7ad14da10e9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32990-cwe-20-improper-input-validation-in-0341ee1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32990%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=69d7ff941cc7ad14da10e9d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29146-padding-oracle-in-apache-software-f-295d2dfe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29146%3A%20Padding%20Oracle%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29145-clientcert-authentication-does-not--11e42669</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29145%3A%20CLIENT_CERT%20authentication%20does%20not%20fail%20as%20expected%20for%20some%20scenarios%20when%20soft%20fail%20is%20disabled%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=69d7ff941cc7ad14da10e9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29129-configured-cipher-preference-order--0d71e2cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29129%3A%20Configured%20cipher%20preference%20order%20not%20preserved%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5973-os-command-injection-in-foundationag-59f6508b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5973%3A%20OS%20Command%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ff961cc7ad14da10ea47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25854-cwe-601-url-redirection-to-untruste-d400d1c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25854%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=69d7ff941cc7ad14da10e9c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24880-cwe-444-inconsistent-interpretation-eda0d8cc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24880%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39977-cwe-22-improper-limitation-of-a-pat-bed6ef14</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39977%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flatpak%20flatpak-builder&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34734-cwe-416-use-after-free-in-hdfgroup--d00b0ad3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34734%3A%20CWE-416%3A%20Use%20After%20Free%20in%20HDFGroup%20hdf5&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5972-os-command-injection-in-foundationag-a112b45e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5972%3A%20OS%20Command%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ff961cc7ad14da10ea3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35195-cwe-787-out-of-bounds-write-in-byte-0b549b4f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35195%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88e1cc7ad14da0c179f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35186-cwe-789-memory-allocation-with-exce-60d4a794</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35186%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c170c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34988-cwe-119-improper-restriction-of-ope-738809df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34988%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=69d7f88c1cc7ad14da0c1709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34987-cwe-125-out-of-bounds-read-in-bytec-5d6922fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34987%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=critical&amp;id=69d7f88c1cc7ad14da0c1706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34983-cwe-416-use-after-free-in-bytecodea-5453e933</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34983%3A%20CWE-416%3A%20Use%20After%20Free%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=69d7f88c1cc7ad14da0c1703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34971-cwe-125-out-of-bounds-read-in-bytec-510a8be8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34971%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=critical&amp;id=69d7f88c1cc7ad14da0c1700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34946-cwe-670-always-incorrect-control-fl-797568c7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34946%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c16fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34945-cwe-681-incorrect-conversion-betwee-93e30ae8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34945%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=69d7f88c1cc7ad14da0c16fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34944-cwe-248-uncaught-exception-in-bytec-19057013</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34944%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c16f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34943-cwe-248-uncaught-exception-in-bytec-2b6ea09e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34943%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c16f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34942-cwe-129-improper-validation-of-arra-8b6d6f53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34942%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d806d51cc7ad14da15a669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34941-cwe-125-out-of-bounds-read-in-bytec-44d942e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34941%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d843791cc7ad14da3fb68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealer-campaign-impacting-sltt-macos-users-463cbc4e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealer%20Campaign%20Impacting%20SLTT%20macOS%20Users&amp;severity=medium&amp;id=69d7f1821cc7ad14da06f834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1584-null-pointer-dereference-in-red-hat--56fa43b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1584%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=high&amp;id=69d7ee091cc7ad14da04a8bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5971-improper-neutralization-of-directive-5770f87f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5971%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39911-cwe-668-exposure-of-resource-to-wro-9576e92f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39911%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20hashgraph%20guardian&amp;severity=high&amp;id=69d7ee091cc7ad14da04a8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39315-cwe-184-incomplete-list-of-disallow-a8a63c9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39315%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20unjs%20unhead&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5329-cwe-20-improper-input-validation-in--bf8aa5a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5329%3A%20CWE-20%20Improper%20input%20validation%20in%20Rapid7%20Velociraptor&amp;severity=high&amp;id=69d7ee091cc7ad14da04a8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35207-cwe-295-improper-certificate-valida-e017082c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35207%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20linuxdeepin%20dde-control-center&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-fake-windows-support-website-delivers-passwor-edce3a29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20fake%20Windows%20support%20website%20delivers%20password-stealing%20malware&amp;severity=medium&amp;id=69d7e6f61cc7ad14dafe7e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40072-cwe-918-server-side-request-forgery-61669d9c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40072%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ethereum%20web3.py&amp;severity=low&amp;id=69d7e6ff1cc7ad14dafe8de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40070-cwe-347-improper-verification-of-cr-caaefd13</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40070%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20sgbett%20bsv-ruby-sdk&amp;severity=high&amp;id=69d7e6ff1cc7ad14dafe8de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40069-cwe-754-improper-check-for-unusual--107e7303</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40069%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20sgbett%20bsv-ruby-sdk&amp;severity=high&amp;id=69d7e6ff1cc7ad14dafe8dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39987-cwe-306-missing-authentication-for--7b043647</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39987%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20marimo-team%20marimo&amp;severity=critical&amp;id=69d7e6ff1cc7ad14dafe8dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39961-cwe-269-improper-privilege-manageme-9281336f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39961%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20aiven%20aiven-operator&amp;severity=medium&amp;id=69d843791cc7ad14da3fb693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39985-cwe-601-url-redirection-to-untruste-53c41450</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39985%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20aces%20Loris&amp;severity=medium&amp;id=69d843791cc7ad14da3fb69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39983-cwe-93-improper-neutralization-of-c-5c3326f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39983%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20patrickjuchli%20basic-ftp&amp;severity=high&amp;id=69d806d51cc7ad14da15a66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39981-cwe-22-improper-limitation-of-a-pat-3d5cb72d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39981%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Josh-XT%20AGiXT&amp;severity=high&amp;id=69d843791cc7ad14da3fb698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5970-code-injection-in-foundationagents-m-8f8c046d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5970%3A%20Code%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39980-cwe-1336-improper-neutralization-of-06ee5ee4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39980%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20OpenCTI-Platform%20opencti&amp;severity=critical&amp;id=69d7f88e1cc7ad14da0c17a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39976-cwe-287-improper-authentication-in--ed402c61</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39976%3A%20CWE-287%3A%20Improper%20Authentication%20in%20laravel%20passport&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39974-cwe-918-server-side-request-forgery-b8153f8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39974%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20czlonkowski%20n8n-mcp&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39972-cwe-1289-improper-validation-of-uns-b2f4daad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39972%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20dunglas%20mercure&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5962-path-traversal-in-tenda-ch22-8c2770fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5962%3A%20Path%20Traversal%20in%20Tenda%20CH22&amp;severity=medium&amp;id=69d7dc7c1cc7ad14daf451e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39959-cwe-770-allocation-of-resources-wit-3b1278fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39959%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20tmds%20Tmds.DBus&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39958-cwe-93-improper-neutralization-of-c-87cdf680</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39958%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20AOSC-Dev%20oma&amp;severity=medium&amp;id=69d7dc7c1cc7ad14daf451cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5961-sql-injection-in-code-projects-simpl-212dd00d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5961%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39957-cwe-863-incorrect-authorization-in--e2f07009</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39957%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=69d7d5661cc7ad14daeeafbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39856-cwe-125-out-of-bounds-read-in-mtroj-7ec6c2c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39856%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20mtrojnar%20osslsigncode&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39855-cwe-125-out-of-bounds-read-in-mtroj-d24019ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39855%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20mtrojnar%20osslsigncode&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40046-cwe-190-integer-overflow-or-wraparo-44ec5833</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40046%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=high&amp;id=69d7d5661cc7ad14daeeafc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33005-cwe-274-improper-handling-of-insuff-ac9e3c46</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33005%3A%20CWE-274%20Improper%20Handling%20of%20Insufficient%20Privileges%20in%20Apache%20Software%20Foundation%20Apache%20OpenMeetings&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33266-cwe-321-use-of-hard-coded-cryptogra-2ef088ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33266%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Apache%20Software%20Foundation%20Apache%20OpenMeetings&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34020-cwe-598-use-of-get-request-method-w-60f3b614</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34020%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Apache%20Software%20Foundation%20Apache%20OpenMeetings&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39853-cwe-121-stack-based-buffer-overflow-b0fc9cb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39853%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20mtrojnar%20osslsigncode&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39843-cwe-918-server-side-request-forgery-320d8b73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39843%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20makeplane%20plane&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39941-cwe-79-improper-neutralization-of-i-7e221f3f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39941%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5960-information-disclosure-in-code-proje-0cffe94e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5960%3A%20Information%20Disclosure%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=69d843791cc7ad14da3fb6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14551-cwe-1258-exposure-of-sensitive-syst-9638ed34</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14551%3A%20CWE-1258%20Exposure%20of%20sensitive%20system%20information%20due%20to%20uncleared%20debug%20information%20in%20Canonical%20Ubuntu&amp;severity=low&amp;id=69d843791cc7ad14da3fb6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15480-cwe-1258-exposure-of-sensitive-syst-91250a7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15480%3A%20CWE-1258%20Exposure%20of%20sensitive%20system%20information%20due%20to%20uncleared%20debug%20information%20in%20Canonical%20Ubuntu&amp;severity=low&amp;id=69d843791cc7ad14da3fb6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35041-cwe-1333-inefficient-regular-expres-03a72d0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35041%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20nearform%20fast-jwt&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35040-cwe-697-incorrect-comparison-in-nea-15fbf83e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35040%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20nearform%20fast-jwt&amp;severity=medium&amp;id=69d843791cc7ad14da3fb6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4878-time-of-check-time-of-use-toctou-rac-180716e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4878%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f92c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5439-cwe-770-allocation-of-resources-with-074c2bff</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5439%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5437-cwe-125-out-of-bounds-read-in-orthan-293b06ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5437%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5438-cwe-770-allocation-of-resources-with-79ed6dbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5438%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5440-cwe-770-allocation-of-resources-with-06df998f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5440%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5442-cwe-190-integer-overflow-or-wraparou-82cdd837</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5442%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Orthanc%20DICOM%20Server&amp;severity=critical&amp;id=69d7bcce1cc7ad14dad7b6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5443-cwe-190-integer-overflow-or-wraparou-81ca17a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5443%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Orthanc%20DICOM%20Server&amp;severity=critical&amp;id=69d7bcce1cc7ad14dad7b6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5445-cwe-125-out-of-bounds-read-in-orthan-76abb402</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5445%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Orthanc%20DICOM%20Server&amp;severity=critical&amp;id=69d7bcce1cc7ad14dad7b704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5444-cwe-190-integer-overflow-or-wraparou-9c148454</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5444%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5441-cwe-125-out-of-bounds-read-in-orthan-a48040f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5441%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34757-cwe-416-use-after-free-in-pnggroup--e7c61505</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34757%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69d7bccb1cc7ad14dad7b12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34578-cwe-90-improper-neutralization-of-s-17b84668</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34578%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20opnsense%20core&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5959-improper-authentication-in-glinet-gl-10bc5666</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5959%3A%20Improper%20Authentication%20in%20GL.iNet%20GL-RM1&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4116-cwe-176-improper-handling-of-unicode-8fb56da1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4116%3A%20CWE-176%20Improper%20handling%20of%20unicode%20encoding%20in%20SonicWall%20SMA1000&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4114-cwe-176-improper-handling-of-unicode-d58b930d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4114%3A%20CWE-176%20Improper%20handling%20of%20unicode%20encoding%20in%20SonicWall%20SMA1000&amp;severity=null&amp;id=69d7bccb1cc7ad14dad7b137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4113-cwe-204-observable-response-discrepa-f4d701a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4113%3A%20CWE-204%20Observable%20response%20discrepancy%20in%20SonicWall%20SMA1000&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4112-cwe-89-improper-neutralization-of-sp-b9df2c98</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4112%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20SonicWall%20SMA1000&amp;severity=null&amp;id=69d7bccb1cc7ad14dad7b131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4660-cwe-200-exposure-of-sensitive-inform-dbd7d623</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4660%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HashiCorp%20Tooling&amp;severity=high&amp;id=69d7b5c31cc7ad14dad0f199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-intelligence-ai-guardrails-bypassed-in-new-a-79953f19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Intelligence%20AI%20Guardrails%20Bypassed%20in%20New%20Attack&amp;severity=medium&amp;id=69d7aeb91cc7ad14dac9d0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/can-we-trust-ai-no-but-eventually-we-must-e2dcb60f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can%20We%20Trust%20AI%3F%20No%20%E2%80%93%20But%20Eventually%20We%20Must&amp;severity=medium&amp;id=69d7ab341cc7ad14dac63dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2519-cwe-472-external-control-of-assumed--f77b1e5e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2519%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20ladela%20Online%20Scheduling%20and%20Appointment%20Booking%20System%20%E2%80%93%20Bookly&amp;severity=medium&amp;id=69d8437c1cc7ad14da3fb791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3005-cwe-79-improper-neutralization-of-in-f4313294</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3005%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fernandobt%20List%20category%20posts&amp;severity=medium&amp;id=69d7e6ff1cc7ad14dafe8df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-api-keys-in-android-apps-expose-gemini-endp-14a569b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20API%20Keys%20in%20Android%20Apps%20Expose%20Gemini%20Endpoints%20to%20Unauthorized%20Access&amp;severity=medium&amp;id=69d79d241cc7ad14daba7bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/palo-alto-networks-sonicwall-patch-high-severity-v-2ff5737b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Palo%20Alto%20Networks%2C%20SonicWall%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69d7961c1cc7ad14dab19540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57735-cwe-613-insufficient-session-expira-9dc4a2f3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57735%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=critical&amp;id=69d78b8f1cc7ad14daa6c55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-hidden-roi-of-visibility-better-decisions-bett-17805858</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Hidden%20ROI%20of%20Visibility%3A%20Better%20Decisions%2C%20Better%20Behavior%2C%20Better%20Security&amp;severity=medium&amp;id=69d788131cc7ad14daa31486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1490-cwe-94-improper-control-of-generatio-5517fc7b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1490%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WAGO%20CC100%20(0751-9x01)&amp;severity=high&amp;id=69d78b8f1cc7ad14daa6c55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-bts-arirang-tour-tickets-k-pop-fans-being-tar-0be0f8a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20BTS%20ARIRANG%20tour%20tickets%3A%20K-pop%20fans%20being%20targeted%20by%20scammers%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d843531cc7ad14da3f941e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-long-road-to-your-crypto-clipbanker-and-its-ma-4b0c512e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20long%20road%20to%20your%20crypto%3A%20ClipBanker%20and%20its%20marathon%20infection%20chain&amp;severity=medium&amp;id=69d7edfe1cc7ad14da04a129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-warns-of-new-campaign-targeting-bpos-to-ste-2ae94a62</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Warns%20of%20New%20Campaign%20Targeting%20BPOs%20to%20Steal%20Corporate%20Data&amp;severity=medium&amp;id=69d776771cc7ad14da90de65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34185-cwe-89-improper-neutralization-of-s-b24b909e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34185%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Hydrosystem%20Control%20System&amp;severity=high&amp;id=69d779fb1cc7ad14da954be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34184-cwe-862-missing-authorization-in-hy-99f5b924</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34184%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Hydrosystem%20Control%20System&amp;severity=high&amp;id=69d779fb1cc7ad14da954bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4901-cwe-532-insertion-of-sensitive-infor-8b7a094e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4901%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hydrosystem%20Control%20System&amp;severity=medium&amp;id=69d779fb1cc7ad14da954be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62188-cwe-200-exposure-of-sensitive-infor-99fa2049</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62188%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=high&amp;id=69d779fb1cc7ad14da954bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34179-cwe-915-improperly-controlled-modif-752fa0b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34179%3A%20CWE-915%20Improperly%20controlled%20modification%20of%20Dynamically-Determined%20object%20attributes%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69d773081cc7ad14da8bdc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34178-cwe-20-improper-input-validation-in-47a9832a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34178%3A%20CWE-20%20Improper%20input%20validation%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69d773081cc7ad14da8bdc1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34177-cwe-184-incomplete-list-of-disallow-fcea39f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34177%3A%20CWE-184%20Incomplete%20list%20of%20disallowed%20inputs%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69d773081cc7ad14da8bdc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34538-cwe-668-exposure-of-resource-to-wro-0014a9aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34538%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69d773081cc7ad14da8bdc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-reader-zero-day-exploited-for-months-researc-bb17e8d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Reader%20Zero-Day%20Exploited%20for%20Months%3A%20Researcher&amp;severity=medium&amp;id=69d768671cc7ad14da81cf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/300000-people-impacted-by-eurail-data-breach-a952810e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=300%2C000%20People%20Impacted%20by%20Eurail%20Data%20Breach&amp;severity=medium&amp;id=69d764e31cc7ad14da7ab3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5854-os-command-injection-in-totolink-a71-6aac9f98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5854%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d7ab3c1cc7ad14dac63fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/36-million-stolen-in-bitcoin-depot-hack-9a950dd5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%243.6%20Million%20Stolen%20in%20Bitcoin%20Depot%20Hack&amp;severity=medium&amp;id=69d74c471cc7ad14da5c17cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5853-os-command-injection-in-totolink-a71-2b9f2bf4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5853%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d843791cc7ad14da3fb6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5852-os-command-injection-in-totolink-a71-675e6a7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5852%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d7d5661cc7ad14daeeafd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5851-os-command-injection-in-totolink-a71-cec71662</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5851%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d745461cc7ad14da533b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5850-os-command-injection-in-totolink-a71-c437d074</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5850%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d745461cc7ad14da533b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5849-path-traversal-in-tenda-i12-633437ed</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5849%3A%20Path%20Traversal%20in%20Tenda%20i12&amp;severity=medium&amp;id=69d73e371cc7ad14da48c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5848-code-injection-in-jeecgboot-jimurepo-5ed759a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5848%3A%20Code%20Injection%20in%20jeecgboot%20JimuReport&amp;severity=medium&amp;id=69d73e371cc7ad14da48c735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5847-information-disclosure-in-code-proje-2971db23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5847%3A%20Information%20Disclosure%20in%20code-projects%20Movie%20Ticketing%20System&amp;severity=medium&amp;id=69d733ab1cc7ad14da3bfe82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5844-os-command-injection-in-d-link-dir-8-643de94e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5844%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-882&amp;severity=high&amp;id=69d733ab1cc7ad14da3bfe7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5842-authorization-bypass-in-decolua-9rou-1a856ee8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5842%3A%20Authorization%20Bypass%20in%20decolua%209router&amp;severity=medium&amp;id=69d733ab1cc7ad14da3bfe71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5841-path-traversal-in-tenda-i3-164f6532</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5841%3A%20Path%20Traversal%20in%20Tenda%20i3&amp;severity=medium&amp;id=69d733ab1cc7ad14da3bfe6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5840-sql-injection-in-phpgurukul-news-por-954d6b68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5840%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d729211cc7ad14da1b3396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5839-sql-injection-in-phpgurukul-news-por-8075a883</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5839%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d729211cc7ad14da1b338f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5838-sql-injection-in-phpgurukul-news-por-cde1d916</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5838%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d729211cc7ad14da1b3388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5742-cwe-79-improper-neutralization-of-in-075f568f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5742%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=69d729211cc7ad14da1b337b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4336-cwe-79-improper-neutralization-of-in-a8fdf393</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4336%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Ultimate%20FAQ%20Accordion%20Plugin&amp;severity=medium&amp;id=69d729211cc7ad14da1b3371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1830-cwe-862-missing-authorization-in-dav-233f04bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1830%3A%20CWE-862%20Missing%20Authorization%20in%20davidfcarr%20Quick%20Playground&amp;severity=critical&amp;id=69d729211cc7ad14da1b336b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5837-sql-injection-in-phpgurukul-news-por-ed5b132e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5837%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5836-cross-site-scripting-in-code-project-5aecdbe0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5836%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5835-cross-site-scripting-in-code-project-c85ef674</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5835%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5834-cross-site-scripting-in-code-project-5de33a51</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5834%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3568-cwe-639-authorization-bypass-through-4f70d3ac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3568%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3574-cwe-79-improper-neutralization-of-in-05424aae</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxdexperts%20Experto%20Dashboard%20for%20WooCommerce&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4429-cwe-79-improper-neutralization-of-in-1c6cee7c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photoweblog%20OSM%20%E2%80%93%20OpenStreetMap&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5357-cwe-79-improper-neutralization-of-in-e6dba13a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5357%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4124-cwe-862-missing-authorization-in-oli-51e7aa24</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4124%3A%20CWE-862%20Missing%20Authorization%20in%20oliverfriedmann%20Ziggeo&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5833-command-injection-in-awwaiid-mcp-ser-701bd158</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5833%3A%20Command%20Injection%20in%20awwaiid%20mcp-server-taskwarrior&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5832-server-side-request-forgery-in-atoto-14e72165</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5832%3A%20Server-Side%20Request%20Forgery%20in%20atototo%20api-lab-mcp&amp;severity=medium&amp;id=69d736f91cc7ad14da418a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-9th-2026-httpsisc-a0436d63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%209th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9886%2C%20(Thu%2C%20Apr%209th)&amp;severity=medium&amp;id=69d7097b1cc7ad14daf111f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5831-os-command-injection-in-agions-taskf-212bac83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5831%3A%20OS%20Command%20Injection%20in%20Agions%20taskflow-ai&amp;severity=medium&amp;id=69d736f91cc7ad14da418a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5830-stack-based-buffer-overflow-in-tenda-981c5f43</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5830%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=69d736f91cc7ad14da418a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4326-cwe-862-missing-authorization-in-web-dd66b007</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4326%3A%20CWE-862%20Missing%20Authorization%20in%20webilia%20Vertex%20Addons%20for%20Elementor&amp;severity=high&amp;id=69d736f91cc7ad14da418a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shaky-ceasefire-unlikely-to-stop-cyberattacks-from-6f18e0b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shaky%20Ceasefire%20Unlikely%20to%20Stop%20Cyberattacks%20From%20Iran-Linked%20Hackers%20for%20Long&amp;severity=medium&amp;id=69d702731cc7ad14daeb9723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5829-sql-injection-in-code-projects-simpl-29fb31de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5829%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d736f91cc7ad14da418a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5828-sql-injection-in-code-projects-simpl-1d307435</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5828%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d736f91cc7ad14da418a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/number-usage-in-passwords-take-two-thu-apr-9th-403df6ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Number%20Usage%20in%20Passwords%3A%20Take%20Two%2C%20(Thu%2C%20Apr%209th)&amp;severity=medium&amp;id=69d6fb701cc7ad14dae5c803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5827-sql-injection-in-code-projects-simpl-99d025b7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5827%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d6f7e71cc7ad14dadd0205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5826-cross-site-scripting-in-code-project-39d2de4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5826%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d6f7e71cc7ad14dadd01fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5825-cross-site-scripting-in-code-project-cbb32e8a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5825%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d6f7e71cc7ad14dadd01f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-10-8f59087b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-10&amp;severity=medium&amp;id=69d92a5f1cc7ad14dad12fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63238-na-9f8a7fac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63238%3A%20n%2Fa&amp;severity=medium&amp;id=69d843791cc7ad14da3fb68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70797-na-541710b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70797%3A%20n%2Fa&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zsh-59-rce-38823372</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZSH%205.9%20-%20RCE&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jumbo-website-manager-remote-code-execution-e1adfaac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jumbo%20Website%20Manager%20%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romm-440-xsscsrf-chain-26560fa6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RomM%20%204.4.0%20-%20%20XSS_CSRF%20Chain&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react-server-1920-remote-code-execution-a47c1524</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React%20Server%2019.2.0%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-09-529a6852</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-09&amp;severity=medium&amp;id=69d83ed21cc7ad14da370704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30478-na-6c9f2b00</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30478%3A%20n%2Fa&amp;severity=high&amp;id=69d814ae1cc7ad14da216545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29923-na-d93035f5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29923%3A%20n%2Fa&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31170-na-b6e95fba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31170%3A%20n%2Fa&amp;severity=critical&amp;id=69d7f88c1cc7ad14da0c16f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30479-na-433cc714</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30479%3A%20n%2Fa&amp;severity=critical&amp;id=69d7d5661cc7ad14daeeafae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70365-na-eb904860</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70365%3A%20n%2Fa&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70364-na-586092fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70364%3A%20n%2Fa&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70811-na-92c3ea46</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70811%3A%20n%2Fa&amp;severity=medium&amp;id=69d7bccb1cc7ad14dad7b121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70810-na-aca56658</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70810%3A%20n%2Fa&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50228-na-e450932f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50228%3A%20n%2Fa&amp;severity=critical&amp;id=69d7bccb1cc7ad14dad7b117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45806-na-0e08cff6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45806%3A%20n%2Fa&amp;severity=medium&amp;id=69d7b5c31cc7ad14dad0f194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-09-e95f5b79</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-09&amp;severity=low&amp;id=69d780fb1cc7ad14da9b687c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5824-sql-injection-in-code-projects-simpl-13fb8677</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5824%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d6ed861cc7ad14dac7072b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5823-sql-injection-in-itsourcecode-constr-d97f737e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5823%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d6e9e31cc7ad14dac41f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5815-stack-based-buffer-overflow-in-d-lin-6637b7b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5815%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-645&amp;severity=high&amp;id=69d6e6551cc7ad14dac1d68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5814-sql-injection-in-phpgurukul-online-c-86739237</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5814%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=69d6e6551cc7ad14dac1d687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5813-sql-injection-in-phpgurukul-online-c-05695093</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5813%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=69d6df4b1cc7ad14dabe8749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5812-business-logic-errors-in-sourcecodes-bdf698b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5812%3A%20Business%20Logic%20Errors%20in%20SourceCodester%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69d6dbd71cc7ad14dabd4729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3199-cwe-502-deserialization-of-untrusted-067114aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3199%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Sonatype%20Nexus%20Repository&amp;severity=critical&amp;id=69d6d8431cc7ad14dabb05cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3438-cwe-79-improper-neutralization-of-in-86971f0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3438%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=69d6d8431cc7ad14dabb05d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5811-business-logic-errors-in-sourcecodes-5f8fd1d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5811%3A%20Business%20Logic%20Errors%20in%20SourceCodester%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69d6d8431cc7ad14dabb05d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5810-cross-site-scripting-in-sourcecodest-fc4b6522</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5810%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69d6d13b1cc7ad14dab766c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40036-cwe-770-allocation-of-resources-wit-a6778d4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40036%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20obsidianforensics%20unfurl&amp;severity=high&amp;id=69d6d13b1cc7ad14dab766cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40035-cwe-489-active-debug-code-in-obsidi-883d1265</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40035%3A%20CWE-489%20Active%20Debug%20Code%20in%20obsidianforensics%20unfurl&amp;severity=critical&amp;id=69d6d13b1cc7ad14dab766cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40032-improper-neutralization-of-special--b7859277</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40032%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20tclahr%20UAC&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40031-cwe-427-uncontrolled-search-path-el-86bb5af2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40031%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20ufrisk%20MemProcFS&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bfa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40030-improper-neutralization-of-special--e7e4c480</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40030%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20khyrenz%20parseusbs&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40029-improper-neutralization-of-special--af174d66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40029%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20khyrenz%20parseusbs&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40028-cwe-79-improper-neutralization-of-i-f38ecff8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40028%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yamato-Security%20hayabusa&amp;severity=medium&amp;id=69d6cdb91cc7ad14dab5bf98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40027-cwe-22-improper-limitation-of-a-pat-c5e77607</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40027%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20abrignoni%20ALEAPP&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5808-cross-site-scripting-in-openstatushq-f958f2cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5808%3A%20Cross%20Site%20Scripting%20in%20openstatusHQ%20openstatus&amp;severity=medium&amp;id=69d6cdb91cc7ad14dab5bfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5711-cwe-79-improper-neutralization-of-in-b0a1f1ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pubudu-malalasekara%20Post%20Blocks%20%26%20Tools&amp;severity=medium&amp;id=69d6cdb91cc7ad14dab5bfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5919-insufficient-validation-of-untrusted-cc335c74</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5919%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca441cc7ad14dab3ce63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5918-inappropriate-implementation-in-goog-85bbee64</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5918%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca421cc7ad14dab3ce0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5915-insufficient-validation-of-untrusted-40ff480c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5915%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3ce06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5914-type-confusion-in-google-chrome-d064b24a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5914%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3ce02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5913-out-of-bounds-read-in-google-chrome-4fd648ea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5913%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5912-integer-overflow-in-google-chrome-73decb5a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5912%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5911-policy-bypass-in-google-chrome-bc41f8ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5911%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca421cc7ad14dab3cdf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5910-integer-overflow-in-google-chrome-bb2b2b54</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5910%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5909-integer-overflow-in-google-chrome-9cd1c959</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5909%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5908-integer-overflow-in-google-chrome-8af47645</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5908%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5907-insufficient-data-validation-in-goog-b8535f82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5907%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5906-incorrect-security-ui-in-google-chro-e55741d0</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5906%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cdb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5905-incorrect-security-ui-in-google-chro-b1cc01f1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5905%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cdb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5904-use-after-free-in-google-chrome-033227fd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5904%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca401cc7ad14dab3cdb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5903-policy-bypass-in-google-chrome-8f14a797</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5903%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5902-race-in-google-chrome-32d92464</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5902%3A%20Race%20in%20Google%20Chrome&amp;severity=critical&amp;id=69d6ca401cc7ad14dab3cda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5901-policy-bypass-in-google-chrome-0f88b312</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5901%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5900-policy-bypass-in-google-chrome-1d248127</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5900%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5899-incorrect-security-ui-in-google-chro-e7632c22</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5899%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5898-incorrect-security-ui-in-google-chro-1ea6a19c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5898%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5897-incorrect-security-ui-in-google-chro-f3fa91bb</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5897%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5896-policy-bypass-in-google-chrome-4a875369</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5896%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5895-incorrect-security-ui-in-google-chro-be6e597f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5895%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5894-inappropriate-implementation-in-goog-2c81a6bf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5894%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5893-race-in-google-chrome-5ddb3cf9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5893%3A%20Race%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5892-insufficient-policy-enforcement-in-g-cb6c6b8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5892%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5891-insufficient-policy-enforcement-in-g-db71c088</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5891%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5890-race-in-google-chrome-cc385d34</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5890%3A%20Race%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5889-cryptographic-flaw-in-google-chrome-df3ad6e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5889%3A%20Cryptographic%20Flaw%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5888-uninitialized-use-in-google-chrome-b2563f01</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5888%3A%20Uninitialized%20Use%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5887-insufficient-validation-of-untrusted-d67fafeb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5887%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5886-out-of-bounds-read-in-google-chrome-7ca4d0af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5886%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5885-insufficient-validation-of-untrusted-4ffcbeb2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5885%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5884-insufficient-validation-of-untrusted-119bb8eb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5884%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca3b1cc7ad14dab3cc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5883-use-after-free-in-google-chrome-adf1ec4a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5883%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5882-incorrect-security-ui-in-google-chro-700d0342</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5882%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5881-policy-bypass-in-google-chrome-e00814a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5881%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5880-incorrect-security-ui-in-google-chro-862c68eb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5880%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5879-insufficient-validation-of-untrusted-bf0ed693</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5879%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca3b1cc7ad14dab3cc5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5878-incorrect-security-ui-in-google-chro-b56f6a3a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5878%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5877-use-after-free-in-google-chrome-4281f5a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5877%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca3b1cc7ad14dab3cc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5876-side-channel-information-leakage-in--bf8afdaa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5876%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5875-policy-bypass-in-google-chrome-f0e918b0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5875%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5874-use-after-free-in-google-chrome-f08fd110</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5874%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69d6ca391cc7ad14dab3cbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5873-out-of-bounds-read-and-write-in-goog-7d05a430</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5873%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5872-use-after-free-in-google-chrome-6bf1af4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5872%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5871-type-confusion-in-google-chrome-061cf3d7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5871%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5870-integer-overflow-in-google-chrome-734323c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5870%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5869-heap-buffer-overflow-in-google-chrom-e9e2c0dd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5869%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5868-heap-buffer-overflow-in-google-chrom-a7f123ac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5868%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5867-heap-buffer-overflow-in-google-chrom-903da312</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5867%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5866-use-after-free-in-google-chrome-ca9dddbd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5866%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5865-type-confusion-in-google-chrome-eaffaa1e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5865%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5864-heap-buffer-overflow-in-google-chrom-9e3c27ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5864%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca371cc7ad14dab3cb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5863-inappropriate-implementation-in-goog-eb628808</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5863%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5862-inappropriate-implementation-in-goog-1605f1f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5862%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5861-use-after-free-in-google-chrome-92acefd5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5861%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5860-use-after-free-in-google-chrome-4fcd253c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5860%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5859-integer-overflow-in-google-chrome-baee9cba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5859%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5858-heap-buffer-overflow-in-google-chrom-15930810</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5858%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5806-cross-site-scripting-in-code-project-8a977b91</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5806%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69d6ca371cc7ad14dab3cb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39860-cwe-61-unix-symbolic-link-symlink-f-8f2fa90c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39860%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20NixOS%20nix&amp;severity=critical&amp;id=69d6c32c1cc7ad14dab1ab39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39892-cwe-119-improper-restriction-of-ope-5b8d3307</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39892%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20pyca%20cryptography&amp;severity=medium&amp;id=69d6c32c1cc7ad14dab1ab4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39891-cwe-94-improper-control-of-generati-8cf06461</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39891%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d6c32c1cc7ad14dab1ab4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39890-cwe-502-deserialization-of-untruste-f407d865</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39890%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d6c32c1cc7ad14dab1ab47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39889-cwe-200-exposure-of-sensitive-infor-5cac7484</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39889%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d6c32c1cc7ad14dab1ab44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39888-cwe-657-violation-of-secure-design--053285e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39888%3A%20CWE-657%3A%20Violation%20of%20Secure%20Design%20Principles%20in%20MervinPraison%20praisonaiagents&amp;severity=critical&amp;id=69d6c32c1cc7ad14dab1ab41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39885-cwe-918-server-side-request-forgery-b0b6ba4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39885%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20agentfront%20frontmcp&amp;severity=high&amp;id=69d6bfa81cc7ad14dab01ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5805-sql-injection-in-code-projects-easy--cac7f445</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5805%3A%20SQL%20Injection%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69d6bfa81cc7ad14dab01ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39883-cwe-426-untrusted-search-path-in-op-4a3a460e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39883%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20open-telemetry%20opentelemetry-go&amp;severity=high&amp;id=69d6bfa81cc7ad14dab01abc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5436-cwe-22-improper-limitation-of-a-path-ba455af8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5436%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20inc2734%20MW%20WP%20Form&amp;severity=high&amp;id=69d6bfa81cc7ad14dab01ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5451-cwe-79-improper-neutralization-of-in-9369247d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20Extensions%20for%20Leaflet%20Map&amp;severity=medium&amp;id=69d6bfa81cc7ad14dab01acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39882-cwe-789-memory-allocation-with-exce-341c852d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39882%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-go&amp;severity=medium&amp;id=69d6bfa81cc7ad14dab01ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39429-cwe-862-missing-authorization-in-kc-6a375916</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39429%3A%20CWE-862%3A%20Missing%20Authorization%20in%20kcp-dev%20kcp&amp;severity=high&amp;id=69d6bc281cc7ad14daadeade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5803-server-side-request-forgery-in-bigsk-0808d0e3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5803%3A%20Server-Side%20Request%20Forgery%20in%20bigsk1%20openai-realtime-ui&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39844-cwe-22-improper-limitation-of-a-pat-2aa72956</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39844%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39416-cwe-79-improper-neutralization-of-i-710941ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39416%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ail-project%20ail-framework&amp;severity=high&amp;id=69d6bc281cc7ad14daadeada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39415-cwe-602-client-side-enforcement-of--aa92afa9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39415%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20frappe%20lms&amp;severity=medium&amp;id=69d6bc281cc7ad14daadead7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39880-cwe-362-concurrent-execution-using--486d98d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39880%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20remnawave%20backend&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5802-os-command-injection-in-idachev-mcp--44929899</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5802%3A%20OS%20Command%20Injection%20in%20idachev%20mcp-javadc&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39862-cwe-78-improper-neutralization-of-s-e1fd5309</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39862%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shopify%20tophat&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39859-cwe-22-improper-limitation-of-a-pat-eb4e4019</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39859%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20harttle%20liquidjs&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39413-cwe-347-improper-verification-of-cr-65040a13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39413%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20HKUDS%20LightRAG&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39412-cwe-200-exposure-of-sensitive-infor-c828575b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39412%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20harttle%20liquidjs&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35525-cwe-61-unix-symbolic-link-symlink-f-c78ff532</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35525%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23869-cwe-502-deserialization-of-untruste-56f5fbec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23869%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data%2C%20(CWE-400)%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-turbopack&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canis-c2-exposed-previously-undocumented-cross-pla-e1c0317e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canis%20C2%20Exposed%3A%20Previously%20Undocumented%20Cross-Platform%20...&amp;severity=medium&amp;id=69d7e6f61cc7ad14dafe7e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35455-cwe-79-improper-neutralization-of-i-573d1665</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35455%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20immich-app%20immich&amp;severity=high&amp;id=69d736f91cc7ad14da418a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35446-cwe-552-files-or-directories-access-9eb009af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35446%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20aces%20Loris&amp;severity=high&amp;id=69d6bc281cc7ad14daadeafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35403-cwe-79-improper-neutralization-of-i-664839e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35403%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aces%20Loris&amp;severity=medium&amp;id=69d736f91cc7ad14da418a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35400-cwe-59-improper-link-resolution-bef-9bad991e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35400%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20aces%20Loris&amp;severity=low&amp;id=69d6b51c1cc7ad14daaa5cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35169-cwe-79-improper-neutralization-of-i-2c58241a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35169%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=69d736f91cc7ad14da418a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35165-cwe-639-authorization-bypass-throug-77a552ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35165%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aces%20Loris&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34985-cwe-639-authorization-bypass-throug-b3f6cc2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34985%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aces%20Loris&amp;severity=medium&amp;id=69d736f91cc7ad14da418a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20709-escalation-of-privilege-in-intelr-p-4405e30a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20709%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Pentium(R)%20Processor%20Silver%20Series%2C%20Intel(R)%20Celeron(R)%20Processor%20J%20Series%2C%20Intel(R)%20Celeron(R)%20Processor%20N%20Series%20may%20allow%20an%20escalation%20of%20privilege.%20Hardware%20reverse%20engineer%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20physical%20access%20when%20attack%20requirements%20are%20present%20with%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(none)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34392-cwe-552-files-or-directories-access-3dcf7cce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34392%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20aces%20Loris&amp;severity=high&amp;id=69d736fd1cc7ad14da418ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30818-cwe-78-improper-neutralization-of-s-1f2ec8c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30818%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30817-cwe-15-external-control-of-system-o-7377e4ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30817%3A%20CWE-15%20External%20control%20of%20system%20or%20configuration%20setting%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30816-cwe-15-external-control-of-system-o-ad8808da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30816%3A%20CWE-15%20External%20control%20of%20system%20or%20configuration%20setting%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30815-cwe-78-improper-neutralization-of-s-e64f09b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30815%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34166-cwe-400-uncontrolled-resource-consu-597ecf56</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34166%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20harttle%20liquidjs&amp;severity=low&amp;id=69d736fd1cc7ad14da418acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30814-cwe-121-stack-based-buffer-overflow-55b44b4e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30814%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33350-cwe-89-improper-neutralization-of-s-91697de3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33350%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27806-cwe-78-improper-neutralization-of-s-ba7f9fe1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27806%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=high&amp;id=69d736fb1cc7ad14da418a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30650-cwe-306-missing-authentication-for--762e46b9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30650%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0811-cwe-352-cross-site-request-forgery-c-3f34647d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0811%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vsourz1td%20Advanced%20Contact%20form%207%20DB&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0814-cwe-862-missing-authorization-in-vso-88777e5a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0814%3A%20CWE-862%20Missing%20Authorization%20in%20vsourz1td%20Advanced%20Contact%20form%207%20DB&amp;severity=medium&amp;id=69d736fb1cc7ad14da418a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2942-cwe-434-unrestricted-upload-of-file--b7e9cbd0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2942%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20prosolution%20ProSolution%20WP%20Client&amp;severity=critical&amp;id=69d6b1991cc7ad14daa7cbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-007-cisco-sou-1add4738</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20007%20-%20Cisco%20Source%20Code%20Stolen%20via%20Trivy-Linked%20Breach%2C%20Google%20GTIG%20Tracks%20TeamPCP%20as%20UNC6780%2C%20and%20CISA%20KEV%20Deadline%20Arrives%20with%20No%20Standalone%20Advisory%2C%20(Wed%2C%20Apr%208th)&amp;severity=medium&amp;id=69d68e701cc7ad14da93c4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32591-server-side-request-forgery-ssrf-in-522c3953</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32591%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69d737011cc7ad14da419497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32590-deserialization-of-untrusted-data-i-2ac51227</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32590%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32589-authorization-bypass-through-user-c-a7beb159</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32589%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=high&amp;id=69d736fd1cc7ad14da418ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33466-cwe-22-improper-limitation-of-a-pat-c3f5e5cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33466%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Elastic%20Logstash&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33458-cwe-918-server-side-request-forgery-637efd36</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33458%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69d6b19c1cc7ad14daa7cc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33459-cwe-400-uncontrolled-resource-consu-70fe4680</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33459%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69d737031cc7ad14da4194b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33460-cwe-863-incorrect-authorization-in--22d07900</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33460%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69d737031cc7ad14da4194d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14243-generation-of-error-message-contain-a37e8c0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14243%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33461-cwe-863-incorrect-authorization-in--fa848cf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33461%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69d737031cc7ad14da4194db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4498-cwe-250-execution-with-unnecessary-p-df770b45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4498%3A%20CWE-250%20%20Execution%20with%20Unnecessary%20Privileges%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69d737031cc7ad14da4194de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2377-server-side-request-forgery-ssrf-in--81c7f9e6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2377%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69d6aa921cc7ad14daa3e922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4837-cwe-95-improper-neutralization-of-di-59dba1b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4837%3A%20CWE-95%20Improper%20neutralization%20of%20directives%20in%20dynamically%20evaluated%20code%20(&apos;eval%20injection&apos;)%20in%20Rapid7%20Insight%20Agent&amp;severity=medium&amp;id=69d729211cc7ad14da1b339d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-leakage-vulnerability-patched-in-openssl-53eed26d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Leakage%20Vulnerability%20Patched%20in%20OpenSSL&amp;severity=medium&amp;id=69d679581cc7ad14da88dc9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33753-cwe-295-improper-certificate-valida-6c184a01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33753%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20trailofbits%20rfc3161-client&amp;severity=medium&amp;id=69d672521cc7ad14da85d64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33229-cwe-862-missing-authorization-in-xw-2e4740d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33229%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=69d672521cc7ad14da85d649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-malware-uses-macos-script-editor-to-deliv-7a29e1d2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Malware%20Uses%20macOS%20Script%20Editor%20to%20Deliver%20Atomic%20Stealer&amp;severity=medium&amp;id=69d6805e1cc7ad14da8bd0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39410-cwe-20-improper-input-validation-in-1020d1d4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39410%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20honojs%20hono&amp;severity=medium&amp;id=69d672521cc7ad14da85d658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39409-cwe-180-incorrect-behavior-order-va-1414983d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39409%3A%20CWE-180%3A%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20honojs%20hono&amp;severity=medium&amp;id=69d737041cc7ad14da419536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39408-cwe-22-improper-limitation-of-a-pat-66010df7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39408%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=69d737061cc7ad14da419553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39407-cwe-22-improper-limitation-of-a-pat-eda2389a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39407%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=69d737041cc7ad14da419531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39406-cwe-22-improper-limitation-of-a-pat-011619d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39406%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20node-server&amp;severity=medium&amp;id=69d672521cc7ad14da85d655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39394-cwe-93-improper-neutralization-of-c-77c1a2a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39394%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69d737041cc7ad14da41952e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39393-cwe-306-missing-authentication-for--2ef30390</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39393%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69d737041cc7ad14da41953e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39392-cwe-79-improper-neutralization-of-i-2a311013</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39392%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d737041cc7ad14da41952b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-bug-lurked-in-apache-activemq-classic-for-13-y-def0a809</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20Bug%20Lurked%20in%20Apache%20ActiveMQ%20Classic%20for%2013%20Years&amp;severity=medium&amp;id=69d667c41cc7ad14da7efa7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39391-cwe-79-improper-neutralization-of-i-6c691515</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39391%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d672521cc7ad14da85d652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39390-cwe-79-improper-neutralization-of-i-3ca1c395</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39390%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d737041cc7ad14da419528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39389-cwe-285-improper-authorization-in-c-861cb544</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39389%3A%20CWE-285%3A%20Improper%20Authorization%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d737041cc7ad14da41953b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/more-honeypot-fingerprinting-scans-wed-apr-8th-8f55a218</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=More%20Honeypot%20Fingerprinting%20Scans%2C%20(Wed%2C%20Apr%208th)&amp;severity=medium&amp;id=69d667d01cc7ad14da7efc4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58713-incorrect-default-permissions-in-re-e2dea4de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58713%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Process%20Automation%207&amp;severity=medium&amp;id=69d664421cc7ad14da7c09be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57853-incorrect-default-permissions-in-re-598e8725</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57853%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Web%20Terminal&amp;severity=medium&amp;id=69d664421cc7ad14da7c09b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57854-incorrect-default-permissions-in-re-a8e4f541</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57854%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Update%20Service&amp;severity=medium&amp;id=69d664421cc7ad14da7c09ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57851-incorrect-default-permissions-in-re-4a9ea030</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57851%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Multicluster%20Engine%20for%20Kubernetes&amp;severity=medium&amp;id=69d664421cc7ad14da7c09b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57847-incorrect-default-permissions-in-re-2124732f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57847%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=medium&amp;id=69d664421cc7ad14da7c09ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-lua-based-malware-lucidrook-observed-in-target-41a1408d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Lua-based%20malware%20LucidRook%20observed%20in%20targeted%20attacks%20against%20Taiwanese%20organizations&amp;severity=medium&amp;id=69d683e41cc7ad14da8df5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-cybercrime-losses-neared-21-billion-in-2025-aee29786</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20Cybercrime%20Losses%20Neared%20%2421%20Billion%20in%202025&amp;severity=high&amp;id=69d659b41cc7ad14da6ff066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5795-cwe-226-sensitive-information-in-res-9bb8041f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5795%3A%20CWE-226%20Sensitive%20information%20in%20resource%20not%20removed%20before%20reuse%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=69d729211cc7ad14da1b33a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2509-cwe-79-improper-neutralization-of-in-d2f401e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2509%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=69d737031cc7ad14da4194b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14816-cwe-317-cleartext-storage-of-sensit-e3c6f53b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14816%3A%20CWE-317%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20GUI%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=critical&amp;id=69d737041cc7ad14da419523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14815-cwe-312-cleartext-storage-of-sensit-1111c12c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14815%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=critical&amp;id=69d737041cc7ad14da41951e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35023-cwe-639-authorization-bypass-throug-032ebf5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35023%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cloud%20Solutions%20SAS%20Wimi%20Teamwork&amp;severity=medium&amp;id=69d737061cc7ad14da419558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28261-cwe-532-insertion-of-sensitive-info-3383cc31</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28261%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20Elastic%20Cloud%20Storage&amp;severity=high&amp;id=69d652ab1cc7ad14da6cf237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massachusetts-hospital-diverts-ambulances-as-cyber-a4d8f793</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massachusetts%20Hospital%20Diverts%20Ambulances%20as%20Cyberattack%20Causes%20Disruption&amp;severity=medium&amp;id=69d64ba31cc7ad14da6b63d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24511-cwe-209-generation-of-error-message-464099fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24511%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27102-cwe-266-incorrect-privilege-assignm-09eee350</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27102%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5302-cwe-942-permissive-cross-domain-poli-0fe04074</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5302%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20CoolerControl%20coolercontrold&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5300-cwe-306-missing-authentication-for-c-24cdf83c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5300%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20CoolerControl%20coolercontrold&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5301-cwe-79-improper-neutralization-of-in-aa6dc7fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5301%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoolerControl%20coolercontrol-ui&amp;severity=high&amp;id=69d64bc31cc7ad14da6b6b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-masjesu-ddos-botnet-targets-iot-devices-aef686d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20Masjesu%20DDoS%20Botnet%20Targets%20IoT%20Devices&amp;severity=critical&amp;id=69d641171cc7ad14da6710d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5208-cwe-78-improper-neutralization-of-sp-43d0d794</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CoolerControl%20coolercontrold&amp;severity=high&amp;id=69d641201cc7ad14da672288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28264-cwe-732-incorrect-permission-assign-c77bd300</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28264%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20PowerProtect%20Agent&amp;severity=low&amp;id=69d641201cc7ad14da672271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-targeting-critical-ninja-forms-bug-that-ex-4a20e46c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Targeting%20Critical%20Ninja%20Forms%20Bug%20That%20Exposes%20WordPress%20Sites%20to%20Takeover&amp;severity=critical&amp;id=69d63a0f1cc7ad14da63b20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3396-cwe-89-improper-neutralization-of-sp-b4d531e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3396%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shamimmoeen%20WCAPF%20%E2%80%93%20Ajax%20Product%20Filter%20for%20WooCommerce&amp;severity=high&amp;id=69d641201cc7ad14da672280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1672-cwe-352-cross-site-request-forgery-c-20c6ab40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1672%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20realmag777%20BEAR%20%E2%80%93%20Bulk%20Editor%20and%20Products%20Manager%20Professional%20for%20WooCommerce%20by%20Pluginus.Net&amp;severity=medium&amp;id=69d641201cc7ad14da672260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2481-cwe-79-improper-neutralization-of-in-74882230</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2481%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=69d641201cc7ad14da672274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3243-cwe-22-improper-limitation-of-a-path-47ffd1ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3243%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danbilabs%20Advanced%20Members%20for%20ACF&amp;severity=high&amp;id=69d641201cc7ad14da672278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1673-cwe-352-cross-site-request-forgery-c-e5802127</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1673%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20realmag777%20BEAR%20%E2%80%93%20Bulk%20Editor%20and%20Products%20Manager%20Professional%20for%20WooCommerce%20by%20Pluginus.Net&amp;severity=medium&amp;id=69d641201cc7ad14da672267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1865-cwe-89-improper-neutralization-of-sp-26abc5f4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1865%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69d641201cc7ad14da67226d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-disrupts-russian-espionage-operation-involving--40648239</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Disrupts%20Russian%20Espionage%20Operation%20Involving%20Hacked%20Routers%20and%20DNS%20Hijacking&amp;severity=medium&amp;id=69d6368b1cc7ad14da6116ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4300-cwe-79-improper-neutralization-of-in-28f97e93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4300%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Robo%20Gallery%20%E2%80%93%20Photo%20%26%20Image%20Slider&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fceb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4025-cwe-79-improper-neutralization-of-in-595e52c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4025%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lcweb-projects%20PrivateContent%20Free&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fce9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4303-cwe-79-improper-neutralization-of-in-668fbda1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osamaesh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fcec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4073-cwe-79-improper-neutralization-of-in-d7e9452f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dougblackjr%20pdfl.io&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fcea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-contagious-interview-campaign-spreads-dab88f6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea&apos;s%20Contagious%20Interview%20Campaign%20Spreads%20Across%205%20Ecosystems%2C%20Delivering%20Staged%20RAT%20Payloads&amp;severity=medium&amp;id=69d636951cc7ad14da612c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-64-bit-variant-of-the-infamous-lumma-f87ffc8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20The%2064-bit%20Variant%20of%20the%20Infamous%20Lumma%20Stealer&amp;severity=medium&amp;id=69d636951cc7ad14da612c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leveling-up-with-nightspire-ransomware-15a6d07c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leveling%20Up%20with%20NightSpire%20Ransomware&amp;severity=medium&amp;id=69d636951cc7ad14da612c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25776-code-injection-in-six-apart-ltd-mov-c0a38b7e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25776%3A%20Code%20injection%20in%20Six%20Apart%20Ltd.%20Movable%20Type&amp;severity=critical&amp;id=69d61a8c1cc7ad14da4e089b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33088-improper-neutralization-of-special--986381b5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33088%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20Six%20Apart%20Ltd.%20Movable%20Type&amp;severity=high&amp;id=69d61a8c1cc7ad14da4e08a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39716-missing-authorization-in-ckthemes-f-5bb90c60</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39716%3A%20Missing%20Authorization%20in%20CKThemes%20Flipmart&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b0108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39715-missing-authorization-in-anytrack-a-c8c688ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39715%3A%20Missing%20Authorization%20in%20AnyTrack%20AnyTrack%20Affiliate%20Link%20Manager&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b0105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39714-missing-authorization-in-g5theme-g5-7e202b33</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39714%3A%20Missing%20Authorization%20in%20G5Theme%20G5Plus%20April&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b0102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39713-missing-authorization-in-mailerclou-885e1e12</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39713%3A%20Missing%20Authorization%20in%20mailercloud%20Mailercloud%20%E2%80%93%20Integrate%20webforms%20and%20synchronize%20website%20contacts&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39712-improper-neutralization-of-script-r-e77d5193</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39712%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39711-insertion-of-sensitive-information--6fd7de96</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39711%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20stmcan%20RT-Theme%2018%20%7C%20Extensions&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39710-cross-site-request-forgery-csrf-in--ffdaf480</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39710%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stmcan%20RT-Theme%2018%20%7C%20Extensions&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39709-insertion-of-sensitive-information--07f770e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39709%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20thetechtribe%20The%20Tribal&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39708-improper-neutralization-of-input-du-37293b52</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39708%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uicore%20UiCore%20Elements&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39707-missing-authorization-in-zealousweb-1c0f1e09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39707%3A%20Missing%20Authorization%20in%20ZealousWeb%20Accept%20PayPal%20Payments%20using%20Contact%20Form%207&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b00a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39706-missing-authorization-in-netro-syst-76ad30c4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39706%3A%20Missing%20Authorization%20in%20Netro%20Systems%20Make%20My%20Trivia&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b00a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39705-missing-authorization-in-mulika-tea-3f637445</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39705%3A%20Missing%20Authorization%20in%20Mulika%20Team%20MIPL%20WC%20Multisite%20Sync&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b009d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39704-missing-authorization-in-nfusionsol-461a37b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39704%3A%20Missing%20Authorization%20in%20nfusionsolutions%20Precious%20Metals%20Automated%20Product%20Pricing%20%E2%80%93%20Pro&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b009a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39703-improper-neutralization-of-input-du-4f8d1788</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39703%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39702-improper-neutralization-of-input-du-605f6758</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39702%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wealcoder%20Animation%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39701-missing-authorization-in-andrew-sho-2a1a28f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39701%3A%20Missing%20Authorization%20in%20Andrew%20ShopWP&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39700-missing-authorization-in-wpxpo-wowo-434bf2b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39700%3A%20Missing%20Authorization%20in%20WPXPO%20WowOptin&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b008e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39699-missing-authorization-in-massiveshi-21bf615b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39699%3A%20Missing%20Authorization%20in%20massiveshift%20AI%20Workflow%20Automation&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b008b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39698-missing-authorization-in-publisherd-f1b61006</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39698%3A%20Missing%20Authorization%20in%20PublisherDesk%20The%20Publisher%20Desk%20ads.txt&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39697-missing-authorization-in-hbss-techn-f0e981c9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39697%3A%20Missing%20Authorization%20in%20HBSS%20Technologies%20MAIO%20%E2%80%93%20The%20new%20AI%20GEO%20%2F%20SEO%20tool&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39696-improper-neutralization-of-input-du-69c8831b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39696%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elfsight%20Elfsight%20WhatsApp%20Chat%20CC&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39694-missing-authorization-in-nsquared-s-37b8eff3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39694%3A%20Missing%20Authorization%20in%20NSquared%20Simply%20Schedule%20Appointments&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39693-improper-neutralization-of-input-du-a9c9bdc1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39693%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fesomia%20FSM%20Custom%20Featured%20Image%20Caption&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39692-improper-neutralization-of-input-du-830a178a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39692%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b003d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39691-missing-authorization-in-adastracry-96af4a1b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39691%3A%20Missing%20Authorization%20in%20AdAstraCrypto%20Cryptocurrency%20Donation%20Box%20%E2%80%93%20Bitcoin%20%26%20Crypto%20Donations&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b003a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39690-missing-authorization-in-paul-bearn-915d2868</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39690%3A%20Missing%20Authorization%20in%20Paul%20Bearne%20Author%20Avatars%20List%2FBlock&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39689-missing-authorization-in-eshipper-e-5e8bc15c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39689%3A%20Missing%20Authorization%20in%20eshipper%20eShipper%20Commerce&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39688-missing-authorization-in-glowlogix--4d7f1971</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39688%3A%20Missing%20Authorization%20in%20Glowlogix%20WP%20Frontend%20Profile&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39687-missing-authorization-in-rapid-car--54457d5d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39687%3A%20Missing%20Authorization%20in%20Rapid%20Car%20Check%20Rapid%20Car%20Check%20Vehicle%20Data&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b002e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39686-exposure-of-sensitive-system-inform-a60b3975</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39686%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20bannersky%20BSK%20PDF%20Manager&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39685-missing-authorization-in-lvaudore-t-dfcb5c55</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39685%3A%20Missing%20Authorization%20in%20lvaudore%20The%20Moneytizer&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39684-improper-control-of-filename-for-in-ef8b4fbf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39684%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20UnTheme%20OrganicFood&amp;severity=high&amp;id=69d6170a1cc7ad14da4affe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39683-improper-neutralization-of-input-du-e59c4297</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chief%20Gnome%20Garden%20Gnome%20Package&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39682-missing-authorization-in-arjan-pron-4a6b3907</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39682%3A%20Missing%20Authorization%20in%20Arjan%20Pronk%20linkPizza-Manager&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39681-improper-control-of-filename-for-in-1690a4a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39681%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Homeo&amp;severity=high&amp;id=69d6170a1cc7ad14da4affd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39680-missing-authorization-in-mwp-develo-0cd2af4d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39680%3A%20Missing%20Authorization%20in%20MWP%20Development%20Diet%20Calorie%20Calculator&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39679-improper-control-of-filename-for-in-427ce365</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39679%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Freeio&amp;severity=high&amp;id=69d6170a1cc7ad14da4affd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39678-missing-authorization-in-dotonpaper-6bffaa78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39678%3A%20Missing%20Authorization%20in%20DOTonPAPER%20Pinpoint%20Booking%20System&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39677-improper-control-of-filename-for-in-d312e518</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39677%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Emphires&amp;severity=high&amp;id=69d6170a1cc7ad14da4affcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39676-missing-authorization-in-shahjada-d-f847ca3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39676%3A%20Missing%20Authorization%20in%20Shahjada%20Download%20Manager&amp;severity=medium&amp;id=69d617091cc7ad14da4aff70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39675-missing-authorization-in-webmuehle--de1f4d2c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39675%3A%20Missing%20Authorization%20in%20webmuehle%20Court%20Reservation&amp;severity=medium&amp;id=69d617091cc7ad14da4aff6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39674-improper-neutralization-of-input-du-f256b351</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Manoj%20Kumar%20MK%20Google%20Directions&amp;severity=medium&amp;id=69d617091cc7ad14da4aff6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39673-missing-authorization-in-shrikantka-a43e6ac7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39673%3A%20Missing%20Authorization%20in%20shrikantkale%20iZooto&amp;severity=medium&amp;id=69d617091cc7ad14da4aff67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39672-missing-authorization-in-shiptime-s-c1df82e0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39672%3A%20Missing%20Authorization%20in%20shiptime%20ShipTime%3A%20Discounted%20Shipping%20Rates&amp;severity=medium&amp;id=69d617091cc7ad14da4aff64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39671-cross-site-request-forgery-csrf-in--cfec4007</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39671%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dotstore%20Extra%20Fees%20Plugin%20for%20WooCommerce&amp;severity=high&amp;id=69d617091cc7ad14da4aff61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39670-server-side-request-forgery-ssrf-in-9775c543</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39670%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Brecht%20Visual%20Link%20Preview&amp;severity=medium&amp;id=69d617091cc7ad14da4aff5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39668-missing-authorization-in-g5theme-bo-cf8964bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39668%3A%20Missing%20Authorization%20in%20g5theme%20Book%20Previewer%20for%20Woocommerce&amp;severity=medium&amp;id=69d617091cc7ad14da4aff5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39667-improper-neutralization-of-input-du-2d48dce4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39667%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jongmyoung%20Kim%20Korea%20SNS&amp;severity=medium&amp;id=69d617091cc7ad14da4aff58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39666-improper-neutralization-of-input-du-87b4cf8d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39666%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20telepathy%20Hello%20Bar%20Popup%20Builder&amp;severity=medium&amp;id=69d617091cc7ad14da4aff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39665-improper-neutralization-of-input-du-8c22e649</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39665%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vladimir%20Prelovac%20SEO%20Friendly%20Images&amp;severity=medium&amp;id=69d617071cc7ad14da4aff48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39663-missing-authorization-in-themetechm-be395ba6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39663%3A%20Missing%20Authorization%20in%20themetechmount%20TrueBooker&amp;severity=medium&amp;id=69d617071cc7ad14da4aff45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39662-missing-authorization-in-prowcplugi-bc63743f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39662%3A%20Missing%20Authorization%20in%20ProWCPlugins%20Product%20Price%20by%20Formula%20for%20WooCommerce&amp;severity=medium&amp;id=69d617071cc7ad14da4aff42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39660-missing-authorization-in-automattic-d4520bba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39660&amp;severity=null&amp;id=69d617071cc7ad14da4aff3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39659-aa1d911c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39659&amp;severity=null&amp;id=69e75c8219fe3cd2cdc91b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39658-missing-authorization-in-coding-pan-6a730078</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39658%3A%20Missing%20Authorization%20in%20Coding%20Panda%20Panda%20Pods%20Repeater%20Field&amp;severity=medium&amp;id=69d617071cc7ad14da4aff3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39657-missing-authorization-in-leadlovers-d6a0a48b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39657%3A%20Missing%20Authorization%20in%20leadlovers%20leadlovers%20forms&amp;severity=medium&amp;id=69d617071cc7ad14da4aff39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39656-missing-authorization-in-razorpay-r-7b8f408a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39656%3A%20Missing%20Authorization%20in%20Razorpay%20Razorpay%20for%20WooCommerce&amp;severity=medium&amp;id=69d617071cc7ad14da4aff36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39654-improper-neutralization-of-input-du-8e014536</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39654%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashish%20Ajani%20WP%20Simple%20HTML%20Sitemap&amp;severity=medium&amp;id=69d617071cc7ad14da4aff33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39653-missing-authorization-in-deepen-baj-12aea5fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39653%3A%20Missing%20Authorization%20in%20Deepen%20Bajracharya%20Video%20Conferencing%20with%20Zoom&amp;severity=medium&amp;id=69d617071cc7ad14da4aff30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39652-missing-authorization-in-igms-igms--5296a529</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39652%3A%20Missing%20Authorization%20in%20igms%20iGMS%20Direct%20Booking&amp;severity=medium&amp;id=69d617071cc7ad14da4aff2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39651-missing-authorization-in-totalsuite-944d0008</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39651%3A%20Missing%20Authorization%20in%20TotalSuite%20Total%20Poll%20Lite&amp;severity=medium&amp;id=69d617051cc7ad14da4afefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39650-missing-authorization-in-unitech-we-6e818b77</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39650%3A%20Missing%20Authorization%20in%20Unitech%20Web%20UnitechPay&amp;severity=medium&amp;id=69d617051cc7ad14da4afefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39649-missing-authorization-in-themebeez--ce475639</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39649%3A%20Missing%20Authorization%20in%20themebeez%20Royale%20News&amp;severity=medium&amp;id=69d617051cc7ad14da4afef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39648-missing-authorization-in-themebeez--b3361ed4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39648%3A%20Missing%20Authorization%20in%20themebeez%20Cream%20Blog&amp;severity=medium&amp;id=69d617051cc7ad14da4afef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39647-server-side-request-forgery-ssrf-in-8e42a0c1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39647%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sonaar%20MP3%20Audio%20Player%20for%20Music%2C%20Radio%20%26%20Podcast%20by%20Sonaar&amp;severity=medium&amp;id=69d617051cc7ad14da4afef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39646-improper-neutralization-of-input-du-35cfcff0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bozdoz%20Leaflet%20Map&amp;severity=medium&amp;id=69d617051cc7ad14da4afeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39645-server-side-request-forgery-ssrf-in-bd2c4602</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39645%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Global%20Payments%20GlobalPayments%20WooCommerce&amp;severity=medium&amp;id=69d617051cc7ad14da4afeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39644-missing-authorization-in-roxnor-wp--0ca5b0ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39644%3A%20Missing%20Authorization%20in%20Roxnor%20Wp%20Ultimate%20Review&amp;severity=medium&amp;id=69d617051cc7ad14da4afee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39643-missing-authorization-in-payment-pl-e37c79ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39643%3A%20Missing%20Authorization%20in%20Payment%20Plugins%20Payment%20Plugins%20for%20PayPal%20WooCommerce&amp;severity=medium&amp;id=69d617051cc7ad14da4afee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39641-cross-site-request-forgery-csrf-in--2af9df80</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39641%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Skywarrior%20Blackfyre&amp;severity=medium&amp;id=69d617051cc7ad14da4afee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39640-cross-site-request-forgery-csrf-in--2243ccb4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39640%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mndpsingh287%20Theme%20Editor&amp;severity=critical&amp;id=69d617031cc7ad14da4afea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39639-missing-authorization-in-redpixelst-bee83bf4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39639%3A%20Missing%20Authorization%20in%20redpixelstudios%20RPS%20Include%20Content&amp;severity=medium&amp;id=69d617031cc7ad14da4afea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39638-improper-neutralization-of-input-du-7631301e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20Qubely&amp;severity=medium&amp;id=69d617031cc7ad14da4afea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39637-missing-authorization-in-spabrice-m-bdd66bda</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39637%3A%20Missing%20Authorization%20in%20SpabRice%20Mogi&amp;severity=medium&amp;id=69d617031cc7ad14da4afe9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39636-improper-neutralization-of-input-du-3c4a91d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d617031cc7ad14da4afe9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39635-cross-site-request-forgery-csrf-in--a32a3287</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39635%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Magazine&amp;severity=medium&amp;id=69d617031cc7ad14da4afe97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39634-cross-site-request-forgery-csrf-in--4494cb3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39634%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Portfolio&amp;severity=medium&amp;id=69d617031cc7ad14da4afe94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39633-cross-site-request-forgery-csrf-in--0c89e848</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39633%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Car%20Rental&amp;severity=medium&amp;id=69d617031cc7ad14da4afe91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39632-cross-site-request-forgery-csrf-in--876f30ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39632%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Blog&amp;severity=medium&amp;id=69d617031cc7ad14da4afe8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39631-missing-authorization-in-ronikunlim-056815bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39631%3A%20Missing%20Authorization%20in%20Ronik%40UnlimitedWP%20WPSchoolPress&amp;severity=medium&amp;id=69d617031cc7ad14da4afe8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39629-improper-neutralization-of-script-r-c319eefa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39629%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kutethemes%20Uminex&amp;severity=medium&amp;id=69d617011cc7ad14da4afdd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39628-improper-neutralization-of-script-r-396420fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39628%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kutethemes%20DukaMarket&amp;severity=medium&amp;id=69d617011cc7ad14da4afdd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39627-missing-authorization-in-wproyal-as-b41441e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39627%3A%20Missing%20Authorization%20in%20wproyal%20Ashe&amp;severity=medium&amp;id=69d617011cc7ad14da4afdd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39626-improper-neutralization-of-script-r-0f0d2bb4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39626%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kutethemes%20Armania&amp;severity=medium&amp;id=69d617011cc7ad14da4afdce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39625-improper-neutralization-of-script-r-a01cb56a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39625%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kutethemes%20TechOne&amp;severity=medium&amp;id=69d617011cc7ad14da4afdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39624-missing-authorization-in-kutethemes-7c0e8504</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39624%3A%20Missing%20Authorization%20in%20kutethemes%20Biolife&amp;severity=medium&amp;id=69d617011cc7ad14da4afdc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39623-improper-control-of-filename-for-in-4d2fd1c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39623%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20kutethemes%20Biolife&amp;severity=high&amp;id=69d617011cc7ad14da4afdc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39622-missing-authorization-in-acmethemes-8703d7da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39622%3A%20Missing%20Authorization%20in%20acmethemes%20Education%20Base&amp;severity=medium&amp;id=69d617011cc7ad14da4afdc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39621-cross-site-request-forgery-csrf-in--6a2ce25f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39621%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20spicethemes%20SpicePress&amp;severity=high&amp;id=69d617011cc7ad14da4afdbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39620-cross-site-request-forgery-csrf-in--fa017005</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39620%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20priyanshumittal%20Appointment&amp;severity=critical&amp;id=69d617011cc7ad14da4afdbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39619-cross-site-request-forgery-csrf-in--fb37f1cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39619%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20priyanshumittal%20Busiprof&amp;severity=critical&amp;id=69d616fe1cc7ad14da4afd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39618-cross-site-request-forgery-csrf-in--ec5ce884</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39618%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themearile%20NewsExo&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39617-cross-site-request-forgery-csrf-in--10c0110c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39617%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20priyanshumittal%20Bluestreet&amp;severity=critical&amp;id=69d616fe1cc7ad14da4afd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39616-authorization-bypass-through-user-c-78d81e2f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39616%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dFactory%20Download%20Attachments&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39615-improper-neutralization-of-input-du-251c6e78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39615%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shahjada%20Download%20Manager&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39614-missing-authorization-in-ilghera-jw-c0b4a550</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39614%3A%20Missing%20Authorization%20in%20ilGhera%20JW%20Player%20for%20WordPress&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39613-improper-control-of-filename-for-in-b90760c4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39613%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20kutethemes%20Boutique&amp;severity=high&amp;id=69d616fe1cc7ad14da4afd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39612-missing-authorization-in-kutethemes-2d5544f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39612%3A%20Missing%20Authorization%20in%20kutethemes%20KuteShop&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39611-improper-control-of-filename-for-in-62d28ace</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39611%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20kutethemes%20KuteShop&amp;severity=high&amp;id=69d616fe1cc7ad14da4afd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39610-missing-authorization-in-pankaj-kum-c7e969a3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39610%3A%20Missing%20Authorization%20in%20Pankaj%20Kumar%20WpXmas-Snow&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39609-missing-authorization-in-wavaco-wav-ac9b8fb3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39609%3A%20Missing%20Authorization%20in%20Wava.co%20Wava%20Payment&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39608-missing-authorization-in-ipospays-i-faef3077</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39608%3A%20Missing%20Authorization%20in%20iPOSPays%20iPOSpays%20Gateways%20WC&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39607-missing-authorization-in-wpbens-fil-ece8b913</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39607%3A%20Missing%20Authorization%20in%20Wpbens%20Filter%20Plus&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39606-missing-authorization-in-foysal-imr-50c178ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39606%3A%20Missing%20Authorization%20in%20Foysal%20Imran%20BizReview&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39605-missing-authorization-in-obadiah-su-7ae924d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39605%3A%20Missing%20Authorization%20in%20Obadiah%20Super%20Custom%20Login&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39604-improper-neutralization-of-input-du-3872f08c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39604%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zookatron%20MyBookTable%20Bookstore&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39603-cross-site-request-forgery-csrf-in--c72d1294</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39603%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Photography&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39602-missing-authorization-in-rustaurius-63531315</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39602%3A%20Missing%20Authorization%20in%20Rustaurius%20Order%20Tracking&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39592-missing-authorization-in-andy-ha-de-80b4222f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39592%3A%20Missing%20Authorization%20in%20Andy%20Ha%20DEPART&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39588-missing-authorization-in-nmerii-nm--e798b4ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39588%3A%20Missing%20Authorization%20in%20nmerii%20NM%20Gift%20Registry%20and%20Wishlist%20Lite&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39586-insertion-of-sensitive-information--c19d163a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39586%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Ateeq%20Rafeeq%20RepairBuddy&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39585-missing-authorization-in-arraytics--3cdfad1b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39585%3A%20Missing%20Authorization%20in%20Arraytics%20Booktics&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39575-improper-neutralization-of-input-du-3d1e8b18</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ronald%20Huereca%20Custom%20Query%20Blocks&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39572-exposure-of-sensitive-system-inform-a5237c39</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39572%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20magepeopleteam%20Bus%20Ticket%20Booking%20with%20Seat%20Reservation&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39571-exposure-of-sensitive-system-inform-b08f32be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39571%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Themefic%20Instantio&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39570-insertion-of-sensitive-information--0254299a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39570%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39569-missing-authorization-in-aa-web-ser-1ea0bfe6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39569%3A%20Missing%20Authorization%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39566-exposure-of-sensitive-system-inform-bab9495d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39566%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39565-missing-authorization-in-magepeople-51b3362f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39565%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpTravelly&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39564-insertion-of-sensitive-information--f306c3d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39564%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39563-missing-authorization-in-illid-shar-6719974c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39563%3A%20Missing%20Authorization%20in%20ILLID%20Share%20This%20Image&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39562-missing-authorization-in-boldgrid-c-f3791555</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39562%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39561-missing-authorization-in-wp-chill-r-199a1e62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39561%3A%20Missing%20Authorization%20in%20WP%20Chill%20Revive.so&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39544-improper-control-of-filename-for-in-91cc223d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39544%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themeStek%20LabtechCO&amp;severity=high&amp;id=69d616f91cc7ad14da4afbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39543-missing-authorization-in-themefic-t-196247a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39543%3A%20Missing%20Authorization%20in%20Themefic%20Tourfic&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39542-insertion-of-sensitive-information--0460275f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39542%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Doofinder%20Doofinder%20for%20WooCommerce&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39541-improper-neutralization-of-input-du-73f33e9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themefic%20Hydra%20Booking&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39538-improper-control-of-filename-for-in-91d9ccf3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39538%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Mikado%20Core&amp;severity=high&amp;id=69d616f91cc7ad14da4afbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39536-exposure-of-sensitive-system-inform-85ad2a2a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39536%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WP%20Chill%20RSVP%20and%20Event%20Management&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39535-missing-authorization-in-fullworks--a42a2483</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39535%3A%20Missing%20Authorization%20in%20fullworks%20Display%20Eventbrite%20Events&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39521-server-side-request-forgery-ssrf-in-f2101bb5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39521%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Nelio%20Software%20Nelio%20Content&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39520-missing-authorization-in-wedevs-wed-c70e74d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39520%3A%20Missing%20Authorization%20in%20weDevs%20weDocs&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39517-improper-neutralization-of-input-du-09284a0b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20A%20WP%20Life%20Blog%20Filter&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39516-exposure-of-sensitive-system-inform-66aa6a83</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39516%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39510-authorization-bypass-through-user-c-d1b52bbc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39510%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20Chill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=low&amp;id=69d616f71cc7ad14da4afb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39509-missing-authorization-in-wpwax-dire-e5a0bac6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39509%3A%20Missing%20Authorization%20in%20wpWax%20Directorist&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39508-improper-neutralization-of-input-du-7de8079d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39508%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Josh%20Kohlbach%20Advanced%20Coupons%20for%20WooCommerce%20Coupons&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39506-missing-authorization-in-jordy-meow-8ed7dcf5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39506%3A%20Missing%20Authorization%20in%20Jordy%20Meow%20AI%20Engine%20(Pro)&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39505-missing-authorization-in-craig-hewi-7796c727</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39505%3A%20Missing%20Authorization%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39504-missing-authorization-in-instawp-in-9d2aa628</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39504%3A%20Missing%20Authorization%20in%20InstaWP%20InstaWP%20Connect&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39501-missing-authorization-in-realmag777-a60ba421</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39501%3A%20Missing%20Authorization%20in%20RealMag777%20FOX&amp;severity=medium&amp;id=69d616f51cc7ad14da4afb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39500-improper-neutralization-of-input-du-90bb209c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39500%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themesflat%20themesflat-addons-for-elementor&amp;severity=medium&amp;id=69d616f51cc7ad14da4afafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39497-improper-neutralization-of-special--41e1ab43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39497%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RealMag777%20FOX&amp;severity=high&amp;id=69d616f51cc7ad14da4afafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39496-improper-neutralization-of-special--7b4afd34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39496%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20YayMail&amp;severity=high&amp;id=69d616f51cc7ad14da4afaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39495-improper-neutralization-of-special--e31f432d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39495%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NSquared%20Simply%20Schedule%20Appointments&amp;severity=high&amp;id=69d616f51cc7ad14da4afaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39487-improper-neutralization-of-special--6e2a6b79</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39487%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ameliabooking%20Amelia&amp;severity=high&amp;id=69d616f51cc7ad14da4afaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39486-improper-neutralization-of-special--ca98010d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39486%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Chill%20Download%20Monitor&amp;severity=high&amp;id=69d616f51cc7ad14da4afaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39485-missing-authorization-in-embedplus--553b7b84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39485%3A%20Missing%20Authorization%20in%20embedplus%20Youtube%20Embed%20Plus&amp;severity=medium&amp;id=69d616f51cc7ad14da4afaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39484-url-redirection-to-untrusted-site-o-aefc8aa3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39484%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20John%20Darrel%20Hide%20My%20WP%20Ghost&amp;severity=medium&amp;id=69d616f51cc7ad14da4afae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39483-improper-neutralization-of-input-du-bde97d33</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39483%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hidekazu%20Ishikawa%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=69d616f51cc7ad14da4afae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39482-improper-neutralization-of-input-du-72a40454</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39482%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PublishPress%20Post%20Expirator&amp;severity=medium&amp;id=69d616f31cc7ad14da4afaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39479-improper-neutralization-of-special--f248450f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39479%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Brainstorm%20Force%20OttoKit&amp;severity=high&amp;id=69d616f31cc7ad14da4afaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39477-missing-authorization-in-brainstorm-2883b008</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39477%3A%20Missing%20Authorization%20in%20Brainstorm%20Force%20CartFlows&amp;severity=medium&amp;id=69d616f31cc7ad14da4afaa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39476-missing-authorization-in-syed-balkh-71ee3c64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39476%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20User%20Feedback&amp;severity=medium&amp;id=69d616f31cc7ad14da4afaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39475-improper-neutralization-of-special--4455fa78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39475%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Syed%20Balkhi%20User%20Feedback&amp;severity=high&amp;id=69d616f31cc7ad14da4afaa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39473-insertion-of-sensitive-information--68bbdf27</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39473%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20P%C3%A4r%20Thernstr%C3%B6m%20Simple%20History&amp;severity=medium&amp;id=69d616f31cc7ad14da4afa9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39469-exposure-of-sensitive-system-inform-ea7f9095</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39469%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Softaculous%20PageLayer&amp;severity=medium&amp;id=69d616f31cc7ad14da4afa9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39466-improper-neutralization-of-special--5e225890</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39466%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Broken%20Link%20Checker&amp;severity=high&amp;id=69d616f31cc7ad14da4afa97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39464-server-side-request-forgery-ssrf-in-5f9f2910</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39464%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SeedProd%20Coming%20Soon%20Page%2C%20Under%20Construction%20%26%20Maintenance%20Mode%20by%20SeedProd&amp;severity=medium&amp;id=69d616f31cc7ad14da4afa94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1396-cwe-79-improper-neutralization-of-in-d8ea9142</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magicplugins%20Magic%20Conversation%20For%20Gravity%20Forms&amp;severity=medium&amp;id=69d616f31cc7ad14da4afa8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hardening-security-management-console-settings-kas-196b1d89</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hardening%20security%20management%20console%20settings%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d843531cc7ad14da3f9421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4330-cwe-639-authorization-bypass-through-5faf3f4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4330%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=69d60c5a1cc7ad14da40051f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4654-cwe-639-authorization-bypass-through-3569b1d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4654%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20awesomesupport%20Awesome%20Support%20%E2%80%93%20WordPress%20HelpDesk%20%26%20Support%20Plugin&amp;severity=medium&amp;id=69d60c5a1cc7ad14da400531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4655-cwe-79-improper-neutralization-of-in-b7a2a664</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4655%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d60c5a1cc7ad14da400539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4483-cwe-782-exposed-ioctl-with-insuffici-c15e4a28</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4483%3A%20CWE-782%3A%20Exposed%20IOCTL%20with%20Insufficient%20Access%20Control%20in%20Moxa%20MxGeneralIo&amp;severity=high&amp;id=69d6330f1cc7ad14da5fceca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1794-cwe-79-improper-neutralization-of-in-5f6cbf28</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1794%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johanaarstein%20AM%20LottiePlayer&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3781-cwe-89-improper-neutralization-of-sp-8de4ea08</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3781%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tnomi%20Attendance%20Manager&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da37386a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4141-cwe-352-cross-site-request-forgery-c-1bb39fd6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4141%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edckwt%20Quran%20Translations&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2838-cwe-79-improper-neutralization-of-in-58a6fbc4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2838%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20idealwebdesignlk%20Whole%20Enquiry%20Cart%20for%20WooCommerce&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da37382d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5506-cwe-79-improper-neutralization-of-in-4eeb5819</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lucascaro%20Wavr&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3618-cwe-79-improper-neutralization-of-in-c0a8e3b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestweblayout%20Columns%20by%20BestWebSoft%20%E2%80%93%20Additional%20Columns%20Plugin%20for%20Posts%20Pages%20and%20Widgets&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da37385f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5167-cwe-639-authorization-bypass-through-7e74c610</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5167%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20masteriyo%20Masteriyo%20LMS%20%E2%80%93%20Online%20Course%20Builder%20for%20eLearning%2C%20LMS%20%26%20Education&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3477-cwe-862-missing-authorization-in-pro-ba62e916</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3477%3A%20CWE-862%20Missing%20Authorization%20in%20projectzealous01%20PZ%20Frontend%20Manager&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da37383b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5508-cwe-79-improper-neutralization-of-in-d52f9afd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theyeti%20WowPress&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4808-cwe-434-unrestricted-upload-of-file--351bdd48</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4808%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tidevapps%20Gerador%20de%20Certificados%20%E2%80%93%20DevApps&amp;severity=high&amp;id=69d5fe4e1cc7ad14da373a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3142-cwe-79-improper-neutralization-of-in-28bf6e05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uniquecodergmailcom%20Pinterest%20Site%20Verification%20plugin%20using%20Meta%20Tag&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5169-cwe-79-improper-neutralization-of-in-e4e92042</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5169%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20udamadu%20Inquiry%20form%20to%20posts%20or%20pages&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3535-cwe-434-unrestricted-upload-of-file--f7fa2474</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3535%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mlfactory%20DSGVO%20Google%20Web%20Fonts%20GDPR&amp;severity=critical&amp;id=69d5fe4c1cc7ad14da37384d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3480-cwe-862-missing-authorization-in-bur-092801c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3480%3A%20CWE-862%20Missing%20Authorization%20in%20burlingtonbytes%20WP%20Blockade%20%E2%80%93%20Visual%20Page%20Builder&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4871-cwe-79-improper-neutralization-of-in-21516959</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4871%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pstruik%20Sports%20Club%20Management&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3594-cwe-200-exposure-of-sensitive-inform-fa14576c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3594%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4338-cwe-200-information-exposure-in-acti-e17048f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4338%3A%20CWE-200%20Information%20Exposure%20in%20ActivityPub&amp;severity=high&amp;id=69d5f7631cc7ad14da1ac467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5083-cwe-340-generation-of-predictable-nu-687eb344</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5083%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20BEROV%20Ado%3A%3ASessions&amp;severity=medium&amp;id=69d5f0511cc7ad14da136bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5082-cwe-340-generation-of-predictable-nu-cfa6d925</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5082%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20TOKUHIROM%20Amon2%3A%3APlugin%3A%3AWeb%3A%3ACSRFDefender&amp;severity=medium&amp;id=69d5f0511cc7ad14da136bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3311-cwe-79-improper-neutralization-of-in-7dd384e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3311%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=69d5f0511cc7ad14da136bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27787-cross-site-scripting-xss-in-icz-cor-bd3c9fc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27787%3A%20Cross-site%20scripting%20(XSS)%20in%20ICZ%20Corporation%20MATCHA%20SNS&amp;severity=medium&amp;id=69d5e9331cc7ad14da0af38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33273-unrestricted-upload-of-file-with-da-08282ecf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33273%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20ICZ%20Corporation%20MATCHA%20INVOICE&amp;severity=medium&amp;id=69d5e9331cc7ad14da0af38e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24913-improper-neutralization-of-special--a0c970a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24913%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20ICZ%20Corporation%20MATCHA%20INVOICE&amp;severity=high&amp;id=69d5e9331cc7ad14da0af385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3239-cwe-79-improper-neutralization-of-in-e321677f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Strong%20Testimonials&amp;severity=medium&amp;id=69d5da2a43e2781badfbe5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3646-cwe-862-missing-authorization-in-eni-4151b69d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3646%3A%20CWE-862%20Missing%20Authorization%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20R%2BL%20Carriers%20Edition&amp;severity=medium&amp;id=69d5da2a43e2781badfbe5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4299-cwe-862-missing-authorization-in-mai-39a16b63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4299%3A%20CWE-862%20Missing%20Authorization%20in%20mainwp%20MainWP%20Child%20Reports&amp;severity=medium&amp;id=69d5da2a43e2781badfbe611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4785-cwe-79-improper-neutralization-of-in-0c03eae6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4785%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69d5da2a43e2781badfbe629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4341-cwe-79-improper-neutralization-of-in-7abe1d49</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4341%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d5da2a43e2781badfbe621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3513-cwe-79-improper-neutralization-of-in-dd5c336b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20TableOn%20%E2%80%93%20WordPress%20Posts%20Table%20Filterable&amp;severity=medium&amp;id=69d5da2a43e2781badfbe5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4003-cwe-862-missing-authorization-in-fel-3d2461b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4003%3A%20CWE-862%20Missing%20Authorization%20in%20felixmartinez%20Users%20manager%20%E2%80%93%20PN&amp;severity=critical&amp;id=69d5da2a43e2781badfbe603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4333-cwe-79-improper-neutralization-of-in-74879927</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4333%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69d5da2a43e2781badfbe619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-disrupt-us-critical-infrastruc-e5d8387a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Disrupt%20US%20Critical%20Infrastructure%20via%20PLC%20Attacks&amp;severity=critical&amp;id=69d5c50e43e2781bade1a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2988-cwe-79-improper-neutralization-of-in-c3d5b403</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blubrry%20PowerPress%20Podcasting%20plugin%20by%20Blubrry&amp;severity=medium&amp;id=69d5cf9a43e2781badef2665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4379-cwe-79-improper-neutralization-of-in-dff1ae19</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20firelightwp%20LightPress%20Lightbox&amp;severity=medium&amp;id=69d5cf9a43e2781badef2669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1163-cwe-613-insufficient-session-expirat-89ecf2fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1163%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20parisneo%20parisneo%2Flollms&amp;severity=medium&amp;id=69d5be0543e2781badde667d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-8th-2026-httpsis-20e60d29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%208th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9884%2C%20(Wed%2C%20Apr%208th)&amp;severity=medium&amp;id=69d5b6fe43e2781badd932f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5726-cwe-121-stack-based-buffer-overflow--e858c143</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5726%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20ASDA-Soft&amp;severity=high&amp;id=69d5be0543e2781badde6681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3499-cwe-352-cross-site-request-forgery-c-c703541c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3499%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jkohlbach%20Product%20Feed%20PRO%20for%20WooCommerce%20by%20AdTribes%20%E2%80%93%20Product%20Feeds%20for%20WooCommerce&amp;severity=high&amp;id=69d5da2f43e2781badfbe70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3296-cwe-502-deserialization-of-untrusted-0f906f62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3296%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%2C%20Quiz%2C%20Survey%20%26%20Custom%20Form%20Builder&amp;severity=critical&amp;id=69d5da2d43e2781badfbe6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14732-cwe-87-improper-neutralization-of-a-c80c9004</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14732%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=69d5da2a43e2781badfbe631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32280-cwe-770-allocation-of-resources-wit-de80e7e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32280%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69d5da2d43e2781badfbe67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32281-cwe-407-inefficient-algorithmic-com-b72394eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32281%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69d5da2d43e2781badfbe684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27140-cwe-501-trust-boundary-violation-in-af12b387</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27140%3A%20CWE-501%3A%20Trust%20Boundary%20Violation%20in%20Go%20toolchain%20cmd%2Fgo&amp;severity=high&amp;id=69d5da2a43e2781badfbe636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32283-cwe-667-improper-locking-in-go-stan-8f02aa51</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32283%3A%20CWE-667%3A%20Improper%20Locking%20in%20Go%20standard%20library%20crypto%2Ftls&amp;severity=high&amp;id=69d5da2d43e2781badfbe690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32288-cwe-400-uncontrolled-resource-consu-6cf553fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32288%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20archive%2Ftar&amp;severity=medium&amp;id=69d5da2d43e2781badfbe696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27143-cwe-190-integer-overflow-or-wraparo-3cb5316f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27143%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Go%20toolchain%20cmd%2Fcompile&amp;severity=critical&amp;id=69d5da2d43e2781badfbe671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27144-cwe-440-expected-behavior-violation-79ce4188</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27144%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20Go%20toolchain%20cmd%2Fcompile&amp;severity=high&amp;id=69d5da2d43e2781badfbe678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33810-cwe-295-improper-certificate-valida-7c6514b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33810%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69d5da2d43e2781badfbe6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32289-cwe-79-improper-neutralization-of-i-bb1dc664</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32289%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Go%20standard%20library%20html%2Ftemplate&amp;severity=medium&amp;id=69d5da2d43e2781badfbe69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32282-cwe-61-unix-symbolic-link-symlink-f-45c62abb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32282%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Go%20standard%20library%20internal%2Fsyscall%2Funix&amp;severity=medium&amp;id=69d5da2d43e2781badfbe68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4788-cwe-532-insertion-of-sensitive-infor-b2599224</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4788%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Tivoli%20Netcool%20Impact&amp;severity=high&amp;id=69d5a90e43e2781badc258eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3357-cwe-502-deserialization-of-untrusted-adf6ffea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3357%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20Langflow%20Desktop&amp;severity=high&amp;id=69d5a90e43e2781badc258e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1346-cwe-250-execution-with-unnecessary-p-0c7a9e3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1346%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=critical&amp;id=69d5a90e43e2781badc258e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1343-cwe-918-server-side-request-forgery--fb6c56f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1343%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69d5a90e43e2781badc258e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/horilla-v13-rce-0b1af8fd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Horilla%20v1.3%20-%20RCE&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-mmc-msc-eviltwin-local-admin-creation-4e805a5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20MMC%20MSC%20EvilTwin%20-%20Local%20Admin%20Creation&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sqlite-3501-heap-overflow-a085d62f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SQLite%203.50.1%20-%20Heap%20Overflow&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xibocms-334-rce-da56583b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=xibocms%203.3.4%20-%20RCE&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/7-zip-2400-directory-traversal-9985f72b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=7-Zip%2024.00%20-%20Directory%20Traversal&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortiweb-802-remote-code-execution-d02f75d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FortiWeb%20%208.0.2%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-09-6a284ade</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-09&amp;severity=medium&amp;id=69d780fb1cc7ad14da9b68aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30080-na-dfe8d7bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30080%3A%20n%2Fa&amp;severity=high&amp;id=69d737041cc7ad14da41951b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31017-na-c9a2ad62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31017%3A%20n%2Fa&amp;severity=critical&amp;id=69d737031cc7ad14da4194d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30075-na-e26c9b0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30075%3A%20n%2Fa&amp;severity=high&amp;id=69d737031cc7ad14da4194cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57175-cwe-259-use-of-hard-coded-password--3f56779a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57175%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Siklu%20EtherHaul%208010&amp;severity=medium&amp;id=69d737031cc7ad14da4194c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52222-na-e14790c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52222%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52221-na-d9756d46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52221%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da41948f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45059-na-da4be87d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45059%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da41948a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45058-na-9b99274a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45058%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45057-na-4fdbe786</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45057%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50665-na-87d73563</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50665%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50664-na-fce2f7ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50664%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50663-na-b4dcd5be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50663%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50662-na-8246a6d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50662%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50661-na-80b3206d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50661%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50660-na-18486f57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50660%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50659-na-3df7cbb2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50659%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50657-na-2beef1d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50657%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50655-na-8161f53b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50655%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50654-na-474a2263</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50654%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50653-na-58791e05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50653%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50652-na-250b1507</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50652%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50650-na-e59a18ab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50650%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50649-na-0364b3d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50649%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50648-na-06f6f35d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50648%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50647-na-847ab36b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50647%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50646-na-f2566770</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50646%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50645-na-06e8d547</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50645%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50644-na-48254413</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50644%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50673-na-56b2d24f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50673%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50672-na-ba1cf499</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50672%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50671-na-fff78188</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50671%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50670-na-64c194af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50670%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50669-na-73b4f094</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50669%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50668-na-5da5fff6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50668%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50667-na-0d001b9b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50667%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50666-na-3f2d51f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50666%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-08-88662dcf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-08&amp;severity=medium&amp;id=69d6ed521cc7ad14dac65b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31040-na-bf49c58b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31040%3A%20n%2Fa&amp;severity=critical&amp;id=69d672521cc7ad14da85d643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-08-006a6854</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-08&amp;severity=low&amp;id=69d5d31643e2781badf30886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4401-cwe-352-cross-site-request-forgery-c-786129b0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4401%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpchill%20Download%20Monitor&amp;severity=medium&amp;id=69d593d643e2781bad930d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2263-cwe-862-missing-authorization-in-wpm-922a4ba2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2263%3A%20CWE-862%20Missing%20Authorization%20in%20wpmudev%20Hustle%20%E2%80%93%20Email%20Marketing%2C%20Lead%20Generation%2C%20Optins%2C%20Popups&amp;severity=medium&amp;id=69d593d643e2781bad930d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1342-cwe-829-inclusion-of-functionality-f-958a04f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1342%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69d593d643e2781bad930d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5747-cwe-787-out-of-bounds-write-in-aws-f-b3ecdbf7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5747%3A%20CWE-787%20Out-of-bounds%20write%20in%20AWS%20Firecracker&amp;severity=high&amp;id=69d593d643e2781bad930da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20628-cwe-1220-insufficient-granularity-o-a7a6b97a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20628%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Ping%20Identity%20PingIDM&amp;severity=medium&amp;id=69d5896b43e2781bad87a4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39936-cwe-79-improper-neutralization-of-i-7dd665bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39936%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Score%20Extension&amp;severity=medium&amp;id=69d5898e43e2781bad88a87f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39935-cwe-79-improper-neutralization-of-i-4f937883</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39935%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20CampaignEvents%20Extension&amp;severity=medium&amp;id=69d5898d43e2781bad88a87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39934-cwe-835-loop-with-unreachable-exit--3c5cb986</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39934%3A%20CWE-835%20Loop%20with%20unreachable%20exit%20condition%20(&apos;infinite%20loop&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments%20Extension&amp;severity=medium&amp;id=69d5826f43e2781bad7a17e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39933-cwe-79-improper-neutralization-of-i-01337219</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39933%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GlobalWatchlist%20Extension&amp;severity=medium&amp;id=69d5826f43e2781bad7a17c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39937-cwe-212-improper-removal-of-sensiti-6c7ae469</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39937%3A%20CWE-212%20Improper%20removal%20of%20sensitive%20information%20before%20storage%20or%20transfer%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20CentralAuth%20Extension&amp;severity=high&amp;id=69d57b23aaed68159a6dfc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39847-cwe-22-improper-limitation-of-a-pat-645f3706</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39847%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20emmett-framework%20emmett&amp;severity=critical&amp;id=69d57b23aaed68159a6dfc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39846-cwe-79-improper-neutralization-of-i-d77ddc8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39846%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69d57b23aaed68159a6dfc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35406-cwe-400-uncontrolled-resource-consu-da0dd3f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35406%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20containers%20aardvark-dns&amp;severity=medium&amp;id=69d57b23aaed68159a6dfc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4065-cwe-862-missing-authorization-in-nex-9dddec99</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4065%3A%20CWE-862%20Missing%20Authorization%20in%20nextendweb%20Smart%20Slider%203&amp;severity=medium&amp;id=69d5779eaaed68159a6ad78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34582-cwe-841-improper-enforcement-of-beh-4800545c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34582%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20randombit%20botan&amp;severity=high&amp;id=69d5779eaaed68159a6ad783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34580-cwe-295-improper-certificate-valida-eaa06a84</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34580%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20randombit%20botan&amp;severity=critical&amp;id=69d5779eaaed68159a6ad780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34371-cwe-22-improper-limitation-of-a-pat-933bc4a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34371%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69d5779eaaed68159a6ad77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35568-cwe-346-origin-validation-error-in--286f27ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35568%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20modelcontextprotocol%20java-sdk&amp;severity=high&amp;id=69d5779eaaed68159a6ad786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35533-cwe-284-improper-access-control-in--c575f90b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35533%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20jdx%20mise&amp;severity=high&amp;id=69d5743aaaed68159a661746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34080-cwe-1289-improper-validation-of-uns-d20a9131</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34080%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20flatpak%20xdg-dbus-proxy&amp;severity=medium&amp;id=69d5743aaaed68159a661743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33439-cwe-502-deserialization-of-untruste-ba9f5241</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33439%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20OpenIdentityPlatform%20OpenAM&amp;severity=critical&amp;id=69d5743aaaed68159a661740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29181-cwe-770-allocation-of-resources-wit-bd8d6c9e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29181%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-telemetry%20opentelemetry-go&amp;severity=high&amp;id=69d5874b43e2781bad84eb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27949-cwe-200-exposure-of-sensitive-infor-edab4ef3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27949%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20makeplane%20plane&amp;severity=low&amp;id=69d5874b43e2781bad84eafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39401-cwe-862-missing-authorization-in-jh-2110547e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39401%3A%20CWE-862%3A%20Missing%20Authorization%20in%20jhuckaby%20Cronicle&amp;severity=medium&amp;id=69d5698eaaed68159a5d8dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39400-cwe-79-improper-neutralization-of-i-8da42c7d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39400%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jhuckaby%20Cronicle&amp;severity=medium&amp;id=69d5698eaaed68159a5d8df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39397-cwe-862-missing-authorization-in-de-8180a502</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39397%3A%20CWE-862%3A%20Missing%20Authorization%20in%20delmaredigital%20payload-puck&amp;severity=critical&amp;id=69d5698eaaed68159a5d8df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39395-cwe-754-improper-check-for-unusual--f6857bb4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39395%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20sigstore%20cosign&amp;severity=medium&amp;id=69d5660baaed68159a5b407a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5741-os-command-injection-in-suvarchal-do-31706638</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5741%3A%20OS%20Command%20Injection%20in%20suvarchal%20docker-mcp-server&amp;severity=medium&amp;id=69d5660baaed68159a5b407d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39356-cwe-89-improper-neutralization-of-s-1f1d9545</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39356%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20drizzle-team%20drizzle-orm&amp;severity=high&amp;id=69d5660baaed68159a5b4073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14859-cwe-327-use-of-a-broken-or-risky-cr-93275ea7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14859%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Semtech%20LR1110&amp;severity=high&amp;id=69d5660baaed68159a5b406d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14858-cwe-226-sensitive-information-in-re-f6b360c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14858%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20Semtech%20LR1110&amp;severity=medium&amp;id=69d5660baaed68159a5b4069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14857-cwe-123-write-what-where-condition--c8c3a068</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14857%3A%20CWE-123%20Write-what-where%20Condition%20in%20Semtech%20LR1110&amp;severity=medium&amp;id=69d5660baaed68159a5b4066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32864-cwe-125-out-of-bounds-read-in-ni-la-6af518ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32864%3A%20CWE-125%20Out-of-bounds%20read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d5660baaed68159a5b4070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39382-cwe-78-improper-neutralization-of-s-b49396ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39382%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20dbt-labs%20dbt-core&amp;severity=critical&amp;id=69d5660baaed68159a5b4076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32863-cwe-125-out-of-bounds-read-in-ni-la-4bc30ff3</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32863%3A%20CWE-125%20Out-of-bounds%20read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d56287aaed68159a58f978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39381-cwe-863-incorrect-authorization-in--ea8cb850</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39381%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69d56287aaed68159a58f984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32862-cwe-787-out-of-bounds-write-in-ni-l-e080252e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32862%3A%20CWE-787%20Out-of-bounds%20write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d56287aaed68159a58f975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39837-cwe-80-improper-neutralization-of-s-0845af33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39837%3A%20CWE-80%20Improper%20neutralization%20of%20Script-Related%20HTML%20tags%20in%20a%20web%20page%20(basic%20XSS)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=69d56287aaed68159a58f989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32861-cwe-787-out-of-bounds-write-in-ni-l-febe3e90</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32861%3A%20CWE-787%20Out-of-bounds%20write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d56287aaed68159a58f972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39376-cwe-674-uncontrolled-recursion-in-k-a81ba893</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39376%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20kagisearch%20fastfeedparser&amp;severity=high&amp;id=69d56287aaed68159a58f981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39841-cwe-80-improper-neutralization-of-s-a175a700</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39841%3A%20CWE-80%20Improper%20neutralization%20of%20Script-Related%20HTML%20tags%20in%20a%20web%20page%20(basic%20XSS)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=69d56289aaed68159a58f9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32860-cwe-787-out-of-bounds-write-in-ni-l-b871832b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32860%3A%20CWE-787%C2%A0-%20Out%20of%20Bounds%20Write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d56287aaed68159a58f96f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39374-cwe-639-authorization-bypass-throug-07ac8902</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39374%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20makeplane%20plane&amp;severity=medium&amp;id=69d56287aaed68159a58f97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39840-cwe-79-improper-neutralization-of-i-1432962f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39840%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=69d56287aaed68159a58f98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39373-cwe-409-improper-handling-of-highly-78e8fadf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39373%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20latchset%20jwcrypto&amp;severity=medium&amp;id=69d56287aaed68159a58f97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39839-cwe-80-improper-neutralization-of-s-43014776</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39839%3A%20CWE-80%20Improper%20neutralization%20of%20Script-Related%20HTML%20tags%20in%20a%20web%20page%20(basic%20XSS)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=69d55f0aaaed68159a5629d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39371-cwe-352-cross-site-request-forgery--ad62fb02</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39371%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20redwoodjs%20sdk&amp;severity=high&amp;id=69d55f0aaaed68159a5629cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39370-cwe-918-server-side-request-forgery-7f740e78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39370%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69d55f0aaaed68159a5629c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39369-cwe-22-improper-limitation-of-a-pat-d8d90b53</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39369%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69d55f07aaed68159a562955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39368-cwe-918-server-side-request-forgery-41ed5d8d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39368%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d55f07aaed68159a562952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39367-cwe-79-improper-neutralization-of-i-a2c0f0ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39367%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d55f07aaed68159a56294e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39366-cwe-345-insufficient-verification-o-78f504b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39366%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d55f07aaed68159a56294a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39838-cwe-79-improper-neutralization-of-i-92dcc43c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39838%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20ProofreadPage%20Extension&amp;severity=medium&amp;id=69d55f0aaaed68159a5629cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5739-code-injection-in-powerjob-55e7481f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5739%3A%20Code%20Injection%20in%20PowerJob&amp;severity=medium&amp;id=69d55f0aaaed68159a5629da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39365-cwe-22-improper-limitation-of-a-pat-1bdd4154</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39365%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite&amp;severity=medium&amp;id=69d55f07aaed68159a562947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39364-cwe-180-incorrect-behavior-order-va-9046ca3d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39364%3A%20CWE-180%3A%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20vitejs%20vite&amp;severity=high&amp;id=69d55f07aaed68159a562944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39363-cwe-200-exposure-of-sensitive-infor-318e5c87</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39363%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20vitejs%20vite&amp;severity=high&amp;id=69d55f07aaed68159a562941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39322-cwe-287-improper-authentication-in--52a7d8f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39322%3A%20CWE-287%3A%20Improper%20Authentication%20in%20polarnl%20PolarLearn&amp;severity=critical&amp;id=69d55f07aaed68159a56293e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39355-cwe-862-missing-authorization-in-mg-7e4b58a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39355%3A%20CWE-862%3A%20Missing%20Authorization%20in%20MGeurts%20genealogy&amp;severity=critical&amp;id=69d5874b43e2781bad84eb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39354-cwe-639-authorization-bypass-throug-42d52418</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39354%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Erudika%20scoold&amp;severity=medium&amp;id=69d5874b43e2781bad84eb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5736-sql-injection-in-powerjob-52439f1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5736%3A%20SQL%20Injection%20in%20PowerJob&amp;severity=medium&amp;id=69d5874b43e2781bad84eb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5762-cwe-770-allocation-of-resources-with-356f3801</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5762%3A%20CWE-770%20Allocation%20of%20resources%20without%20limits%20or%20throttling%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20ReportIncident%20Extension&amp;severity=medium&amp;id=69d5874b43e2781bad84eb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-unveils-claude-mythos-a-cybersecurity-br-5fcf7a85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%C2%A0Unveils%20%E2%80%98Claude%20Mythos%E2%80%99%20%E2%80%93%20A%20Cybersecurity%20Breakthrough%20That%20Could%20Also%20Supercharge%20Attacks&amp;severity=critical&amp;id=69d550f2aaed68159a4b492d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22711-cwe-87-improper-neutralization-of-a-5efa9e0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22711%3A%20CWE-87%20Improper%20neutralization%20of%20alternate%20XSS%20syntax%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikilove%20Extension&amp;severity=medium&amp;id=69d5874b43e2781bad84eb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-little-bit-pivoting-what-web-shells-are-attacker-e7efe859</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Little%20Bit%20Pivoting%3A%20What%20Web%20Shells%20are%20Attackers%20Looking%20for%26%23x3f%3B%2C%20(Tue%2C%20Apr%207th)&amp;severity=critical&amp;id=69d54d6eaaed68159a48c750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39324-cwe-287-improper-authentication-in--fb314bd2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39324%3A%20CWE-287%3A%20Improper%20Authentication%20in%20rack%20rack-session&amp;severity=critical&amp;id=69d549ecaaed68159a47390c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39321-cwe-208-observable-timing-discrepan-78f06f4f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39321%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69d549ecaaed68159a473907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39337-cwe-94-improper-control-of-generati-d10607b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39337%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69d549ecaaed68159a47390f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39319-cwe-89-improper-neutralization-of-s-d67499f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39319%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a473904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39344-cwe-80-improper-neutralization-of-s-a8984072</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39344%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549eeaaed68159a473968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39343-cwe-89-improper-neutralization-of-s-261e41ba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39343%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a473921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39342-cwe-89-improper-neutralization-of-s-7364aad1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39342%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69d549ecaaed68159a47391e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39341-cwe-89-improper-neutralization-of-s-5581e9ff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39341%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a47391b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39340-cwe-89-improper-neutralization-of-s-bd7d68e6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39340%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a473918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39339-cwe-284-improper-access-control-in--d81b63be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39339%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69d549ecaaed68159a473915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39338-cwe-79-improper-neutralization-of-i-e5710ece</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39338%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a473912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39336-cwe-79-improper-neutralization-of-i-0d695d4a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39336%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69d54667aaed68159a45f2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39334-cwe-89-improper-neutralization-of-s-86f645fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39334%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f29e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39333-cwe-79-improper-neutralization-of-i-4197b72d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39333%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f29b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39332-cwe-79-improper-neutralization-of-i-58566cc9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39332%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39331-cwe-639-authorization-bypass-throug-d615f628</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39331%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39330-cwe-89-improper-neutralization-of-s-ee261c11</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39330%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39329-cwe-89-improper-neutralization-of-s-e56fe8e9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39329%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39328-cwe-79-improper-neutralization-of-i-0bd6d06b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39328%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39327-cwe-89-improper-neutralization-of-s-676247de</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39327%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39326-cwe-89-improper-neutralization-of-s-38ebd0e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39326%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5660daaed68159a5b4136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39325-cwe-89-improper-neutralization-of-s-6b2e8d23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39325%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5874d43e2781bad84f53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39323-cwe-89-improper-neutralization-of-s-1746d817</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39323&amp;severity=null&amp;id=69d5874b43e2781bad84eb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39318-cwe-89-improper-neutralization-of-s-b28e5f1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39318%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5874d43e2781bad84f537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39335-cwe-79-improper-neutralization-of-i-1a28ade0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39335%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69d5874e43e2781bad84f790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39317-cwe-89-improper-neutralization-of-s-d04471fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39317&amp;severity=null&amp;id=69d5660baaed68159a5b4087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24175-cwe-248-uncaught-exception-in-nvidi-9f848a2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24175%3A%20CWE-248%20Uncaught%20Exception%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69d5874d43e2781bad84f525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24174-cwe-681-incorrect-conversion-betwee-f5c56edf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24174%3A%20CWE-681%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69d5874d43e2781bad84f520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24173-cwe-190-integer-overflow-or-wraparo-7caeae47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24173%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69d5874b43e2781bad84eb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24147-cwe-22-improper-limitation-of-a-pat-f50a1d12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24147%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=69d55f0aaaed68159a5629e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24146-cwe-789-memory-allocation-with-exce-3e49f936</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24146%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69d55f0aaaed68159a5629e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35576-cwe-79-improper-neutralization-of-i-6b4a2278</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35576%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5874d43e2781bad84f533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24156-cwe-502-deserialization-of-untruste-b62ca16f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24156%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20DALI&amp;severity=high&amp;id=69d55f0aaaed68159a5629eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22682-cwe-863-incorrect-authorization-in--2c6d5e70</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22682%3A%20CWE-863%20Incorrect%20Authorization%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69d5874d43e2781bad84f51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35575-cwe-79-improper-neutralization-of-i-4f65591c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35575%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d550fbaaed68159a4b4b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22680-cwe-862-missing-authorization-in-vo-b1333a95</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22680%3A%20CWE-862%20Missing%20Authorization%20in%20Volcengine%20OpenViking&amp;severity=medium&amp;id=69d5874d43e2781bad84f515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35572-cwe-918-server-side-request-forgery-9880f733</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35572%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5660baaed68159a5b4084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35573-cwe-22-improper-limitation-of-a-pat-cd7c363b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35573%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69d5874d43e2781bad84f530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35574-cwe-79-improper-neutralization-of-i-964a1eb4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35574%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d53bdbaaed68159a38bdbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39316-cwe-416-use-after-free-in-openprint-81491557</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39316%3A%20CWE-416%3A%20Use%20After%20Free%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d53bddaaed68159a38be0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39314-cwe-191-integer-underflow-wrap-or-w-216f8413</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39314%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d53bddaaed68159a38be09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35610-cwe-285-improper-authorization-in-p-8a184153</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35610%3A%20CWE-285%3A%20Improper%20Authorization%20in%20polarnl%20PolarLearn&amp;severity=high&amp;id=69d53bdbaaed68159a38bdc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23696-cwe-89-improper-neutralization-of-s-55a8fb9d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23696%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Windmill%20Labs%20Windmill%20CE%20(Community%20Edition)&amp;severity=critical&amp;id=69d53bdbaaed68159a38bdad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22683-cwe-862-missing-authorization-in-wi-68e61a60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22683%3A%20CWE-862%20Missing%20Authorization%20in%20Windmill%20Labs%20Windmill%20CE%20(Community%20Edition)&amp;severity=high&amp;id=69d53bdbaaed68159a38bda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39307-cwe-22-improper-limitation-of-a-pat-dcad6020</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39307%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d53bdbaaed68159a38bdce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39308-cwe-22-improper-limitation-of-a-pat-cbe46351</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39308%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d53bddaaed68159a38be06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39306-cwe-22-improper-limitation-of-a-pat-b272ba3d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39306%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d53bdbaaed68159a38bdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39305-cwe-22-improper-limitation-of-a-pat-ee1c9c84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39305%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d53bdbaaed68159a38bdc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35615-cwe-22-improper-limitation-of-a-pat-ac7728e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35615%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d53bdbaaed68159a38bdc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32588-cwe-400-uncontrolled-resource-consu-09d4adec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32588%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Cassandra&amp;severity=medium&amp;id=69d53bdbaaed68159a38bdba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-new-rules-of-engagement-matching-agentic-attac-9364e595</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20New%20Rules%20of%20Engagement%3A%20Matching%20Agentic%20Attack%20Speed&amp;severity=medium&amp;id=69d534d4aaed68159a357310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27315-cwe-532-insertion-of-sensitive-info-6ca7f942</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27315%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Cassandra&amp;severity=medium&amp;id=69d53bdbaaed68159a38bdb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35613-cwe-22-improper-limitation-of-a-pat-e3f4414f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35613%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moritzmyrz%20coursevault-preview&amp;severity=medium&amp;id=69d534e5aaed68159a357dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35611-cwe-1333-inefficient-regular-expres-c299d172</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35611%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20sporkmonger%20addressable&amp;severity=high&amp;id=69d534e5aaed68159a357dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35608-cwe-79-improper-neutralization-of-i-c1166cc0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35608%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RoastSlav%20quickdrop&amp;severity=medium&amp;id=69d534e5aaed68159a357dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trent-ai-emerges-from-stealth-with-13-million-in-f-7a90dd79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trent%20AI%20Emerges%20From%20Stealth%20With%20%2413%20Million%20in%20Funding&amp;severity=medium&amp;id=69d534d4aaed68159a357313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14821-uncontrolled-search-path-element-in-a80a017f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14821%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=high&amp;id=69d534e5aaed68159a357db8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27314-cwe-267-privilege-defined-with-unsa-7e231997</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27314%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Apache%20Software%20Foundation%20Apache%20Cassandra&amp;severity=high&amp;id=69d534e5aaed68159a357dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4631-improper-neutralization-of-special-e-ba011f09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4631%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=critical&amp;id=69d534e5aaed68159a357dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14944-cwe-862-missing-authorization-in-in-6a37bcb0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14944%3A%20CWE-862%20Missing%20Authorization%20in%20inisev%20BackupBliss%20%E2%80%93%20Backup%20%26%20Migration%20with%20Free%20Cloud%20Storage&amp;severity=medium&amp;id=69d534e5aaed68159a357dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35584-cwe-306-missing-authentication-for--587bb12d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35584%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69d5314faaed68159a33992b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39384-cwe-639-authorization-bypass-throug-fc977f46</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39384%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69d5314faaed68159a33992e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35523-cwe-306-missing-authentication-for--051f992d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35523%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20strawberry-graphql%20strawberry&amp;severity=high&amp;id=69d5314faaed68159a33991a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35583-cwe-22-improper-limitation-of-a-pat-f33beecb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35583%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=medium&amp;id=69d5314faaed68159a339928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35581-cwe-78-improper-neutralization-of-s-c191187e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35581%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=high&amp;id=69d5314faaed68159a339925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35580-cwe-77-improper-neutralization-of-s-e4caccb1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35580%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=critical&amp;id=69d5314faaed68159a339920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35578-cwe-601-url-redirection-to-untruste-0a63bdb7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35578&amp;severity=null&amp;id=69d5314faaed68159a33991d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35567-cwe-89-improper-neutralization-of-s-65faaa6c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35567&amp;severity=null&amp;id=69d52a46aaed68159a30f8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35566-cwe-89-improper-neutralization-of-s-13b861c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35566&amp;severity=null&amp;id=69d52a46aaed68159a30f8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35534-cwe-79-improper-neutralization-of-i-4b6f14c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35534%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d52a46aaed68159a30f8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flowise-vulnerability-in-attacker-crossha-a53d74a5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flowise%20Vulnerability%20in%20Attacker%20Crosshairs&amp;severity=critical&amp;id=69d526c2aaed68159a2fe3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35571-cwe-79-improper-neutralization-of-i-7dab1fcc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35571%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=medium&amp;id=69d52a46aaed68159a30f8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35526-cwe-770-allocation-of-resources-wit-33a1f717</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35526%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20strawberry-graphql%20strawberry&amp;severity=high&amp;id=69d52a46aaed68159a30f8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4931-cwe-681-incorrect-conversion-between-185741c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4931%3A%20CWE-681%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Marginal%20Marginal%20Smart%20Contract&amp;severity=medium&amp;id=69d52a47aaed68159a30f8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35521-cwe-78-improper-neutralization-of-s-d0980be3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35521%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52a46aaed68159a30f8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33816-cwe-697-incorrect-comparison-in-git-90a754f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33816%3A%20CWE-697%20%E2%80%94%20Incorrect%20Comparison%20in%20github.com%2Fjackc%2Fpgx%2Fv5%20github.com%2Fjackc%2Fpgx%2Fv5%2Fpgproto3&amp;severity=critical&amp;id=69d52a46aaed68159a30f89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33815-cwe-129-improper-validation-of-arra-24136267</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33815%3A%20CWE-129%20%E2%80%94%20Improper%20Validation%20of%20Array%20Index%20in%20github.com%2Fjackc%2Fpgx%2Fv5%20github.com%2Fjackc%2Fpgx%2Fv5%2Fpgproto3&amp;severity=critical&amp;id=69d52a46aaed68159a30f898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35520-cwe-78-improper-neutralization-of-s-1cae9e5c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35520%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52a46aaed68159a30f8a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35519-cwe-78-improper-neutralization-of-s-ad11d3fa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35519%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52a46aaed68159a30f89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1079-cwe-284-improper-access-control-in-p-d6216d38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1079%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Pegasystems%20Pega%20Browser%20Extension%20(PBE)&amp;severity=medium&amp;id=69d52341aaed68159a2ec570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35518-cwe-78-improper-neutralization-of-s-78f9c7fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35518%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52344aaed68159a2ec624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35517-cwe-78-improper-neutralization-of-s-f2c0d982</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35517%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52344aaed68159a2ec621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35516-cwe-918-server-side-request-forgery-5c669499</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35516%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=medium&amp;id=69d52344aaed68159a2ec61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24819-vulnerability-in-nokia-mantaray-nm-038e8147</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24819%3A%20Vulnerability%20in%20Nokia%20MantaRay%20NM&amp;severity=medium&amp;id=69d52341aaed68159a2ec566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24818-vulnerability-in-nokia-mantaray-nm-1f8275a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24818%3A%20Vulnerability%20in%20Nokia%20MantaRay%20NM&amp;severity=high&amp;id=69d52341aaed68159a2ec563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24817-vulnerability-in-nokia-mantaray-nm-4f065fd9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24817%3A%20Vulnerability%20in%20Nokia%20MantaRay%20NM&amp;severity=high&amp;id=69d52341aaed68159a2ec560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35515-cwe-74-improper-neutralization-of-s-f8853fa9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35515%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nestjs%20nest&amp;severity=medium&amp;id=69d52344aaed68159a2ec61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1078-cwe-284-improper-access-control-in-p-5bac2281</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1078%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Pegasystems%20Pega%20Robot%20Studio&amp;severity=high&amp;id=69d52341aaed68159a2ec56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35492-cwe-22-improper-limitation-of-a-pat-f84dc278</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35492%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kedro-org%20kedro-plugins&amp;severity=medium&amp;id=69d52344aaed68159a2ec616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35491-cwe-863-incorrect-authorization-in--4cb4d025</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35491%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20pi-hole%20FTL&amp;severity=medium&amp;id=69d52344aaed68159a2ec613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5745-null-pointer-dereference-in-red-hat--880566c2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5745%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69d52346aaed68159a2ecada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35490-cwe-863-incorrect-authorization-in--fecf3683</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35490%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20dgtlmoon%20changedetection.io&amp;severity=critical&amp;id=69d52344aaed68159a2ec610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35489-cwe-639-authorization-bypass-throug-9fba6e7a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35489%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69d52344aaed68159a2ec60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35488-cwe-749-exposed-dangerous-method-or-3a0a8a55</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35488%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69d52344aaed68159a2ec608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35487-cwe-22-improper-limitation-of-a-pat-e2594a7d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35487%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=medium&amp;id=69d52341aaed68159a2ec57c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35486-cwe-918-server-side-request-forgery-46e64d20</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35486%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20oobabooga%20text-generation-webui&amp;severity=high&amp;id=69d52341aaed68159a2ec579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35485-cwe-22-improper-limitation-of-a-pat-077bd81d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35485%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=high&amp;id=69d51c3eaaed68159a2c1622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35484-cwe-22-improper-limitation-of-a-pat-1be27b8d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35484%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=medium&amp;id=69d51c3eaaed68159a2c161f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35483-cwe-22-improper-limitation-of-a-pat-b3c7c859</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35483%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=medium&amp;id=69d51c3eaaed68159a2c161c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35480-cwe-770-allocation-of-resources-wit-ce9cb61f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35480%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ipld%20go-ipld-prime&amp;severity=medium&amp;id=69d51c3eaaed68159a2c1617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4740-improper-certificate-validation-in-r-d209bf80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4740%3A%20Improper%20Certificate%20Validation%20in%20Red%20Hat%20Multicluster%20Engine%20for%20Kubernetes&amp;severity=high&amp;id=69d51c3eaaed68159a2c1634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35462-cwe-613-insufficient-session-expira-655ca154</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35462%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20papra-hq%20papra&amp;severity=medium&amp;id=69d51c3baaed68159a2c14fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35461-cwe-918-server-side-request-forgery-1fc369b3</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35461%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20papra-hq%20papra&amp;severity=medium&amp;id=69d51c3baaed68159a2c14f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35460-cwe-80-improper-neutralization-of-s-a1b65bf5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35460%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20papra-hq%20papra&amp;severity=medium&amp;id=69d51c3baaed68159a2c14f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/severe-strongbox-vulnerability-patched-in-android-2406484f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Severe%20StrongBox%20Vulnerability%20Patched%20in%20Android&amp;severity=critical&amp;id=69d51530aaed68159a296f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33034-cwe-770-allocation-of-resources-wit-62744c5c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33034%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20djangoproject%20Django&amp;severity=high&amp;id=69d51c3baaed68159a2c14ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33033-cwe-407-inefficient-algorithmic-com-29d5fe4e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33033%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69d51c3baaed68159a2c14e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4292-cwe-862-missing-authorization-in-dja-57d55899</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4292%3A%20CWE-862%3A%20Missing%20Authorization%20in%20djangoproject%20Django&amp;severity=low&amp;id=69d51c3eaaed68159a2c162f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4277-cwe-862-missing-authorization-in-dja-17fa66ce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4277%3A%20CWE-862%3A%20Missing%20Authorization%20in%20djangoproject%20Django&amp;severity=critical&amp;id=69d51c3eaaed68159a2c162a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35457-cwe-770-allocation-of-resources-wit-4a7de5b5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35457%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69d51c3baaed68159a2c14f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3902-cwe-290-authentication-bypass-by-spo-925d7235</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3902%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20djangoproject%20Django&amp;severity=high&amp;id=69d51c3eaaed68159a2c1625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35405-cwe-770-allocation-of-resources-wit-07b4b21d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35405%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69d51c3baaed68159a2c14ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5384-cwe-863-incorrect-authorization-in-r-4f054075</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5384%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d51c41aaed68159a2c16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5383-cwe-863-incorrect-authorization-in-r-7d8c86a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5383%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Explorer&amp;severity=medium&amp;id=69d51c41aaed68159a2c16d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5382-cwe-863-incorrect-authorization-in-r-c59deb95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5382%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=low&amp;id=69d51c41aaed68159a2c16cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5381-cwe-863-incorrect-authorization-in-r-72ccf558</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5381%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=low&amp;id=69d51c41aaed68159a2c16c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5380-cwe-863-incorrect-authorization-in-r-bbdccf91</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5380%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d51c41aaed68159a2c16c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5379-cwe-863-incorrect-authorization-in-r-bdf9f407</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5379%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=low&amp;id=69d51c41aaed68159a2c16c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5378-cwe-863-incorrect-authorization-in-r-b41d9219</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5378%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d51c41aaed68159a2c16bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5376-cwe-613-insufficient-control-of-reso-6f3cf9cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5376%3A%20CWE-613%3A%20Insufficient%20Control%20of%20Resources%20After%20Expiration%20or%20Release%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d51c3eaaed68159a2c1639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5375-cwe-200-exposure-of-sensitive-inform-03b25ad4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5375%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20runZero%20Platform&amp;severity=low&amp;id=69d52346aaed68159a2ecaea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5374-cwe-863-incorrect-authorization-in-r-9c41aa0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5374%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d52346aaed68159a2ecae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5373-cwe-269-improper-privilege-managemen-43a9d747</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5373%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20runZero%20Platform&amp;severity=high&amp;id=69d52346aaed68159a2ecae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5372-cwe-89-improper-neutralization-of-sp-38771393</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5372%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d52346aaed68159a2ecade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grafanaghost-attackers-can-abuse-grafana-to-leak-e-3a7cc7cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GrafanaGhost%3A%20Attackers%20Can%20Abuse%20Grafana%20to%20Leak%20Enterprise%20Data&amp;severity=medium&amp;id=69d50e26aaed68159a26aa2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dangers-of-telehealth-data-breaches-phishing-a-0ddbd472</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20dangers%20of%20telehealth%3A%20data%20breaches%2C%20phishing%2C%20and%20spam%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d5d94943e2781badfb7efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-why-automated-pentesting-alone-is-no-00c50312</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20Why%20Automated%20Pentesting%20Alone%20Is%20Not%20Enough&amp;severity=medium&amp;id=69d50724aaed68159a2422a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35554-cwe-416-use-after-free-in-apache-so-3aeacf12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35554%3A%20CWE-416%20Use%20After%20Free%20in%20Apache%20Software%20Foundation%20Apache%20Kafka%20Clients&amp;severity=high&amp;id=69d50aa5aaed68159a256b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5627-cwe-29-path-traversal-filename-in-mi-9e476f7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5627%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=critical&amp;id=69d50aa5aaed68159a256b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22679-cwe-306-missing-authentication-for--330ac532</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22679%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Weaver%20Network%20Co.%2C%20Ltd.%20E-cology&amp;severity=critical&amp;id=69d50016aaed68159a219ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5735-vulnerability-in-mozilla-firefox-60096f4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5735%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69d50016aaed68159a219ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5734-vulnerability-in-mozilla-firefox-c0373840</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5734%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69d50016aaed68159a219ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5733-vulnerability-in-mozilla-firefox-05cd41e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5733%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69d50016aaed68159a219cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5732-vulnerability-in-mozilla-firefox-1f927624</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5732%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69d50016aaed68159a219cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5731-vulnerability-in-mozilla-firefox-99d73722</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5731%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69d50016aaed68159a219cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22666-cwe-95-improper-neutralization-of-d-0f29c4fc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22666%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Dolibarr%20Dolibarr%20ERP%2FCRM&amp;severity=high&amp;id=69d50016aaed68159a219cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28808-cwe-863-incorrect-authorization-in--234c0945</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28808%3A%20CWE-863%20Incorrect%20Authorization%20in%20Erlang%20OTP&amp;severity=high&amp;id=69d4fc92aaed68159a20604c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32144-cwe-295-improper-certificate-valida-27760d2a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32144%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Erlang%20OTP&amp;severity=high&amp;id=69d4fc92aaed68159a206054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23818-vulnerability-in-hewlett-packard-en-2e70c28e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23818%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Private%205G%20Core&amp;severity=high&amp;id=69d4fc92aaed68159a206049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39666-cwe-426-untrusted-search-path-in-ch-e2f0285d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39666%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=critical&amp;id=69d4fc92aaed68159a206046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3466-cwe-79-improper-neutralization-of-in-d80ce4e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3466%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69d4fc92aaed68159a20605c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gpubreach-root-shell-access-achieved-via-gpu-rowha-1215a777</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GPUBreach%3A%20Root%20Shell%20Access%20Achieved%20via%20GPU%20Rowhammer%20Attack&amp;severity=medium&amp;id=69d4ee82aaed68159a15c601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31842-cwe-444-inconsistent-interpretation-c345cdab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31842%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Tinyproxy%20Project%20Tinyproxy&amp;severity=high&amp;id=69d4ee89aaed68159a15cf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ta416-resumes-european-government-espionage-campai-95cb4807</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TA416%20resumes%20European%20government%20espionage%20campaigns&amp;severity=medium&amp;id=69d4e778aaed68159a0e93d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detections-for-the-axios-supply-chain-compromise-828371e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detections%20for%20the%20Axios%20supply%20chain%20compromise&amp;severity=medium&amp;id=69d4eafdaaed68159a12948d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusa-ransomware-fast-to-exploit-vulnerabilities--4446437b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medusa%20Ransomware%20Fast%20to%20Exploit%20Vulnerabilities%2C%20Breached%20Systems&amp;severity=medium&amp;id=69d4e497aaed68159a0d6d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/german-police-unmask-revil-ransomware-leader-662d4d22</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=German%20Police%20Unmask%20REvil%20Ransomware%20Leader&amp;severity=medium&amp;id=69d4cedeaaed68159a05effa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34903-cwe-862-missing-authorization-in-oc-0cb4688b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34903%3A%20CWE-862%20Missing%20Authorization%20in%20OceanWP%20Ocean%20Extra&amp;severity=medium&amp;id=69d4cb5aaaed68159a04482c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34899-cwe-862-missing-authorization-in-en-4d9d2403</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34899%3A%20CWE-862%20Missing%20Authorization%20in%20Eniture%20technology%20LTL%20Freight%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=medium&amp;id=69d4c452aaed68159a00e3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/white-house-seeks-to-slash-cisa-funding-by-707-mil-c930cb7f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=White%20House%20Seeks%20to%20Slash%20CISA%20Funding%20by%20%24707%20Million&amp;severity=critical&amp;id=69d4c0cfaaed68159afed9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34904-cwe-352-cross-site-request-forgery--d695f98e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34904%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Analytify%20Simple%20Social%20Media%20Share%20Buttons&amp;severity=high&amp;id=69d4c452aaed68159a00e3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34896-cwe-352-cross-site-request-forgery--25e0cb83</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34896%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Analytify%20Under%20Construction%2C%20Coming%20Soon%20%26%20Maintenance%20Mode&amp;severity=high&amp;id=69d4c452aaed68159a00e3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33227-cwe-22-improper-input-validation-fo-fcaded2c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33227%3A%20CWE-22%20Improper%20input%20validation%20for%20resource%20loading%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Client&amp;severity=medium&amp;id=69d4bd49aaed68159afc7f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28810-cwe-340-generation-of-predictable-n-2cebe101</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28810%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69d4bd49aaed68159afc7f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34197-cwe-20-improper-input-validation-in-32baa8df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34197%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Broker&amp;severity=high&amp;id=69d4bd49aaed68159afc7f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3177-cwe-345-insufficient-verification-of-66835760</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3177%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20smub%20Charitable%20%E2%80%93%20Donation%20Plugin%20for%20WordPress%20%E2%80%93%20Fundraising%20with%20Recurring%20Donations%20%26%20More&amp;severity=medium&amp;id=69d4e4a2aaed68159a0d7521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5465-cwe-639-authorization-bypass-through-c68a4d21</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5465%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=high&amp;id=69d4af3baaed68159af4f58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1114-cwe-284-improper-access-control-in-p-40f6ba09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1114%3A%20CWE-284%20Improper%20Access%20Control%20in%20parisneo%20parisneo%2Flollms&amp;severity=critical&amp;id=69d4a832aaed68159ad9ba6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wynn-resorts-says-21000-employees-affected-by-shin-d88a1657</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wynn%20Resorts%20Says%2021%2C000%20Employees%20Affected%20by%20ShinyHunters%20Hack&amp;severity=high&amp;id=69d4a12aaaed68159ad2b8e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4079-cwe-89-sql-injection-in-sql-chart-bu-96d8ce74</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4079%3A%20CWE-89%20SQL%20Injection%20in%20SQL%20Chart%20Builder&amp;severity=medium&amp;id=69d4a832aaed68159ad9ba75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1900-cwe-862-missing-authorization-in-lin-eb4c0dc8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1900%3A%20CWE-862%20Missing%20Authorization%20in%20Link%20Whisper%20Free&amp;severity=medium&amp;id=69d4a832aaed68159ad9ba72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15611-cwe-79-cross-site-scripting-xss-in--8c937f1d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15611%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Popup%20Box&amp;severity=medium&amp;id=69d4a832aaed68159ad9ba6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65116-cwe-763-release-of-invalid-pointer--6df269bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65116%3A%20CWE-763%20Release%20of%20invalid%20pointer%20or%20reference%20in%20Hitachi%20JP1%2FIT%20Desktop%20Management%202%20-%20Manager&amp;severity=medium&amp;id=69d49de1aaed68159acfad0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1839-cwe-502-deserialization-of-untrusted-5f6a12e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1839%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=69d49a21aaed68159acbc2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65115-cwe-73-external-control-of-file-nam-a8eb6ffa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65115%3A%20CWE-73%20External%20control%20of%20file%20name%20or%20path%20in%20Hitachi%20JP1%2FIT%20Desktop%20Management%202%20-%20Manager&amp;severity=high&amp;id=69d49a21aaed68159acbc2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0740-cwe-434-unrestricted-upload-of-file--9ec11832</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0740%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SaturdayDrive%20Ninja%20Forms%20-%20File%20Uploads&amp;severity=critical&amp;id=69d48bf00a160ebd92416647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20446-cwe-787-out-of-bounds-write-in-medi-9fb40fd5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20446%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69d47ddc0a160ebd9234c837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20433-cwe-787-out-of-bounds-write-in-medi-1d30900f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20433%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69d47ddc0a160ebd9234c834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20432-cwe-787-out-of-bounds-write-in-medi-f16f04fd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20432%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69d47ddc0a160ebd9234c831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20431-cwe-770-allocation-of-resources-wit-c21cd2dc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20431%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69d47ddc0a160ebd9234c82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5719-sql-injection-in-itsourcecode-constr-df554fa7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5719%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d46fca0a160ebd92208af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-7th-2026-httpsiscs-d1fa261a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%207th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9882%2C%20(Tue%2C%20Apr%207th)&amp;severity=medium&amp;id=69d465400a160ebd920711df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13044-cwe-340-generation-of-predictable-n-82b5f6dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13044%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20IBM%20Concert&amp;severity=medium&amp;id=69d461b90a160ebd9203cbbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-08-2fb33380</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-08&amp;severity=medium&amp;id=69d660b31cc7ad14da71d60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-07-896477e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-07&amp;severity=medium&amp;id=69d59e5943e2781badb13b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31272-na-cc351abb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31272%3A%20n%2Fa&amp;severity=critical&amp;id=69d5874d43e2781bad84f52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31271-na-b10371a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31271%3A%20n%2Fa&amp;severity=critical&amp;id=69d5874d43e2781bad84f52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71058-na-060d58b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71058%3A%20n%2Fa&amp;severity=critical&amp;id=69d5874b43e2781bad84eb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69515-na-de1f3698</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69515%3A%20n%2Fa&amp;severity=critical&amp;id=69d55f07aaed68159a56293a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56015-na-10ff62bb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56015%3A%20n%2Fa&amp;severity=high&amp;id=69d55f07aaed68159a562936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-07-45db4b77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-07&amp;severity=low&amp;id=69d542d9aaed68159a3c0b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70844-na-707f43dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70844%3A%20n%2Fa&amp;severity=medium&amp;id=69d534e5aaed68159a357dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36058-na-a04e0a3d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36058%3A%20n%2Fa&amp;severity=critical&amp;id=69d5314faaed68159a339914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30460-na-cdb1ba2a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30460%3A%20n%2Fa&amp;severity=high&amp;id=69d52341aaed68159a2ec573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52908-na-be591ca1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52908%3A%20n%2Fa&amp;severity=critical&amp;id=69d52341aaed68159a2ec569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36057-na-d4b2a2fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36057%3A%20n%2Fa&amp;severity=critical&amp;id=69d52341aaed68159a2ec55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30079-na-46b40ad6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30079%3A%20n%2Fa&amp;severity=critical&amp;id=69d51c3baaed68159a2c14e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62818-na-96afc532</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62818%3A%20n%2Fa&amp;severity=critical&amp;id=69d51c3baaed68159a2c14de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52909-na-7b723d69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52909%3A%20n%2Fa&amp;severity=critical&amp;id=69d51c3baaed68159a2c14da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5705-cross-site-scripting-in-code-project-773e54db</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5705%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Hotel%20Booking&amp;severity=medium&amp;id=69d4459a0a160ebd92ea3486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5692-os-command-injection-in-totolink-a71-0e1d1ea0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5692%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d442150a160ebd92e8c0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5691-os-command-injection-in-totolink-a71-9ff38c07</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5691%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d43e920a160ebd92e74967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5690-os-command-injection-in-totolink-a71-d07689a1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5690%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d43b0e0a160ebd92e61f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5689-os-command-injection-in-totolink-a71-f836dc6b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5689%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d437a00a160ebd92e4f4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5688-os-command-injection-in-totolink-a71-7df2adbb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5688%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d434060a160ebd92e3c28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5687-stack-based-buffer-overflow-in-tenda-af9feb13</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5687%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=high&amp;id=69d430940a160ebd92e2809b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35454-cwe-22-improper-limitation-of-a-pat-cf5ff4e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35454%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20coder%20code-marketplace&amp;severity=high&amp;id=69d42d0d0a160ebd92e15bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35452-cwe-200-exposure-of-sensitive-infor-e07a1773</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35452%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d42d0d0a160ebd92e15bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35450-cwe-306-missing-authentication-for--f2435df8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35450%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d42d0d0a160ebd92e15bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35449-cwe-200-exposure-of-sensitive-infor-e15e3474</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35449%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d42d0d0a160ebd92e15bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5686-stack-based-buffer-overflow-in-tenda-a9c63a39</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5686%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=high&amp;id=69d42d0d0a160ebd92e15bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35448-cwe-862-missing-authorization-in-ww-041cc36d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35448%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=low&amp;id=69d42d0d0a160ebd92e15bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35444-cwe-125-out-of-bounds-read-in-libsd-af3db040</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35444%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20libsdl-org%20SDL_image&amp;severity=high&amp;id=69d42d0d0a160ebd92e15bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35471-cwe-22-improper-limitation-of-a-pat-515b5296</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35471%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d4297c0a160ebd92e0093d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5709-cwe-78-improper-neutralization-of-sp-fb21bdcc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5709%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20AWS%20Research%20and%20Engineering%20Studio%20(RES)&amp;severity=high&amp;id=69d4297c0a160ebd92e00951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5685-stack-based-buffer-overflow-in-tenda-75bc7b03</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5685%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=high&amp;id=69d4297c0a160ebd92e00940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5708-cwe-915-improperly-controlled-modifi-7d074816</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5708%3A%20CWE-915%20Improperly%20controlled%20modification%20of%20Dynamically-Determined%20object%20attributes%20in%20AWS%20Research%20and%20Engineering%20Studio%20(RES)&amp;severity=high&amp;id=69d4297c0a160ebd92e0094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5707-cwe-78-improper-neutralization-of-sp-0c568b48</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5707%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20AWS%20Research%20and%20Engineering%20Studio%20(RES)&amp;severity=high&amp;id=69d4297c0a160ebd92e00947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35404-cwe-601-url-redirection-to-untruste-439d20b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35404%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20openedx%20openedx-platform&amp;severity=medium&amp;id=69d425f60a160ebd92deddc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22675-cwe-79-improper-neutralization-of-i-3125cc30</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OCS%20Inventory%20OCS%20Inventory%20NG%20Server&amp;severity=medium&amp;id=69d425f60a160ebd92deddbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35475-cwe-601-url-redirection-to-untruste-ac706b50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35475%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d425f60a160ebd92deddcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5684-stack-based-buffer-overflow-in-tenda-deeeb3f0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5684%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=high&amp;id=69d425f60a160ebd92deddd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35474-cwe-601-url-redirection-to-untruste-d9ca66d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35474%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d425f60a160ebd92deddc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35473-cwe-601-url-redirection-to-untruste-026e71eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35473%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d425f60a160ebd92deddc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35399-cwe-79-improper-neutralization-of-i-01d4cda6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35399%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69d422720a160ebd92dda200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35472-cwe-601-url-redirection-to-untruste-1a6f86c5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35472%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d422720a160ebd92dda203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35398-cwe-601-url-redirection-to-untruste-d1e8c203</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35398%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d422720a160ebd92dda1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35396-cwe-601-url-redirection-to-untruste-7af49979</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35396%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d422720a160ebd92dda1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35395-cwe-89-improper-neutralization-of-s-dd6d2d62</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35395%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69d422720a160ebd92dda1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35394-cwe-939-improper-authorization-in-h-ff73149b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35394%3A%20CWE-939%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme%20in%20mobile-next%20mobile-mcp&amp;severity=high&amp;id=69d41eee0a160ebd92dcdbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35393-cwe-22-improper-limitation-of-a-pat-b57d1ba3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35393%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d41eee0a160ebd92dcdbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35392-cwe-22-improper-limitation-of-a-pat-4b67dff2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35392%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d41eee0a160ebd92dcdbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5683-stack-based-buffer-overflow-in-tenda-31031057</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5683%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=medium&amp;id=69d41b690a160ebd92db5976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-an-aienabled-device-code-phishing-campaign-a142ae3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20an%20AIenabled%20device%20code%20phishing%20campaign&amp;severity=medium&amp;id=69d425f50a160ebd92dedd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35391-cwe-348-use-of-less-trusted-source--c50ca1ef</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35391%3A%20CWE-348%3A%20Use%20of%20Less%20Trusted%20Source%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69d417e60a160ebd92da7f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35390-cwe-79-improper-neutralization-of-i-963b67d6</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35390%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bulwarkmail%20webmail&amp;severity=medium&amp;id=69d417e60a160ebd92da7f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35389-cwe-295-improper-certificate-valida-a699249f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35389%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69d417e60a160ebd92da7f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35213-cwe-1333-inefficient-regular-expres-174f25ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35213%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20hapijs%20content&amp;severity=high&amp;id=69d417e60a160ebd92da7f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35208-cwe-79-improper-neutralization-of-i-d04e197a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35208%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lichess-org%20lila&amp;severity=medium&amp;id=69d417e60a160ebd92da7f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35201-cwe-125-out-of-bounds-read-in-david-4802dc5c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35201%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20davidfstr%20rdiscount&amp;severity=medium&amp;id=69d4982faaed68159ac9fe05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35200-cwe-436-interpretation-conflict-in--11991d06</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35200%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69d4982faaed68159ac9fe00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5682-risky-cryptographic-algorithm-in-mee-ff18ecc6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5682%3A%20Risky%20Cryptographic%20Algorithm%20in%20Meesho%20Online%20Shopping%20App&amp;severity=medium&amp;id=69d4982faaed68159ac9fe08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35199-cwe-122-heap-based-buffer-overflow--aec400ee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35199%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20microsoft%20SymCrypt&amp;severity=medium&amp;id=69d4982faaed68159ac9fdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35197-cwe-94-improper-control-of-generati-08451375</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35197%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mattieb%20dye&amp;severity=medium&amp;id=69d40d5a0a160ebd92d69897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35185-cwe-284-improper-access-control-in--87e54f7f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35185%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20haxtheweb%20HAXiam&amp;severity=high&amp;id=69d40d5a0a160ebd92d69894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35184-cwe-89-improper-neutralization-of-s-f392ddab</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35184%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20phili67%20ecclesiacrm&amp;severity=high&amp;id=69d40d5a0a160ebd92d6988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5681-sql-injection-in-itsourcecode-saniti-c40d4cdb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5681%3A%20SQL%20Injection%20in%20itsourcecode%20sanitize%20or%20validate%20this%20input&amp;severity=medium&amp;id=69d409da0a160ebd92d5a9da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35183-cwe-639-authorization-bypass-throug-c21973de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35183%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Ajax30%20BraveCMS-2.0&amp;severity=high&amp;id=69d409da0a160ebd92d5a9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35182-cwe-862-missing-authorization-in-aj-7e097403</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35182%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Ajax30%20BraveCMS-2.0&amp;severity=high&amp;id=69d409da0a160ebd92d5a9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35181-cwe-352-cross-site-request-forgery--a6817e6a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35181%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d409d70a160ebd92d5a951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35180-cwe-352-cross-site-request-forgery--63177348</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35180%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d409d70a160ebd92d5a94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35179-cwe-862-missing-authorization-in-ww-2d01c7e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35179%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d409d70a160ebd92d5a947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5679-os-command-injection-in-totolink-a33-a94bd30b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5679%3A%20OS%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69d409da0a160ebd92d5a9d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35176-cwe-125-out-of-bounds-read-in-trabu-d8cdef14</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35176%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20trabucayre%20openFPGALoader&amp;severity=high&amp;id=69d409d70a160ebd92d5a944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35022-cwe-78-improper-neutralization-of-s-9ed949c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35022%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anthropic%20Claude%20Code&amp;severity=critical&amp;id=69d409d70a160ebd92d5a937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35021-cwe-78-improper-neutralization-of-s-0c10b810</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35021%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anthropic%20Claude%20Code&amp;severity=high&amp;id=69d409d70a160ebd92d5a933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35170-cwe-125-out-of-bounds-read-in-trabu-6c582391</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35170%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20trabucayre%20openFPGALoader&amp;severity=high&amp;id=69d409d70a160ebd92d5a93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35020-cwe-78-improper-neutralization-of-s-ecf20559</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35020%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anthropic%20Claude%20Code&amp;severity=high&amp;id=69d409d70a160ebd92d5a92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5678-os-command-injection-in-totolink-a71-30b2b01a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5678%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d402cf0a160ebd92d2b844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5677-os-command-injection-in-totolink-a71-8e1759cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5677%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d3ff4a0a160ebd92d10004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0049-denial-of-service-in-google-android-73e3359f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0049%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69d3ff4a0a160ebd92d0fffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48651-unknown-in-google-android-8892d81d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48651%3A%20Unknown%20in%20Google%20Android&amp;severity=medium&amp;id=69d40d5a0a160ebd92d6989b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5676-missing-authentication-in-totolink-a-4c98cc11</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5676%3A%20Missing%20Authentication%20in%20Totolink%20A8000R&amp;severity=medium&amp;id=69d3ff4a0a160ebd92d0fffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33817-413ceec5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33817&amp;severity=null&amp;id=69d737031cc7ad14da4194be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5675-sql-injection-in-itsourcecode-constr-61f7dbce</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5675%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d3f8440a160ebd92cf69a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35174-cwe-22-improper-limitation-of-a-pat-c16d1487</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35174%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20xenocrat%20chyrp-lite&amp;severity=critical&amp;id=69d3f8440a160ebd92cf699f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35173-cwe-639-authorization-bypass-throug-cb83b4ae</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35173%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20xenocrat%20chyrp-lite&amp;severity=medium&amp;id=69d3f8440a160ebd92cf699b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35171-cwe-94-improper-control-of-generati-06939640</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35171%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kedro-org%20kedro&amp;severity=critical&amp;id=69d3f4be0a160ebd92ce2ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5672-sql-injection-in-code-projects-simpl-4f58dda2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5672%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d3f4be0a160ebd92ce2eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35167-cwe-22-improper-limitation-of-a-pat-989e897d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35167%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kedro-org%20kedro&amp;severity=high&amp;id=69d3f4be0a160ebd92ce2ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35470-cwe-89-improper-neutralization-of-s-92f103df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35470%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69d3f4be0a160ebd92ce2efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35166-cwe-79-improper-neutralization-of-i-6bce5d1f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35166%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gohugoio%20hugo&amp;severity=medium&amp;id=69d3f4be0a160ebd92ce2ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35164-cwe-434-unrestricted-upload-of-file-984d2f6a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35164%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ajax30%20BraveCMS-2.0&amp;severity=high&amp;id=69d3f4be0a160ebd92ce2eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35052-cwe-79-improper-neutralization-of-i-121184d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35052%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20man-group%20dtale&amp;severity=medium&amp;id=69d3f4be0a160ebd92ce2eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35050-cwe-22-improper-limitation-of-a-pat-3480660e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35050%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=critical&amp;id=69d3f4be0a160ebd92ce2ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35209-cwe-1321-improperly-controlled-modi-76f08387</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35209%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20unjs%20defu&amp;severity=high&amp;id=69d3edbe0a160ebd92cb34cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35047-cwe-434-unrestricted-upload-of-file-a7c1a195</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35047%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ajax30%20BraveCMS-2.0&amp;severity=critical&amp;id=69d3edbe0a160ebd92cb34c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35046-cwe-79-improper-neutralization-of-i-8d304dd6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35046%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69d3edbe0a160ebd92cb34c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35045-cwe-639-authorization-bypass-throug-6f199385</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35045%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69d3edbe0a160ebd92cb34bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5671-cross-site-scripting-in-cyber-iii-st-fbf946b5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5671%3A%20Cross%20Site%20Scripting%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d3edbe0a160ebd92cb34d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35042-cwe-345-insufficient-verification-o-d4271e43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35042%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20nearform%20fast-jwt&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35039-cwe-345-insufficient-verification-o-e6af2ea6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35039%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20nearform%20fast-jwt&amp;severity=critical&amp;id=69d3ea320a160ebd92c9fd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35037-cwe-918-server-side-request-forgery-b904914c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35037%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lin-snow%20Ech0&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35036-cwe-918-server-side-request-forgery-4db6c315</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35036%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lin-snow%20Ech0&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35035-cwe-79-improper-neutralization-of-i-6f9e3406</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35035%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35030-cwe-287-improper-authentication-in--918a2d56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35030%3A%20CWE-287%3A%20Improper%20Authentication%20in%20BerriAI%20litellm&amp;severity=critical&amp;id=69d3ea320a160ebd92c9fd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5670-unrestricted-upload-in-cyber-iii-stu-237569ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5670%3A%20Unrestricted%20Upload%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d3ea320a160ebd92c9fd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35029-cwe-863-incorrect-authorization-in--ed3eedd3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35029%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20BerriAI%20litellm&amp;severity=high&amp;id=69d3ea320a160ebd92c9fda1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34992-cwe-311-missing-encryption-of-sensi-93f490eb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34992%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20antrea-io%20antrea&amp;severity=high&amp;id=69d4982faaed68159ac9fe11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5669-sql-injection-in-cyber-iii-student-m-6a572c5a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5669%3A%20SQL%20Injection%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d3ea320a160ebd92c9fda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34989-cwe-79-improper-neutralization-of-i-bdfd6b20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34989%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69d4982faaed68159ac9fe0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34981-cwe-918-server-side-request-forgery-6ba39912</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34981%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pavelzbornik%20whisperX-FastAPI&amp;severity=medium&amp;id=69d3dfa80a160ebd92c701e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34977-cwe-78-improper-neutralization-of-s-e8f0aace</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34977%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zeecka%20AperiSolve&amp;severity=critical&amp;id=69d3dfa80a160ebd92c701de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5668-cross-site-scripting-in-cyber-iii-st-14e3000c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5668%3A%20Cross%20Site%20Scripting%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d3dfa80a160ebd92c701e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34976-cwe-862-missing-authorization-in-dg-edb4d75f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34976%3A%20CWE-862%3A%20Missing%20Authorization%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69d3dfa80a160ebd92c701db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34975-cwe-93-improper-neutralization-of-c-29f279cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34975%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20useplunk%20plunk&amp;severity=high&amp;id=69d3dfa80a160ebd92c701d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34841-cwe-494-download-of-code-without-in-97972daa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34841%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20usebruno%20bruno&amp;severity=critical&amp;id=69d3dfa80a160ebd92c701d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34783-cwe-22-improper-limitation-of-a-pat-b7f6108c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34783%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MontFerret%20ferret&amp;severity=high&amp;id=69d3dfa80a160ebd92c701ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34950-cwe-327-use-of-a-broken-or-risky-cr-19d5d528</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34950%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20nearform%20fast-jwt&amp;severity=critical&amp;id=69d3dc220a160ebd92c52bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34940-cwe-78-improper-neutralization-of-s-e39f3606</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34940%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kubeai-project%20kubeai&amp;severity=high&amp;id=69e0004582d89c981f9b91c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34756-cwe-770-allocation-of-resources-wit-6938b632</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34756%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69d49831aaed68159aca0f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34755-cwe-770-allocation-of-resources-wit-052948e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34755%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69d402cf0a160ebd92d2b84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34753-cwe-918-server-side-request-forgery-5a76be30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34753%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69d49831aaed68159aca0f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21382-cwe-120-buffer-copy-without-checkin-dbfa725a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21382%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfad0a160ebd92c70959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21381-cwe-126-buffer-over-read-in-qualcom-97e60d99</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21381%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfad0a160ebd92c70956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21380-cwe-416-use-after-free-in-qualcomm--39b98ba6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21380%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c7026a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21378-cwe-126-buffer-over-read-in-qualcom-db6e8adf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21378%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21376-cwe-126-buffer-over-read-in-qualcom-4b558eed</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21376%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21375-cwe-126-buffer-over-read-in-qualcom-3e9ef29c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21375%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21374-cwe-126-buffer-over-read-in-qualcom-ec97fd40</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21374%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c7025e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21373-cwe-126-buffer-over-read-in-qualcom-f1151391</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21373%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c7025b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21372-cwe-122-heap-based-buffer-overflow--c4a06644</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21372%3A%20CWE-122%3A%20Heap-Based%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21371-cwe-126-buffer-over-read-in-qualcom-59baca32</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21371%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21367-cwe-126-buffer-over-read-in-qualcom-e1ac069c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21367%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47400-cwe-126-buffer-over-read-in-qualcom-bd042dbf</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47400%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c7024f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47392-cwe-190-integer-overflow-or-wraparo-02f5c4b9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47392%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfa80a160ebd92c701f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47391-cwe-121-stack-based-buffer-overflow-1323497d</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47391%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfa80a160ebd92c701f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47390-cwe-126-buffer-over-read-in-qualcom-de63c3be</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47390%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d48bf00a160ebd9241664f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47389-cwe-120-buffer-copy-without-checkin-0c21b8f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47389%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d48bf00a160ebd9241664c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47374-cwe-416-use-after-free-in-qualcomm--0d39ebfd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47374%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69d4982faaed68159ac9fe18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14032-cwe-862-missing-authorization-in-tw-75f09585</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14032%3A%20CWE-862%20Missing%20Authorization%20in%20Twitch%20Twitch%20Studio&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34589-cwe-190-integer-overflow-or-wraparo-670cf108</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34589%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69d47ddc0a160ebd9234c840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-deepmind-researchers-map-web-attacks-agains-aeea6bb9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20DeepMind%20Researchers%20Map%20Web%20Attacks%20Against%20AI%20Agents&amp;severity=low&amp;id=69d3d51a0a160ebd92c27878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34588-cwe-125-out-of-bounds-read-in-acade-6aa2dbfa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34588%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69d47ddc0a160ebd9234c83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34444-cwe-284-improper-access-control-in--55c5a0e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34444%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20scoder%20lupa&amp;severity=high&amp;id=69d402cf0a160ebd92d2b84b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5666-insecure-storage-of-sensitive-inform-5b3042a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5666%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20code-projects%20Online%20FIR%20System&amp;severity=medium&amp;id=69d49831aaed68159aca0f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34402-cwe-89-improper-neutralization-of-s-f739644e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34402&amp;severity=null&amp;id=69d3dfad0a160ebd92c7095c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33405-cwe-79-improper-neutralization-of-i-00265079</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33405%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=low&amp;id=69d3d1a00a160ebd92c130ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34380-cwe-190-integer-overflow-or-wraparo-5fee1a08</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34380%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34379-cwe-704-incorrect-type-conversion-o-d3addab1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34379%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69d3d1a00a160ebd92c130df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34378-cwe-190-integer-overflow-or-wraparo-2a394764</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34378%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5704-unrestricted-upload-of-file-with-dan-b8ef14a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5704%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d3d1a30a160ebd92c13132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5665-sql-injection-in-code-projects-onlin-8cd984ff</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5665%3A%20SQL%20Injection%20in%20code-projects%20Online%20FIR%20System&amp;severity=medium&amp;id=69d3d1a30a160ebd92c1312b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34217-cwe-668-exposure-of-resource-to-wro-58a29899</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34217%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20nyariv%20SandboxJS&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34211-cwe-674-uncontrolled-recursion-in-n-f8e7d7c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34211%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20nyariv%20SandboxJS&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34208-cwe-693-protection-mechanism-failur-e30541cd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34208%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69d3d1a00a160ebd92c130d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34148-cwe-400-uncontrolled-resource-consu-a5ea008b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34148%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20%40fedify%20fedify&amp;severity=high&amp;id=69d3d1a00a160ebd92c130d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33752-cwe-918-server-side-request-forgery-e0c92d48</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33752%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lexiforest%20curl_cffi&amp;severity=high&amp;id=69d3d1a00a160ebd92c130cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33510-cwe-87-improper-neutralization-of-a-fa85fbb2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33510%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20homarr-labs%20homarr&amp;severity=high&amp;id=69d3ce180a160ebd92c09cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34897-cwe-79-improper-neutralization-of-i-c217a2af</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=medium&amp;id=69d3ce180a160ebd92c09cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33406-cwe-79-improper-neutralization-of-i-32216ce3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33406%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=medium&amp;id=69d3ce180a160ebd92c09cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33404-cwe-79-improper-neutralization-of-i-ebecab71</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33404%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=low&amp;id=69d3ce180a160ebd92c09cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33403-cwe-79-improper-neutralization-of-i-b74d02a0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33403%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=medium&amp;id=69d3ce180a160ebd92c09ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34885-cwe-89-improper-neutralization-of-s-37e96e1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34885%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=high&amp;id=69d3ce180a160ebd92c09cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32602-cwe-367-time-of-check-time-of-use-t-01123955</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32602%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=69d3ce180a160ebd92c09cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29047-cwe-89-improper-neutralization-of-s-892178f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29047%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69d3ce150a160ebd92c09c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26263-cwe-89-improper-neutralization-of-s-98f225c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26263%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69d3c70a0a160ebd92be8322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26027-cwe-79-improper-neutralization-of-i-5619f4b8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26027%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69d3c70a0a160ebd92be831f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26026-cwe-94-improper-control-of-generati-4a1597fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26026%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=critical&amp;id=69d3c70a0a160ebd92be831c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25932-cwe-116-improper-encoding-or-escapi-427f3b13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25932%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69d3c70a0a160ebd92be8319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5663-os-command-injection-in-offis-dcmtk-23884b4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5663%3A%20OS%20Command%20Injection%20in%20OFFIS%20DCMTK&amp;severity=medium&amp;id=69d3c3860a160ebd92bdb61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5661-denial-of-service-in-free5gc-ddea4988</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5661%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69d3c3860a160ebd92bdb615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5660-sql-injection-in-itsourcecode-constr-98f1115c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5660%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d3bc7e0a160ebd92bb5f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5659-deserialization-in-pytries-datrie-6b0a8d2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5659%3A%20Deserialization%20in%20pytries%20datrie&amp;severity=medium&amp;id=69d3b5770a160ebd92b7fa70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guardarian-users-targeted-with-malicious-strapi-np-667f63fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guardarian%20Users%20Targeted%20With%20Malicious%20Strapi%20NPM%20Packages&amp;severity=medium&amp;id=69d39cda0a160ebd92ab1d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5650-insecure-storage-of-sensitive-inform-4d29decf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5650%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20code-projects%20Online%20Application%20System%20for%20Admission&amp;severity=medium&amp;id=69d3a05e0a160ebd92acdcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/6th-april-threat-intelligence-report-2e352230</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=6th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69d399550a160ebd92a9b3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5649-sql-injection-in-code-projects-onlin-2974d006</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5649%3A%20SQL%20Injection%20in%20code-projects%20Online%20Application%20System%20for%20Admission&amp;severity=medium&amp;id=69d399550a160ebd92a9b3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-target-high-profile-nodejs-ma-25d12f06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Target%20High-Profile%20Node.js%20Maintainers&amp;severity=high&amp;id=69d395d20a160ebd92a6fec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5648-sql-injection-in-code-projects-simpl-a580976b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5648%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d395d90a160ebd92a70b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5647-cross-site-scripting-in-code-project-ce53e321</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5647%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d395d90a160ebd92a70b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5646-sql-injection-in-code-projects-easy--86537ffb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5646%3A%20SQL%20Injection%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69d38eca0a160ebd92a3e2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5645-sql-injection-in-projectworlds-car-r-7806b7f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5645%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20System&amp;severity=medium&amp;id=69d38eca0a160ebd92a3e2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5644-cross-site-scripting-in-cyber-iii-st-26209b3b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5644%3A%20Cross%20Site%20Scripting%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d387c10a160ebd92a05aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5643-cross-site-scripting-in-cyber-iii-st-89b3b93c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5643%3A%20Cross%20Site%20Scripting%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d387c10a160ebd92a05ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-rushes-emergency-fixes-for-exploited-zero-0e3162fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Rushes%20Emergency%20Fixes%20for%20Exploited%20Zero-Day&amp;severity=low&amp;id=69d380ba0a160ebd929cdcbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5642-improper-authorization-in-cyber-iii--0ffbbeb4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5642%3A%20Improper%20Authorization%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d380c00a160ebd929cdd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5673-out-of-bounds-read-in-red-hat-red-ha-0905ee9b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5673%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d380c00a160ebd929cdd67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5641-sql-injection-in-phpgurukul-online-s-f420b58d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5641%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d380c00a160ebd929cdd58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5640-sql-injection-in-phpgurukul-online-s-35d2da80</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5640%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d379b20a160ebd9296724d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-often-are-redirects-used-in-phishing-in-2026x3-6e4aa013</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20often%20are%20redirects%20used%20in%20phishing%20in%202026%26%23x3f%3B%2C%20(Mon%2C%20Apr%206th)&amp;severity=medium&amp;id=69d376340a160ebd9294c463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5639-sql-injection-in-phpgurukul-online-s-27b523e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5639%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d379b20a160ebd92967246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37977-origin-validation-error-in-red-hat--52323981</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37977%3A%20Origin%20Validation%20Error%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69d372ac0a160ebd9293290b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5638-path-traversal-in-heriklyma-cppwebfr-b0d21b50</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5638%3A%20Path%20Traversal%20in%20HerikLyma%20CPPWebFramework&amp;severity=medium&amp;id=69d372ac0a160ebd92932915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5637-sql-injection-in-projectworlds-car-r-292e4dae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5637%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20System&amp;severity=medium&amp;id=69d372ac0a160ebd9293290f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5636-sql-injection-in-phpgurukul-online-s-d95e00cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5636%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d36ba30a160ebd9290d554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5635-sql-injection-in-phpgurukul-online-s-b47bbe57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5635%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d36ba30a160ebd9290d54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5634-sql-injection-in-projectworlds-car-r-fff45319</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5634%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20Project&amp;severity=medium&amp;id=69d36ba30a160ebd9290d547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5633-server-side-request-forgery-in-assaf-31e6e672</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5633%3A%20Server-Side%20Request%20Forgery%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d3924a0a160ebd92a58b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5632-missing-authentication-in-assafelovi-40387971</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5632%3A%20Missing%20Authentication%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d35a0e0a160ebd92890b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5631-code-injection-in-assafelovic-gpt-re-ae6c8081</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5631%3A%20Code%20Injection%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d35a0e0a160ebd92890b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5630-cross-site-scripting-in-assafelovic--c377408d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5630%3A%20Cross%20Site%20Scripting%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d35a0e0a160ebd92890b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5629-stack-based-buffer-overflow-in-belki-abbd3417</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5629%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d34f820a160ebd9282cfe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5628-stack-based-buffer-overflow-in-belki-732548e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5628%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d34c040a160ebd9280c17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5625-cross-site-scripting-in-assafelovic--72d4f926</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5625%3A%20Cross%20Site%20Scripting%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d34c040a160ebd9280c175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5624-cross-site-request-forgery-in-projec-fecacb04</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5624%3A%20Cross-Site%20Request%20Forgery%20in%20ProjectSend&amp;severity=medium&amp;id=69d34c040a160ebd9280c16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5623-server-side-request-forgery-in-hceng-e59811be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5623%3A%20Server-Side%20Request%20Forgery%20in%20hcengineering%20Huly%20Platform&amp;severity=medium&amp;id=69d34c040a160ebd9280c168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5622-use-of-hard-coded-cryptographic-key--31b4d302</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5622%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20hcengineering%20Huly%20Platform&amp;severity=medium&amp;id=69d33a730a160ebd9261d5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5621-os-command-injection-in-chrischinchi-7676eab8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5621%3A%20OS%20Command%20Injection%20in%20ChrisChinchilla%20Vale-MCP&amp;severity=medium&amp;id=69d33a730a160ebd9261d5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5620-sql-injection-in-itsourcecode-constr-ab89fe24</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5620%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d33a730a160ebd9261d5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5619-os-command-injection-in-braffolk-mcp-d6998a0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5619%3A%20OS%20Command%20Injection%20in%20Braffolk%20mcp-summarization-functions&amp;severity=medium&amp;id=69d33a730a160ebd9261d5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5618-server-side-request-forgery-in-kalca-5e58cc4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5618%3A%20Server-Side%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69d32c5a0a160ebd92539b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5616-missing-authentication-in-jeecgboot-38bc1de7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5616%3A%20Missing%20Authentication%20in%20JeecgBoot&amp;severity=medium&amp;id=69d32c5a0a160ebd92539b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5615-cross-site-scripting-in-givanz-vvveb-1c1067fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5615%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvvebjs&amp;severity=medium&amp;id=69d32c5a0a160ebd92539b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5614-stack-based-buffer-overflow-in-belki-4bd2dba3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5614%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d32c5a0a160ebd92539b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5613-stack-based-buffer-overflow-in-belki-4e7d7f43</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5613%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d348ef0a160ebd927fa927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5612-stack-based-buffer-overflow-in-belki-c7735710</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5612%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d348ef0a160ebd927fa91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5611-stack-based-buffer-overflow-in-belki-807657fa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5611%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d348ef0a160ebd927fa915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-april-6th-2026-httpsiscsa-2ee41ab0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20April%206th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9880%2C%20(Mon%2C%20Apr%206th)&amp;severity=medium&amp;id=69d313bf0a160ebd923e6280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5610-stack-based-buffer-overflow-in-belki-eb86f832</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5610%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d3103a0a160ebd923c912d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5609-stack-based-buffer-overflow-in-tenda-a4abeddf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5609%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69d3103a0a160ebd923c9126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5608-stack-based-buffer-overflow-in-belki-c4d65888</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5608%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69d305ae0a160ebd92332185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5607-server-side-request-forgery-in-imprv-cb207074</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5607%3A%20Server-Side%20Request%20Forgery%20in%20imprvhub%20mcp-browser-agent&amp;severity=medium&amp;id=69d305ae0a160ebd9233217f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5606-sql-injection-in-phpgurukul-online-s-9f42cde0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5606%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d2fb230a160ebd9229b829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-07-d0bfbefe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-07&amp;severity=medium&amp;id=69d542daaaed68159a3c0b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-madara-local-file-inclusion-8b9d5ae1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20%20Madara%20-%20Local%20File%20Inclusion&amp;severity=medium&amp;id=69d4e432aaed68159a0d45a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ritecms-310-authenticated-remote-code-execution-8102a11a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RiteCMS%203.1.0%20-%20Authenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d4e432aaed68159a0d459e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wbce-cms-164-remote-code-execution-cad05e4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WBCE%20CMS%201.6.4%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d4e432aaed68159a0d4599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zhiyuan-oa-arbitrary-file-upload-leading-b478c822</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zhiyuan%20OA%20-%20arbitrary%20file%20upload%20leading&amp;severity=medium&amp;id=69d4e432aaed68159a0d4594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grafana-1160-ssrf-cca26f05</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grafana%2011.6.0%20-%20SSRF&amp;severity=medium&amp;id=69d4e432aaed68159a0d458f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aspnet-8010-bypass-09598bc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASP.net%20%208.0.10%20-%20Bypass&amp;severity=medium&amp;id=69d4e432aaed68159a0d458a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/desktop-window-manager-core-library-100102400-priv-50e07b38</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Desktop%20Window%20Manager%20Core%20Library%2010.0.10240.0%20-%20Privilege%20Escalation&amp;severity=high&amp;id=69d4e432aaed68159a0d4585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-kernel-elevation-of-privilege-6bda53b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Kernel%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=69d4e432aaed68159a0d4580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fortiweb-v801-auth-bypass-41827c94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20FortiWeb%20v8.0.1%20-%20Auth%20Bypass&amp;severity=medium&amp;id=69d4e432aaed68159a0d457b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-localhost-ip-200-ssrf-6852b3d3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=is-localhost-ip%202.0.0%20-%20SSRF&amp;severity=medium&amp;id=69d4e432aaed68159a0d4576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31352-na-b621af4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31352%3A%20n%2Fa&amp;severity=medium&amp;id=69d4982faaed68159ac9fe21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31350-na-e6fb99eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31350%3A%20n%2Fa&amp;severity=medium&amp;id=69d4982faaed68159ac9fe1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-06-03ccef92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-06&amp;severity=medium&amp;id=69d44c990a160ebd92ef4b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54601-na-de1c7b61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54601%3A%20n%2Fa&amp;severity=high&amp;id=69d417e60a160ebd92da7f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57834-na-d6f58338</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57834%3A%20n%2Fa&amp;severity=high&amp;id=69d40d5a0a160ebd92d6988a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54602-na-d03a9d7e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54602%3A%20n%2Fa&amp;severity=high&amp;id=69d409d70a160ebd92d5a92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54328-na-18af0f52</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54328%3A%20n%2Fa&amp;severity=critical&amp;id=69d409d70a160ebd92d5a927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58349-na-9f3c45dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58349%3A%20n%2Fa&amp;severity=critical&amp;id=69d402cf0a160ebd92d2b840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54324-na-8382b977</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54324%3A%20n%2Fa&amp;severity=high&amp;id=69d402cf0a160ebd92d2b83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59440-na-7905e51f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59440%3A%20n%2Fa&amp;severity=high&amp;id=69d3f8440a160ebd92cf6997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57835-na-a9c52f60</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57835%3A%20n%2Fa&amp;severity=high&amp;id=69d3f8440a160ebd92cf6993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30613-na-a58e6b92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30613%3A%20n%2Fa&amp;severity=medium&amp;id=69d3f4be0a160ebd92ce2ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61166-na-90779fb3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61166%3A%20n%2Fa&amp;severity=medium&amp;id=69d3edbe0a160ebd92cb34bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31313-na-4ebc5a87</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31313%3A%20n%2Fa&amp;severity=medium&amp;id=69d3dfa80a160ebd92c701ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31354-na-36df3662</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31354%3A%20n%2Fa&amp;severity=medium&amp;id=69d3dc220a160ebd92c52bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31353-na-9fbc1a43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31353%3A%20n%2Fa&amp;severity=medium&amp;id=69d3dc220a160ebd92c52bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31351-na-0aac2020</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31351%3A%20n%2Fa&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31067-na-b9bd7456</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31067%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce180a160ebd92c09cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31066-na-2af03cb2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31066%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31065-na-b7520b37</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31065%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31063-na-c31fc392</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31063%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31062-na-40958597</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31062%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31061-na-b9e481ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31061%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31060-na-6d26087b</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31060%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31059-na-9fbd7824</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31059%3A%20n%2Fa&amp;severity=critical&amp;id=69d3ce150a160ebd92c09c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31058-na-880ca1c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31058%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31053-na-a6a7c90d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31053%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31153-na-df948ad8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31153%3A%20n%2Fa&amp;severity=medium&amp;id=69d3c70a0a160ebd92be832d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31151-na-d0e23eb3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31151%3A%20n%2Fa&amp;severity=critical&amp;id=69d3c70a0a160ebd92be8329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31150-na-06667191</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31150%3A%20n%2Fa&amp;severity=medium&amp;id=69d3c70a0a160ebd92be8325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30078-na-0c914f65</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30078%3A%20n%2Fa&amp;severity=high&amp;id=69d3bc7e0a160ebd92bb5f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-06-c4385a78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-06&amp;severity=low&amp;id=69d30cad0a160ebd92390330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5605-stack-based-buffer-overflow-in-tenda-5175b382</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5605%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69d2f0950a160ebd92223704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5604-stack-based-buffer-overflow-in-tenda-db7d292f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5604%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69d2e98e0a160ebd921dd793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5603-os-command-injection-in-elgentos-mag-77273804</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5603%3A%20OS%20Command%20Injection%20in%20elgentos%20magento2-dev-mcp&amp;severity=medium&amp;id=69d2e60a0a160ebd921baa0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5602-os-command-injection-in-nor2-io-heim-b47b6f51</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5602%3A%20OS%20Command%20Injection%20in%20Nor2-io%20heim-mcp&amp;severity=medium&amp;id=69d2e2860a160ebd921a0373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4272-cwe-306-missing-authentication-for-c-c9a0d783</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4272%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Honeywell%20Barcode%20Scanners&amp;severity=high&amp;id=69d2df020a160ebd921850c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5601-information-disclosure-in-acrel-elec-0d3391a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5601%3A%20Information%20Disclosure%20in%20Acrel%20Electrical%20Prepaid%20Cloud%20Platform&amp;severity=medium&amp;id=69d2df020a160ebd921850c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35679-cwe-358-improperly-implemented-secu-190d6e68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35679%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Zcash%20zcashd&amp;severity=low&amp;id=69d2d4760a160ebd9210510c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5597-path-traversal-in-griptape-ai-gripta-63b77628</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5597%3A%20Path%20Traversal%20in%20griptape-ai%20griptape&amp;severity=medium&amp;id=69d2d4760a160ebd92105110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5596-sql-injection-in-griptape-ai-griptap-ba35b0fe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5596%3A%20SQL%20Injection%20in%20griptape-ai%20griptape&amp;severity=medium&amp;id=69d2cd6e0a160ebd920c956e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5595-path-traversal-in-griptape-ai-gripta-afe36018</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5595%3A%20Path%20Traversal%20in%20griptape-ai%20griptape&amp;severity=medium&amp;id=69d2b8560a160ebd920208d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5594-code-injection-in-premai-io-premsql-97f422d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5594%3A%20Code%20Injection%20in%20premAI-io%20premsql&amp;severity=medium&amp;id=69d2adca0a160ebd92fc0d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5587-sql-injection-in-wbbeyourself-mac-sq-ccb4e970</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5587%3A%20SQL%20Injection%20in%20wbbeyourself%20MAC-SQL&amp;severity=medium&amp;id=69d2aa460a160ebd92fa19c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5586-sql-injection-in-zhongyu09-openchatb-1cc59c89</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5586%3A%20SQL%20Injection%20in%20zhongyu09%20openchatbi&amp;severity=medium&amp;id=69d2a6c30a160ebd92f87995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5585-information-disclosure-in-tencent-ai-f43c5abe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5585%3A%20Information%20Disclosure%20in%20Tencent%20AI-Infra-Guard&amp;severity=medium&amp;id=69d29fba0a160ebd92f4a36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5584-code-injection-in-fosowl-agenticseek-5ebdc688</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5584%3A%20Code%20Injection%20in%20Fosowl%20agenticSeek&amp;severity=medium&amp;id=69d2952e0a160ebd92ee8ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5583-sql-injection-in-phpgurukul-online-s-7e53dc46</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5583%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d291aa0a160ebd92ed361d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5580-sql-injection-in-codeastro-online-cl-588a3e11</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5580%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d28e260a160ebd92ebf79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5579-sql-injection-in-codeastro-online-cl-8a36bff3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5579%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d28aa20a160ebd92eae607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5578-sql-injection-in-codeastro-online-cl-270cae2a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5578%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d2872d0a160ebd92e8c403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5577-sql-injection-in-song-li-crossbrowse-75f65393</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5577%3A%20SQL%20Injection%20in%20Song-Li%20cross_browser&amp;severity=medium&amp;id=69d2839a0a160ebd92e66794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5576-unrestricted-upload-in-sourcecodeste-8cf7d296</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5576%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Record%20Management%20System&amp;severity=medium&amp;id=69d280150a160ebd92e46934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5575-sql-injection-in-sourcecodester-reco-fd2e567e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5575%3A%20SQL%20Injection%20in%20SourceCodester%20Record%20Management%20System&amp;severity=medium&amp;id=69d27c920a160ebd92e1f0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5574-missing-authorization-in-technostrob-06b353f0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5574%3A%20Missing%20Authorization%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d2790f0a160ebd92e069e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5573-unrestricted-upload-in-technostrobe--f074c6ed</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5573%3A%20Unrestricted%20Upload%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d2758a0a160ebd92df43da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5572-cross-site-request-forgery-in-techno-06441469</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5572%3A%20Cross-Site%20Request%20Forgery%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d26e830a160ebd92dcfb20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5571-information-disclosure-in-technostro-516ca39f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5571%3A%20Information%20Disclosure%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d26afe0a160ebd92db2dc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5570-improper-authentication-in-technostr-b7d1e5d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5570%3A%20Improper%20Authentication%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d2677a0a160ebd92d9f069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5569-improper-access-controls-in-technost-c554c45e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5569%3A%20Improper%20Access%20Controls%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d2677a0a160ebd92d9f063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5568-cross-site-scripting-in-akaunting-86cee6b8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5568%3A%20Cross%20Site%20Scripting%20in%20Akaunting&amp;severity=medium&amp;id=69d2607d0a160ebd92d8087b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5567-buffer-overflow-in-tenda-m3-072d4fc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5567%3A%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=69d2607d0a160ebd92d80874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5599-cwe-653-improper-isolation-or-compar-fc614c1a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5599%3A%20CWE-653%20Improper%20isolation%20or%20compartmentalization%20in%20pretix%20Venueless&amp;severity=high&amp;id=69d2596b0a160ebd92d5b95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5566-buffer-overflow-in-utt-hiper-1250gw-91d9c7d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5566%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69d255e50a160ebd92d4a22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5565-sql-injection-in-code-projects-simpl-b07ef79f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5565%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d255e50a160ebd92d4a223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5564-sql-injection-in-code-projects-simpl-b881b02b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5564%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d24b5a0a160ebd92cf6eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5563-sql-injection-in-autohomecorp-frostm-2a715c16</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5563%3A%20SQL%20Injection%20in%20AutohomeCorp%20frostmourne&amp;severity=medium&amp;id=69d247d60a160ebd92ce48cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5562-code-injection-in-provectus-kafka-ui-442a7aab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5562%3A%20Code%20Injection%20in%20provectus%20kafka-ui&amp;severity=medium&amp;id=69d244520a160ebd92ccff0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5561-injection-in-campcodes-complete-pos--7e32e92a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5561%3A%20Injection%20in%20Campcodes%20Complete%20POS%20Management%20and%20Inventory%20System&amp;severity=medium&amp;id=69d240c80a160ebd92cc2116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5560-sql-injection-in-phpgurukul-online-s-96eac83b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5560%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d23d4b0a160ebd92ca42f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5559-improper-neutralization-of-special-e-0f220e7d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5559%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20AntaresMugisho%20PyBlade&amp;severity=medium&amp;id=69d239c60a160ebd92c92f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5558-sql-injection-in-phpgurukul-phpguruk-e94dae7f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5558%3A%20SQL%20Injection%20in%20PHPGurukul%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d236420a160ebd92c84fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5557-authentication-bypass-using-alternat-9548feee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5557%3A%20Authentication%20Bypass%20Using%20Alternate%20Channel%20in%20badlogic%20pi-mono&amp;severity=medium&amp;id=69d232be0a160ebd92c6ef65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5556-code-injection-in-badlogic-pi-mono-c43049d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5556%3A%20Code%20Injection%20in%20badlogic%20pi-mono&amp;severity=medium&amp;id=69d22f510a160ebd92c5a8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5555-sql-injection-in-code-projects-conce-8ea5e7de</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5555%3A%20SQL%20Injection%20in%20code-projects%20Concert%20Ticket%20Reservation%20System&amp;severity=medium&amp;id=69d22bb60a160ebd92c4c66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5554-sql-injection-in-code-projects-conce-3e644e27</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5554%3A%20SQL%20Injection%20in%20code-projects%20Concert%20Ticket%20Reservation%20System&amp;severity=medium&amp;id=69d22bb60a160ebd92c4c664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5553-sql-injection-in-itsourcecode-online-f04df440</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5553%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cellphone%20System&amp;severity=medium&amp;id=69d240c80a160ebd92cc211e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5552-sql-injection-in-phpgurukul-online-s-2c0bee43</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5552%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d2212a0a160ebd92c0fdde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5551-sql-injection-in-itsourcecode-free-h-36ec2bc4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5551%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69d21da50a160ebd92bf5b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5550-stack-based-buffer-overflow-in-tenda-a47995aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5550%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=69d21a220a160ebd92bda2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5549-use-of-hard-coded-cryptographic-key--5da1f78a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5549%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Tenda%20AC10&amp;severity=medium&amp;id=69d21a220a160ebd92bda2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5548-stack-based-buffer-overflow-in-tenda-b21b0ead</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5548%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=69d240c80a160ebd92cc2125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5547-os-command-injection-in-tenda-ac10-059e62c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5547%3A%20OS%20Command%20Injection%20in%20Tenda%20AC10&amp;severity=medium&amp;id=69d20f950a160ebd92b9623e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5546-unrestricted-upload-in-campcodes-com-39af8247</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5546%3A%20Unrestricted%20Upload%20in%20Campcodes%20Complete%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=69d2050a0a160ebd92b5ca37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5544-stack-based-buffer-overflow-in-utt-h-45d31ae5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5544%3A%20Stack-based%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69d1f7600a160ebd92af7735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5543-sql-injection-in-phpgurukul-user-reg-7eff5247</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5543%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management%20System&amp;severity=medium&amp;id=69d1e8ea0a160ebd9293977d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5542-cross-site-scripting-in-code-project-92369ba6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5542%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d1e8ea0a160ebd92939775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5541-cross-site-scripting-in-code-project-9d9eda40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5541%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d1e8ea0a160ebd9293976e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5540-sql-injection-in-code-projects-simpl-d6b5d26d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5540%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d1e8ea0a160ebd92939767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5590-null-pointer-dereference-in-zephyrpr-8d20064c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5590%3A%20NULL%20Pointer%20Dereference%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=69d1dada0a160ebd92844add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5539-cross-site-scripting-in-code-project-db8879a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5539%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d1dada0a160ebd92844ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5538-server-side-request-forgery-in-qingd-fc47f9c1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5538%3A%20Server-Side%20Request%20Forgery%20in%20QingdaoU%20OnlineJudge&amp;severity=medium&amp;id=69d1dada0a160ebd92844ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5537-sql-injection-in-halex-coursesel-763c9bf3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5537%3A%20SQL%20Injection%20in%20halex%20CourseSEL&amp;severity=medium&amp;id=69d1dada0a160ebd92844aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5536-deserialization-in-fedml-ai-fedml-83857636</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5536%3A%20Deserialization%20in%20FedML-AI%20FedML&amp;severity=medium&amp;id=69d1dada0a160ebd92844ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5535-path-traversal-in-fedml-ai-fedml-a593f60b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5535%3A%20Path%20Traversal%20in%20FedML-AI%20FedML&amp;severity=medium&amp;id=69d1ccca0a160ebd92763d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5534-sql-injection-in-itsourcecode-online-c19ce8d5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5534%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69d1ccca0a160ebd92763d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5533-cross-site-scripting-in-badlogic-pi--560a39e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5533%3A%20Cross%20Site%20Scripting%20in%20badlogic%20pi-mono&amp;severity=medium&amp;id=69d1beba0a160ebd9263934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5532-os-command-injection-in-scrapegrapha-517e04f7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5532%3A%20OS%20Command%20Injection%20in%20ScrapeGraphAI%20scrapegraph-ai&amp;severity=medium&amp;id=69d1beba0a160ebd92639349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5531-cleartext-storage-in-a-file-or-on-di-a84e61b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5531%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=69d1beba0a160ebd92639342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5530-server-side-request-forgery-in-ollam-fdcf16de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5530%3A%20Server-Side%20Request%20Forgery%20in%20Ollama&amp;severity=medium&amp;id=69d1f7600a160ebd92af7748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5529-improper-authorization-in-dromara-la-95f7d62a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5529%3A%20Improper%20Authorization%20in%20Dromara%20lamp-cloud&amp;severity=medium&amp;id=69d1f7600a160ebd92af773e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-05-8e0ed497</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-05&amp;severity=medium&amp;id=69d2fb190a160ebd9229a5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-05-877aed8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-05&amp;severity=low&amp;id=69d1ec650a160ebd92aa0b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5528-os-command-injection-in-moussaabbadl-7c70d590</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5528%3A%20OS%20Command%20Injection%20in%20MoussaabBadla%20code-screenshot-mcp&amp;severity=medium&amp;id=69d1a29a0a160ebd92f0a043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5527-use-of-hard-coded-cryptographic-key--3a414038</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5527%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Tenda%204G03%20Pro&amp;severity=medium&amp;id=69d19f160a160ebd92e2b2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5526-improper-access-controls-in-tenda-4g-14b70564</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5526%3A%20Improper%20Access%20Controls%20in%20Tenda%204G03%20Pro&amp;severity=medium&amp;id=69d1f7600a160ebd92af7750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3666-cwe-22-improper-limitation-of-a-path-8b05d9d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3666%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=69d0f6560a160ebd92e6d966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2936-cwe-79-improper-neutralization-of-in-422ba84b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2936%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wp-buy%20Visitor%20Traffic%20Real%20Time%20Statistics&amp;severity=high&amp;id=69d0f6560a160ebd92e6d95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1233-cwe-798-use-of-hard-coded-credential-6c6e620c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1233%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20mvirik%20Text%20to%20Speech%20%E2%80%93%20TTSWP&amp;severity=high&amp;id=69d0f6560a160ebd92e6d95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14938-cwe-434-unrestricted-upload-of-file-2401272d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14938%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20purethemes%20Listeo-Core%20-%20Directory%20Plugin%20by%20Purethemes&amp;severity=medium&amp;id=69d0f6560a160ebd92e6d952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3309-cwe-94-improper-control-of-generatio-826c5da5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3309%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=69d0f6560a160ebd92e6d962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0626-cwe-79-improper-neutralization-of-in-5419438f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getwpfunnels%20WPFunnels%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20with%20Checkout%20%26%20One%20Click%20Upsell&amp;severity=medium&amp;id=69d0f6560a160ebd92e6d956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-commission-confirms-data-breach-linked-to-7237c06f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Commission%20Confirms%20Data%20Breach%20Linked%20to%20Trivy%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69d0ebcb0a160ebd92e486b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3445-cwe-862-missing-authorization-in-pro-38b78a54</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3445%3A%20CWE-862%20Missing%20Authorization%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=high&amp;id=69d0cfab0a160ebd92dd86d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2826-cwe-862-missing-authorization-in-ste-6610cfb4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2826%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=69d0cfab0a160ebd92dd86cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2437-cwe-79-improper-neutralization-of-in-0af0e1d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Tour%20Booking%20Plugin%20%E2%80%93%20Tour%20Operator%20Software&amp;severity=medium&amp;id=69d0cfab0a160ebd92dd86c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5425-cwe-79-improper-neutralization-of-in-1c7aa2af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5425%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Widgets%20for%20Social%20Photo%20Feed&amp;severity=high&amp;id=69d0cfab0a160ebd92dd86d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4896-cwe-639-authorization-bypass-through-8abf7432</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4896%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wclovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce&amp;severity=high&amp;id=69d0c19a0a160ebd92d74647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13368-cwe-79-improper-neutralization-of-i-081a22a8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13368%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0552-cwe-79-improper-neutralization-of-in-1f4cccca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0552%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0737-cwe-79-improper-neutralization-of-in-4c65f006</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0738-cwe-79-improper-neutralization-of-in-c28c2c0b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0738%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69d0c19a0a160ebd92d7463e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2600-cwe-79-improper-neutralization-of-in-49ef0340</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2600%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0664-cwe-79-improper-neutralization-of-in-897d2c33</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15064-cwe-79-improper-neutralization-of-i-35918fc7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=69d0c19a0a160ebd92d7462d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2949-cwe-79-improper-neutralization-of-in-ba43818e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2949%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69d085d60a160ebd9291ffbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2924-cwe-79-improper-neutralization-of-in-c8383986</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2924%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20%E2%80%93%20Ultimate%20WordPress%20FSE%20Blocks%20Addons%20%26%20Ecosystem&amp;severity=medium&amp;id=69d085d60a160ebd9291ffb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3571-cwe-862-missing-authorization-in-gen-414f53ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3571%3A%20CWE-862%20Missing%20Authorization%20in%20genetechproducts%20Pie%20Register%20%E2%80%93%20User%20Registration%2C%20Profiles%20%26%20Content%20Restriction&amp;severity=medium&amp;id=69d074630a160ebd927ffddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35616-escalation-of-privilege-in-fortinet-1f903372</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35616%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientEMS&amp;severity=critical&amp;id=69d062ae0a160ebd92704c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-05-ff758128</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-05&amp;severity=medium&amp;id=69d27c8a0a160ebd92e1bfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-04-7eb28cb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-04&amp;severity=medium&amp;id=69d1a9990a160ebd92071c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-04-b9a3641d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-04&amp;severity=low&amp;id=69d0cc1f0a160ebd92dc5a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34955-cwe-78-improper-neutralization-of-s-35d9d34b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34955%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d04d960a160ebd926594f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34954-cwe-918-server-side-request-forgery-896ba330</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34954%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d04a110a160ebd9264ca72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34953-cwe-863-incorrect-authorization-in--72e3ef5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34953%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d04a110a160ebd9264ca6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34952-cwe-306-missing-authentication-for--4a535aff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34952%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d04a110a160ebd9264ca6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34939-cwe-1333-inefficient-regular-expres-34333858</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34939%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d04a110a160ebd9264ca69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34938-cwe-693-protection-mechanism-failur-01ac669c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34938%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d04a110a160ebd9264ca66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34937-cwe-78-improper-neutralization-of-s-323a6925</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34937%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d04a110a160ebd9264ca63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34936-cwe-918-server-side-request-forgery-f70ae3e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34936%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d04a110a160ebd9264ca60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34934-cwe-89-improper-neutralization-of-s-2e7eac46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34934%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d046900a160ebd9263e690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34935-cwe-78-improper-neutralization-of-s-aa91a94a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34935%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d046900a160ebd9263e693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34824-cwe-125-out-of-bounds-read-in-mesop-38b40f4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34824%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20mesop-dev%20mesop&amp;severity=high&amp;id=69d046900a160ebd9263e68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34612-cwe-89-improper-neutralization-of-s-c7c6454f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34612%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kestra-io%20kestra&amp;severity=critical&amp;id=69d046900a160ebd9263e685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35468-cwe-252-unchecked-return-value-in-n-d12f56bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35468%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20nimiq%20core-rs-albatross&amp;severity=medium&amp;id=69d03f860a160ebd92619e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33184-cwe-191-integer-underflow-wrap-or-w-4ea8d7a9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33184%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69d03f860a160ebd92619e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34061-cwe-345-insufficient-verification-o-7684b074</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34061%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20nimiq%20core-rs-albatross&amp;severity=medium&amp;id=69d03f860a160ebd92619e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34052-cwe-401-missing-release-of-memory-a-4d60fc53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34052%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20jupyterhub%20ltiauthenticator&amp;severity=medium&amp;id=69d03f860a160ebd92619e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33175-cwe-287-improper-authentication-in--900dd73d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33175%3A%20CWE-287%3A%20Improper%20Authentication%20in%20jupyterhub%20oauthenticator&amp;severity=high&amp;id=69d03c020a160ebd926055e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28797-cwe-20-improper-input-validation-in-23caf65b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28797%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20infiniflow%20ragflow&amp;severity=high&amp;id=69d038800a160ebd925f4637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34980-cwe-20-improper-input-validation-in-692dc2f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34980%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d2016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34979-cwe-122-heap-based-buffer-overflow--62848072</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34979%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d2013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34978-cwe-22-improper-limitation-of-a-pat-c074c0e7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34978%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d2010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34990-cwe-287-improper-authentication-in--2f45c293</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34990%3A%20CWE-287%3A%20Improper%20Authentication%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d201a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27447-cwe-863-incorrect-authorization-in--07eb4b03</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27447%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d200c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22665-cwe-178-improper-handling-of-case-s-4e82a4fd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22665%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20prompts.chat&amp;severity=high&amp;id=69d026ec0a160ebd92593012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22664-cwe-918-server-side-request-forgery-8828a448</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22664%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20prompts.chat&amp;severity=high&amp;id=69d026ec0a160ebd9259300d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22663-cwe-862-missing-authorization-in-pr-a0e6cd29</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22663%3A%20CWE-862%20Missing%20Authorization%20in%20prompts.chat&amp;severity=high&amp;id=69d026ec0a160ebd92593008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22662-cwe-918-server-side-request-forgery-11de16a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22662%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20prompts.chat&amp;severity=medium&amp;id=69d026ec0a160ebd92593003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22661-cwe-22-improper-limitation-of-a-pat-e784ddc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22661%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20prompts.chat&amp;severity=high&amp;id=69d026ec0a160ebd92592ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10681-cwe-798-in-gardyn-mobile-applicatio-18dc4351</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10681%3A%20CWE-798%20in%20Gardyn%20Mobile%20Application&amp;severity=high&amp;id=69d026ec0a160ebd92592ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25197-cwe-639-in-gardyn-cloud-api-0887f9ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25197%3A%20CWE-639%20in%20Gardyn%20Cloud%20API&amp;severity=critical&amp;id=69d026ec0a160ebd92593017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28766-cwe-306-in-gardyn-cloud-api-a7ac8e53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28766%3A%20CWE-306%20in%20Gardyn%20Cloud%20API&amp;severity=critical&amp;id=69d026ec0a160ebd9259301d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28767-cwe-306-in-gardyn-cloud-api-7cf9d13d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28767%3A%20CWE-306%20in%20Gardyn%20Cloud%20API&amp;severity=medium&amp;id=69d023670a160ebd92577b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32646-cwe-306-in-gardyn-cloud-api-42895e3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32646%3A%20CWE-306%20in%20Gardyn%20Cloud%20API&amp;severity=high&amp;id=69d023670a160ebd92577b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35558-cwe-77-improper-neutralization-of-s-2fdf5088</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35558%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35559-cwe-787-out-of-bounds-write-in-amaz-64d68bf7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35559%3A%20CWE-787%20Out-of-bounds%20write%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=medium&amp;id=69d023670a160ebd92577b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5485-cwe-78-improper-neutralization-of-sp-efef007b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5485%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32662-cwe-489-in-gardyn-cloud-api-d58ccfc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32662%3A%20CWE-489%20in%20Gardyn%20Cloud%20API&amp;severity=medium&amp;id=69d023670a160ebd92577b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35562-cwe-770-allocation-of-resources-wit-55242724</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35562%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35561-cwe-862-missing-authorization-in-am-b3c9fe82</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35561%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35560-cwe-295-improper-certificate-valida-6b4d3803</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35560%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28798-cwe-918-server-side-request-forgery-eeb1458a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28798%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IceWhaleTech%20ZimaOS&amp;severity=critical&amp;id=69d01fe40a160ebd92561113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5484-improper-access-controls-in-bookstac-dec9933e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5484%3A%20Improper%20Access%20Controls%20in%20BookStackApp%20BookStack&amp;severity=medium&amp;id=69d01c5f0a160ebd9254ff70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3184-authentication-bypass-by-alternate-n-f2f54bad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3184%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=low&amp;id=69d011d20a160ebd9251326c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2625-improper-verification-of-cryptograph-ee8d8567</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2625%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69d00aca0a160ebd924e2a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5476-integer-overflow-in-nasa-cfs-5bb1bd57</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5476%3A%20Integer%20Overflow%20in%20NASA%20cFS&amp;severity=low&amp;id=69cffcbb0a160ebd924911a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32186-cwe-918-server-side-request-forgery-56097844</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32186%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Bing&amp;severity=critical&amp;id=69cffcbb0a160ebd9249119e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5475-memory-corruption-in-nasa-cfs-13fbb9f6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5475%3A%20Memory%20Corruption%20in%20NASA%20cFS&amp;severity=medium&amp;id=69cff9360a160ebd9247d56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0545-cwe-306-missing-authentication-for-c-c182a1fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0545%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69cff9360a160ebd9247d567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5474-heap-based-buffer-overflow-in-nasa-c-f6b3acaa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5474%3A%20Heap-based%20Buffer%20Overflow%20in%20NASA%20cFS&amp;severity=medium&amp;id=69cff5b20a160ebd92462686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5473-deserialization-in-nasa-cfs-3e2a874c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5473%3A%20Deserialization%20in%20NASA%20cFS&amp;severity=low&amp;id=69cff2300a160ebd92448b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/managing-open-source-vulnerabilities-kaspersky-off-55d6c244</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Managing%20open-source%20vulnerabilities%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69cfeb2e0a160ebd9241ea44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5472-unrestricted-upload-in-projectsandpr-0cc309bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5472%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=69cfe7a20a160ebd9240d447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25118-cwe-598-use-of-get-request-method-w-96ae0d1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25118%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20immich-app%20immich&amp;severity=medium&amp;id=69cfe4200a160ebd923f9c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5471-use-of-hard-coded-cryptographic-key--5760eb8c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5471%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Investory%20Toy%20Planet%20Trouble%20App&amp;severity=medium&amp;id=69cfe4200a160ebd923f9c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5470-server-side-request-forgery-in-mixel-d7026a99</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5470%3A%20Server-Side%20Request%20Forgery%20in%20mixelpixx%20Google-Research-MCP&amp;severity=medium&amp;id=69cfe09b0a160ebd923e33cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27124-cwe-441-unintended-proxy-or-interme-8aae3b75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27124%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20jlowin%20fastmcp&amp;severity=high&amp;id=69cfdd290a160ebd923d52c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64340-cwe-78-improper-neutralization-of-s-051e5da6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64340%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jlowin%20fastmcp&amp;severity=medium&amp;id=69cfdd290a160ebd923d52bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23473-c8747a12</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23473&amp;severity=null&amp;id=69f59eeccbff5d8610a6dc47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23471-bbdc30cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23471&amp;severity=null&amp;id=69dcf3cf82d89c981fee9b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5469-server-side-request-forgery-in-casdo-a22db068</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5469%3A%20Server-Side%20Request%20Forgery%20in%20Casdoor&amp;severity=medium&amp;id=69d01fe40a160ebd92561117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprk-related-campaigns-with-lnk-and-github-c2-91573c21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK-Related%20Campaigns%20with%20LNK%20and%20GitHub%20C2&amp;severity=medium&amp;id=69cff22d0a160ebd924486ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5468-cross-site-scripting-in-casdoor-7e8a0a24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5468%3A%20Cross%20Site%20Scripting%20in%20Casdoor&amp;severity=medium&amp;id=69cfc47e0a160ebd922338ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28736-cwe-639-authorization-bypass-throug-75f52a86</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28736%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mattermost%20Focalboard&amp;severity=medium&amp;id=69cfc47e0a160ebd922338cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25773-cwe-89-improper-neutralization-of-s-43bf0e92</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25773%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mattermost%20Focalboard&amp;severity=high&amp;id=69cfc47e0a160ebd922338c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-006-cert-eu-c-06f851f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20006%20-%20CERT-EU%20Confirms%20European%20Commission%20Cloud%20Breach%2C%20Sportradar%20Details%20Emerge%2C%20and%20Mandiant%20Quantifies%20Campaign%20at%201%2C000%26%23x2b%3B%20SaaS%20Environments%2C%20(Fri%2C%20Apr%203rd)&amp;severity=medium&amp;id=69cfc0f60a160ebd9221d9f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trueconf-zero-day-exploited-in-asian-government-at-c6827a67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TrueConf%20Zero-Day%20Exploited%20in%20Asian%20Government%20Attacks&amp;severity=medium&amp;id=69cfb9ee0a160ebd921e736a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-chatgpt-data-leak-android-rootkit-wa-e5dd880b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20ChatGPT%20Data%20Leak%2C%20Android%20Rootkit%2C%20Water%20Facility%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=69cfb66a0a160ebd921d0eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27655-cwe-79-improper-neutralization-of-i-6c9ead92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27655%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfb2e50a160ebd921b3d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-sharefile-flaws-lead-to-unauthenticated-r-db626a4f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20ShareFile%20Flaws%20Lead%20to%20Unauthenticated%20RCE&amp;severity=critical&amp;id=69cfaf620a160ebd9219b6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4108-cwe-79-improper-neutralization-of-in-77d35d30</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4108%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfb2e50a160ebd921b3d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5467-open-redirect-in-casdoor-d92e6490</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5467%3A%20Open%20Redirect%20in%20Casdoor&amp;severity=medium&amp;id=69cfabde0a160ebd92184cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4107-cwe-79-improper-neutralization-of-in-b7a2b682</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4107%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfabde0a160ebd92184cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3880-cwe-79-improper-neutralization-of-in-4115e272</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3880%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfabde0a160ebd92184cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3879-cwe-79-improper-neutralization-of-in-2109c30e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3879%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfabde0a160ebd92184cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28703-cwe-79-improper-neutralization-of-i-105fef78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28703%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfabde0a160ebd92184cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28756-cwe-79-improper-neutralization-of-i-95c85518</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28756%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfa1520a160ebd92140866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-attack-surface-expands-as-enterprises-lose--2062976c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20Attack%20Surface%20Expands%20as%20Enterprises%20Lose%20Control&amp;severity=medium&amp;id=69cfc4ba0a160ebd9223c7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-exploited-in-large-scale-credential-ha-710eb52c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Exploited%20in%20Large-Scale%20Credential%20Harvesting%20Campaign&amp;severity=medium&amp;id=69cf9dce0a160ebd92126582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/t-mobile-sets-the-record-straight-on-latest-data-b-a56c8b52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=T-Mobile%20Sets%20the%20Record%20Straight%20on%20Latest%20Data%20Breach%20Filing&amp;severity=medium&amp;id=69cf96c60a160ebd920f4081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28754-cwe-79-improper-neutralization-of-i-6d918354</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28754%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cf96cc0a160ebd920f4a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-technique-based-approach-to-hunting-web-delivere-aa216956</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Technique-Based%20Approach%20to%20Hunting%20Web-Delivered%20Malware&amp;severity=medium&amp;id=69cff22d0a160ebd924486f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-drain-285-million-from-drift--80bba754</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Drain%20%24285%20Million%20From%20Drift%20in%2010%20Seconds&amp;severity=medium&amp;id=69cf8fbe0a160ebd920b65a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7024-cwe-276-incorrect-default-permission-97c73fb0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7024%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AIRBUS%20TETRA%20Connectivity%20Server%20(TCS)&amp;severity=medium&amp;id=69cf701a0a160ebd92f9a4a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5462-use-of-hard-coded-cryptographic-key--cec5a6d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5462%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Wahoo%20Fitness%20SYSTM%20App&amp;severity=medium&amp;id=69cf701a0a160ebd92f9a4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5458-use-of-hard-coded-cryptographic-key--9ad81a24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5458%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Noelse%20Individuals%20%26%20Pro%20App&amp;severity=medium&amp;id=69cf69120a160ebd92df90e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5457-use-of-hard-coded-cryptographic-key--4bb86ba2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5457%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20PropertyGuru%20AgentNet%20Singapore%20App&amp;severity=medium&amp;id=69cf658d0a160ebd92dcb2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5456-use-of-hard-coded-cryptographic-key--a777f37c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5456%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Align%20Technology%20My%20Invisalign%20App&amp;severity=medium&amp;id=69cf5e850a160ebd92d5742c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5455-use-of-hard-coded-cryptographic-key--ff603c53</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5455%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Dialogue%20App&amp;severity=medium&amp;id=69cf5e850a160ebd92d57426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5454-use-of-hard-coded-cryptographic-key--c7599b26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5454%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20GRID%20Organiser%20App&amp;severity=medium&amp;id=69cf4ec6e6bfc5ba1d76734c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5463-cwe-77-improper-neutralization-of-sp-6f7ed040</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5463%3A%20CWE-77%20Improper%20neutralization%20of%20special%20elements%20leading%20to%20command%20injection%20in%20Dan%20McInerney%20pymetasploit3&amp;severity=critical&amp;id=69cf4ec6e6bfc5ba1d767352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5453-use-of-hard-coded-cryptographic-key--eebd2c8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5453%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Rico%20s%C3%B3%20vantagem%20pra%20investir%20App&amp;severity=medium&amp;id=69cf4ec6e6bfc5ba1d767346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35545-cwe-669-incorrect-resource-transfer-4f9b63c9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35545%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35544-cwe-669-incorrect-resource-transfer-3cfa2528</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35544%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35543-cwe-669-incorrect-resource-transfer-2e3eea55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35543%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35542-cwe-669-incorrect-resource-transfer-1ee1fdc5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35542%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35541-cwe-843-access-of-resource-using-in-6cfb8571</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35541%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35540-cwe-669-incorrect-resource-transfer-d7e9fcf3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35540%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35539-cwe-79-improper-neutralization-of-i-c4f66e2b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35539%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35538-cwe-88-improper-neutralization-of-a-9cd34ca9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35538%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Roundcube%20Webmail&amp;severity=low&amp;id=69cf56590a160ebd92cd3e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35537-cwe-502-deserialization-of-untruste-e3e5ffd4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35537%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Roundcube%20Webmail&amp;severity=low&amp;id=69cf362ae6bfc5ba1d4c9706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5452-use-of-hard-coded-cryptographic-key--d5424d8d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5452%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20UCC%20CampusConnect%20App&amp;severity=medium&amp;id=69cf362ae6bfc5ba1d4c970f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35536-cwe-159-improper-handling-of-invali-02ebbe3e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35536%3A%20CWE-159%20Improper%20Handling%20of%20Invalid%20Use%20of%20Special%20Elements%20in%20tornadoweb%20Tornado&amp;severity=high&amp;id=69cf362ae6bfc5ba1d4c9702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35535-cwe-271-privilege-dropping-lowering-83309c2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35535%3A%20CWE-271%20Privilege%20Dropping%20%2F%20Lowering%20Errors%20in%20Sudo%20project%20Sudo&amp;severity=high&amp;id=69cf565a0a160ebd92cd3eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28815-a-remote-attacker-can-supply-a-shor-45198375</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28815%3A%20A%20remote%20attacker%20can%20supply%20a%20short%20X-Wing%20HPKE%20encapsulated%20key%20and%20trigger%20an%20out-of-bounds%20read%20in%20the%20C%20decapsulation%20path%2C%20potentially%20causing%20a%20crash%20or%20memory%20disclosure%20depending%20on%20runtime%20protections.%20in%20Apple%20macOS&amp;severity=high&amp;id=69cf565a0a160ebd92cd3eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35508-cwe-79-improper-neutralization-of-i-2b165f2c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20milesmcc%20Shynet&amp;severity=medium&amp;id=69cf1a09e6bfc5ba1d18739d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35507-cwe-348-use-of-less-trusted-source--3dfca42c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35507%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20milesmcc%20Shynet&amp;severity=medium&amp;id=69cf1a09e6bfc5ba1d187399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-the-supply-chain-how-sentinelones-ai-edr--ae921dbc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20the%20Supply%20Chain%3A%20How%20SentinelOne&apos;s%20AI%20EDR%20Stops%20the%20...&amp;severity=medium&amp;id=69cff22d0a160ebd92448702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-04-86c459c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-04&amp;severity=medium&amp;id=69d15c420a160ebd92fdc245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59710-na-3fafd6d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59710%3A%20n%2Fa&amp;severity=high&amp;id=69d0a7090a160ebd92cef529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59709-na-482aa39f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59709%3A%20n%2Fa&amp;severity=medium&amp;id=69d0a7090a160ebd92cef51f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-03-448d30f3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-03&amp;severity=medium&amp;id=69d058190a160ebd9267d399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28373-na-09617547</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28373%3A%20n%2Fa&amp;severity=critical&amp;id=69cff2300a160ebd92448b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26477-na-a491f893</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26477%3A%20n%2Fa&amp;severity=high&amp;id=69cfdd290a160ebd923d52c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59711-na-4eeb3c1b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59711%3A%20n%2Fa&amp;severity=high&amp;id=69cfdd290a160ebd923d52c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-03-d6f01094</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-03&amp;severity=low&amp;id=69cf1d84e6bfc5ba1d1ded65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32211-cwe-306-missing-authentication-for--955487bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32211%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Azure%20Web%20Apps&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d07550c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32173-cwe-287-improper-authentication-in--faaed594</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32173%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Azure%20SRE%20Agent%20Gateway%20-%20SignalR%20Hub&amp;severity=high&amp;id=69cefde9e6bfc5ba1d075509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33105-cwe-285-improper-authorization-in-m-73a608f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33105%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Kubernetes%20Service&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d075512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26135-cwe-918-server-side-request-forgery-b7428a35</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26135%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Custom%20Locations%20Resource%20Provider&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d075506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33107-cwe-918-server-side-request-forgery-97f03653</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33107%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Databricks&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d075515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32213-cwe-285-improper-authorization-in-m-b7cd2d00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32213%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20AI%20Foundry&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d07550f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14033-cwe-122-heap-based-buffer-overflow--5ba0f01c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14033%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Belden%20Hirschmann%20EagleSDV&amp;severity=high&amp;id=69ceed4ae6bfc5ba1d039aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/risks-emerging-when-developing-or-using-open-sourc-65bd61cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Risks%2C%20emerging%20when%20developing%20or%20using%20open-source%20software&amp;severity=medium&amp;id=69cef91ee6bfc5ba1d055051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15620-cwe-306-missing-authentication-for--3a8bc232</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15620%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Belden%20Hirschmann%20HiOS%20Switch%20Platform&amp;severity=critical&amp;id=69cef2c1e6bfc5ba1d03d79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35467-cwe-522-insufficiently-protected-cr-7c0849fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35467%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20CERT%2FCC%20cveClient%2Fencrypt-storage.js&amp;severity=high&amp;id=69cef558e6bfc5ba1d04a7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35466-cwe-79-improper-neutralization-of-i-561895ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35466%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CERT%2FCC%20cveClient%2FcveInterface.js&amp;severity=medium&amp;id=69cef472e6bfc5ba1d047ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14034-improper-authentication-cwe-287-in--177567d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14034%3A%20Improper%20Authentication%20(CWE-287)%20in%20Belden%20Hirschmann%20HiEOS%20LRS11&amp;severity=critical&amp;id=69cef608e6bfc5ba1d04c2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34838-cwe-502-deserialization-of-untruste-f6c31d56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34838%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=69cec5aae6bfc5ba1dfbd82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34834-cwe-287-improper-authentication-in--289edfd2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34834%3A%20CWE-287%3A%20Improper%20Authentication%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69cec5aae6bfc5ba1dfbd828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34833-cwe-312-cleartext-storage-of-sensit-b51ce693</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34833%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69cec5aae6bfc5ba1dfbd823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34832-cwe-639-authorization-bypass-throug-53bea463</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34832%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Erudika%20scoold&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35383-cwe-540-inclusion-of-sensitive-info-d7621abd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35383%3A%20CWE-540%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20Bentley%20Systems%20iTwin%20Platform&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34762-cwe-20-improper-input-validation-in-7e4100c1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34762%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ellanetworks%20core&amp;severity=low&amp;id=69cec5aae6bfc5ba1dfbd81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34761-cwe-476-null-pointer-dereference-in-5e11ac55</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34761%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5420-use-of-hard-coded-cryptographic-key--225a1021</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5420%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Shinrays%20Games%20Goods%20Triple%20App&amp;severity=low&amp;id=69cec5aae6bfc5ba1dfbd837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34760-cwe-20-improper-input-validation-in-9529c1a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34760%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34745-cwe-22-improper-limitation-of-a-pat-3a68f043</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34745%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ShaneIsrael%20fireshare&amp;severity=critical&amp;id=69cec35ae6bfc5ba1dfb4cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5429-cwe-79-improper-neutralization-of-in-0dc227b2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5429%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20AWS%20Kiro%20IDE&amp;severity=high&amp;id=69cec35ae6bfc5ba1dfb4ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34743-cwe-122-heap-based-buffer-overflow--7a101be3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34743%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20tukaani-project%20xz&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34742-cwe-1188-insecure-default-initializ-4e5c2196</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34742%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20modelcontextprotocol%20go-sdk&amp;severity=high&amp;id=69cec35ae6bfc5ba1dfb4cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5418-server-side-request-forgery-in-appsm-c094f40b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5418%3A%20Server-Side%20Request%20Forgery%20in%20appsmithorg%20appsmith&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6dea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34736-cwe-287-improper-authentication-in--80eaaffe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34736%3A%20CWE-287%3A%20Improper%20Authentication%20in%20openedx%20openedx-platform&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43236-an-attacker-may-be-able-to-cause-un-e92b7e14</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43236%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=low&amp;id=69ceb81ae6bfc5ba1df6de14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43257-an-app-may-be-able-to-break-out-of--e2aaec50</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43257%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34735-cwe-434-unrestricted-upload-of-file-f5d45c4f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34735%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HytaleModding%20wiki&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40849-an-app-may-be-able-to-break-out-of--c169fbdd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40849%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44303-a-malicious-application-may-be-able-5e1d5890</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44303%3A%20A%20malicious%20application%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6de00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43210-processing-a-maliciously-crafted-me-956bf5fc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43210%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb81ae6bfc5ba1df6de07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44250-an-app-may-be-able-to-execute-arbit-072a711f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44250%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20out%20of%20its%20sandbox%20or%20with%20certain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40858-an-app-may-be-able-to-access-contac-99748021</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40858%3A%20An%20app%20may%20be%20able%20to%20access%20Contacts%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5417-server-side-request-forgery-in-datae-d5f83fe0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5417%3A%20Server-Side%20Request%20Forgery%20in%20Dataease%20SQLbot&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6dea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43264-processing-a-maliciously-crafted-im-3fa309fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43264%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44286-an-attacker-with-physical-access-ca-66c9dde5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44286%3A%20An%20attacker%20with%20physical%20access%20can%20input%20keyboard%20events%20to%20apps%20running%20on%20a%20locked%20device%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44219-a-malicious-application-with-root-p-e93f0a1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44219%3A%20A%20malicious%20application%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43202-processing-a-file-may-lead-to-memor-9e453001</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43202%3A%20Processing%20a%20file%20may%20lead%20to%20memory%20corruption%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6de03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43238-an-app-may-be-able-to-cause-unexpec-cb9a7852</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43238%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34730-cwe-22-improper-limitation-of-a-pat-0c6f1997</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34730%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20copier-org%20copier&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34726-cwe-22-improper-limitation-of-a-pat-facde2ea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34726%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20copier-org%20copier&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43219-processing-a-maliciously-crafted-im-6b401487</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43219%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6de11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34581-cwe-288-authentication-bypass-using-897021e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34581%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-in-claude-code-emerges-days-2c1b21d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20in%20Claude%20Code%20Emerges%20Days%20After%20Source%20Leak&amp;severity=critical&amp;id=69ceb091e6bfc5ba1df36caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5414-improper-control-of-resource-identif-fcd854c5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5414%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Newgen%20OmniDocs&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34717-cwe-89-improper-neutralization-of-s-63776762</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34717%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=69ceb0a7e6bfc5ba1df381ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34715-cwe-113-improper-neutralization-of--5927154c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34715%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20vshakitskiy%20ewe&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34610-cwe-681-incorrect-conversion-betwee-3f84b0e0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34610%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20smuellerDD%20leancrypto&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34606-cwe-79-improper-neutralization-of-i-a9d7fe2f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34606%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5413-information-disclosure-in-newgen-omn-d0dfc533</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5413%3A%20Information%20Disclosure%20in%20Newgen%20OmniDocs&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34593-cwe-400-uncontrolled-resource-consu-4a24c715</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34593%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ash-project%20ash&amp;severity=high&amp;id=69cead0fe6bfc5ba1df180ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34591-cwe-22-improper-limitation-of-a-pat-b3677cbb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34591%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20python-poetry%20poetry&amp;severity=high&amp;id=69cead0fe6bfc5ba1df180a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34828-cwe-613-insufficient-session-expira-ea1d03d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34828%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20knadh%20listmonk&amp;severity=high&amp;id=69cead0fe6bfc5ba1df180b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34584-cwe-639-authorization-bypass-throug-6b5821ab</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34584%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20knadh%20listmonk&amp;severity=medium&amp;id=69cead0fe6bfc5ba1df1809d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5370-cross-site-scripting-in-krayin-larav-5380aa7b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5370%3A%20Cross%20Site%20Scripting%20in%20krayin%20laravel-crm&amp;severity=medium&amp;id=69cead0fe6bfc5ba1df180b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34590-cwe-918-server-side-request-forgery-eeb7f30d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34590%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=medium&amp;id=69cead0fe6bfc5ba1df180a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34577-cwe-918-server-side-request-forgery-909b76e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34577%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69cea98de6bfc5ba1defd63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blurred-lines-adtech-abuse-delivers-browser-hijack-17589a6b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blurred%20Lines%3A%20AdTech%20Abuse%20Delivers%20Browser%20Hijackers%20Through%20the%20Microsoft%20Store&amp;severity=medium&amp;id=69cea988e6bfc5ba1defd25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34576-cwe-918-server-side-request-forgery-b2391ee3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34576%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34124-cwe-120-buffer-copy-without-checkin-3bdb564c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34124%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34122-cwe-121-stack-based-buffer-overflow-417d8ccf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34122%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34121-cwe-287-improper-authentication-in--70bb008f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34121%3A%20CWE-287%20Improper%20Authentication%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34120-cwe-122-heap-based-buffer-overflow--ac6e1997</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34120%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34119-cwe-122-heap-based-buffer-overflow--623c460c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34119%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34118-cwe-122-heap-based-buffer-overflow--89dd0897</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34118%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5368-sql-injection-in-projectworlds-car-r-e18e0ca8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5368%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20Project&amp;severity=medium&amp;id=69cea98de6bfc5ba1defd647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35414-cwe-670-always-incorrect-control-fl-e4d4c1c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35414%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20OpenBSD%20OpenSSH&amp;severity=medium&amp;id=69cea98de6bfc5ba1defd642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33271-cwe-732-in-acronis-acronis-true-ima-83d3446e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33271%3A%20CWE-732%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69cea98ae6bfc5ba1defd456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27774-cwe-427-in-acronis-acronis-true-ima-f5d81d91</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27774%3A%20CWE-427%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69cea98ae6bfc5ba1defd450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28728-cwe-427-in-acronis-acronis-true-ima-d8de14ba</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28728%3A%20CWE-427%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69cea98ae6bfc5ba1defd453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5360-type-confusion-in-free5gc-b6640c32</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5360%3A%20Type%20Confusion%20in%20Free5GC&amp;severity=medium&amp;id=69cea282e6bfc5ba1ded3a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35388-cwe-420-unprotected-alternate-chann-db477462</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35388%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=69cea282e6bfc5ba1ded3a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35387-cwe-670-always-incorrect-control-fl-852141e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35387%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=69cea282e6bfc5ba1ded3a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5355-os-command-injection-in-trendnet-tew-5919378b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5355%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69cea282e6bfc5ba1ded3a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35386-cwe-696-incorrect-behavior-order-in-646d5041</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35386%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=69cea282e6bfc5ba1ded3a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35385-cwe-281-improper-preservation-of-pe-48960da7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35385%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20OpenBSD%20OpenSSH&amp;severity=high&amp;id=69cea98de6bfc5ba1defd64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5354-os-command-injection-in-trendnet-tew-c979efcf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5354%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69cec35ae6bfc5ba1dfb4cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35038-cwe-20-improper-input-validation-in-8b5fa3f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35038%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20SignalK%20signalk-server&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-rolls-out-darksword-exploit-protection-to-mo-bc92c3b6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Rolls%20Out%20DarkSword%20Exploit%20Protection%20to%20More%20Devices&amp;severity=medium&amp;id=69ce97f5e6bfc5ba1dea5515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5353-os-command-injection-in-trendnet-tew-9f4b903f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5353%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34083-cwe-346-origin-validation-error-in--ca18c573</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34083%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33951-cwe-284-improper-access-control-in--c9ec4f21</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33951%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33950-cwe-285-improper-authorization-in-s-42d339ad</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33950%3A%20CWE-285%3A%20Improper%20Authorization%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=69ce9803e6bfc5ba1dea5ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5352-os-command-injection-in-trendnet-tew-dda530c3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5352%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65114-cwe-444-inconsistent-interpretation-24bc4154</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65114%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=69ce9803e6bfc5ba1dea5ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58136-cwe-670-always-incorrect-control-fl-428e4957</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58136%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=69ce9803e6bfc5ba1dea5abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5351-os-command-injection-in-trendnet-tew-74359ae2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5351%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69ce9471e6bfc5ba1de9346c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5350-stack-based-buffer-overflow-in-trend-f5ac4019</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5350%3A%20Stack-based%20Buffer%20Overflow%20in%20Trendnet%20TEW-657BRM&amp;severity=high&amp;id=69ce8d6ee6bfc5ba1de64e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-talos-qilin-edr-killer-infection-chain-0d9ac91a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Talos%3A%20Qilin%20EDR%20killer%20infection%20chain&amp;severity=medium&amp;id=69cea988e6bfc5ba1defd24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5349-stack-based-buffer-overflow-in-trend-1ea24dda</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5349%3A%20Stack-based%20Buffer%20Overflow%20in%20Trendnet%20TEW-657BRM&amp;severity=high&amp;id=69ce8d6ee6bfc5ba1de64e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33746-cwe-287-improper-authentication-in--78811956</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33746%3A%20CWE-287%3A%20Improper%20Authentication%20in%20ConvoyPanel%20panel&amp;severity=critical&amp;id=69ce8d6ee6bfc5ba1de64e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33544-cwe-362-concurrent-execution-using--60e2872c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33544%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20steveiliop56%20tinyauth&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5346-server-side-request-forgery-in-huime-f002dac4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5346%3A%20Server-Side%20Request%20Forgery%20in%20huimeicloud%20hm_editor&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de33855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33641-cwe-78-improper-neutralization-of-s-214e76d2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33641%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69ce866ce6bfc5ba1de3360d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33533-cwe-942-permissive-cross-domain-pol-c2e5f1b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33533%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20nicolargo%20glances&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32871-cwe-918-server-side-request-forgery-0687fde2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32871%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PrefectHQ%20fastmcp&amp;severity=critical&amp;id=69ce866ce6bfc5ba1de335fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempts-to-exploit-exposed-vite-installs-cve-2025-827c1913</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempts%20to%20Exploit%20Exposed%20%22Vite%22%20Installs%20(CVE-2025-30208)%2C%20(Thu%2C%20Apr%202nd)&amp;severity=medium&amp;id=69ce82dde6bfc5ba1de1d284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34974-cwe-79-improper-neutralization-of-i-8de569da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34974%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de3384b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34973-cwe-943-improper-neutralization-of--0361ce91</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34973%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de33847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34729-cwe-79-improper-neutralization-of-i-ff1a0323</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34729%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce866ce6bfc5ba1de33616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34823-cwe-79-improper-neutralization-of-i-852fe0d8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de33843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34822-cwe-79-improper-neutralization-of-i-a1876c88</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34821-cwe-79-improper-neutralization-of-i-29b5152c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34821%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34820-cwe-79-improper-neutralization-of-i-bd60eac2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34819-cwe-79-improper-neutralization-of-i-8942aadd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34819%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34818-cwe-79-improper-neutralization-of-i-61c0ae4b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34818%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34817-cwe-79-improper-neutralization-of-i-1a0bd2b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34817%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34816-cwe-79-improper-neutralization-of-i-bf596a93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34816%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34815-cwe-79-improper-neutralization-of-i-02ff92e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34814-cwe-79-improper-neutralization-of-i-8d8fa93e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34813-cwe-79-improper-neutralization-of-i-a451dc1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34812-cwe-79-improper-neutralization-of-i-921e323c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34812%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34811-cwe-79-improper-neutralization-of-i-22dddd64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34811%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34810-cwe-79-improper-neutralization-of-i-3fae305a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3377f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34809-cwe-79-improper-neutralization-of-i-c8f386bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3377b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34808-cwe-79-improper-neutralization-of-i-5f915904</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34807-cwe-79-improper-neutralization-of-i-424a2944</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34806-cwe-79-improper-neutralization-of-i-da867409</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3376f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34805-cwe-79-improper-neutralization-of-i-d35ef2fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3376b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34804-cwe-79-improper-neutralization-of-i-4100c6c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34803-cwe-79-improper-neutralization-of-i-c5a9c48d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34803%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34802-cwe-79-improper-neutralization-of-i-9839a241</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34801-cwe-79-improper-neutralization-of-i-ef5dac74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34800-cwe-79-improper-neutralization-of-i-483fe746</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34799-cwe-79-improper-neutralization-of-i-efa3f37c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34798-cwe-79-improper-neutralization-of-i-cc36ce0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34798%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34797-improper-neutralization-of-special--ffdcbce6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34797%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34796-improper-neutralization-of-special--79152788</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34796%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34795-improper-neutralization-of-special--f96f1d2e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34795%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34794-improper-neutralization-of-special--d12f875a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34794%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34793-improper-neutralization-of-special--725bdc11</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34793%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34792-improper-neutralization-of-special--ef0a7278</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34792%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34791-improper-neutralization-of-special--46bc51d8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34791%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ce6bfc5ba1de3361e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34790-cwe-22-improper-limitation-of-a-pat-061f357f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34790%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ce6bfc5ba1de3361a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5344-path-traversal-in-textpattern-f83f8ea6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5344%3A%20Path%20Traversal%20in%20Textpattern&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de3384f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34728-cwe-22-improper-limitation-of-a-pat-020b73b9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34728%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32629-cwe-20-improper-input-validation-in-98592881</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32629%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce866ce6bfc5ba1de335f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31937-cwe-407-inefficient-algorithmic-com-baa4c414</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31937%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31935-cwe-400-uncontrolled-resource-consu-a13b1298</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31935%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5342-out-of-bounds-read-in-libraw-6fbc52cd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5342%3A%20Out-of-Bounds%20Read%20in%20LibRaw&amp;severity=medium&amp;id=69ce82f2e6bfc5ba1de1d95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31934-cwe-407-inefficient-algorithmic-com-b2d2eef9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31934%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5339-command-injection-in-tenda-g103-5eb39526</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5339%3A%20Command%20Injection%20in%20Tenda%20G103&amp;severity=medium&amp;id=69ce82f2e6bfc5ba1de1d94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31933-cwe-407-inefficient-algorithmic-com-ddce571b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31933%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31932-cwe-407-inefficient-algorithmic-com-f6b065e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31932%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26928-cwe-354-improper-validation-of-inte-78673667</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26928%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Krajowa%20Izba%20Rozliczeniowa%20SzafirHost&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26927-cwe-348-use-of-less-trusted-source--37ed82cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26927%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20Krajowa%20Izba%20Rozliczeniowa%20Szafir%20SDK%20Web&amp;severity=medium&amp;id=69ce7bd9e6bfc5ba1ddfe6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31931-cwe-476-null-pointer-dereference-in-9e69cdc4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31931%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5338-command-injection-in-tenda-g103-b6ed48f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5338%3A%20Command%20Injection%20in%20Tenda%20G103&amp;severity=medium&amp;id=69ce7bdce6bfc5ba1ddfe78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30867-cwe-617-reachable-assertion-in-emqx-785033b8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30867%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20emqx%20CocoaMQTT&amp;severity=medium&amp;id=69ce7bd9e6bfc5ba1ddfe6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35168-cwe-89-improper-neutralization-of-s-d5a2d66d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35168%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5334-sql-injection-in-itsourcecode-online-d20cf182</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5334%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69ce7bd9e6bfc5ba1ddfe6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28805-cwe-89-improper-neutralization-of-s-ce15ee60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28805%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29782-cwe-502-deserialization-of-untruste-274e1222</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29782%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5333-command-injection-in-defaultfuction--b5a483d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5333%3A%20Command%20Injection%20in%20DefaultFuction%20Content-Management-System&amp;severity=medium&amp;id=69ce74d2e6bfc5ba1ddd16c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2737-cwe-79-improper-neutralization-of-in-4a30897e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3692-cwe-78-improper-neutralization-of-sp-3f6ac794</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3692%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5332-cross-site-scripting-in-xiaopi-panel-53e8a11b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5332%3A%20Cross%20Site%20Scripting%20in%20Xiaopi%20Panel&amp;severity=medium&amp;id=69ce74d2e6bfc5ba1ddd16bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2701-cwe-434-unrestricted-upload-of-file--41b41e42</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2701%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Progress%20ShareFile%20Storage%20Zones%20Controller&amp;severity=critical&amp;id=69ce74d2e6bfc5ba1ddd16b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2699-cwe-698-execution-after-redirect-ear-4b64a3dc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2699%3A%20CWE-698%3A%20Execution%20After%20Redirect%20(EAR)%20in%20Progress%20ShareFile%20Storage%20Zones%20Controller&amp;severity=critical&amp;id=69ce74d2e6bfc5ba1ddd16b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5331-path-traversal-in-opencart-5c3ce989</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5331%3A%20Path%20Traversal%20in%20OpenCart&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34890-cwe-79-improper-neutralization-of-i-c66c3461</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mark%20O%E2%80%99Donnell%20MSTW%20League%20Manager&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5330-improper-access-controls-in-sourceco-8bbff6ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5330%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Best%20Courier%20Management%20System&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4636-incorrect-behavior-order-authorizati-0cc8b635</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4636%3A%20Incorrect%20Behavior%20Order%3A%20Authorization%20Before%20Parsing%20and%20Canonicalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4634-excessive-platform-resource-consumpt-e63a2b27</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4634%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4325-improper-isolation-or-compartmentali-bba41b6c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4325%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4282-improper-isolation-or-compartmentali-80ba9520</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4282%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3872-url-redirection-to-untrusted-site-op-f57a586d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3872%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-and-high-severity-vulnerabi-87970731</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20and%20High-Severity%20Vulnerabilities&amp;severity=critical&amp;id=69ce6339e6bfc5ba1dd727e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5328-sql-injection-in-shsuishang-modulith-d2e7674c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5328%3A%20SQL%20Injection%20in%20shsuishang%20modulithshop&amp;severity=medium&amp;id=69ce634be6bfc5ba1dd72c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/250000-affected-by-data-breach-at-nacogdoches-memo-e5c6e74a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=250%2C000%20Affected%20by%20Data%20Breach%20at%20Nacogdoches%20Memorial%20Hospital&amp;severity=medium&amp;id=69ce5c31e6bfc5ba1dd4377d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5327-command-injection-in-efforthye-fast--2095b670</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5327%3A%20Command%20Injection%20in%20efforthye%20fast-filesystem-mcp&amp;severity=medium&amp;id=69ce5c3fe6bfc5ba1dd43aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5326-authorization-bypass-in-sourcecodest-1e83e563</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5326%3A%20Authorization%20Bypass%20in%20SourceCodester%20Leave%20Application%20System&amp;severity=medium&amp;id=69ce4e22e6bfc5ba1dced15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mercor-hit-by-litellm-supply-chain-attack-7b85edb5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mercor%20Hit%20by%20LiteLLM%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69ce4a9ee6bfc5ba1dcd4fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32145-cwe-770-allocation-of-resources-wit-10bb908a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32145%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20gleam-wisp%20wisp&amp;severity=high&amp;id=69ce471be6bfc5ba1dcbccc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-crystalx-rat-emerges-1eb51c44</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20CrystalX%20RAT%20Emerges&amp;severity=medium&amp;id=69ce3c8de6bfc5ba1dc7d5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5246-authorization-bypass-in-cesanta-mong-ae6eeaf9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5246%3A%20Authorization%20Bypass%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ce3c9ae6bfc5ba1dc7d953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5245-stack-based-buffer-overflow-in-cesan-37061058</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5245%3A%20Stack-based%20Buffer%20Overflow%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ce82f2e6bfc5ba1de1d976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33617-cwe-497-exposure-of-sensitive-syste-9798356f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33617%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33616-cwe-89-improper-neutralization-of-s-b558174c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33616%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33615-cwe-89-improper-neutralization-of-s-cc89f560</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33615%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=critical&amp;id=69ce82f2e6bfc5ba1de1d972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33614-cwe-89-improper-neutralization-of-s-efad6d82</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33614%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33613-cwe-78-improper-neutralization-of-s-0a03d240</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33613%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69ce7bdce6bfc5ba1ddfe79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29136-cwe-79-improper-neutralization-of-i-7ca90c9a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29136%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-Site%20Scripting&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29139-cwe-288-authentication-bypass-using-94a56236</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29139%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29144-cwe-20-improper-input-validation-in-ad573e10</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29144%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29143-cwe-20-improper-input-validation-in-1fea5cad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29143%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0634-cwe-88-improper-neutralization-of-ar-70949bd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0634%3A%20CWE-88%20Improper%20neutralization%20of%20argument%20delimiters%20in%20a%20command%20(&apos;argument%20injection&apos;)%20in%20TECNO%20Mobile%20TECNO%20Pova7%20Pro%205G&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc4189f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29138-cwe-90-improper-neutralization-of-s-69352f09</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29138%3A%20CWE-90%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29131-cwe-90-improper-neutralization-of-s-69785704</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29131%3A%20CWE-90%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29142-cwe-325-missing-cryptographic-step--10414bc1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29142%3A%20CWE-325%20Missing%20Cryptographic%20Step%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29137-cwe-20-improper-input-validation-in-7d8ef09b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29137%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29141-cwe-20-improper-input-validation-in-35e12996</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29141%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29135-cwe-20-improper-input-validation-in-531384d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29135%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29134-cwe-807-reliance-on-untrusted-input-0711a551</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29134%3A%20CWE-807%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29140-cwe-295-improper-certificate-valida-1bda9135</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29140%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce2afae6bfc5ba1dc065e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29133-cwe-20-improper-input-validation-in-6d190327</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29133%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29132-cwe-306-missing-authentication-for--afdaff4e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29132%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5244-heap-based-buffer-overflow-in-cesant-a31023f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5244%3A%20Heap-based%20Buffer%20Overflow%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ce74d2e6bfc5ba1ddd16d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5032-cwe-200-exposure-of-sensitive-inform-e8a1194d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5032%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20boldgrid%20W3%20Total%20Cache&amp;severity=high&amp;id=69ce206de6bfc5ba1dba1550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0686-cwe-918-server-side-request-forgery--ae91b1ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0686%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pfefferle%20Webmention&amp;severity=high&amp;id=69ce206de6bfc5ba1dba1543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0688-cwe-918-server-side-request-forgery--d72e0c85</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0688%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pfefferle%20Webmention&amp;severity=medium&amp;id=69ce206de6bfc5ba1dba154a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5325-cross-site-scripting-in-sourcecodest-0e3910bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5325%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Simple%20Customer%20Relationship%20Management%20System&amp;severity=medium&amp;id=69ce1964e6bfc5ba1db608a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5323-server-side-request-forgery-in-priya-eb225e7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5323%3A%20Server-Side%20Request%20Forgery%20in%20priyankark%20a11y-mcp&amp;severity=medium&amp;id=69ce125de6bfc5ba1db26106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1540-cwe-94-improper-control-of-generatio-c59967f8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1540%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Spam%20Protect%20for%20Contact%20Form%207&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5322-sql-injection-in-alejandroarciniegas-379e6975</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5322%3A%20SQL%20Injection%20in%20AlejandroArciniegas%20mcp-data-vis&amp;severity=medium&amp;id=69ce044ee6bfc5ba1dac2508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4347-cwe-22-improper-limitation-of-a-path-17e5576b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4347%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20inc2734%20MW%20WP%20Form&amp;severity=high&amp;id=69ce044ee6bfc5ba1dac2503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5321-permissive-cross-domain-policy-with--484deffd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5321%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69cdf9c0e6bfc5ba1d93594a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5320-missing-authentication-in-vanna-ai-v-27b068c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5320%3A%20Missing%20Authentication%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69cdef39e6bfc5ba1d8a4eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5319-cross-site-scripting-in-itsourcecode-b7657577</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5319%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69cde4a8e6bfc5ba1d70ae32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5318-out-of-bounds-write-in-libraw-d90882c4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5318%3A%20Out-of-bounds%20Write%20in%20LibRaw&amp;severity=medium&amp;id=69cdd316e6bfc5ba1d496d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5317-out-of-bounds-write-in-nothings-stb-3bd2dfb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5317%3A%20Out-of-bounds%20Write%20in%20Nothings%20stb&amp;severity=medium&amp;id=69ce74d5e6bfc5ba1ddd1777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1243-vulnerability-in-ibm-content-navigat-a8af920e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1243%3A%20Vulnerability%20in%20IBM%20Content%20Navigator&amp;severity=medium&amp;id=69ce7bdce6bfc5ba1ddfe79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5316-allocation-of-resources-in-nothings--e599e034</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5316%3A%20Allocation%20of%20Resources%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cdb370e6bfc5ba1d0f636a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-03-8dc929ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-03&amp;severity=medium&amp;id=69d03bf90a160ebd92602460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-02-5aedb171</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-02&amp;severity=medium&amp;id=69cfc4810a160ebd9223393f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-02-f161eb17</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-02&amp;severity=medium&amp;id=69cf04e8e6bfc5ba1d090aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30252-na-03589a2b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30252%3A%20n%2Fa&amp;severity=medium&amp;id=69cef3d9e6bfc5ba1d047235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30251-na-e36bdc8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30251%3A%20n%2Fa&amp;severity=medium&amp;id=69cef356e6bfc5ba1d045060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26895-na-47bf4a92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26895%3A%20n%2Fa&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30603-na-ae538424</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30603%3A%20n%2Fa&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34877-na-4fa5c075</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34877%3A%20n%2Fa&amp;severity=critical&amp;id=69cea282e6bfc5ba1ded3a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25212-na-87cac814</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25212%3A%20n%2Fa&amp;severity=critical&amp;id=69ce9803e6bfc5ba1dea5ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30332-na-a0fa4c0e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30332%3A%20n%2Fa&amp;severity=high&amp;id=69ce9471e6bfc5ba1de93467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34876-na-d655599d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34876%3A%20n%2Fa&amp;severity=high&amp;id=69ce8d6ee6bfc5ba1de64e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21767-cwe-306-missing-authentication-for--f30553f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21767%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20HCLSoftware%20BigFix%20Platform&amp;severity=medium&amp;id=69cdb370e6bfc5ba1d0f6370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21765-cwe-732-incorrect-permission-assign-d20224ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21765%3A%20CWE-732%20%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20HCLSoftware%20BigFix%20Platform&amp;severity=high&amp;id=69cdafeee6bfc5ba1d0e2130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5315-out-of-bounds-read-in-nothings-stb-e375c1ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5315%3A%20Out-of-Bounds%20Read%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cdac8de6bfc5ba1d0c8246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66487-cwe-770-allocation-of-resources-wit-66913c96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66487%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Aspera%20Shares&amp;severity=low&amp;id=69cda8e6e6bfc5ba1d0b5794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66486-cwe-80-improper-neutralization-of-s-dec075eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66486%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b5791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66485-cwe-644-improper-neutralization-of--f6e8158d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66485%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b578e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32929-out-of-bounds-read-in-fuji-electric-599bf79b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32929%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b57a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32928-stack-based-buffer-overflow-in-fuji-f84a5b5b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32928%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b57a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66484-vulnerability-in-ibm-aspera-shares-ad9e1822</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66484%3A%20Vulnerability%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b578b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32927-out-of-bounds-read-in-fuji-electric-a25c3241</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32927%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b579f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32926-out-of-bounds-read-in-fuji-electric-9a1a91dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32926%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b579b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32925-stack-based-buffer-overflow-in-fuji-6dac82d2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32925%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b5797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66483-cwe-613-insufficient-session-expira-ee16a507</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66483%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b5788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36375-cwe-352-cross-site-request-forgery--28f4e6e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36375%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20DataPower%20Gateway%2010.6CD&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5314-out-of-bounds-read-in-nothings-stb-bdde5681</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5314%3A%20Out-of-Bounds%20Read%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cd9ad5e6bfc5ba1d063678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34572-cwe-284-improper-access-control-in--63f77787</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34572%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69cd93efe6bfc5ba1d0036ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3987-cwe-22-improper-limitation-of-a-path-318a1a63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3987%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69cd93efe6bfc5ba1d0036f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34571-cwe-79-improper-neutralization-of-i-055c896a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34571%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93efe6bfc5ba1d0036ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34570-cwe-284-improper-access-control-in--917f2c32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34570%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69cd93ece6bfc5ba1d00363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5313-denial-of-service-in-nothings-stb-3f5b6ef3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5313%3A%20Denial%20of%20Service%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cd93efe6bfc5ba1d0036f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34569-cwe-79-improper-neutralization-of-i-ebe55431</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34569%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34568-cwe-79-improper-neutralization-of-i-ae5d4369</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34568%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34567-cwe-79-improper-neutralization-of-i-5c12fe3e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34567%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00362e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34566-cwe-79-improper-neutralization-of-i-937ed996</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34566%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00362a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34565-cwe-79-improper-neutralization-of-i-f662be7e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34565%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34564-cwe-79-improper-neutralization-of-i-8f6e6ad8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34564%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34563-cwe-79-improper-neutralization-of-i-e0cd90ea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34563%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00361d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34562-cwe-79-improper-neutralization-of-i-b2a73cac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34562%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69cd93ece6bfc5ba1d003619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34561-cwe-79-improper-neutralization-of-i-b2df19ae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34561%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69cd93ece6bfc5ba1d003615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34560-cwe-79-improper-neutralization-of-i-f9f46ebc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34560%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69ce7bdce6bfc5ba1ddfe7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34559-cwe-79-improper-neutralization-of-i-7054532f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34559%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cec35ae6bfc5ba1dfb4d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2475-cwe-601-url-redirection-to-untrusted-81d4cc07</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2475%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=low&amp;id=69cd8944e6bfc5ba1dfc32df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34543-cwe-908-use-of-uninitialized-resour-86e5cef9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34543%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69cd8944e6bfc5ba1dfc32ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34544-cwe-190-integer-overflow-or-wraparo-efaa8782</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34544%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69cd8944e6bfc5ba1dfc32ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4820-cwe-614-sensitive-cookie-in-https-se-fb43e146</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4820%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20IBM%20Maximo%20Application%20Suite&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34545-cwe-122-heap-based-buffer-overflow--18796f81</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34545%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69cd8944e6bfc5ba1dfc32f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36373-cwe-497-exposure-of-sensitive-syste-8d6a2629</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36373%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20DataPower%20Gateway%2010.6CD&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13916-cwe-327-use-of-a-broken-or-risky-cr-094ead12</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13916%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1491-cwe-444-inconsistent-interpretation--f859d77e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1491%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34531-cwe-287-improper-authentication-in--374da8b6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34531%3A%20CWE-287%3A%20Improper%20Authentication%20in%20miguelgrinberg%20Flask-HTTPAuth&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2862-cwe-444-inconsistent-interpretation--f24cc938</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2862%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1345-cwe-78-improper-neutralization-of-sp-ed530469</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1345%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69cd85bee6bfc5ba1df9d438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4101-cwe-287-improper-authentication-in-i-7c1be3e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4101%3A%20CWE-287%20Improper%20Authentication%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69cd85bee6bfc5ba1df9d44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4364-cwe-79-improper-neutralization-of-in-1bd7f249</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69cd85bee6bfc5ba1df9d44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5312-improper-access-controls-in-d-link-d-cb27ea75</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5312%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69cd85bee6bfc5ba1df9d451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34525-cwe-20-improper-input-validation-in-e9b20bba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34525%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69cd85bee6bfc5ba1df9d445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34520-cwe-113-improper-neutralization-of--111721c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34520%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cd85bee6bfc5ba1df9d440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34519-cwe-113-improper-neutralization-of--70b3077a</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34519%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cd85bee6bfc5ba1df9d43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34518-cwe-200-exposure-of-sensitive-infor-10190518</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34518%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69ce7bdce6bfc5ba1ddfe7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34517-cwe-770-allocation-of-resources-wit-505e0ade</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34517%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34516-cwe-770-allocation-of-resources-wit-8668224c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34516%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34515-cwe-36-absolute-path-traversal-in-a-c7316820</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34515%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69ce9471e6bfc5ba1de93472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34514-cwe-113-improper-neutralization-of--4f1fe682</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34514%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69ce7bdce6bfc5ba1ddfe7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-script-that-gets-rid-of-ads-wed-apr-1st-503f23d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Script%20That%20Gets%20Rid%20of%20ADS%2C%20(Wed%2C%20Apr%201st)&amp;severity=medium&amp;id=69ccf91de6bfc5ba1dc22852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22815-cwe-400-uncontrolled-resource-consu-c8acea99</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22815%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34513-cwe-770-allocation-of-resources-wit-a8a2860e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34513%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34456-cwe-284-improper-access-control-in--99ed6793</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34456%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20reviactyl%20panel&amp;severity=critical&amp;id=69cd7b33e6bfc5ba1df4980f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34455-cwe-89-improper-neutralization-of-s-b655e030</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34455%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HiEventsDev%20Hi.Events&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df49809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34750-cwe-22-improper-limitation-of-a-pat-b466bdec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34750%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20payloadcms%20payload&amp;severity=medium&amp;id=69cd7b33e6bfc5ba1df49823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34749-cwe-352-cross-site-request-forgery--8eac2e30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34749%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20payloadcms%20payload&amp;severity=medium&amp;id=69cd7b33e6bfc5ba1df4981f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34748-cwe-79-improper-neutralization-of-i-edb944a9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34748%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20payloadcms%20payload&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df4981c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34747-cwe-89-improper-neutralization-of-s-6146081e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34747%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20payloadcms%20payload&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df49818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5311-improper-access-controls-in-d-link-d-528d6a16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5311%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69cd7b33e6bfc5ba1df49826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34746-cwe-918-server-side-request-forgery-27aa2220</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34746%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20payloadcms%20payload&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df49814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stranger-strings-yurei-ransomware-operator-toolkit-b88717bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stranger%20Strings%3A%20Yurei%20Ransomware%20Operator%20Toolkit%20Exposed&amp;severity=medium&amp;id=69cd7428e6bfc5ba1def5b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35000-cwe-184-incomplete-list-of-disallow-5d5e7007</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35000%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20dgtlmoon%20ChangeDetection.io&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9caef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5199-cwe-639-authorization-bypass-through-f024480b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5199%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Temporal%20Technologies%2C%20Inc.%20temporal&amp;severity=low&amp;id=69cd5f13e6bfc5ba1de6e545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34751-cwe-472-external-control-of-assumed-7a45aec3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34751%3A%20CWE-472%3A%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20payloadcms%20payload&amp;severity=critical&amp;id=69cd5f13e6bfc5ba1de6e53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34397-cwe-269-improper-privilege-manageme-ac0f8ecc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34397%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20himmelblau-idm%20himmelblau&amp;severity=medium&amp;id=69cd7224e6bfc5ba1dee83e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34376-cwe-863-incorrect-authorization-in--58a5425c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34376%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20mrmn2%20PdfDing&amp;severity=high&amp;id=69cd5809e6bfc5ba1de493d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34236-cwe-331-insufficient-entropy-in-aut-5b5ef4db</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34236%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20auth0%20auth0-PHP&amp;severity=high&amp;id=69cd5809e6bfc5ba1de493cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34159-cwe-119-improper-restriction-of-ope-71d608e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34159%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ggml-org%20llama.cpp&amp;severity=critical&amp;id=69cd7224e6bfc5ba1dee83e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34076-cwe-918-server-side-request-forgery-66475961</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34076%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20clerk%20javascript&amp;severity=high&amp;id=69cd6623e6bfc5ba1de9cbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34072-cwe-287-improper-authentication-in--c977ac52</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34072%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fccview%20cronmaster&amp;severity=high&amp;id=69cd5f16e6bfc5ba1de6e60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20090-improper-neutralization-of-input-du-c35f3078</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20090%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20089-improper-neutralization-of-input-du-ca0d51f4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20089%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20087-improper-neutralization-of-input-du-35f27bdb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20087%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20088-improper-neutralization-of-input-du-02bcc2a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5310-use-of-hard-coded-cryptographic-key--f3646b0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5310%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=low&amp;id=69cd5f16e6bfc5ba1de6e60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20160-exposure-of-resource-to-wrong-spher-3290e5d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20160%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Cisco%20Cisco%20Smart%20Software%20Manager%20On-Prem&amp;severity=critical&amp;id=69cd6621e6bfc5ba1de9cb54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20174-improper-limitation-of-a-pathname-t-f29065ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20174%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=69cd6621e6bfc5ba1de9cb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20151-insertion-of-sensitive-information--d4761117</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20151%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Cisco%20Cisco%20Smart%20Software%20Manager%20On-Prem&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20155-missing-authorization-in-cisco-cisc-f689f549</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20155%3A%20Missing%20Authorization%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20096-improper-neutralization-of-special--255348b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20096%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd6621e6bfc5ba1de9cb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20097-out-of-bounds-write-in-cisco-cisco--549f74cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20097%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Standalone)&amp;severity=medium&amp;id=69cd6621e6bfc5ba1de9cb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20094-improper-neutralization-of-special--15156e9c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20094%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Standalone)&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9cb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20095-improper-neutralization-of-special--1a61b766</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20095%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9cb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20093-improper-input-validation-in-cisco--4922ce7a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20093%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=critical&amp;id=69cd661ee6bfc5ba1de9cafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20085-improper-neutralization-of-input-du-1da11352</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20085%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9cafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20041-server-side-request-forgery-ssrf-in-eabba642</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20041%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9caf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20042-improper-certificate-validation-in--1a05cd72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20042%3A%20Improper%20Certificate%20Validation%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9caf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33990-cwe-918-server-side-request-forgery-02c9c2d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33990%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20docker%20model-runner&amp;severity=medium&amp;id=69cd7224e6bfc5ba1dee83ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33978-cwe-79-improper-neutralization-of-i-39c40437</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33978%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20notesnook&amp;severity=medium&amp;id=69cd7224e6bfc5ba1dee83ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35099-cwe-362-concurrent-execution-using--a2f5c300</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35099%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Lakeside%20Software%20SysTrack%20Agent&amp;severity=high&amp;id=69cd69c0e6bfc5ba1deb926c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toy-giant-hasbro-hit-by-cyberattack-6970d5a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Toy%20Giant%20Hasbro%20Hit%20by%20Cyberattack&amp;severity=medium&amp;id=69cd3be9e6bfc5ba1ddce51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4989-cwe-918-server-side-request-forgery--2822c454</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4989%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crystalx-rat-a-trojan-for-pranks-remote-access-and-e7339edb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrystalX%20RAT%3A%20a%20Trojan%20for%20pranks%2C%20remote%20access%2C%20and%20cryptocurrency%20theft%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69cd34fae6bfc5ba1dda8bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-deepload-malware-dropped-in-clickfix-attacks-bb581dea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20DeepLoad%20Malware%20Dropped%20in%20ClickFix%20Attacks&amp;severity=medium&amp;id=69cd34e1e6bfc5ba1dda7e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5175-cwe-862-in-devolutions-server-45e43dc2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5175%3A%20CWE-862%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4925-cwe-862-in-devolutions-server-8fd83451</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4925%3A%20CWE-862%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4927-cwe-201-insertion-of-sensitive-infor-7cf72305</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4927%3A%20CWE-201%20Insertion%20of%20sensitive%20information%20into%20sent%20data%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4924-cwe-1390-in-devolutions-server-d7d2eda8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4924%3A%20CWE-1390%20in%20Devolutions%20Server&amp;severity=high&amp;id=69cd3867e6bfc5ba1ddc2e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4828-cwe-1390-in-devolutions-server-596962b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4828%3A%20CWE-1390%20in%20Devolutions%20Server&amp;severity=high&amp;id=69cd3867e6bfc5ba1ddc2e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4829-cwe-287-in-devolutions-server-b2e61b41</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4829%3A%20CWE-287%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13535-cwe-79-improper-neutralization-of-i-e707a4a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13535%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%2080%2B%20Elementor%20Widgets%2C%204%20000%2B%20Elementor%20Templates%2C%20WooCommerce%2C%20Mega%20Menu%2C%20Popup%20Builder&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-zero-day-among-21-vulnerabilities-patche-54fdc91f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20Zero-Day%20Among%2021%20Vulnerabilities%20Patched%20in%20Chrome&amp;severity=medium&amp;id=69cd2dd9e6bfc5ba1dd7270c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-data-security-risks-from-china-made-m-6fc1b458</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Data%20Security%20Risks%20From%20China-Made%20Mobile%20Apps&amp;severity=medium&amp;id=69cd26d2e6bfc5ba1dd450e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35094-expired-pointer-dereference-in-red--f22d2f86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35094%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69cd26f5e6bfc5ba1dd45f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35093-improper-control-of-generation-of-c-7b21388e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35093%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5271-vulnerability-in-python-software-fou-bed2426b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5271%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20pymanager&amp;severity=medium&amp;id=69cd26f5e6bfc5ba1dd45f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34430-cwe-184-incomplete-list-of-disallow-3e65c84f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34430%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Bytedance%20Inc.%20DeerFlow&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34999-cwe-306-missing-authentication-for--59ead885</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34999%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Volcengine%20OpenViking&amp;severity=medium&amp;id=69cd26f5e6bfc5ba1dd45f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-charges-uranium-crypto-exchange-hacker-59d7b087</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Charges%20Uranium%20Crypto%20Exchange%20Hacker&amp;severity=medium&amp;id=69cd1fc9e6bfc5ba1dd1955e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-nexus-threat-actor-compromises-widely--67b5ee00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Nexus%20Threat%20Actor%20Compromises%20Widely%20Used%20Axios%20NPM%20Package%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69cd70a4e6bfc5ba1ded84d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpacking-augmented-marauders-multi-pronged-casban-0e495343</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpacking%20Augmented%20Marauder%E2%80%99s%20Multi-Pronged%20Casbaneiro%20Campaigns&amp;severity=medium&amp;id=69cd3864e6bfc5ba1ddc2cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-axios-supply-chain-compromise-one-rat-t-38259c89</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20Axios%20supply%20chain%20compromise%20-%20one%20RAT%20to%20rule%20them%20all&amp;severity=medium&amp;id=69cd70a4e6bfc5ba1ded84c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35092-integer-overflow-or-wraparound-in-r-1580859a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35092%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35091-incorrect-check-of-function-return--9c3dab2b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35091%3A%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/latest-xloader-obfuscation-methods-and-network-pro-08dbc5b8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Latest%20Xloader%20Obfuscation%20Methods%20and%20Network%20Protocol&amp;severity=medium&amp;id=69cd7428e6bfc5ba1def5b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-inbox-to-intrusion-multistage-remcos-rat-and--59cdc1b2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Inbox%20to%20Intrusion%3A%20Multi%E2%80%91Stage%20Remcos%20RAT%20and%20C2%E2%80%91Delivered%20Payloads%20in%20Network&amp;severity=medium&amp;id=69cd3864e6bfc5ba1ddc2ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/axios-front-end-library-npm-supply-chain-poisoning-9eef9940</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Axios%20Front-End%20Library%20npm%20Supply%20Chain%20Poisoning%20Alert&amp;severity=medium&amp;id=69cd34f2e6bfc5ba1dda89f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3877-cwe-79-improper-neutralization-of-in-2906697a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20VertiGIS%20VertiGIS%20FM&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0522-cwe-610-externally-controlled-refere-a44134fc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0522%3A%20CWE-610%20Externally%20Controlled%20Reference%20to%20a%20Resource%20in%20Another%20Sphere%20in%20VertiGIS%20VertiGIS%20FM&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-005-first-con-187893ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20005%20-%20First%20Confirmed%20Victim%20Disclosure%2C%20Post-Compromise%20Cloud%20Enumeration%20Documented%2C%20and%20Axios%20Attribution%20Narrows%2C%20(Wed%2C%20Apr%201st)&amp;severity=medium&amp;id=69cd1c4fe6bfc5ba1dcfe81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22768-cwe-732-incorrect-permission-assign-6516d813</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22768%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20AppSync&amp;severity=high&amp;id=69cd11c0e6bfc5ba1dcba0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22767-cwe-61-unix-symbolic-link-symlink-f-7f0a5250</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22767%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Dell%20AppSync&amp;severity=high&amp;id=69cd11c0e6bfc5ba1dcba0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25601-cwe-798-use-of-hard-coded-credentia-f6a1fb4a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25601%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Metronik%20d.o.o.%20MEPIS%20RM&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24096-cwe-280-improper-handling-of-insuff-7723b1ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24096%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69ccf599e6bfc5ba1dc10444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0932-cwe-918-server-side-request-forgery--a1ba07b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0932%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=69ccf599e6bfc5ba1dc10440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1879-unrestricted-upload-in-harvard-unive-0364b373</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1879%3A%20Unrestricted%20Upload%20in%20Harvard%20University%20IQSS%20Dataverse&amp;severity=medium&amp;id=69ccee90e6bfc5ba1dbeb780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53828-cwe-228-in-ericsson-packet-core-con-8d45fc72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53828%3A%20CWE-228%20in%20Ericsson%20Packet%20Core%20Controller%20(PCC)&amp;severity=medium&amp;id=69ccee90e6bfc5ba1dbeb77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21630-cwe-89-improper-neutralization-of-s-f9ffd8d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21630%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc6714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23898-cwe-73-destructive-file-deletion-an-4b16a48a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23898%3A%20CWE-73%20Destructive%20File%20Deletion%20and%20Potential%20System%20Compromise%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=high&amp;id=69cce78be6bfc5ba1dbc671d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21629-cwe-284-improper-access-control-in--ffadd50c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21629%3A%20CWE-284%20Improper%20Access%20Control%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc670f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23899-cwe-284-improper-access-control-in--4257ef69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23899%3A%20CWE-284%20Improper%20Access%20Control%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=high&amp;id=69cce78be6bfc5ba1dbc6720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21631-cwe-79-improper-neutralization-of-i-92d153db</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21631%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc6717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21632-cwe-79-improper-neutralization-of-i-cb31d573</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc671a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34889-cwe-79-improper-neutralization-of-i-fc72ebe4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=69cce0a2e6bfc5ba1db4f246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/axios-npm-package-breached-in-north-korean-supply--46479264</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Axios%20NPM%20Package%20Breached%20in%20North%20Korean%20Supply%20Chain%20Attack&amp;severity=low&amp;id=69ccdcfde6bfc5ba1daf8eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5261-unrestricted-upload-in-shandong-hote-e305c3a8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5261%3A%20Unrestricted%20Upload%20in%20Shandong%20Hoteam%20InforCenter%20PLM&amp;severity=medium&amp;id=69ccd979e6bfc5ba1dae0250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4370-cwe-295-improper-certificate-validat-9bb2b3b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4370%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Canonical%20Juju&amp;severity=critical&amp;id=69ccd979e6bfc5ba1dae024d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-addresses-vertex-security-issues-after-rese-8ede5828</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Addresses%20Vertex%20Security%20Issues%20After%20Researchers%20Weaponize%20AI%20Agents&amp;severity=medium&amp;id=69ccceede6bfc5ba1da7e8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28265-cwe-35-path-traversal-in-dell-power-95e5b4b4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28265%3A%20CWE-35%3A%20Path%20Traversal%20in%20Dell%20PowerStore&amp;severity=medium&amp;id=69ccd270e6bfc5ba1daa6537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5259-server-side-request-forgery-in-autoh-263f25bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5259%3A%20Server-Side%20Request%20Forgery%20in%20AutohomeCorp%20frostmourne&amp;severity=medium&amp;id=69ccd270e6bfc5ba1daa653a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27101-cwe-22-improper-limitation-of-a-pat-91a08efa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27101%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20Path%20Traversal%20in%20Dell%20Secure%20Connect%20Gateway&amp;severity=medium&amp;id=69ccd270e6bfc5ba1daa6534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5258-path-traversal-in-sanster-iopaint-674463db</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5258%3A%20Path%20Traversal%20in%20Sanster%20IOPaint&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-laughing-rat-crystalx-combines-spyware-stealer-a-5579cd12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20laughing%20RAT%3A%20CrystalX%20combines%20spyware%3B%20stealer%3B%20and%20prankware%20features&amp;severity=medium&amp;id=69ccf214e6bfc5ba1dbff3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5257-sql-injection-in-code-projects-simpl-d962b8c6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5257%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69ccb9d5e6bfc5ba1da0d491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5256-sql-injection-in-code-projects-simpl-cd4b413e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5256%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69ccb9d5e6bfc5ba1da0d48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2696-cwe-200-information-exposure-in-expo-c6c7420f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2696%3A%20CWE-200%20Information%20Exposure%20in%20Export%20All%20URLs&amp;severity=medium&amp;id=69ccb9d5e6bfc5ba1da0d487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15484-cwe-287-improper-authentication-in--ce94ec07</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15484%3A%20CWE-287%20Improper%20Authentication%20in%20Order%20Notification%20for%20WooCommerce&amp;severity=critical&amp;id=69ccb9d5e6bfc5ba1da0d484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5255-cross-site-scripting-in-code-project-b81dbea2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5255%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69ccaf49e6bfc5ba1d9c9961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5292-out-of-bounds-read-in-google-chrome-b15ff9cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5292%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c4e6bfc5ba1d993171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5291-inappropriate-implementation-in-goog-a4be30b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5291%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c4e6bfc5ba1d99316d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5290-use-after-free-in-google-chrome-83e792f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5290%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69cca4c2e6bfc5ba1d9930fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5289-use-after-free-in-google-chrome-b3278917</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5289%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69cca4c2e6bfc5ba1d9930fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5288-use-after-free-in-google-chrome-8b1fddc3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5288%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69cca4c2e6bfc5ba1d9930f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5287-use-after-free-in-google-chrome-0142d8c0</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5287%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5273-use-after-free-in-google-chrome-9e1d72d0</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5273%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c0e6bfc5ba1d993049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5286-use-after-free-in-google-chrome-34aabe80</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5286%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5285-use-after-free-in-google-chrome-1cf97b5a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5285%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5284-use-after-free-in-google-chrome-08b3d1bf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5284%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5283-inappropriate-implementation-in-goog-8cbcc8fc</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5283%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c2e6bfc5ba1d9930e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5272-heap-buffer-overflow-in-google-chrom-fc402e90</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5272%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5282-out-of-bounds-read-in-google-chrome-c48d1b96</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5282%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5281-use-after-free-in-google-chrome-a3c95c50</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5281%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5280-use-after-free-in-google-chrome-f1defb35</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5280%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5279-object-corruption-in-google-chrome-1e2351f0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5279%3A%20Object%20corruption%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5278-use-after-free-in-google-chrome-795bf565</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5278%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d99305d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5277-integer-overflow-in-google-chrome-895e8161</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5277%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5276-insufficient-policy-enforcement-in-g-312e0a64</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5276%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c0e6bfc5ba1d993055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5275-heap-buffer-overflow-in-google-chrom-6d922d63</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5275%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5274-integer-overflow-in-google-chrome-7a8b6e09</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5274%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d99304d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5254-cross-site-scripting-in-welovemedia--c4c3c5aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5254%3A%20Cross%20Site%20Scripting%20in%20welovemedia%20FFmate&amp;severity=medium&amp;id=69cca4c0e6bfc5ba1d99303e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5253-cross-site-scripting-in-bufanyun-hot-0cbc0137</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5253%3A%20Cross%20Site%20Scripting%20in%20bufanyun%20HotGo&amp;severity=medium&amp;id=69cc96ade6bfc5ba1d9413ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5252-cross-site-scripting-in-z-9527-admin-c0179b5d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5252%3A%20Cross%20Site%20Scripting%20in%20z-9527%20admin&amp;severity=medium&amp;id=69cc96ade6bfc5ba1d9413a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5251-dynamically-determined-object-attrib-a89ddae1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5251%3A%20Dynamically-Determined%20Object%20Attributes%20in%20z-9527%20admin&amp;severity=medium&amp;id=69cc889de6bfc5ba1d8929e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3774-cwe-200-exposure-of-sensitive-inform-09cde688</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3774%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d854111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3775-cwe-427-dll-hijacking-in-foxit-softw-ab6d3970</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3775%3A%20CWE-427%3A%20DLL%20Hijacking%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d854114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3776-cwe-476-null-pointer-dereference-in--9dd0d0dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3776%3A%20CWE-476%20NULL%20pointer%20dereference%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d854117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3780-cwe-426-untrusted-search-path-in-fox-e264b801</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3780%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d854123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3778-cwe-674-uncontrolled-recursion-in-fo-3d872c30</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3778%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d85411d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3779-cwe-416-use-after-free-in-foxit-soft-0f3310c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3779%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d854120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3777-cwe-416-use-after-free-in-foxit-soft-29267dd3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3777%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d85411a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4947-cwe-284-improper-access-control-in-f-dce1d63f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4947%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Foxit%20Software%20Inc.%20na1.foxitesign.foxit.com&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d85412d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5249-cross-site-scripting-in-gougucms-9a138dfd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5249%3A%20Cross%20Site%20Scripting%20in%20gougucms&amp;severity=medium&amp;id=69cc7a90e6bfc5ba1d854169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3831-cwe-862-missing-authorization-in-crm-eaf2a059</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3831%3A%20CWE-862%20Missing%20Authorization%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d854126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4374-cwe-611-improper-restriction-of-xml--8bd180bb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4374%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d85412a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2394-cwe-126-buffer-over-read-in-rti-conn-3e28938c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2394%3A%20CWE-126%20Buffer%20Over-read%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=69cc7001e6bfc5ba1d749755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5248-dynamically-determined-object-attrib-f8b4af24</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5248%3A%20Dynamically-Determined%20Object%20Attributes%20in%20gougucms&amp;severity=medium&amp;id=69cc7001e6bfc5ba1d749758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13855-cwe-89-improper-neutralization-of-s-df457862</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13855%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Storage%20Protect%20Server&amp;severity=high&amp;id=69cc7001e6bfc5ba1d749752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34873-na-4c47360d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34873%3A%20n%2Fa&amp;severity=critical&amp;id=69cec35ce6bfc5ba1dfb4d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-01-7d540e8f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-01&amp;severity=medium&amp;id=69cdb368e6bfc5ba1d0f530e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66442-na-f8572be5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66442%3A%20n%2Fa&amp;severity=medium&amp;id=69cd77b1e6bfc5ba1df19f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30291-na-ebb091ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30291%3A%20n%2Fa&amp;severity=high&amp;id=69cd74cfe6bfc5ba1df01063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29598-na-2d280f25</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29598%3A%20n%2Fa&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df0105e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34872-na-52cdc6bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34872%3A%20n%2Fa&amp;severity=critical&amp;id=69cd74cfe6bfc5ba1df0104d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67807-na-3cdb3a2c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67807%3A%20n%2Fa&amp;severity=medium&amp;id=69cd7413e6bfc5ba1def511f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43028-na-a438d685</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43028%3A%20n%2Fa&amp;severity=critical&amp;id=69cd7224e6bfc5ba1dee83f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40489-na-a97611df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40489%3A%20n%2Fa&amp;severity=critical&amp;id=69cd7224e6bfc5ba1dee83f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34871-na-0e98fe73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34871%3A%20n%2Fa&amp;severity=medium&amp;id=69cd69c0e6bfc5ba1deb9268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31027-na-43cb3480</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31027%3A%20n%2Fa&amp;severity=critical&amp;id=69cd6621e6bfc5ba1de9cb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30643-na-324a0dae</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30643%3A%20n%2Fa&amp;severity=critical&amp;id=69cd6621e6bfc5ba1de9cb64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30292-na-9c827e2f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30292%3A%20n%2Fa&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30273-na-53a2c388</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30273%3A%20n%2Fa&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34874-na-20e195fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34874%3A%20n%2Fa&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9caeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25835-na-c7115649</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25835%3A%20n%2Fa&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9cae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25833-na-39fc498d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25833%3A%20n%2Fa&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9cae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30573-na-074185c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30573%3A%20n%2Fa&amp;severity=high&amp;id=69cd5f13e6bfc5ba1de6e558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30523-na-e91f0ac3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30523%3A%20n%2Fa&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34875-na-87e74112</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34875%3A%20n%2Fa&amp;severity=critical&amp;id=69cd5f13e6bfc5ba1de6e541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25834-na-b6e432ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25834%3A%20n%2Fa&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30526-na-bfd1e890</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30526%3A%20n%2Fa&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67806-na-fbbc0c48</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67806%3A%20n%2Fa&amp;severity=low&amp;id=69cd3867e6bfc5ba1ddc2e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67805-na-26c76182</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67805%3A%20n%2Fa&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30522-na-da16853b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30522%3A%20n%2Fa&amp;severity=medium&amp;id=69cd26f5e6bfc5ba1dd45f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30289-na-3270a501</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30289%3A%20n%2Fa&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30287-na-8263b233</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30287%3A%20n%2Fa&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5240-cross-site-scripting-in-code-project-c4b471da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5240%3A%20Cross%20Site%20Scripting%20in%20code-projects%20BloodBank%20Managing%20System&amp;severity=medium&amp;id=69cc5e6ee6bfc5ba1d4effb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5238-sql-injection-in-itsourcecode-payrol-9ef6c417</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5238%3A%20SQL%20Injection%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69cc5e6ee6bfc5ba1d4effaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4668-cwe-89-improper-neutralization-of-sp-1cc6ecba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4668%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=69cc5aeae6bfc5ba1d4dd37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5237-sql-injection-in-itsourcecode-payrol-8d912d8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5237%3A%20SQL%20Injection%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69cd1fdee6bfc5ba1dd19c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5236-heap-based-buffer-overflow-in-axioma-029b3e7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5236%3A%20Heap-based%20Buffer%20Overflow%20in%20Axiomatic%20Bento4&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2480-cwe-79-improper-neutralization-of-in-6b3f465a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2480%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69cd7410e6bfc5ba1def5047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34556-cwe-125-out-of-bounds-read-in-inter-6e7c0da0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34556%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34555-cwe-121-stack-based-buffer-overflow-c10bc34d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34555%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd1fdee6bfc5ba1dd19c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34554-cwe-125-out-of-bounds-read-in-inter-aafb7891</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34554%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7413e6bfc5ba1def511a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34553-cwe-562-return-of-stack-variable-ad-2c16da57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34553%3A%20CWE-562%3A%20Return%20of%20Stack%20Variable%20Address%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34552-cwe-476-null-pointer-dereference-in-4bc7aebe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34552%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df0106e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5235-heap-based-buffer-overflow-in-axioma-070dd75a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5235%3A%20Heap-based%20Buffer%20Overflow%20in%20Axiomatic%20Bento4&amp;severity=medium&amp;id=69cd11c0e6bfc5ba1dcba0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34551-cwe-476-null-pointer-dereference-in-6e2f2b29</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34551%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd1fdee6bfc5ba1dd19c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34550-cwe-681-incorrect-conversion-betwee-7e7c75d5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34550%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7410e6bfc5ba1def5052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34549-cwe-758-reliance-on-undefined-unspe-a6e68408</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34549%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34548-cwe-681-incorrect-conversion-betwee-65343c71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34548%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34547-cwe-758-reliance-on-undefined-unspe-51bc6a5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34547%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd26f8e6bfc5ba1dd46493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34546-cwe-369-divide-by-zero-in-internati-ab0b32a6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34546%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7410e6bfc5ba1def504d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34542-cwe-121-stack-based-buffer-overflow-3dc3f0d3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34542%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34541-cwe-476-null-pointer-dereference-in-97376314</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34541%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34540-cwe-122-heap-based-buffer-overflow--6ae50b02</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34540%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34539-cwe-122-heap-based-buffer-overflow--a5ea5a6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34539%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34537-cwe-758-reliance-on-undefined-unspe-8300a004</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34537%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34536-cwe-674-uncontrolled-recursion-in-i-aa01237b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34536%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34535-cwe-122-heap-based-buffer-overflow--68816653</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34535%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34534-cwe-122-heap-based-buffer-overflow--984e044e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34534%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34533-cwe-758-reliance-on-undefined-unspe-384b4f8b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34533%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34605-cwe-79-improper-neutralization-of-i-fae01986</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34605%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69cc424fe6bfc5ba1d44f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34585-cwe-79-improper-neutralization-of-i-e55ddbb4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34585%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69cc424fe6bfc5ba1d44f4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34449-cwe-942-permissive-cross-domain-pol-0cb7b35e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34449%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69cc424fe6bfc5ba1d44f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34448-cwe-79-improper-neutralization-of-i-36bc82a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34448%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69cc424fe6bfc5ba1d44f4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34453-cwe-863-incorrect-authorization-in--a00bf5be</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34453%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69cc424fe6bfc5ba1d44f4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34451-cwe-22-improper-limitation-of-a-pat-34e7a1b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34451%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20anthropics%20anthropic-sdk-typescript&amp;severity=medium&amp;id=69cc424fe6bfc5ba1d44f4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34450-cwe-276-incorrect-default-permissio-e2dd2ab0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34450%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20anthropics%20anthropic-sdk-python&amp;severity=medium&amp;id=69cc424fe6bfc5ba1d44f4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34452-cwe-59-improper-link-resolution-bef-645fcbd8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34452%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20anthropics%20anthropic-sdk-python&amp;severity=medium&amp;id=69cc424fe6bfc5ba1d44f4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34442-cwe-20-improper-input-validation-in-98638d4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34442%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43dab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34443-cwe-918-server-side-request-forgery-82314a2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34443%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43dab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34441-cwe-444-inconsistent-interpretation-822278a8</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34441%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43daaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34405-cwe-79-improper-neutralization-of-i-b15ea7cf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34405%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nuxt-modules%20og-image&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43daab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34404-cwe-400-uncontrolled-resource-consu-46d515e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34404%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20nuxt-modules%20og-image&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43daa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5215-improper-access-controls-in-d-link-d-79f88c69</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5215%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69cc3b45e6bfc5ba1d430caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5214-stack-based-buffer-overflow-in-d-lin-fc01fc98</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5214%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc3b45e6bfc5ba1d430ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34401-cwe-611-improper-restriction-of-xml-a60b8584</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34401%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20microsoft%20XmlNotepad&amp;severity=medium&amp;id=69cc3b45e6bfc5ba1d430c9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34740-cwe-918-server-side-request-forgery-237de682</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34740%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c3e6bfc5ba1d418a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34739-cwe-79-improper-neutralization-of-i-3c670ea4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34739%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34738-cwe-285-improper-authorization-in-w-0862147d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34738%3A%20CWE-285%3A%20Improper%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34737-cwe-862-missing-authorization-in-ww-4c620e5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34737%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34733-cwe-284-improper-access-control-in--135c5460</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34733%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34732-cwe-306-missing-authentication-for--f0ad5c69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34732%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34731-cwe-306-missing-authentication-for--e79ff8e1</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34731%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69cc37c1e6bfc5ba1d418a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34716-cwe-79-improper-neutralization-of-i-9ebc5823</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34716%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34613-cwe-352-cross-site-request-forgery--11c5e554</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34613%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34611-cwe-352-cross-site-request-forgery--4e180877</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34611%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34396-cwe-79-improper-neutralization-of-i-d8a298c2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34396%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34394-cwe-352-cross-site-request-forgery--35460bbd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34394%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69cc343ee6bfc5ba1d4033d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34395-cwe-862-missing-authorization-in-ww-1d4fc49d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34395%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc343ee6bfc5ba1d4033d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34586-cwe-863-incorrect-authorization-in--54e3e32d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34586%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20mrmn2%20PdfDing&amp;severity=medium&amp;id=69cc343ee6bfc5ba1d4033d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1579-cwe-306-in-px4-autopilot-77f763f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1579%3A%20CWE-306%20in%20PX4%20Autopilot&amp;severity=critical&amp;id=69cc2d39e6bfc5ba1d3ba360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3470-cwe-20-improper-input-validation-in--65b0c784</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3470%3A%20CWE-20%20Improper%20input%20validation%20in%20SonicWall%20Email%20Security&amp;severity=low&amp;id=69cc2d39e6bfc5ba1d3ba36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3469-cwe-20-improper-input-validation-in--eaa3f9df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3469%3A%20CWE-20%20Improper%20input%20validation%20in%20SonicWall%20Email%20Security&amp;severity=low&amp;id=69cc2d39e6bfc5ba1d3ba369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3468-cwe-79-improper-neutralization-of-in-b52440e6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3468%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SonicWall%20Email%20Security&amp;severity=medium&amp;id=69cc2d39e6bfc5ba1d3ba366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5213-stack-based-buffer-overflow-in-d-lin-5302c1ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5213%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc2d39e6bfc5ba1d3ba377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5212-stack-based-buffer-overflow-in-d-lin-c2d1e0da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5212%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc2d39e6bfc5ba1d3ba36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34784-cwe-285-improper-authorization-in-p-66d533fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34784%3A%20CWE-285%3A%20Improper%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cc2635e6bfc5ba1d366733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34215-cwe-200-exposure-of-sensitive-infor-5ac81827</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34215%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cc2635e6bfc5ba1d36672c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34206-cwe-79-improper-neutralization-of-i-ce9b1789</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34206%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20libops%20captcha-protect&amp;severity=medium&amp;id=69cc2635e6bfc5ba1d366727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5211-stack-based-buffer-overflow-in-d-lin-71b7c6f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5211%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc2635e6bfc5ba1d36673a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3356-cwe-306-missing-authentication-for-c-80869dad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3356%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Anritsu%20Remote%20Spectrum%20Monitor%20MS27100A&amp;severity=critical&amp;id=69cc1babe6bfc5ba1d32cc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5210-file-inclusion-in-sourcecodester-lea-7ae37a06</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5210%3A%20File%20Inclusion%20in%20SourceCodester%20Leave%20Application%20System&amp;severity=medium&amp;id=69cc149be6bfc5ba1d3026d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5209-cross-site-scripting-in-sourcecodest-a847cd41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5209%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Leave%20Application%20System&amp;severity=medium&amp;id=69cc149be6bfc5ba1d3026cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62184-cwe-79-improper-neutralization-of-i-9654bd5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62184%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69cc1babe6bfc5ba1d32cc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5206-sql-injection-in-code-projects-simpl-4acdb68f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5206%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Gym%20Management%20System&amp;severity=medium&amp;id=69cc0a0fe6bfc5ba1d2cf77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2123-cwe-280-improper-handling-of-insuffi-ea54619e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2123%3A%20CWE-280%20Improper%20handling%20of%20insufficient%20permissions%20or%20privileges%20in%20OpenText%20Operations%20Agent&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5190-cwe-787-out-of-bounds-write-in-aws-a-7d1c9bb7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5190%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20AWS%20aws-c-event-stream&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32725-cwe-23-relative-path-traversal-in-s-31b04076</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32725%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20scitokens%20scitokens-cpp&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32726-cwe-863-incorrect-authorization-in--de3b423f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32726%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20scitokens%20scitokens-cpp&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34361-cwe-552-files-or-directories-access-66cb8838</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34361%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=critical&amp;id=69cbff80e6bfc5ba1d29f7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34360-cwe-918-server-side-request-forgery-5862110a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34360%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=medium&amp;id=69cbff80e6bfc5ba1d29f7c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34359-cwe-346-origin-validation-error-in--7ddd6ff0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34359%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=high&amp;id=69cbff80e6bfc5ba1d29f7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-malware-campaign-delivers-vbscript-and-ms-ae2a5fd4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20malware%20campaign%20delivers%20VBScript%20and%20MSI%20backdoors&amp;severity=medium&amp;id=69cc1498e6bfc5ba1d3022ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-compromise-of-axios-npm-package-c65fd242</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply-Chain%20Compromise%20of%20axios%20npm%20Package&amp;severity=medium&amp;id=69cc1498e6bfc5ba1d3022df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5205-server-side-request-forgery-in-chatw-40f6084d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5205%3A%20Server-Side%20Request%20Forgery%20in%20chatwoot&amp;severity=medium&amp;id=69cbf879e6bfc5ba1d2801af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24165-cwe-502-deserialization-of-untruste-abf108db</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24165%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20BioNeMo%20Framework&amp;severity=high&amp;id=69cbf879e6bfc5ba1d2801aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24164-cwe-502-deserialization-of-untruste-8f050d1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24164%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20BioNeMo%20Framework&amp;severity=high&amp;id=69cbf879e6bfc5ba1d2801a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24154-cwe-78-improper-neutralization-of-s-e4e69e90</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24154%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20Jetson%20Xavier%20Series%2C%20Jetson%20Orin%20Series%20and%20Jetson%20Thor&amp;severity=high&amp;id=69cbf879e6bfc5ba1d2801a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24153-cwe-501-trust-boundary-violation-in-e7a82e21</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24153%3A%20CWE-501%20Trust%20Boundary%20Violation%20in%20NVIDIA%20Jetson%20Xavier%20Series%2C%20Jetson%20Orin%20Series%20and%20Jetson%20Thor&amp;severity=medium&amp;id=69cbf879e6bfc5ba1d28019b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24148-cwe-1188-initialization-of-a-resour-b1f9912a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24148%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20NVIDIA%20Jetson%20Xavier%20Series%20and%20Jetson%20Orin%20Series&amp;severity=high&amp;id=69cbf879e6bfc5ba1d280196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-widespread-eviltokens-kit-device-code-phishing-38053c6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20widespread%20EvilTokens%20kit%3A%20device%20code%20phishing%20as-a-service&amp;severity=medium&amp;id=69cc1498e6bfc5ba1d3022bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantom-footprints-tracking-ghostsocks-malware-88b2ff6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phantom%20Footprints%3A%20Tracking%20GhostSocks%20Malware&amp;severity=medium&amp;id=69cc181be6bfc5ba1d31dd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crysome-rat-an-advanced-persistent-net-remote-acce-50137084</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrySome%20RAT%20%3A%20An%20Advanced%20Persistent%20.NET%20Remote%20Access%20Trojan&amp;severity=medium&amp;id=69cc181be6bfc5ba1d31dd33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/one-click-away-inside-a-linkedin-phishing-attack-fb385e9c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=One%20Click%20Away%3A%20Inside%20a%20LinkedIn%20Phishing%20Attack&amp;severity=medium&amp;id=69cc181be6bfc5ba1d31dd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ringing-in-chaos-how-teampcp-weaponized-the-telnyx-877e2dda</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ringing%20in%20Chaos%3A%20How%20TeamPCP%20Weaponized%20the%20Telnyx%20Python%20SDK&amp;severity=medium&amp;id=69d636951cc7ad14da612bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5087-cwe-338-use-of-cryptographically-wea-f1ae242d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5087%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20JJNAPIORK%20PAGI%3A%3AMiddleware%3A%3ASession%3A%3AStore%3A%3ACookie&amp;severity=high&amp;id=69cbf4f5e6bfc5ba1d2745d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34243-cwe-77-improper-neutralization-of-s-be7fa18e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34243%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20njzjz%20wenxian&amp;severity=critical&amp;id=69cbf4f5e6bfc5ba1d2745cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34219-cwe-190-integer-overflow-or-wraparo-4cd76bc0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34219%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69cbf4f5e6bfc5ba1d2745ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5204-stack-based-buffer-overflow-in-tenda-1d07a571</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5204%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cbedf2e6bfc5ba1d248110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5203-path-traversal-in-cms-made-simple-8956ef9c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5203%3A%20Path%20Traversal%20in%20CMS%20Made%20Simple&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d24810a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34240-cwe-347-improper-verification-of-cr-4aef725b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34240%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20appsup-dart%20jose&amp;severity=high&amp;id=69cbedf2e6bfc5ba1d248106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34237-cwe-942-permissive-cross-domain-pol-df6035ea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34237%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20modelcontextprotocol%20java-sdk&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d248101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34235-cwe-125-out-of-bounds-read-in-pjsip-64e6e86d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34235%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-next-cybersecurity-crisis-isnt-breachesits-dat-617ce088</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Next%20Cybersecurity%20Crisis%20Isn%E2%80%99t%20Breaches%E2%80%94It%E2%80%99s%20Data%20You%20Can%E2%80%99t%20Trust&amp;severity=medium&amp;id=69cbea6ae6bfc5ba1d226c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34231-cwe-79-improper-neutralization-of-i-a3811ee5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34231%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mixxorz%20slippers&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22561-vulnerability-in-anthropic-claude-d-f8757e77</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22561%3A%20Vulnerability%20in%20Anthropic%20Claude%20Desktop%20-%20Windows&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34227-cwe-306-missing-authentication-for--8ac78b6f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34227%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34218-cwe-269-improper-privilege-manageme-5469040d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34218%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20craigjbass%20clearancekit&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34595-cwe-843-access-of-resource-using-in-a99e068c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34595%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34574-cwe-697-incorrect-comparison-in-par-52fbaa27</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34574%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34573-cwe-407-inefficient-algorithmic-com-0c0c9664</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34573%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cbe700e6bfc5ba1d219519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stolen-logins-are-fueling-everything-from-ransomwa-1ac187c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stolen%20Logins%20Are%20Fueling%20Everything%20From%20Ransomware%20to%20Nation-State%20Cyberattacks&amp;severity=medium&amp;id=69cbe361e6bfc5ba1d2085e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4819-cwe-532-in-floragunn-search-guard-fl-c836b24f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4819%3A%20CWE-532%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22569-cwe-1289-improper-validation-of-uns-79b5145f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22569%3A%20CWE-1289%20Improper%20validation%20of%20unsafe%20equivalence%20in%20input%20in%20Zscaler%20Zscaler%20Client%20Connector&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4818-cwe-285-in-floragunn-search-guard-fl-352b80c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4818%3A%20CWE-285%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d21952e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/venom-stealer-raises-stakes-with-continuous-creden-8197636e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Venom%20Stealer%20Raises%20Stakes%20With%20Continuous%20Credential%20Harvesting&amp;severity=medium&amp;id=69cbdfdde6bfc5ba1d1e5b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34532-cwe-863-incorrect-authorization-in--d438f9ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34532%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69cbdff9e6bfc5ba1d1e69d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4799-cwe-601-url-redirection-to-untrusted-e7eb6ba1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4799%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69cbdff9e6bfc5ba1d1e69d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34373-cwe-346-origin-validation-error-in--b9034bc6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34373%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69cbdff9e6bfc5ba1d1e69c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34363-cwe-362-concurrent-execution-using--0173ea9b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34363%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cbdff9e6bfc5ba1d1e69c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0596-cwe-78-improper-neutralization-of-sp-7a9aeb7a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0596%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69cbdff9e6bfc5ba1d1e69b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34224-cwe-367-time-of-check-time-of-use-t-04fec12b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34224%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69cbdff9e6bfc5ba1d1e69bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34214-cwe-212-improper-removal-of-sensiti-fe343f70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34214%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20trinodb%20trino&amp;severity=high&amp;id=69cbd8dce6bfc5ba1d1c31a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34209-cwe-294-authentication-bypass-by-ca-ae7e0cd6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34209%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20wevm%20mppx&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c3123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34210-cwe-697-incorrect-comparison-in-wev-005026cd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34210%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20wevm%20mppx&amp;severity=medium&amp;id=69cbd8dce6bfc5ba1d1c31a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34377-cwe-347-improper-verification-of-cr-961af0bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34377%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ZcashFoundation%20zebra&amp;severity=high&amp;id=69cbd8dce6bfc5ba1d1c31ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34202-cwe-1336-improper-neutralization-of-80a87c57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34202%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20ZcashFoundation%20zebra&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c311e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-moves-from-oss-to-aws-environments-ec10ca3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Moves%20From%20OSS%20to%20AWS%20Environments&amp;severity=medium&amp;id=69cbd551e6bfc5ba1d1b0977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20915-cwe-79-improper-neutralization-of-i-9c8aeba6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20915%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c30fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34172-cwe-1336-improper-neutralization-of-1aeae384</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34172%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Giskard-AI%20giskard-oss&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c311b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33276-cwe-79-improper-neutralization-of-i-3ffa7566</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33276%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c310c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34162-cwe-306-missing-authentication-for--6cb44fc6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34162%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20labring%20FastGPT&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c310f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34163-cwe-918-server-side-request-forgery-df36ec79</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34163%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20labring%20FastGPT&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c3115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crewai-vulnerabilities-expose-devices-to-hacking-845e6a48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrewAI%20Vulnerabilities%20Expose%20Devices%20to%20Hacking&amp;severity=medium&amp;id=69cbce49e6bfc5ba1d18329f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-ransomware-is-now-after-your-data-and-how-to-p-6fc7d779</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20ransomware%20is%20now%20after%20your%20data%20%E2%80%94%20and%20how%20to%20protect%20your%20home%20storage%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69cbce5ee6bfc5ba1d1838db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-truechaos-0-day-exploitation-against-sou-08e18aae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20TrueChaos%3A%200-Day%20Exploitation%20Against%20Southeast%20Asian%20Government%20Targets&amp;severity=medium&amp;id=69cc30c3e6bfc5ba1d3e44b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3308-cwe-190-integer-overflow-or-wraparou-b1a7029f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3308%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Artifex%20Software%20Inc.%20*PyMuPDF*%20MuPDF&amp;severity=high&amp;id=69cbd1cfe6bfc5ba1d19baec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27854-use-after-free-in-powerdns-dnsdist-e6e09fac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27854%3A%20Use%20After%20Free%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27853-out-of-bounds-write-in-powerdns-dns-ccd834c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27853%3A%20Out-of-bounds%20Write%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24030-uncontrolled-memory-allocation-in-p-60254c6e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24030%3A%20Uncontrolled%20Memory%20Allocation%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24029-incorrect-authorization-in-powerdns-a9ec0de4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24029%3A%20Incorrect%20Authorization%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24028-buffer-over-read-in-powerdns-dnsdis-62e4a5a1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24028%3A%20Buffer%20Over-read%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/axios-npm-distribution-compromised-in-supply-chain-c5ee45b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Axios%20NPM%20Distribution%20Compromised%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69cd1c4ee6bfc5ba1dcfe7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0397-overly-permissive-cross-domain-white-800b174d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0397%3A%20Overly%20Permissive%20Cross-domain%20Whitelist%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69cbb931e6bfc5ba1d10da47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-slashes-quantum-resource-requirements-for-b-41cc00eb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Slashes%20Quantum%20Resource%20Requirements%20for%20Breaking%20Cryptocurrency%20Encryption&amp;severity=medium&amp;id=69cbb5afe6bfc5ba1d0f3172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0396-improper-neutralization-of-script-re-f60b6be7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0396%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69cbb931e6bfc5ba1d10da44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-critical-fortinet-forticlient-ems--a7f71706</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Critical%20Fortinet%20FortiClient%20EMS%20Flaw%20Begins&amp;severity=critical&amp;id=69cbb5afe6bfc5ba1d0f3176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14213-cwe-78-improper-neutralization-of-s-115c4b1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14213%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cato%20Networks%20Socket&amp;severity=high&amp;id=69cbb930e6bfc5ba1d10da40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14031-cwe-1395-dependency-on-vulnerable-t-b96af189</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14031%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20YVES%20Sereal%3A%3AEncoder&amp;severity=high&amp;id=69cbb22ae6bfc5ba1d0de955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14030-cwe-1395-dependency-on-vulnerable-t-a55e9ce0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14030%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20YVES%20Sereal%3A%3ADecoder&amp;severity=high&amp;id=69cbb22ae6bfc5ba1d0de950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4267-cwe-79-improper-neutralization-of-in-3a3951a7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnbillion%20Query%20Monitor&amp;severity=high&amp;id=69cbb22ae6bfc5ba1d0de963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3191-cwe-352-cross-site-request-forgery-c-188285cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3191%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20teckel%20Minify%20HTML&amp;severity=medium&amp;id=69cbb22ae6bfc5ba1d0de95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3139-cwe-639-authorization-bypass-through-8b75f73d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3139%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=69cbb22ae6bfc5ba1d0de95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34509-88c32a04</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34509&amp;severity=null&amp;id=69cd26f5e6bfc5ba1dd45f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34508-6ec16998</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34508&amp;severity=null&amp;id=69cd26f5e6bfc5ba1dd45f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5198-sql-injection-in-code-projects-stude-8e459cec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5198%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cbaea5e6bfc5ba1d0cfdee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/strongswan-flaw-allows-unauthenticated-attackers-t-6c936cd5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StrongSwan%20Flaw%20Allows%20Unauthenticated%20Attackers%20to%20Crash%20VPNs&amp;severity=low&amp;id=69cba095e6bfc5ba1d069829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34887-cwe-79-improper-neutralization-of-i-959708a0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Extend%20Themes%20Kubio%20AI%20Page%20Builder&amp;severity=medium&amp;id=69cba419e6bfc5ba1d08ffa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4400-cwe-639-authorization-bypass-through-c221da90</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4400%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%201millionbot%20Millie%20chat&amp;severity=high&amp;id=69cba419e6bfc5ba1d08ffa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4399-cwe-1427-improper-neutralization-of--6d726c1d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4399%3A%20CWE-1427%20Improper%20neutralization%20of%20input%20used%20for%20LLM%20prompting%20in%201millionbot%20Millie%20chat&amp;severity=high&amp;id=69cba419e6bfc5ba1d08ffa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lloyds-data-security-incident-impacts-450000-indiv-bf5b7289</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lloyds%20Data%20Security%20Incident%20Impacts%20450%2C000%20Individuals&amp;severity=medium&amp;id=69cb9d11e6bfc5ba1d05291b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15618-cwe-338-use-of-cryptographically-we-19be4bf3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15618%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20MOCK%20Business%3A%3AOnlinePayment%3A%3AStoredTransaction&amp;severity=critical&amp;id=69cba419e6bfc5ba1d08ff9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5197-sql-injection-in-code-projects-stude-35da754e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5197%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cb9d1de6bfc5ba1d052b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4317-cwe-89-improper-neutralization-of-sp-e769b7b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4317%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Umami%20Software%20application%20Umami%20Software&amp;severity=critical&amp;id=69cb9d1de6bfc5ba1d052b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5196-sql-injection-in-code-projects-stude-b73c09b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5196%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cc1e09e6bfc5ba1d33b7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10559-cwe-22-improper-limitation-of-a-pat-a46b0034</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10559%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Factory%20Resource%20Manager&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10553-cwe-79-improper-neutralization-of-i-0ca743a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10553%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Factory%20Resource%20Manager&amp;severity=high&amp;id=69cbd1cfe6bfc5ba1d19baf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10551-cwe-79-improper-neutralization-of-i-5b79fb83</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=69cb8b7de6bfc5ba1df48222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5201-heap-based-buffer-overflow-in-red-ha-598a08d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5201%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cb8b7de6bfc5ba1df48225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5195-sql-injection-in-code-projects-stude-bc053e71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5195%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cb8475e6bfc5ba1df0b3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/application-control-bypass-for-data-exfiltration-t-88c48161</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Application%20Control%20Bypass%20for%20Data%20Exfiltration%2C%20(Tue%2C%20Mar%2031st)&amp;severity=medium&amp;id=69cb79e9e6bfc5ba1deaad81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5186-double-free-in-nothings-stb-9e4c2f49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5186%3A%20Double%20Free%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cbedf4e6bfc5ba1d248139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-dualscript-multi-stage-powershell-malwar-63268769</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20DualScript%3A%20Multi-Stage%20PowerShell%20Malware%20Targets%20Crypto&amp;severity=medium&amp;id=69cc1b98e6bfc5ba1d32c553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5185-heap-based-buffer-overflow-in-nothin-14d54f9b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5185%3A%20Heap-based%20Buffer%20Overflow%20in%20Nothings%20stb_image&amp;severity=medium&amp;id=69cb6f5ce6bfc5ba1de4b856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5184-command-injection-in-trendnet-tew-71-9fc19bda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5184%3A%20Command%20Injection%20in%20TRENDnet%20TEW-713RE&amp;severity=medium&amp;id=69cb6f5ce6bfc5ba1de4b850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-in-openai-codex-allowed-git-19b187ba</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20in%20OpenAI%20Codex%20Allowed%20GitHub%20Token%20Compromise&amp;severity=critical&amp;id=69cb6bd9e6bfc5ba1de2b835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3881-cwe-918-server-side-request-forgery--b7cb0fc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3881%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Performance%20Monitor&amp;severity=medium&amp;id=69cb6857e6bfc5ba1de0b6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5183-command-injection-in-trendnet-tew-71-6f0fe0f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5183%3A%20Command%20Injection%20in%20TRENDnet%20TEW-713RE&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5182-sql-injection-in-sourcecodester-teac-5602a1a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5182%3A%20SQL%20Injection%20in%20SourceCodester%20Teacher%20Record%20System&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34881-cwe-918-server-side-request-forgery-4eec20a5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34881%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20OpenStack%20Glance&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1877-cwe-79-improper-neutralization-of-in-a66dc075</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnh10%20Auto%20Post%20Scheduler&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1834-cwe-80-improper-neutralization-of-sc-8611fff6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1834%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20vowelweb%20Ibtana%20%E2%80%93%20WordPress%20Website%20Builder&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5181-unrestricted-upload-in-sourcecodeste-d1cc0456</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5181%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Simple%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9ced5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4146-cwe-79-improper-neutralization-of-in-f54775f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4146%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timwhitlock%20Loco%20Translate&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9cecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1710-cwe-285-improper-authorization-in-wo-825159fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1710%3A%20CWE-285%20Improper%20Authorization%20in%20woocommerce%20WooPayments%3A%20Integrated%20WooCommerce%20Payments&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9cec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1797-cwe-862-missing-authorization-in-the-54e9e4f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1797%3A%20CWE-862%20Missing%20Authorization%20in%20themetechmount%20TrueBooker%20%E2%80%93%20Appointment%20Booking%20and%20Scheduler%20System&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9cecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5180-sql-injection-in-sourcecodester-simp-c8e12654</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5180%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=69cb4fb9e6bfc5ba1dc69fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5179-sql-injection-in-sourcecodester-simp-4bb61a7e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5179%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=69cb4fb9e6bfc5ba1dc69fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5178-command-injection-in-totolink-a3300r-d158d31b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5178%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69cb41a9e6bfc5ba1dadee2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34073-cwe-295-improper-certificate-valida-10885c91</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34073%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20pyca%20cryptography&amp;severity=low&amp;id=69cbd8dce6bfc5ba1d1c31b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34070-cwe-22-improper-limitation-of-a-pat-ac8541ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34070%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20langchain-ai%20langchain&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5177-command-injection-in-totolink-a3300r-dabb0ca9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5177%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69cbd1cfe6bfc5ba1d19baf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34060-cwe-94-improper-control-of-generati-bee34109</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34060%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Shopify%20ruby-lsp&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34054-cwe-427-uncontrolled-search-path-el-04e663ed</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34054%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20microsoft%20vcpkg&amp;severity=high&amp;id=69cbedf4e6bfc5ba1d248134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34043-cwe-400-uncontrolled-resource-consu-3f949807</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34043%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20yahoo%20serialize-javascript&amp;severity=medium&amp;id=69cbd8dce6bfc5ba1d1c31b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34042-cwe-862-missing-authorization-in-ne-c419b6c5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34042%3A%20CWE-862%3A%20Missing%20Authorization%20in%20nektos%20act&amp;severity=high&amp;id=69cc1babe6bfc5ba1d32cc20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34041-cwe-74-improper-neutralization-of-s-7d4e514b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34041%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nektos%20act&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3300-cwe-94-improper-control-of-generatio-6c6e7217</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3300%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=critical&amp;id=69cb25a7e6bfc5ba1d9a95b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4020-cwe-200-exposure-of-sensitive-inform-b98091d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4020%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20RocketGenius%20Gravity%20SMTP&amp;severity=high&amp;id=69cb25a7e6bfc5ba1d9a95b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5176-command-injection-in-totolink-a3300r-0198ea25</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5176%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69cb25a7e6bfc5ba1d9a95c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5115-cwe-319-cleartext-transmission-of-se-7a72caea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5115%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20PaperCut%20Papercut%20NG%2FMF&amp;severity=low&amp;id=69cb1e83e6bfc5ba1d972340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-004-databrick-d60c6a86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20004%20-%20Databricks%20Investigating%20Alleged%20Compromise%2C%20TeamPCP%20Runs%20Dual%20Ransomware%20Operations%2C%20and%20AstraZeneca%20Data%20Released%2C%20(Mon%2C%20Mar%2030th)&amp;severity=medium&amp;id=69ca91e1e6bfc5ba1d4195f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32734-cwe-79-improper-neutralization-of-i-5b4bf0b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32734%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baserproject%20basercms&amp;severity=high&amp;id=69cb1e82e6bfc5ba1d9722cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30879-cwe-79-improper-neutralization-of-i-315a156d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30879%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baserproject%20basercms&amp;severity=medium&amp;id=69cb1e82e6bfc5ba1d9722bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30940-cwe-22-improper-limitation-of-a-pat-4cf3d0c8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30940%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20baserproject%20basercms&amp;severity=high&amp;id=69cb1e82e6bfc5ba1d9722c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30878-cwe-285-improper-authorization-in-b-0d863f22</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30878%3A%20CWE-285%3A%20Improper%20Authorization%20in%20baserproject%20basercms&amp;severity=medium&amp;id=69cb1e82e6bfc5ba1d9722b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30877-cwe-78-improper-neutralization-of-s-36a348b4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30877%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=critical&amp;id=69cb1e82e6bfc5ba1d9722b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30880-cwe-78-improper-neutralization-of-s-5ac38c48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30880%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=critical&amp;id=69cb1e82e6bfc5ba1d9722c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27697-cwe-89-improper-neutralization-of-s-4a7e4478</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27697%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=medium&amp;id=69cb1e82e6bfc5ba1d9722ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21861-cwe-78-improper-neutralization-of-s-7b86deef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21861%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=critical&amp;id=69cb1e82e6bfc5ba1d9722a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32957-cwe-434-unrestricted-upload-of-file-07ed5ff8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32957%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20baserproject%20basercms&amp;severity=high&amp;id=69cb1e82e6bfc5ba1d9722a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4794-cwe-79-improper-neutralization-of-in-b1682948</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4794%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20PaperCut%20PaperCut%20NG%2FMF&amp;severity=low&amp;id=69cb1e82e6bfc5ba1d9722d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-31-b94f0480</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-31&amp;severity=medium&amp;id=69cc61e8e6bfc5ba1d50ebb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30290-na-d795f9fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30290%3A%20n%2Fa&amp;severity=high&amp;id=69cc2635e6bfc5ba1d366722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30285-na-6a2d5cfa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30285%3A%20n%2Fa&amp;severity=critical&amp;id=69cc1f3ce6bfc5ba1d342c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30280-na-e7f28f90</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30280%3A%20n%2Fa&amp;severity=medium&amp;id=69cc1f3ce6bfc5ba1d342c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30520-na-d7a777db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30520%3A%20n%2Fa&amp;severity=medium&amp;id=69cc1e09e6bfc5ba1d33b7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30286-na-fbc0b73a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30286%3A%20n%2Fa&amp;severity=critical&amp;id=69cc1e09e6bfc5ba1d33b7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30521-na-03f608fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30521%3A%20n%2Fa&amp;severity=medium&amp;id=69cc149be6bfc5ba1d3026cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30283-na-ed1a86e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30283%3A%20n%2Fa&amp;severity=critical&amp;id=69cc0a0fe6bfc5ba1d2cf778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30279-na-8a3ec826</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30279%3A%20n%2Fa&amp;severity=high&amp;id=69cc0a0fe6bfc5ba1d2cf772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30282-na-2cce3cba</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30282%3A%20n%2Fa&amp;severity=critical&amp;id=69cc068ae6bfc5ba1d2beedf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30278-na-bacab0cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30278%3A%20n%2Fa&amp;severity=critical&amp;id=69cc068ae6bfc5ba1d2beeda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30277-na-d58dc8e2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30277%3A%20n%2Fa&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30284-na-5be1bb53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30284%3A%20n%2Fa&amp;severity=high&amp;id=69cbf4f5e6bfc5ba1d2745c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30281-na-48ac7389</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30281%3A%20n%2Fa&amp;severity=critical&amp;id=69cbedf2e6bfc5ba1d2480ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30276-na-932d5438</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30276%3A%20n%2Fa&amp;severity=critical&amp;id=69cbedf2e6bfc5ba1d2480ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30314-na-bc561faf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30314%3A%20n%2Fa&amp;severity=critical&amp;id=69cbdff9e6bfc5ba1d1e69b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29870-na-e9224b82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29870%3A%20n%2Fa&amp;severity=high&amp;id=69cbdff9e6bfc5ba1d1e69b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30312-na-6798d69d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30312%3A%20n%2Fa&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c3108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30311-na-afb7abcc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30311%3A%20n%2Fa&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c3104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30309-na-5d9d5ab8</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30309%3A%20n%2Fa&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c3100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30310-na-ded13cc8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30310%3A%20n%2Fa&amp;severity=critical&amp;id=69cbd1cfe6bfc5ba1d19bae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-31-e1bb4eef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-31&amp;severity=low&amp;id=69cb3714e6bfc5ba1da38cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5157-cross-site-scripting-in-code-project-fa8372fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5157%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69cb096be6bfc5ba1d7e1fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5156-stack-based-buffer-overflow-in-tenda-95d1a648</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5156%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cb096be6bfc5ba1d7e1fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5155-stack-based-buffer-overflow-in-tenda-42fe2620</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5155%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cafedde6bfc5ba1d798140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5154-stack-based-buffer-overflow-in-tenda-0a4a9773</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5154%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cafedde6bfc5ba1d798139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5130-cwe-565-reliance-on-cookies-without--7fe086b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5130%3A%20CWE-565%20Reliance%20on%20Cookies%20without%20Validation%20and%20Integrity%20Checking%20in%20jhimross%20Debugger%20%26%20Troubleshooter&amp;severity=high&amp;id=69cafb5ae6bfc5ba1d780867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32794-cwe-295-improper-certificate-valida-33e2597e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32794%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Provider%20for%20Databricks&amp;severity=medium&amp;id=69caf451e6bfc5ba1d7409b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5153-command-injection-in-tenda-ch22-ee0fb20b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5153%3A%20Command%20Injection%20in%20Tenda%20CH22&amp;severity=medium&amp;id=69caf0cde6bfc5ba1d729540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4257-cwe-94-improper-control-of-generatio-c9e2f160</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4257%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20supsysticcom%20Contact%20Form%20by%20Supsystic&amp;severity=critical&amp;id=69caf0cde6bfc5ba1d72953b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32877-cwe-125-out-of-bounds-read-in-rando-f9a11963</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32877%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20randombit%20botan&amp;severity=high&amp;id=69cae2bce6bfc5ba1d6c3e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32883-cwe-347-improper-verification-of-cr-1af6174a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32883%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20randombit%20botan&amp;severity=medium&amp;id=69cae2bce6bfc5ba1d6c3e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32884-cwe-295-improper-certificate-valida-f12891c4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32884%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20randombit%20botan&amp;severity=medium&amp;id=69cae2bce6bfc5ba1d6c3e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5152-stack-based-buffer-overflow-in-tenda-50cbb48f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5152%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cae2bce6bfc5ba1d6c3e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34558-cwe-79-improper-neutralization-of-i-198231a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34558%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34557-cwe-79-improper-neutralization-of-i-f3fef655</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34557%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27599-cwe-79-improper-neutralization-of-i-cb40a560</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27599%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69cae2bce6bfc5ba1d6c3e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5150-sql-injection-in-code-projects-accou-ec58ae08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5150%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69cad830e6bfc5ba1d66dc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5148-sql-injection-in-yunaiv-yudao-cloud-5dc94026</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5148%3A%20SQL%20Injection%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69cad830e6bfc5ba1d66dc10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33026-cwe-312-cleartext-storage-of-sensit-de36c61f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33026%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69cad4ace6bfc5ba1d65117d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21710-vulnerability-in-nodejs-node-028748b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21710%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=69cacda7e6bfc5ba1d6188a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21716-vulnerability-in-nodejs-node-e1c41615</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21716%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=69cacda7e6bfc5ba1d6188b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21711-vulnerability-in-nodejs-node-ddaccfa2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21711%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21715-vulnerability-in-nodejs-node-14042404</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21715%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=69cacda7e6bfc5ba1d6188ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21717-vulnerability-in-nodejs-node-70bc0aac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21717%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21713-vulnerability-in-nodejs-node-4458c2af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21713%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21714-vulnerability-in-nodejs-node-a0eb338f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21714%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dshield-cowrie-honeypot-stats-and-when-sessions-di-88050524</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DShield%20(Cowrie)%20Honeypot%20Stats%20and%20When%20Sessions%20Disconnect%2C%20(Mon%2C%20Mar%2030th)&amp;severity=medium&amp;id=69c9bef1e6bfc5ba1d521ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5147-sql-injection-in-yunaiv-yudao-cloud-16d2d339</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5147%3A%20SQL%20Injection%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69caca21e6bfc5ba1d5f423b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3991-cwe-829-inclusion-of-functionality-f-131dca0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3991%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20Broadcom%20Data%20Loss%20Prevention&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcps-telnyx-attack-marks-a-shift-in-tactics-be-49f2484d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%E2%80%99s%20Telnyx%20Attack%20Marks%20a%20Shift%20in%20Tactics%20Beyond%20LiteLLM&amp;severity=medium&amp;id=69caed48e6bfc5ba1d70eba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3502-cwe-494-download-of-code-without-int-45ea491d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3502%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check.%20in%20TrueConf%20TrueConf%20Client&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5126-server-side-request-forgery-in-sourc-39062150</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5126%3A%20Server-Side%20Request%20Forgery%20in%20SourceCodester%20RSS%20Feed%20Parser&amp;severity=medium&amp;id=69cabc11e6bfc5ba1d596e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33027-cwe-22-improper-limitation-of-a-pat-c07fecd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33027%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69cabc11e6bfc5ba1d596df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33028-cwe-362-concurrent-execution-using--15669eaf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33028%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69cabc11e6bfc5ba1d596df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33029-cwe-20-improper-input-validation-in-e829da5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33029%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69cabc11e6bfc5ba1d596dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33030-cwe-78-improper-neutralization-of-s-ce389835</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33030%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69cabc11e6bfc5ba1d596dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33032-cwe-306-missing-authentication-for--2512a116</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33032%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69cabc11e6bfc5ba1d596e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4046-cwe-617-reachable-assertion-in-the-g-18e966bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4046%3A%20CWE-617%20Reachable%20assertion%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69cab88de6bfc5ba1d56ff2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5125-os-command-injection-in-raine-consul-50411acc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5125%3A%20OS%20Command%20Injection%20in%20raine%20consult-llm-mcp&amp;severity=medium&amp;id=69cacae6e6bfc5ba1d5fd380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27508-cwe-79-improper-neutralization-of-i-f32f18c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27508%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Smoothwall%20Express&amp;severity=medium&amp;id=69caae00e6bfc5ba1d516fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26352-cwe-79-improper-neutralization-of-i-77ac9a7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26352%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Smoothwall%20Express&amp;severity=medium&amp;id=69caae00e6bfc5ba1d516fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5124-improper-access-controls-in-osrg-gob-b46befd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5124%3A%20Improper%20Access%20Controls%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69caa6f9e6bfc5ba1d4dfd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5170-cwe-617-reachable-assertion-in-mongo-3f604185</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5170%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20MongoDB%20MongoDB%20Server&amp;severity=medium&amp;id=69ca9c71e6bfc5ba1d472626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5123-off-by-one-in-osrg-gobgp-3ed023a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5123%3A%20Off-by-One%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21712-vulnerability-in-nodejs-node-52636af1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21712%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d472595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5165-expired-pointer-dereference-in-red-h-b327eb88</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5165%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5164-buffer-copy-without-checking-size-of-dd5cb921</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5164%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/healthcare-it-platform-carecloud-probing-potential-568e92da</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Healthcare%20IT%20Platform%20CareCloud%20Probing%20Potential%20Data%20Breach&amp;severity=medium&amp;id=69ca8756e6bfc5ba1d3aa7d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5122-improper-access-controls-in-osrg-gob-ec99131e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5122%3A%20Improper%20Access%20Controls%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69ca8e5fe6bfc5ba1d3ebe50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-drift-how-llms-are-quietly-breaking-organiz-e69f5f70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Drift%3A%20How%20LLMs%20Are%20Quietly%20Breaking%20Organizational%20Access%20Control&amp;severity=medium&amp;id=69ca8756e6bfc5ba1d3aa7d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28528-cwe-125-out-of-bounds-read-in-bluek-e98e0a75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28528%3A%20CWE-125%20Out-of-bounds%20Read%20in%20BlueKitchen%20GmbH%20BTstack&amp;severity=low&amp;id=69ca8777e6bfc5ba1d3aaeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28527-cwe-125-out-of-bounds-read-in-bluek-bcfc2127</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28527%3A%20CWE-125%20Out-of-bounds%20Read%20in%20BlueKitchen%20GmbH%20BTstack&amp;severity=low&amp;id=69ca8777e6bfc5ba1d3aaeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28526-cwe-125-out-of-bounds-read-in-bluek-5b117bbe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28526%3A%20CWE-125%20Out-of-bounds%20Read%20in%20BlueKitchen%20GmbH%20BTstack&amp;severity=low&amp;id=69ca8777e6bfc5ba1d3aaeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-iron-curtain-for-ai-how-to-improve-autonomous-a-a6c72dc8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20iron%20curtain%20for%20AI%3A%20how%20to%20improve%20autonomous%20AI%20agent%20security%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ca8053e6bfc5ba1d368b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3321-cwe-639-authorization-bypass-through-c880c1c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3321%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20ON24%20ON24%20Q%26A%20chat&amp;severity=high&amp;id=69ca7cd8e6bfc5ba1d314847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-data-leakage-via-a-hidden-outbound-channel-77d73958</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChatGPT%20Data%20Leakage%20via%20a%20Hidden%20Outbound%20Channel%20in%20the%20Code%20Execution%20Runtime&amp;severity=medium&amp;id=69ca7944e6bfc5ba1d2fc939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/30th-march-threat-intelligence-report-e05488d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=30th%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=low&amp;id=69cae257e6bfc5ba1d6c0684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4315-cwe-352-cross-site-request-forgery-c-3da322ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4315%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69ca75c0e6bfc5ba1d2d9bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4266-cwe-502-deserialization-of-untrusted-985082ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4266%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69ca75c0e6bfc5ba1d2d9beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-star-blizzard-adopts-darksword-ios-exp-08457acb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20Star%20Blizzard%20Adopts%20DarkSword%20iOS%20Exploit%20Kit&amp;severity=high&amp;id=69ca67b1e6bfc5ba1d24dab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-commission-reports-cyber-intrusion-and-da-712b39a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Commission%20Reports%20Cyber%20Intrusion%20and%20Data%20Theft&amp;severity=medium&amp;id=69ca60a9e6bfc5ba1d1f9640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacked-hospitals-hidden-spyware-iran-conflict-show-960e3022</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacked%20Hospitals%2C%20Hidden%20Spyware%3A%20Iran%20Conflict%20Shows%20How%20Digital%20Fight%20Is%20Ingrained%20in%20Warfare&amp;severity=high&amp;id=69ca5d25e6bfc5ba1d1d6402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telnyx-targeted-in-growing-teampcp-supply-chain-at-3b995e80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telnyx%20Targeted%20in%20Growing%20TeamPCP%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69ca59a1e6bfc5ba1d18f925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1612-cwe-798-use-of-hard-coded-credential-4f82f25a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1612%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20AL-KO%20Robolinho%20Update%20Software&amp;severity=medium&amp;id=69ca4f15e6bfc5ba1d110ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-fresh-citrix-netscaler-vulnerabili-cb88742d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Fresh%20Citrix%20NetScaler%20Vulnerability%20Begins&amp;severity=critical&amp;id=69ca4489e6bfc5ba1d06497d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5128-cwe-200-exposure-of-sensitive-inform-adf68c3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5128&amp;severity=null&amp;id=69ca480ee6bfc5ba1d09ad0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-brief-tax-scams-aim-to-steal-funds-from-t-4f3af72b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20brief%3A%20tax%20scams%20aim%20to%20steal%20funds%20from%20taxpayers&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-confirms-kash-patel-email-hack-as-us-offers-10-48617ffa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Confirms%20Kash%20Patel%20Email%20Hack%20as%20US%20Offers%20%2410M%20Reward%20for%20Hackers&amp;severity=medium&amp;id=69ca2f74e6bfc5ba1dec291a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4416-cwe-502-deserialization-of-untrusted-7c234af9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4416%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20GIGABYTE%20Performance%20Library&amp;severity=high&amp;id=69ca2f86e6bfc5ba1dec601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5121-vulnerability-in-red-hat-red-hat-ent-8ecef880</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5121%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207%20Extended%20Lifecycle%20Support&amp;severity=high&amp;id=69ca2f86e6bfc5ba1dec601f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25704-cwe-271-privilege-dropping-lowering-9551ffdb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25704%3A%20CWE-271%3A%20Privilege%20Dropping%20%2F%20Lowering%20Errors%20in%20pop-os%20cosmic-greeter&amp;severity=medium&amp;id=69ca2f86e6bfc5ba1dec6014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4415-cwe-23-relative-path-traversal-in-gi-d148431b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4415%3A%20CWE-23%20Relative%20path%20traversal%20in%20GIGABYTE%20Gigabyte%20Control%20Center&amp;severity=critical&amp;id=69ca2f86e6bfc5ba1dec6017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3716-cwe-204-observable-response-discrepa-19d0288d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3716%3A%20CWE-204%20Observable%20response%20discrepancy%20in%20ESET%2C%20spol.%20s.r.o%20ESET%20Protect%20(on-prem)&amp;severity=medium&amp;id=69ca2f86e6bfc5ba1dec6011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15379-cwe-77-improper-neutralization-of-s-6f707b63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15379%3A%20CWE-77%20%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69ca2868e6bfc5ba1de5eb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-ex-7117a302</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20BIG-IP%20DoS%20Flaw%20Upgraded%20to%20Critical%20RCE%2C%20Now%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=69ca2161e6bfc5ba1de1970a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2328-cwe-790-improper-filtering-of-specia-345e5887</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2328%3A%20CWE-790%20Improper%20Filtering%20of%20Special%20Elements%20in%20WAGO%20Device%20Sphere&amp;severity=high&amp;id=69ca2868e6bfc5ba1de5eb96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5119-cleartext-transmission-of-sensitive--a5271c6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5119%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ca16d5e6bfc5ba1dd8ea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5107-improper-access-controls-in-frroutin-1c6243fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5107%3A%20Improper%20Access%20Controls%20in%20FRRouting%20FRR&amp;severity=low&amp;id=69ca0c48e6bfc5ba1dd16be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5106-cross-site-scripting-in-code-project-9b1a6ed5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5106%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5105-command-injection-in-totolink-a3300r-3ffece95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5105%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9f3ace6bfc5ba1da3b131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5104-command-injection-in-totolink-a3300r-967faa0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5104%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9e219e6bfc5ba1d89ce55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3124-cwe-639-authorization-bypass-through-6397300c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3124%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpchill%20Download%20Monitor&amp;severity=high&amp;id=69c9d408e6bfc5ba1d7f34a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15036-cwe-29-path-traversal-filename-in-m-bf2c3022</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15036%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69c9d408e6bfc5ba1d7f349e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5103-command-injection-in-totolink-a3300r-8a4403a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5103%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9d408e6bfc5ba1d7f34a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7741-cwe-259-use-of-hard-coded-password-i-5fed7c83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7741%3A%20CWE-259%20Use%20of%20hard-coded%20password%20in%20Yokogawa%20Electric%20Corporation%20CENTUM%20VP&amp;severity=low&amp;id=69c9befee6bfc5ba1d524370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5102-command-injection-in-totolink-a3300r-fdb9f73a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5102%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9befee6bfc5ba1d524373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-30-728f86ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-30&amp;severity=medium&amp;id=69cb1068e6bfc5ba1d83cbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30306-na-f64a590d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30306%3A%20n%2Fa&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30313-na-8166a460</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30313%3A%20n%2Fa&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30308-na-5353a88a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30308%3A%20n%2Fa&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30305-na-259404ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30305%3A%20n%2Fa&amp;severity=critical&amp;id=69cad4ace6bfc5ba1d651178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30307-na-4ce41ceb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30307%3A%20n%2Fa&amp;severity=critical&amp;id=69cacda7e6bfc5ba1d6188b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29872-na-eca84de0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29872%3A%20n%2Fa&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29925-na-684bc216</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29925%3A%20n%2Fa&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29924-na-58efd28c</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29924%3A%20n%2Fa&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30077-na-c0138794</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30077%3A%20n%2Fa&amp;severity=high&amp;id=69cab88de6bfc5ba1d56ff26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29954-na-ffb2524c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29954%3A%20n%2Fa&amp;severity=high&amp;id=69caa6f9e6bfc5ba1d4dfd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29909-na-552e3807</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29909%3A%20n%2Fa&amp;severity=medium&amp;id=69caa6f9e6bfc5ba1d4dfd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-30-67c01efa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-30&amp;severity=low&amp;id=69caa6f0e6bfc5ba1d4dfb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33643-na-14732c9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33643%3A%20n%2Fa&amp;severity=high&amp;id=69caa378e6bfc5ba1d4bb8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30556-na-352c7804</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30556%3A%20n%2Fa&amp;severity=medium&amp;id=69caa378e6bfc5ba1d4bb8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29953-na-34aa1f9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29953%3A%20n%2Fa&amp;severity=high&amp;id=69caa378e6bfc5ba1d4bb8b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34472-na-951eb9f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34472%3A%20n%2Fa&amp;severity=high&amp;id=69ca9c6fe6bfc5ba1d4725b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30562-na-d8e97f9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30562%3A%20n%2Fa&amp;severity=critical&amp;id=69ca9c6fe6bfc5ba1d4725ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30561-na-7eb11893</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30561%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30560-na-da409bb0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30560%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30559-na-24a2fd68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30559%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30558-na-d1116e3c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30558%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30557-na-4d52faa3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30557%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d47259e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29597-na-2ce820bf</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29597%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d472599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33373-na-22e2186d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33373%3A%20n%2Fa&amp;severity=high&amp;id=69ca9568e6bfc5ba1d43cfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30566-na-30d77aa8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30566%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30565-na-d2474f6a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30565%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30564-na-dd3b9500</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30564%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30563-na-22b162a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30563%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30082-na-75c73eab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30082%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5101-command-injection-in-totolink-a3300r-08bf6741</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5101%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4176-cwe-1395-dependency-on-vulnerable-th-556b643e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4176%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20SHAY%20perl&amp;severity=critical&amp;id=69c994c1e6bfc5ba1d0997a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4946-cwe-78-improper-neutralization-of-sp-c53cae64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4946%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20NSA%20Ghidra&amp;severity=high&amp;id=69c9832de6bfc5ba1dd34820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0558-cwe-287-improper-authentication-in-p-51fddf90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0558%3A%20CWE-287%20Improper%20Authentication%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69c97a88e6bfc5ba1dc8618d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0560-cwe-918-server-side-request-forgery--5103940b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0560%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69c97a88e6bfc5ba1dc86191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0562-cwe-863-incorrect-authorization-in-p-77e45474</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0562%3A%20CWE-863%20Incorrect%20Authorization%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69c97a88e6bfc5ba1dc86195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34005-cwe-78-improper-neutralization-of-s-b117df4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34005%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Xiongmai%20DVR%2FNVR%20devices&amp;severity=high&amp;id=69c95e2e919ccadcdf40cfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5046-stack-based-buffer-overflow-in-tenda-7d25f76d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5046%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=69c93781919ccadcdf2a290a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5045-stack-based-buffer-overflow-in-tenda-2a8bfe4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5045%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=69c92cf6919ccadcdf22c137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5044-stack-based-buffer-overflow-in-belki-0a467880</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5044%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c91b64919ccadcdf191739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5043-stack-based-buffer-overflow-in-belki-d08945f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5043%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c90d85919ccadcdf10f5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5042-stack-based-buffer-overflow-in-belki-bbfacd19</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5042%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c902c8919ccadcdf09eac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-threat-landscape-digest-january-february-2026-5b11ad26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Threat%20Landscape%20Digest%20January-February%202026&amp;severity=medium&amp;id=69c9885ae6bfc5ba1ddc37cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5041-command-injection-in-code-projects-c-82c5a99c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5041%3A%20Command%20Injection%20in%20code-projects%20Chamber%20of%20Commerce%20Membership%20Management%20System&amp;severity=medium&amp;id=69c8f839919ccadcdf040e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5037-stack-based-buffer-overflow-in-mxml-e2721322</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5037%3A%20Stack-based%20Buffer%20Overflow%20in%20mxml&amp;severity=medium&amp;id=69c8ea29919ccadcdffae6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5036-stack-based-buffer-overflow-in-tenda-210df5d9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5036%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%204G06&amp;severity=high&amp;id=69c8dc1a919ccadcdfea42e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5035-sql-injection-in-code-projects-accou-b844fbad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5035%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c8d18d919ccadcdfe4513a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5034-sql-injection-in-code-projects-accou-4be3d339</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5034%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c8c37e919ccadcdfda1ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5033-sql-injection-in-code-projects-accou-9e1a8bbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5033%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c8bc76919ccadcdfd4fa04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5031-improper-control-of-resource-identif-e4390a28</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5031%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69c8b56e919ccadcdfd0c4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5030-command-injection-in-totolink-nr1800-e137d8f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5030%3A%20Command%20Injection%20in%20Totolink%20NR1800X&amp;severity=medium&amp;id=69c8aaee919ccadcdfb97398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5024-stack-based-buffer-overflow-in-d-lin-e70f155a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5024%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69c89cd1919ccadcdfa20329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5023-os-command-injection-in-dedeveloper2-cc03c992</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5023%3A%20OS%20Command%20Injection%20in%20DeDeveloper23%20codebase-mcp&amp;severity=medium&amp;id=69c88b3d919ccadcdf8ee47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2602-cwe-79-improper-neutralization-of-in-4cab52e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2602%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20twentig%20Twentig%20Supercharged%20Block%20Editor%20%E2%80%93%20Blocks%2C%20Patterns%2C%20Starter%20Sites%2C%20Portfolio&amp;severity=medium&amp;id=69c88b3d919ccadcdf8ee47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5021-stack-based-buffer-overflow-in-tenda-f1fb8811</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5021%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c880b1919ccadcdf7c0d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5020-command-injection-in-totolink-a3600r-b468734a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5020%3A%20Command%20Injection%20in%20Totolink%20A3600R&amp;severity=medium&amp;id=69c879aa919ccadcdf6dd167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4851-cwe-502-deserialization-of-untrusted-4ee6eb90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4851%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20CASIANO%20GRID%3A%3AMachine&amp;severity=critical&amp;id=69c879aa919ccadcdf6dd163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-29-3c380d68</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-29&amp;severity=medium&amp;id=69c9bee8e6bfc5ba1d520a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-29-d62cc526</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-29&amp;severity=medium&amp;id=69c98a2ce6bfc5ba1dddddec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-29-d4ae1112</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-29&amp;severity=low&amp;id=69c8fbb6919ccadcdf066a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5019-sql-injection-in-code-projects-simpl-bb8230db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5019%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69c86817919ccadcdf560eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5018-sql-injection-in-code-projects-simpl-fa1c2f64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5018%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69c85a06919ccadcdf4a2818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5017-sql-injection-in-code-projects-simpl-b274ffdd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5017%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69c85a06919ccadcdf4a2811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5016-server-side-request-forgery-in-elecv-d734b993</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5016%3A%20Server-Side%20Request%20Forgery%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c84f7c919ccadcdf355adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5015-cross-site-scripting-in-elecv2-elecv-a07712f4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5015%3A%20Cross%20Site%20Scripting%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c844ee919ccadcdf10d93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5014-path-traversal-in-elecv2-elecv2p-4b247b7d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5014%3A%20Path%20Traversal%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c844ee919ccadcdf10d937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5013-path-traversal-in-elecv2-elecv2p-4c235acc</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5013%3A%20Path%20Traversal%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c83c4f919ccadcdf051ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5012-os-command-injection-in-elecv2-elecv-a675e27e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5012%3A%20OS%20Command%20Injection%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c82a1b2b68dbd88eb19d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3256-cwe-340-generation-of-predictable-nu-ad49460d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3256%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20KTAT%20HTTP%3A%3ASession&amp;severity=critical&amp;id=69c826972b68dbd88eafb4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15604-cwe-340-generation-of-predictable-n-ca970ba1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15604%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20TOKUHIROM%20Amon2&amp;severity=critical&amp;id=69c823142b68dbd88eadbff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5011-code-injection-in-elecv2-elecv2p-e0ba6ef3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5011%3A%20Code%20Injection%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c823142b68dbd88eadc006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5007-os-command-injection-in-kazuph-mcp-d-8c5548a0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5007%3A%20OS%20Command%20Injection%20in%20kazuph%20mcp-docs-rag&amp;severity=medium&amp;id=69c823142b68dbd88eadbffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5004-stack-based-buffer-overflow-in-wavli-7ae39014</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5004%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-WN579X3-C&amp;severity=high&amp;id=69c811842b68dbd88ea326b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5003-information-disclosure-in-promtengin-b6513727</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5003%3A%20Information%20Disclosure%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c811842b68dbd88ea326aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5002-injection-in-promtengineer-localgpt-1aabfd3d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5002%3A%20Injection%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c80a782b68dbd88e9f987c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cunning-predator-how-silver-fox-preys-on-japanes-697603f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20cunning%20predator%3A%20How%20Silver%20Fox%20preys%20on%20Japanese%20firms%20this%20tax%20season&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5001-unrestricted-upload-in-promtengineer-271f0511</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5001%3A%20Unrestricted%20Upload%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c7ffec2b68dbd88e794fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-003-operation-0ad14f82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20003%20-%20Operational%20Tempo%20Shift%20as%20Campaign%20Enters%20Monetization%20Phase%20With%20No%20New%20Compromises%20in%2048%20Hours%2C%20(Sat%2C%20Mar%2028th)&amp;severity=medium&amp;id=69c7f1db2b68dbd88e3e35d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5000-missing-authentication-in-promtengin-3eea2599</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5000%3A%20Missing%20Authentication%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c7ee562b68dbd88e316160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4999-path-traversal-in-z-9527-admin-04e5407b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4999%3A%20Path%20Traversal%20in%20z-9527%20admin&amp;severity=medium&amp;id=69c7ee562b68dbd88e31615a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4998-code-injection-in-sinaptik-ai-pandas-fd0c98b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4998%3A%20Code%20Injection%20in%20Sinaptik%20AI%20PandasAI&amp;severity=medium&amp;id=69c7d9402b68dbd88efcd7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4997-path-traversal-in-sinaptik-ai-pandas-33b63c5c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4997%3A%20Path%20Traversal%20in%20Sinaptik%20AI%20PandasAI&amp;severity=medium&amp;id=69c7ceb42b68dbd88ef8dca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4996-sql-injection-in-sinaptik-ai-pandasa-a62f3dcb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4996%3A%20SQL%20Injection%20in%20Sinaptik%20AI%20PandasAI&amp;severity=medium&amp;id=69c7c0a42b68dbd88ef18cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2595-cwe-79-improper-neutralization-of-in-ec76e7d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2595%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpquads%20Quads%20Ads%20Manager%20for%20Google%20AdSense&amp;severity=medium&amp;id=69c7bd322b68dbd88eeee801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9497-cwe-798-use-of-hard-coded-credential-05235081</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9497%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Microchip%20Time%20Provider%204100&amp;severity=medium&amp;id=69c7b6162b68dbd88eeae170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4995-cross-site-scripting-in-wandb-openui-72ab2620</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4995%3A%20Cross%20Site%20Scripting%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c7b2942b68dbd88ee17702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-themed-clickfix-attack-drops-infiniti-s-89c85cac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare-Themed%20ClickFix%20Attack%20Drops%20Infiniti%20Stealer%20on%20Macs&amp;severity=medium&amp;id=69c7af0f2b68dbd88edf21e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2442-cwe-93-improper-neutralization-of-cr-39aa3590</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2442%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=69c7a4822b68dbd88ed883f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4994-information-exposure-through-error-m-a1e2e3d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4994%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c83c4f919ccadcdf051abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4993-hard-coded-credentials-in-wandb-open-34206a49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4993%3A%20Hard-coded%20Credentials%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c83c4f919ccadcdf051ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telnyx-python-sdk-compromised-to-deliver-credentia-c990c297</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telnyx%20Python%20SDK%20Compromised%20to%20Deliver%20Credential-Stealing%20Malware&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breachforums-data-leaks-technical-analysis-and-tim-0df146b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BreachForums%20Data%20Leaks%3A%20Technical%20Analysis%20and%20Timeline%20Attribution%20(2022%E2%80%932026)&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1307-cwe-200-exposure-of-sensitive-inform-15467f36</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1307%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=69c77dd62b68dbd88eb19528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15445-cwe-862-missing-authorization-in-re-ebaf3148</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15445%3A%20CWE-862%20Missing%20Authorization%20in%20Restaurant%20Cafeteria&amp;severity=medium&amp;id=69c7734a2b68dbd88eabfb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12886-cwe-918-server-side-request-forgery-f4b6fece</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12886%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Laborator%20Oxygen%20-%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=69c74c9e2b68dbd88e79ce13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4987-cwe-20-improper-input-validation-in--6438ea07</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4987%3A%20CWE-20%20Improper%20Input%20Validation%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=high&amp;id=69c7307f2b68dbd88e6742d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-28-cf9131f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-28&amp;severity=medium&amp;id=69c86f15919ccadcdf5b95ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-28-e71c94e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-28&amp;severity=medium&amp;id=69c7e03f2b68dbd88effa8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-28-c40eedd1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-28&amp;severity=low&amp;id=69c7501a2b68dbd88e7d74a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1679-buffer-copy-without-checking-size-of-5ca8f17f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1679%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=69c7145f2b68dbd88e5638f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4248-cwe-285-improper-authorization-in-ul-0446e863</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4248%3A%20CWE-285%20Improper%20Authorization%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=high&amp;id=69c706502b68dbd88e324709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33996-cwe-476-null-pointer-dereference-in-d8cb8d7c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33996%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20benmcollins%20libjwt&amp;severity=medium&amp;id=69c706502b68dbd88e324705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33994-cwe-1321-improperly-controlled-modi-7ca08c52</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33994%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20locutusjs%20locutus&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33993-cwe-1321-improperly-controlled-modi-474a6f4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33993%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20locutusjs%20locutus&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33991-cwe-89-improper-neutralization-of-s-585124c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33991%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69c702cd2b68dbd88e2edf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33936-cwe-20-improper-input-validation-in-2b6599fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33936%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tlsfuzzer%20python-ecdsa&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4992-cross-site-scripting-in-wandb-openui-e8f6e690</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4992%3A%20Cross%20Site%20Scripting%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4991-cross-site-scripting-in-qdocs-smart--297c25d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4991%3A%20Cross%20Site%20Scripting%20in%20QDOCS%20Smart%20School%20Management%20System&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33989-cwe-22-improper-limitation-of-a-pat-761e1467</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33989%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mobile-next%20mobile-mcp&amp;severity=high&amp;id=69c6ff482b68dbd88e2a92a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33981-cwe-200-exposure-of-sensitive-infor-608754f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33981%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=69c6ff482b68dbd88e2a929d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33980-cwe-943-improper-neutralization-of--dc16a759</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33980%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20pab1it0%20adx-mcp-server&amp;severity=high&amp;id=69c6fa4f3c064ed76ffa5f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33979-cwe-183-permissive-list-of-allowed--75ae3464</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33979%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20AhmedAdelFahim%20express-xss-sanitizer&amp;severity=high&amp;id=69c6fa4f3c064ed76ffa5f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33955-cwe-79-improper-neutralization-of-i-04111b1f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33955%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20Notesnook%20Web%2FDesktop&amp;severity=high&amp;id=69c6fa4f3c064ed76ffa5f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4990-improper-authorization-in-chatwoot-9cefc3d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4990%3A%20Improper%20Authorization%20in%20chatwoot&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4988-denial-of-service-in-open5gs-42cbf14d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4988%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4985-integer-overflow-in-dloebl-cgif-5e373785</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4985%3A%20Integer%20Overflow%20in%20dloebl%20CGIF&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33976-cwe-79-improper-neutralization-of-i-cedece5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33976%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20Notesnook%20Web%2FDesktop&amp;severity=critical&amp;id=69c6fa4f3c064ed76ffa5f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33954-cwe-285-improper-authorization-in-k-60cf3f7a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33954%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Kovah%20LinkAce&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33953-cwe-918-server-side-request-forgery-aa47dbeb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33953%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27309-use-after-free-cwe-416-in-adobe-sub-e8186d78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27309%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33946-cwe-384-session-fixation-in-modelco-507e7510</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33946%3A%20CWE-384%3A%20Session%20Fixation%20in%20modelcontextprotocol%20ruby-sdk&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34226-cwe-201-insertion-of-sensitive-info-59be2af2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34226%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20capricorn86%20happy-dom&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33943-cwe-94-improper-control-of-generati-83e18bd5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33943%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20capricorn86%20happy-dom&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33941-cwe-79-improper-neutralization-of-i-0c3a00bd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33941%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33940-cwe-94-improper-control-of-generati-e76af596</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33940%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33939-cwe-754-improper-check-for-unusual--3cf356be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33939%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33938-cwe-94-improper-control-of-generati-a3f5c858</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33938%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f3473c064ed76ff618a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33937-cwe-843-access-of-resource-using-in-5708b559</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33937%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=critical&amp;id=69c6f3473c064ed76ff618a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33916-cwe-79-improper-neutralization-of-i-5e8c53a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33916%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=medium&amp;id=69c6f3473c064ed76ff6189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33907-cwe-476-null-pointer-dereference-in-c5f76ee9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33907%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c6f3473c064ed76ff61897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33906-cwe-269-improper-privilege-manageme-512598f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33906%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ellanetworks%20core&amp;severity=high&amp;id=69c6f3473c064ed76ff61892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33904-cwe-833-deadlock-in-ellanetworks-co-00359507</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33904%3A%20CWE-833%3A%20Deadlock%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c6f3473c064ed76ff6188d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33903-cwe-476-null-pointer-dereference-in-3ccc04e0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33903%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c6efd03c064ed76ff473fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33896-cwe-295-improper-certificate-valida-cdbadd36</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33896%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efd03c064ed76ff473f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33895-cwe-347-improper-verification-of-cr-95f9ae6f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33895%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efce3c064ed76ff462eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33894-cwe-347-improper-verification-of-cr-a7043394</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33894%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efce3c064ed76ff462e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33891-cwe-835-loop-with-unreachable-exit--0b104492</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33891%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efce3c064ed76ff462e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32187-defense-in-depth-in-microsoft-micro-ee466c6b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32187&amp;severity=null&amp;id=69c6efce3c064ed76ff462cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33887-cwe-862-missing-authorization-in-st-d67a668d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33887%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33886-cwe-200-exposure-of-sensitive-infor-6b040762</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33886%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33885-cwe-601-url-redirection-to-untruste-93d7d876</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33885%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33884-cwe-863-incorrect-authorization-in--b5e8a17b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33884%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33883-cwe-79-improper-neutralization-of-i-0694226b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33883%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33882-cwe-20-improper-input-validation-in-7a276760</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33882%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33881-cwe-94-improper-control-of-generati-d4c95438</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33881%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20windmill-labs%20windmill&amp;severity=high&amp;id=69c6ec5f3c064ed76ff25048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33879-cwe-307-improper-restriction-of-exc-fb0fa8de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33879%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20londonaicentre%20FLIP&amp;severity=low&amp;id=69c6ec5f3c064ed76ff25045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4976-buffer-overflow-in-totolink-lr350-f0bc237b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4976%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=69c6ec5f3c064ed76ff2504b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33875-cwe-940-improper-verification-of-so-189b5f61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33875%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20gematik%20app-Authenticator&amp;severity=critical&amp;id=69c6ec5f3c064ed76ff25042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33874-cwe-78-improper-neutralization-of-s-4c942ed9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33874%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20gematik%20app-Authenticator&amp;severity=high&amp;id=69c6ec5f3c064ed76ff2503c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34046-cwe-639-authorization-bypass-throug-a0ee16dd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34046%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c6e8bb3c064ed76ff077d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33873-cwe-94-improper-control-of-generati-cafbe4ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33873%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69c6e8bb3c064ed76ff077be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33872-cwe-362-concurrent-execution-using--727f216c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33872%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20revelrylabs%20elixir-nodejs&amp;severity=high&amp;id=69c6e53a3c064ed76fede072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4975-stack-based-buffer-overflow-in-tenda-817f95ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4975%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=69c6e53a3c064ed76fede086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4974-stack-based-buffer-overflow-in-tenda-15d8d9aa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4974%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=69c6e53a3c064ed76fede07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4973-cross-site-scripting-in-sourcecodest-f50d41d0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4973%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Quiz%20System&amp;severity=medium&amp;id=69c6e53a3c064ed76fede078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33765-cwe-78-improper-neutralization-of-s-3a7427e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33765%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20web&amp;severity=high&amp;id=69c6e1b93c064ed76febd417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33654-cwe-94-improper-control-of-generati-c2cfed7a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33654%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20HKUDS%20nanobot&amp;severity=high&amp;id=69c6e1b93c064ed76febd414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34205-cwe-923-improper-restriction-of-com-dfad0bbb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34205%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20home-assistant%20Home%20Assistant%20Operating%20System&amp;severity=critical&amp;id=69c6e1b93c064ed76febd41a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34475-cwe-180-incorrect-behavior-order-va-77fc7370</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34475%3A%20CWE-180%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=69c6e1b93c064ed76febd41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33045-cwe-79-improper-neutralization-of-i-245e58ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33045%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20home-assistant%20core&amp;severity=high&amp;id=69c6e1b93c064ed76febd410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33044-cwe-79-improper-neutralization-of-i-8931a13c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33044%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20home-assistant%20core&amp;severity=high&amp;id=69c6e1b93c064ed76febd40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32241-cwe-77-improper-neutralization-of-s-5b167894</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32241%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20flannel-io%20flannel&amp;severity=high&amp;id=69c6de373c064ed76fea1d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31951-cwe-200-exposure-of-sensitive-infor-2658a252</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31951%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69c6de373c064ed76fea1d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31950-cwe-284-improper-access-control-in--9692bdfc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31950%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69c6de373c064ed76fea1d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31945-cwe-918-server-side-request-forgery-6d761e69</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31945%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69c6de373c064ed76fea1d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31943-cwe-918-server-side-request-forgery-37c34fc7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31943%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69c6de373c064ed76fea1d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34391-cwe-488-exposure-of-data-element-to-d0ca6277</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34391%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6de373c064ed76fea1d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34389-cwe-287-improper-authentication-in--a644a652</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34389%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6de373c064ed76fea1d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4972-cross-site-scripting-in-code-project-71861764</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4972%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=69c6daaa3c064ed76fe814bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4971-cross-site-request-forgery-in-source-69d6fee6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4971%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Note%20Taking%20App&amp;severity=medium&amp;id=69c6daaa3c064ed76fe814b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34388-cwe-703-improper-check-or-handling--939ff080</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34388%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6daaa3c064ed76fe814b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-infrastructure-supply-chain-poisoning-alert-0bea3b94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Infrastructure%20Supply%20Chain%20Poisoning%20Alert&amp;severity=medium&amp;id=69c6de343c064ed76fea1bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aitm-phishing-targets-tiktok-business-accounts-usi-bb5b2f91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AitM%20Phishing%20Targets%20TikTok%20Business%20Accounts%20Using%20Cloudflare%20Turnstile%20Evasion&amp;severity=medium&amp;id=69c6de343c064ed76fea1be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bogus-website-fakes-virus-scan-installs-venom-stea-59949404</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bogus%20website%20fakes%20virus%20scan%2C%20installs%20Venom%20Stealer%20instead&amp;severity=medium&amp;id=69d636951cc7ad14da612bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34387-cwe-78-improper-neutralization-of-s-b0d45cde</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34387%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34386-cwe-89-improper-neutralization-of-s-4c1e8f40</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34386%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34385-cwe-89-improper-neutralization-of-s-b5e82d09</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34385%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29180-cwe-862-missing-authorization-in-fl-da4570c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29180%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4970-sql-injection-in-code-projects-socia-1b1f86da</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4970%3A%20SQL%20Injection%20in%20code-projects%20Social%20Networking%20Site&amp;severity=medium&amp;id=69c6d0203c064ed76fe28e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4969-cross-site-scripting-in-code-project-e2e4a1f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4969%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Social%20Networking%20Site&amp;severity=medium&amp;id=69c6d0203c064ed76fe28e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26061-cwe-770-allocation-of-resources-wit-73916d43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26061%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20fleetdm%20fleet&amp;severity=high&amp;id=69c6d01e3c064ed76fe28e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26060-cwe-613-insufficient-session-expira-e9113065</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26060%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34375-cwe-79-improper-neutralization-of-i-f0b41eba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34375%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c6d01e3c064ed76fe28e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34374-cwe-89-improper-neutralization-of-s-171f2208</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34374%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c6d01e3c064ed76fe28e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15612-cwe-295-improper-certificate-valida-2a970739</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15612%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Wazuh%20Wazuh%20Provisioning%20Scripts%20(Agent%20Build%20Environment)&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34369-cwe-862-missing-authorization-in-ww-b48b43d7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34369%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34368-cwe-362-concurrent-execution-using--5d1f951f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34368%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6c9173c064ed76fdf38a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34364-cwe-863-incorrect-authorization-in--077b2b46</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34364%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6c9173c064ed76fdf389d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15617-cwe-522-insufficiently-protected-cr-9454fac7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15617%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Wazuh%20Wazuh%20(GitHub%20Actions)&amp;severity=medium&amp;id=69c6c9173c064ed76fdf3893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4968-cross-site-request-forgery-in-source-af9ec2e0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4968%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Diary%20App&amp;severity=medium&amp;id=69c6c5913c064ed76fdb1782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4966-sql-injection-in-itsourcecode-free-h-6dc1800b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4966%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c6c5913c064ed76fdb177b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4965-improper-neutralization-of-directive-9aea4106</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4965%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20letta-ai%20letta&amp;severity=medium&amp;id=69c6c5913c064ed76fdb1775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4964-server-side-request-forgery-in-letta-1bb98fde</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4964%3A%20Server-Side%20Request%20Forgery%20in%20letta-ai%20letta&amp;severity=medium&amp;id=69c6c6913c064ed76fdc2946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4963-code-injection-in-huggingface-smolag-98db0746</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4963%3A%20Code%20Injection%20in%20huggingface%20smolagents&amp;severity=medium&amp;id=69c6c6913c064ed76fdc293d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4962-uncontrolled-search-path-in-ultravnc-34124aea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4962%3A%20Uncontrolled%20Search%20Path%20in%20UltraVNC&amp;severity=high&amp;id=69c6c5913c064ed76fdb178d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34362-cwe-613-insufficient-session-expira-8dde0450</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34362%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6b7823c064ed76fc77db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-iranian-hacking-group-claims-credit-for-hack-o-60a43961</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Iranian%20Hacking%20Group%20Claims%20Credit%20for%20Hack%20of%20FBI%20Director%20Kash%20Patel%E2%80%99s%20Personal%20Account&amp;severity=medium&amp;id=69c6b3fd3c064ed76fc55bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34247-cwe-862-missing-authorization-in-ww-01b2864d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34247%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6b7823c064ed76fc77db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15616-cwe-94-improper-control-of-generati-f69b8211</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15616%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Wazuh%20wazuh-agent&amp;severity=high&amp;id=69c6b7823c064ed76fc77d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34245-cwe-862-missing-authorization-in-ww-218357cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34245%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6b7823c064ed76fc77dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33867-cwe-312-cleartext-storage-of-sensit-e9914632</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33867%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c6b7823c064ed76fc77daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15615-cwe-276-incorrect-default-permissio-6c55aec2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15615%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Wazuh%20wazuh-manager&amp;severity=medium&amp;id=69c6c5913c064ed76fdb1789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15381-cwe-200-exposure-of-sensitive-infor-58cdecb0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15381%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=69c6c6913c064ed76fdc294c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33770-cwe-89-improper-neutralization-of-s-48be2040</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33770%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c6c6913c064ed76fdc2961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28369-inconsistent-interpretation-of-http-710a6b03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28369%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=high&amp;id=69c6c6913c064ed76fdc2957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28367-inconsistent-interpretation-of-http-86cc39b5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28367%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=high&amp;id=69c6c6913c064ed76fdc294f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28368-inconsistent-interpretation-of-http-8e8a214c</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28368%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=high&amp;id=69c6c6913c064ed76fdc2953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33767-cwe-89-improper-neutralization-of-s-be3257f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33767%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c6c20e3c064ed76fce99b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4961-stack-based-buffer-overflow-in-tenda-7613bc02</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4961%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=69c6c20e3c064ed76fce99b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4960-stack-based-buffer-overflow-in-tenda-f1d5709e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4960%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=69c6c6913c064ed76fdc2965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32983-cwe-276-incorrect-default-permissio-2038176e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32983%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Wazuh%20wazuh-manager&amp;severity=medium&amp;id=69c6a9723c064ed76fbf9381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4959-missing-authentication-in-openbmb-xa-57f06968</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4959%3A%20Missing%20Authentication%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=69c6a9723c064ed76fbf938c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4958-authorization-bypass-in-openbmb-xage-e355a4dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4958%3A%20Authorization%20Bypass%20in%20OpenBMB%20XAgent&amp;severity=low&amp;id=69c6a9723c064ed76fbf9385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/most-notable-supply-chain-attacks-of-2025-kaspersk-65bf714a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Most%20notable%20supply-chain%20attacks%20of%202025%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69c69b673c064ed76fb8319c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5027-cwe-22-improper-limitation-of-a-path-965c6426</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5027%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c69ee73c064ed76fb956b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4957-sensitive-information-in-log-files-i-50f0bde8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4957%3A%20Sensitive%20Information%20in%20Log%20Files%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=69c69ee73c064ed76fb956aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4956-sql-injection-in-shenzhen-ruiming-te-2de04042</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4956%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=69c69ee73c064ed76fb956a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4955-sql-injection-in-shenzhen-ruiming-te-8eb7713e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4955%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=69c69ee73c064ed76fb9569d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5026-cwe-79-improper-neutralization-of-in-c75988b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5026%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c69ee73c064ed76fb956b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5025-cwe-862-missing-authorization-in-lan-fcc5962e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5025%3A%20CWE-862%20Missing%20Authorization%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69c69ee73c064ed76fb956b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5010-cwe-79-improper-neutralization-of-in-055aca8f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5010%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Sanoma%20Clickedu&amp;severity=medium&amp;id=69c697e13c064ed76fb722b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-002-telnyx-py-dd315e4a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20002%20-%20Telnyx%20PyPI%20Compromise%2C%20Vect%20Ransomware%20Mass%20Affiliate%20Program%2C%20and%20First%20Named%20Victim%20Claim%2C%20(Fri%2C%20Mar%2027th)&amp;severity=medium&amp;id=69c694683c064ed76fb59f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5022-cwe-862-missing-authorization-in-lan-00d95863</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5022%3A%20CWE-862%20Missing%20Authorization%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69c697e33c064ed76fb722dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33766-cwe-918-server-side-request-forgery-f241f712</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33766%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33764-cwe-639-authorization-bypass-throug-9632a444</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33764%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-palo-alto-recruiter-scam-anti-deepfa-9f373486</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Palo%20Alto%20Recruiter%20Scam%2C%20Anti-Deepfake%20Chip%2C%20Google%20Sets%202029%20Quantum%20Deadline&amp;severity=medium&amp;id=69c6945a3c064ed76fb59acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33763-cwe-307-improper-restriction-of-exc-a4e305cb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33763%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27876-vulnerability-in-grafana-grafana-en-b51cbbf8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27876%3A%20Vulnerability%20in%20Grafana%20Grafana%20Enterprise&amp;severity=critical&amp;id=69c697e13c064ed76fb72296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33761-cwe-862-missing-authorization-in-ww-8ddf3006</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33761%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33759-cwe-862-missing-authorization-in-ww-e274f6e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33759%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb7229c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1496-cwe-639-authorization-bypass-through-d8c09de9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1496%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Black%20Duck%20Coverity&amp;severity=critical&amp;id=69c694993c064ed76fb5b666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4954-sql-injection-in-mingsoft-mcms-4f540294</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4954%3A%20SQL%20Injection%20in%20mingSoft%20MCMS&amp;severity=medium&amp;id=69c6949b3c064ed76fb5b75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4953-server-side-request-forgery-in-mings-e5843174</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4953%3A%20Server-Side%20Request%20Forgery%20in%20mingSoft%20MCMS&amp;severity=medium&amp;id=69c6949b3c064ed76fb5b756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11604-cwe-532-insertion-of-sensitive-info-df89216d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11604%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20OpenText%20IDM%20Driver%20and%20Extensions&amp;severity=high&amp;id=69c694993c064ed76fb5b65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33755-cwe-89-improper-neutralization-of-s-75a40d5b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33755%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=high&amp;id=69c6949b3c064ed76fb5b753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33750-cwe-400-uncontrolled-resource-consu-59607088</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33750%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20juliangruber%20brace-expansion&amp;severity=medium&amp;id=69c6949b3c064ed76fb5b747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33748-cwe-22-improper-limitation-of-a-pat-59db9529</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33748%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moby%20buildkit&amp;severity=high&amp;id=69c6949b3c064ed76fb5b742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33284-cwe-20-improper-input-validation-in-ead42146</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33284%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20globaleaks%20globaleaks-whistleblowing-software&amp;severity=low&amp;id=69c694993c064ed76fb5b681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33206-cwe-23-relative-path-traversal-in-k-107aaef1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33206%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69c694993c064ed76fb5b67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33205-cwe-918-server-side-request-forgery-a841d997</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33205%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69c694993c064ed76fb5b67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13478-cwe-522-insufficiently-protected-cr-a00443b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13478%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20OpenText%20Identity%20Manager&amp;severity=high&amp;id=69c68d533c064ed76fb2aba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32859-cwe-79-improper-neutralization-of-i-bce14615</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32859%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Bytedance%20Inc.%20DeerFlow&amp;severity=medium&amp;id=69c68d533c064ed76fb2aba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4982-cwe-20-improper-input-validation-in--05602973</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4982%3A%20CWE-20%20Improper%20input%20validation%20in%20pretix%20Venueless&amp;severity=high&amp;id=69c67f433c064ed76facb4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4620-cwe-78-improper-neutralization-of-sp-aca82dd8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4620%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20WX1500HP&amp;severity=high&amp;id=69c674b53c064ed76fa619de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4622-cwe-78-improper-neutralization-of-sp-3939268a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4622%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20WG2600HS&amp;severity=high&amp;id=69c674b53c064ed76fa619e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4621-cwe-912-hidden-functionality-in-nec--04a5c93b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4621%3A%20CWE-912%3A%20Hidden%20Functionality%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20W1200EX(-MS)&amp;severity=medium&amp;id=69c674b53c064ed76fa619e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4619-cwe-22-improper-limitation-of-a-path-83322c52</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4619%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20WX3600HP&amp;severity=medium&amp;id=69c671313c064ed76fa3fd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4309-cwe-862-missing-authorization-in-nec-06bc0ccd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4309%3A%20CWE-862%3A%20Missing%20Authorization%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20W1200EX(-MS)&amp;severity=medium&amp;id=69c671313c064ed76fa3fd84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-high-severity-router-vulnerabiliti-8c193f30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20High-Severity%20Router%20Vulnerabilities&amp;severity=high&amp;id=69c66dad3c064ed76fa11cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coruna-ios-exploit-kit-likely-an-update-to-operati-9113ab40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coruna%20iOS%20Exploit%20Kit%20Likely%20an%20Update%20to%20Operation%20Triangulation&amp;severity=medium&amp;id=69c65f9d3c064ed76f950c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-ptc-vulnerability-that-had-ger-e5854258</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20PTC%20Vulnerability%20That%20Had%20German%20Police%20Mobilized&amp;severity=critical&amp;id=69c64e093c064ed76f7d2b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3457-cwe-79-improper-neutralization-of-in-6c12ff4f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Thales%20Sentinel%20LDK%20Runtime&amp;severity=high&amp;id=69c64a8f3c064ed76f7aa1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-keitaro-abuse-part-2-one-platform-many-thre-3d831901</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20Keitaro%20Abuse%20Part%202%3A%20One%20Platform%2C%20Many%20Threats&amp;severity=medium&amp;id=69c6518c3c064ed76f7f61aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brushworm-and-brushlogger-uncovered-415a1fb0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BRUSHWORM%20and%20BRUSHLOGGER%20uncovered&amp;severity=medium&amp;id=69c6518c3c064ed76f7f6213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27860-improper-neutralization-of-special--6360e1c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27860%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=low&amp;id=69c63ffd3c064ed76f701ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27859-uncontrolled-resource-consumption-i-fe0e60ad</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27859%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27858-uncontrolled-resource-consumption-i-4ea18f33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27858%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27857-uncontrolled-resource-consumption-i-0011fc23</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27857%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27856-improper-authentication-in-open-xch-d601837d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27856%3A%20Improper%20Authentication%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27855-authentication-bypass-by-capture-re-77b5e888</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27855%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24031-improper-neutralization-of-special--f2f4e9b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24031%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0394-improper-limitation-of-a-pathname-to-145c4555</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0394%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59032-improper-input-validation-in-open-x-bd435fc8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59032%3A%20Improper%20Input%20Validation%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59031-exposure-of-sensitive-information-t-20c26aad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59031%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59028-improper-input-validation-in-open-x-87a912ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59028%3A%20Improper%20Input%20Validation%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14028-cwe-416-use-after-free-in-softing-s-b6d4a86a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14028%3A%20CWE-416%20Use%20after%20free%20in%20Softing%20smartLink%20HW-DP&amp;severity=medium&amp;id=69c61cf33c064ed76f58580c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22744-vulnerability-in-spring-spring-ai-8d7a4912</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22744%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69c61cf33c064ed76f585816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22743-vulnerability-in-spring-spring-ai-78da137c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22743%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69c61cf33c064ed76f585813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4948-incorrect-execution-assigned-permiss-0bd6a078</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4948%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c61cf33c064ed76f58582d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22742-vulnerability-in-spring-spring-ai-76d7852f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22742%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69c61cf33c064ed76f585810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33366-missing-authentication-for-critical-004c493d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33366%3A%20Missing%20authentication%20for%20critical%20function%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=medium&amp;id=69c61cf33c064ed76f585829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33280-hidden-functionality-in-buffalo-inc-cfe45036</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33280%3A%20Hidden%20functionality%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f585825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32678-authentication-bypass-using-an-alte-3ed7b3d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32678%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f585821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32669-code-injection-in-buffalo-inc-buffa-9c341c29</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32669%3A%20Code%20injection%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f58581d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27650-improper-neutralization-of-special--be872db1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27650%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f585819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22738-vulnerability-in-spring-spring-ai-473dec2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22738%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=critical&amp;id=69c615c93c064ed76f536685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33559-cross-site-scripting-xss-in-mika-op-88322545</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33559%3A%20Cross-site%20scripting%20(XSS)%20in%20MiKa%20OpenStreetMap&amp;severity=medium&amp;id=69c615c93c064ed76f536688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3098-cwe-862-missing-authorization-in-nex-82bd35df</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3098%3A%20CWE-862%20Missing%20Authorization%20in%20nextendweb%20Smart%20Slider%203&amp;severity=medium&amp;id=69c6c6933c064ed76fdc2987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4910-sql-injection-in-shenzhen-ruiming-te-af03ad8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4910%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=69c66dbb3c064ed76fa122ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4909-cross-site-scripting-in-code-project-c59d5b0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4909%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c5ef1e3c064ed76f1376f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4908-sql-injection-in-code-projects-simpl-05928344</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4908%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c5ef1e3c064ed76f1376e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4907-server-side-request-forgery-in-page--8799229c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4907%3A%20Server-Side%20Request%20Forgery%20in%20Page-Replica%20Page%20Replica&amp;severity=medium&amp;id=69c6949d3c064ed76fb5b813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4906-stack-based-buffer-overflow-in-tenda-f24bafca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4906%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c5da053c064ed76f01c452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33747-cwe-22-improper-limitation-of-a-pat-6a030cf7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33747%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moby%20buildkit&amp;severity=high&amp;id=69c5da053c064ed76f01c442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33745-cwe-200-exposure-of-sensitive-infor-23c6c791</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33745%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69c5da053c064ed76f01c43f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33935-cwe-307-improper-restriction-of-exc-874ceb6e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33935%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69c5da053c064ed76f01c44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33890-cwe-284-improper-access-control-in--d138f9e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33890%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69c5da053c064ed76f01c446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33735-cwe-285-improper-authorization-in-f-ea8d45fd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33735%3A%20CWE-285%3A%20Improper%20Authorization%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69c5da053c064ed76f01c43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33728-cwe-502-deserialization-of-untruste-d41c376a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33728%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20DataDog%20dd-trace-java&amp;severity=critical&amp;id=69c5d2fe3c064ed76ff4048b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33693-cwe-918-server-side-request-forgery-0d7a70f3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33693%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LemmyNet%20lemmy&amp;severity=medium&amp;id=69c5d2fe3c064ed76ff4047c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33701-cwe-502-deserialization-of-untruste-08578920</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33701%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20open-telemetry%20opentelemetry-java-instrumentation&amp;severity=critical&amp;id=69c5d2fe3c064ed76ff40486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30568-na-c7d5136b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30568%3A%20n%2Fa&amp;severity=medium&amp;id=69c6c9173c064ed76fdf389a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30567-na-34ea507a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30567%3A%20n%2Fa&amp;severity=medium&amp;id=69c6c9173c064ed76fdf3897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30576-na-4a704b17</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30576%3A%20n%2Fa&amp;severity=high&amp;id=69c6c6913c064ed76fdc295e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30574-na-1948478e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30574%3A%20n%2Fa&amp;severity=high&amp;id=69c6c6913c064ed76fdc295b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-27-783cd3d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-27&amp;severity=medium&amp;id=69c6c2053c064ed76fce23f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30575-na-ce7a4259</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30575%3A%20n%2Fa&amp;severity=high&amp;id=69c6b7823c064ed76fc77da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30571-na-aad3cfe6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30571%3A%20n%2Fa&amp;severity=medium&amp;id=69c6b7823c064ed76fc77da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30570-na-90f13cf1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30570%3A%20n%2Fa&amp;severity=medium&amp;id=69c6b7823c064ed76fc77da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30569-na-778534d9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30569%3A%20n%2Fa&amp;severity=medium&amp;id=69c6b7823c064ed76fc77d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30530-na-d795d87c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30530%3A%20n%2Fa&amp;severity=critical&amp;id=69c6acf53c064ed76fc0f14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30529-na-6d76fbec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30529%3A%20n%2Fa&amp;severity=high&amp;id=69c6acf53c064ed76fc0f14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30527-na-0e4ae47d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30527%3A%20n%2Fa&amp;severity=medium&amp;id=69c6acf53c064ed76fc0f149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30531-na-688119ea</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30531%3A%20n%2Fa&amp;severity=high&amp;id=69c6a9723c064ed76fbf937e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30302-na-b059f73c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30302%3A%20n%2Fa&amp;severity=critical&amp;id=69c6a9723c064ed76fbf937b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30534-na-ad84f286</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30534%3A%20n%2Fa&amp;severity=high&amp;id=69c6a26b3c064ed76fbc6561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30533-na-901e8879</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30533%3A%20n%2Fa&amp;severity=critical&amp;id=69c6a26b3c064ed76fbc655e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30532-na-be24c2b9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30532%3A%20n%2Fa&amp;severity=critical&amp;id=69c6a26b3c064ed76fbc655b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29871-na-8b7078d3</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29871%3A%20n%2Fa&amp;severity=high&amp;id=69c69ee73c064ed76fb9569a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30637-na-e7b36711</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30637%3A%20n%2Fa&amp;severity=high&amp;id=69c697e13c064ed76fb72299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69988-na-4a2623b9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69988%3A%20n%2Fa&amp;severity=medium&amp;id=69c697e13c064ed76fb72293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61190-na-08db7991</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61190%3A%20n%2Fa&amp;severity=medium&amp;id=69c697e13c064ed76fb7228e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30689-na-60d2c934</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30689%3A%20n%2Fa&amp;severity=high&amp;id=69c694993c064ed76fb5b676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30304-na-c6885618</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30304%3A%20n%2Fa&amp;severity=critical&amp;id=69c694993c064ed76fb5b670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30303-na-37247ce6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30303%3A%20n%2Fa&amp;severity=critical&amp;id=69c694993c064ed76fb5b66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69986-na-107043d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69986%3A%20n%2Fa&amp;severity=high&amp;id=69c694993c064ed76fb5b663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-27-89ac2f2e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-27&amp;severity=low&amp;id=69c635653c064ed76f6845e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33699-cwe-835-loop-with-unreachable-exit--d1313b63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33699%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69c5d2fe3c064ed76ff40481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27893-cwe-693-protection-mechanism-failur-a0dfde92</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27893%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20vllm-project%20vllm&amp;severity=high&amp;id=69c5c8713c064ed76fe63c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33697-cwe-322-key-exchange-without-entity-b574293b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33697%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20ultravioletrs%20cocos&amp;severity=high&amp;id=69c5c8713c064ed76fe63c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33945-cwe-22-improper-limitation-of-a-pat-4b327a65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33945%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20lxc%20incus&amp;severity=critical&amp;id=69c5c16a3c064ed76fe46d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33898-cwe-287-improper-authentication-in--26104083</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33898%3A%20CWE-287%3A%20Improper%20Authentication%20in%20lxc%20incus&amp;severity=high&amp;id=69c5c16a3c064ed76fe46d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4905-stack-based-buffer-overflow-in-tenda-a658b06f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4905%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c66dbb3c064ed76fa122e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4904-stack-based-buffer-overflow-in-tenda-f869e792</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4904%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c6c6933c064ed76fdc298c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33897-cwe-1336-improper-neutralization-of-fafd9faa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33897%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20lxc%20incus&amp;severity=critical&amp;id=69c5ba613c064ed76fe1f5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33743-cwe-770-allocation-of-resources-wit-4c38ea14</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33743%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20lxc%20incus&amp;severity=medium&amp;id=69c5ba613c064ed76fe1f5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33711-cwe-61-unix-symbolic-link-symlink-f-631adb75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33711%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20lxc%20incus&amp;severity=medium&amp;id=69c5ba613c064ed76fe1f5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33542-cwe-295-improper-certificate-valida-feeb9042</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33542%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20lxc%20incus&amp;severity=medium&amp;id=69c5ba613c064ed76fe1f5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4903-stack-based-buffer-overflow-in-tenda-b9940a9a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4903%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c5ba613c064ed76fe1f5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4902-stack-based-buffer-overflow-in-tenda-94214df0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4902%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c5ba613c064ed76fe1f5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4900-files-or-directories-accessible-in-c-df08f42b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4900%3A%20Files%20or%20Directories%20Accessible%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4899-cross-site-scripting-in-code-project-58c2a264</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4899%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33686-cwe-22-improper-limitation-of-a-pat-5344035e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33686%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20code16%20sharp&amp;severity=high&amp;id=69c5ac523c064ed76fd41c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12805-improper-isolation-or-compartmental-96bbe2f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12805%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%202.25&amp;severity=high&amp;id=69c5ac523c064ed76fd41c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33687-cwe-434-unrestricted-upload-of-file-ceb5ec07</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33687%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20code16%20sharp&amp;severity=high&amp;id=69c5ac523c064ed76fd41c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28377-vulnerability-in-grafana-tempo-a7a1aaaf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28377%3A%20Vulnerability%20in%20Grafana%20Tempo&amp;severity=high&amp;id=69c5ac523c064ed76fd41c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33672-cwe-1321-improperly-controlled-modi-73dc059c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33672%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20micromatch%20picomatch&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33671-cwe-1333-inefficient-regular-expres-753ec15d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33671%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20micromatch%20picomatch&amp;severity=high&amp;id=69c5a8ce3c064ed76fd1dae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0748-cwe-284-improper-access-control-in-d-2bf828b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0748%3A%20CWE-284%20Improper%20Access%20Control%20in%20Drupal%20Internationalization%20(i18n)%20-%20i18n_node%20submodule&amp;severity=medium&amp;id=69c5a8ce3c064ed76fd1dade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4346-cwe-312-cleartext-storage-of-sensiti-056ca912</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4346%3A%20CWE-312%20Cleartext%20storage%20of%20sensitive%20information%20in%20TP-Link%20Systems%20Inc.%20TL-WR850N%20v3&amp;severity=medium&amp;id=69c5a8ce3c064ed76fd1dae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33670-cwe-22-improper-limitation-of-a-pat-0880f67a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33670%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69c5a54b3c064ed76fcfc833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33669-cwe-125-out-of-bounds-read-in-siyua-064aace2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33669%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69c5a54b3c064ed76fcfc830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1556-cwe-200-exposure-of-sensitive-inform-0daf77f9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1556%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Drupal%20Drupal%20File%20(Field)%20Paths&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33664-cwe-79-improper-neutralization-of-i-c3eb5eac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33664%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kestra-io%20kestra&amp;severity=high&amp;id=69c5a54b3c064ed76fcfc82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3650-cwe-401-in-grassroots-grassroots-dic-a3ef7ceb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3650%3A%20CWE-401%20in%20Grassroots%20Grassroots%20DICOM%20(GDCM)&amp;severity=high&amp;id=69c5a54b3c064ed76fcfc836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/etherrat-sysinfo-module-c2-on-ethereum-etherhiding-38f718e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EtherRAT%20%26%20SYS_INFO%20Module%3A%20C2%20on%20Ethereum%20(EtherHiding)%2C%20Target%20Selection%2C%20CDN-Like%20Beacons&amp;severity=medium&amp;id=69c5a8cd3c064ed76fd1d915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4898-cross-site-scripting-in-code-project-dc1fb1e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4898%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc83b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33661-cwe-290-authentication-bypass-by-sp-0af23ed1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33661%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20yansongda%20pay&amp;severity=high&amp;id=69c5a54b3c064ed76fcfc828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33658-cwe-770-allocation-of-resources-wit-31281ecb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33658%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20rails%20activestorage&amp;severity=low&amp;id=69c5a54b3c064ed76fcfc821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33653-cwe-79-improper-neutralization-of-i-1514e992</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33653%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20farisc0de%20Uploady&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33645-cwe-22-improper-limitation-of-a-pat-2ac3bb97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33645%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ShaneIsrael%20fireshare&amp;severity=high&amp;id=69c5a1c53c064ed76fce0c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33638-cwe-862-missing-authorization-in-li-48adeeb6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33638%3A%20CWE-862%3A%20Missing%20Authorization%20in%20lin-snow%20Ech0&amp;severity=medium&amp;id=69c5a1c53c064ed76fce0c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-attack-installs-fake-browser-extension-f-658dbe72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20attack%20installs%20fake%20browser%20extension%20for%20surveillance&amp;severity=medium&amp;id=69c5a8cd3c064ed76fd1d9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3622-cwe-125-out-of-bounds-read-in-tp-lin-e6d670e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3622%3A%20CWE-125%20Out-of-bounds%20read%20in%20TP-Link%20Systems%20Inc.%20TL-WR841N%20v14&amp;severity=high&amp;id=69c59e483c064ed76fcd549a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33545-cwe-89-improper-neutralization-of-s-5827a82d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33545%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=medium&amp;id=69c59e483c064ed76fcd5495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33541-cwe-400-uncontrolled-resource-consu-40a6ca87</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33541%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20miraheze%20TSPortal&amp;severity=medium&amp;id=69c5973e3c064ed76fca3c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33738-cwe-79-improper-neutralization-of-i-ce3958ae</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33738%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LycheeOrg%20Lychee&amp;severity=medium&amp;id=69c5973e3c064ed76fca3c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4393-cwe-352-cross-site-request-forgery-c-f8a6aee5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4393%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Automated%20Logout&amp;severity=medium&amp;id=69c6c6943c064ed76fdc29fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4933-cwe-863-incorrect-authorization-in-d-e659c429</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4933%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Unpublished%20Node%20Permissions&amp;severity=high&amp;id=69c6c6943c064ed76fdc2a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3573-cwe-863-incorrect-authorization-in-d-6fdb0f15</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3573%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20AI%20(Artificial%20Intelligence)&amp;severity=high&amp;id=69c6c6943c064ed76fdc29fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0965-external-control-of-file-name-or-pat-52e92e8d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0965%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69c6c6933c064ed76fdc2993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0967-inefficient-regular-expression-compl-86bb3a06</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0967%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0968-null-pointer-dereference-in-red-hat--d915bdc4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0968%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0964-improper-limitation-of-a-pathname-to-2ae13e3e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0964%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c59e483c064ed76fcd549f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0966-buffer-underwrite-buffer-underflow-i-79e9d10d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0966%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21724-vulnerability-in-grafana-grafana-os-3abea496</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21724%3A%20Vulnerability%20in%20Grafana%20Grafana%20OSS&amp;severity=medium&amp;id=69c5a54c3c064ed76fcfc86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33375-vulnerability-in-grafana-grafana-os-67e46cbf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33375%3A%20Vulnerability%20in%20Grafana%20Grafana%20OSS&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33644-cwe-918-server-side-request-forgery-18b4775d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33644%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=69c6c6933c064ed76fdc299b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3532-cwe-178-improper-handling-of-case-se-f8b1305e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3532%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20Drupal%20OpenID%20Connect%20%2F%20OAuth%20client&amp;severity=medium&amp;id=69c6949d3c064ed76fb5b810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3531-cwe-288-authentication-bypass-using--7f0de8f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3531%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20OpenID%20Connect%20%2F%20OAuth%20client&amp;severity=medium&amp;id=69c6c6943c064ed76fdc29f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3530-cwe-918-server-side-request-forgery--497953a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3530%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Drupal%20OpenID%20Connect%20%2F%20OAuth%20client&amp;severity=medium&amp;id=69c6c6943c064ed76fdc29f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3529-cwe-79-improper-neutralization-of-in-db408486</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3529%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Google%20Analytics%20GA4&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3528-cwe-79-improper-neutralization-of-in-0832454b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3528%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Calculation%20Fields&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3527-cwe-306-missing-authentication-for-c-8c4d2498</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3527%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Drupal%20AJAX%20Dashboard&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3526-cwe-863-incorrect-authorization-in-d-45205db2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3526%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20File%20Access%20Fix%20(deprecated)&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3525-cwe-863-incorrect-authorization-in-d-79c13952</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3525%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20File%20Access%20Fix%20(deprecated)&amp;severity=medium&amp;id=69c6c6933c064ed76fdc299f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2100-access-of-uninitialized-pointer-in-r-70c93daf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2100%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69c59e483c064ed76fcd54a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33537-cwe-918-server-side-request-forgery-7e8f2ade</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33537%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LycheeOrg%20Lychee&amp;severity=medium&amp;id=69c6c6933c064ed76fdc2997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2239-improper-null-termination-in-red-hat-7affad82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2239%3A%20Improper%20Null%20Termination%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2272-integer-overflow-or-wraparound-in-re-e752abf5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2272%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69c5a54c3c064ed76fcfc87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2271-integer-overflow-or-wraparound-in-re-3121f72b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2271%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33532-cwe-674-uncontrolled-recursion-in-e-41e4ce98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33532%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20eemeli%20yaml&amp;severity=medium&amp;id=69c590393c064ed76fc7fe87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33632-cwe-862-missing-authorization-in-cr-df2ceb79</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33632%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69c58caf3c064ed76fc67000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2436-expired-pointer-dereference-in-red-h-af2e8042</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2436%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c58caf3c064ed76fc66fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33631-cwe-862-missing-authorization-in-cr-914bd25a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33631%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69c58caf3c064ed76fc66ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33529-cwe-22-improper-limitation-of-a-pat-7d574b44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33529%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tobychui%20zoraxy&amp;severity=low&amp;id=69c58caf3c064ed76fc66ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33528-cwe-22-improper-limitation-of-a-pat-44f0b1de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33528%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20yusing%20godoxy&amp;severity=medium&amp;id=69c58caf3c064ed76fc66ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3121-incorrect-privilege-assignment-in-re-84c0c7ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3121%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69c589333c064ed76fb16803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3190-improper-handling-of-insufficient-pe-09076be7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3190%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69c589333c064ed76fb16807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33152-cwe-307-improper-restriction-of-exc-e7cae15a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33152%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20TandoorRecipes%20recipes&amp;severity=critical&amp;id=69c589313c064ed76fb167cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33153-cwe-89-improper-neutralization-of-s-5b9303b4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33153%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69c589313c064ed76fb167d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33148-cwe-74-improper-neutralization-of-s-a7637ce2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33148%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69c589313c064ed76fb167c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29055-cwe-1230-exposure-of-sensitive-info-58c6e1d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29055%3A%20CWE-1230%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69c589313c064ed76fb167bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26213-cwe-78-improper-neutralization-of-s-27248bb9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26213%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20themactep%20thingino-firmware&amp;severity=high&amp;id=69c589313c064ed76fb167b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28503-cwe-639-authorization-bypass-throug-c45a9219</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28503%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69c589313c064ed76fb167b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33149-cwe-644-improper-neutralization-of--6d2eec85</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33149%3A%20CWE-644%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69c589313c064ed76fb167ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33506-cwe-87-improper-neutralization-of-a-799c9e0e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33506%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20ory%20polis&amp;severity=high&amp;id=69c589313c064ed76fb167d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33491-cwe-121-stack-based-buffer-overflow-786fa8ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33491%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20zenc-lang%20zenc&amp;severity=high&amp;id=69c582253c064ed76fa7cc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33505-cwe-89-improper-neutralization-of-s-7dc3388c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33505%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ory%20keto&amp;severity=high&amp;id=69c582253c064ed76fa7cc80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-001-x3f-check-550ef483</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20001%20-%20Checkmarx%20Scope%20Wider%20Than%20Reported%2C%20CISA%20KEV%20Entry%2C%20and%20Detection%20Tools%20Available%2C%20(Thu%2C%20Mar%2026th)&amp;severity=medium&amp;id=69c56d4ef4197a8e3bec2651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33504-cwe-89-improper-neutralization-of-s-f2d530e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33504%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ory%20hydra&amp;severity=high&amp;id=69c574363c064ed76f96818a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33503-cwe-89-improper-neutralization-of-s-32e281db</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33503%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ory%20kratos&amp;severity=high&amp;id=69c570d8f4197a8e3bef1f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33496-cwe-1289-improper-validation-of-uns-bd9362c1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33496%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20ory%20oathkeeper&amp;severity=high&amp;id=69c570d8f4197a8e3bef1f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33495-cwe-862-missing-authorization-in-or-b18fe7c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33495%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ory%20oathkeeper&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33494-cwe-23-relative-path-traversal-in-o-d845cb54</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33494%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20ory%20oathkeeper&amp;severity=critical&amp;id=69c570d8f4197a8e3bef1f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33732-cwe-706-use-of-incorrectly-resolved-ec758fd5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33732%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20h3js%20srvx&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33490-cwe-706-use-of-incorrectly-resolved-76c4af93</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33490%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20h3js%20h3&amp;severity=low&amp;id=69c570d8f4197a8e3bef1eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33487-cwe-347-improper-verification-of-cr-33820af1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33487%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20russellhaering%20goxmldsig&amp;severity=high&amp;id=69c570d8f4197a8e3bef1efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33486-cwe-918-server-side-request-forgery-62a4e798</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33486%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20roadiz%20core-bundle-dev-app&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33481-cwe-460-improper-cleanup-on-thrown--43cd4c99</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33481%3A%20CWE-460%3A%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20anchore%20syft&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33477-cwe-863-incorrect-authorization-in--b8176694</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33477%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20error311%20FileRise&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33470-cwe-862-missing-authorization-in-bl-cf242ca5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33470%3A%20CWE-862%3A%20Missing%20Authorization%20in%20blakeblackshear%20frigate&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33469-cwe-863-incorrect-authorization-in--e8c6070a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33469%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20blakeblackshear%20frigate&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33468-cwe-89-improper-neutralization-of-s-c6315e5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33468%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kysely-org%20kysely&amp;severity=high&amp;id=69c569d6f4197a8e3be94d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33442-cwe-89-improper-neutralization-of-s-f971cd6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33442%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kysely-org%20kysely&amp;severity=high&amp;id=69c569d6f4197a8e3be94d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34071-cwe-79-improper-neutralization-of-i-7eb8f515</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34071%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=medium&amp;id=69c569d8f4197a8e3be94dc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33438-cwe-770-allocation-of-resources-wit-1428d408</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33438%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33430-cwe-732-incorrect-permission-assign-a2e24fdd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33430%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20beeware%20briefcase&amp;severity=high&amp;id=69c569d6f4197a8e3be94d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33636-cwe-125-out-of-bounds-read-in-pnggr-69be97d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33636%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=high&amp;id=69c569d6f4197a8e3be94d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33416-cwe-416-use-after-free-in-pnggroup--f5d1ae3b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33416%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pnggroup%20libpng&amp;severity=high&amp;id=69c569d6f4197a8e3be94d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33402-cwe-79-improper-neutralization-of-i-2723f0f3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33402%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sakaiproject%20sakai&amp;severity=low&amp;id=69c569d6f4197a8e3be94d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33015-cwe-863-incorrect-authorization-in--329a7ec4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33015%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33014-cwe-863-incorrect-authorization-in--8d9fffcf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33014%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cff4197a8e3be49ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33009-cwe-362-concurrent-execution-using--5f9e12f3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33009%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c562cdf4197a8e3be49a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29044-cwe-863-incorrect-authorization-in--4438817d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29044%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27828-cwe-416-use-after-free-in-everest-e-adf48606</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27828%3A%20CWE-416%3A%20Use%20After%20Free%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27816-cwe-787-out-of-bounds-write-in-ever-984d5d0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27816%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27815-cwe-787-out-of-bounds-write-in-ever-bbd7f92c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27815%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27814-cwe-362-concurrent-execution-using--ab09716a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27814%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27813-cwe-416-use-after-free-in-everest-e-c8c578fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27813%3A%20CWE-416%3A%20Use%20After%20Free%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26074-cwe-362-concurrent-execution-using--22a9ae97</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26074%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c562cdf4197a8e3be49a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26073-cwe-122-heap-based-buffer-overflow--2f7a5923</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26073%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4897-allocation-of-resources-without-limi-69f0a690</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4897%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26072-cwe-362-concurrent-execution-using--e4f31acc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26072%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26071-cwe-362-concurrent-execution-using--b57a7aa5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26071%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26070-cwe-362-concurrent-execution-using--18848e3e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26070%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26008-cwe-125-out-of-bounds-read-in-evere-7e88bae7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26008%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c57a7d3c064ed76f9f9d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23995-cwe-121-stack-based-buffer-overflow-522c3df9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23995%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c57a7d3c064ed76f9f9cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22790-cwe-121-stack-based-buffer-overflow-96e39999</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22790%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c5583ef4197a8e3bdf81d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28298-cwe-79-improper-neutralization-of-i-936109e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28298%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=69c5583ef4197a8e3bdf81d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hightower-holding-data-breach-impacts-130000-86a37b28</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hightower%20Holding%20Data%20Breach%20Impacts%20130%2C000&amp;severity=high&amp;id=69c53f99f4197a8e3bceb0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27664-cwe-787-out-of-bounds-write-in-siem-ebaa8618</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27664%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20CPCI85%20Central%20Processing%2FCommunication&amp;severity=high&amp;id=69c57a7f3c064ed76f9f9d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27663-cwe-770-allocation-of-resources-wit-e3eb94b5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27663%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Siemens%20CPCI85%20Central%20Processing%2FCommunication&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28297-cwe-79-improper-neutralization-of-i-d551e15a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28297%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22593-cwe-193-off-by-one-error-in-everest-38a504ac</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22593%3A%20CWE-193%3A%20Off-by-one%20Error%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c57a7f3c064ed76f9f9d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33397-cwe-601-url-redirection-to-untruste-c4b42fd0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33397%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20angular%20angular-cli&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33413-cwe-862-missing-authorization-in-et-61b60199</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33413%3A%20CWE-862%3A%20Missing%20Authorization%20in%20etcd-io%20etcd&amp;severity=high&amp;id=69c53915f4197a8e3bcae392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bind-updates-patch-high-severity-vulnerabilities-34793081</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BIND%20Updates%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69c5389ef4197a8e3bcaa6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2389-cwe-79-improper-neutralization-of-in-e95028db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2389%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20complianz%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=medium&amp;id=69c53915f4197a8e3bcae383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1032-cwe-352-cross-site-request-forgery-c-1b8f5a85</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1032%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themifyme%20Conditional%20Menus&amp;severity=medium&amp;id=69c53915f4197a8e3bcae374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2231-cwe-79-improper-neutralization-of-in-d90c4f82</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Booking%20%E2%80%93%20The%20Ultimate%20Appointments%20Scheduling%2C%20Events%20Booking%2C%20Events%20Calendar%20Solution&amp;severity=high&amp;id=69c53915f4197a8e3bcae37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2511-cwe-89-improper-neutralization-of-sp-f3faec51</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2511%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rabilal%20JS%20Help%20Desk%20%E2%80%93%20AI-Powered%20Support%20%26%20Ticketing%20System&amp;severity=high&amp;id=69c53915f4197a8e3bcae389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55261-cwe-284-improper-access-control-in--baab77f9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55261%3A%20CWE-284%3A%20Improper%20Access%20Control.%20in%20HCL%20Aftermarket%20DPC&amp;severity=high&amp;id=69c53915f4197a8e3bcae368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55262-cwe-798-use-of-hardcoded-credential-37d59e42</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55262%3A%20CWE-798%3A%20Use%20of%20Hardcoded%20Credentials%20in%20HCL%20Aftermarket%20DPC&amp;severity=high&amp;id=69c53915f4197a8e3bcae36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4877-cross-site-scripting-in-itsourcecode-604d0d38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4877%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4876-sql-injection-in-itsourcecode-free-h-ad659424</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4876%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55263-cwe-798-use-of-hardcoded-credential-b91db2da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55263%3A%20CWE-798%3A%20Use%20of%20Hardcoded%20Credentials%20in%20HCL%20Aftermarket%20DPC&amp;severity=high&amp;id=69c53915f4197a8e3bcae36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55264-cwe-613-insufficient-session-expira-997c0a5b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55264%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c53915f4197a8e3bcae371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55265-cwe-200-exposure-of-sensitive-infor-68372ff5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55265%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55266-cwe-384-session-fixation-in-hcl-aft-d67e947d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55266%3A%20CWE-384%3A%20Session%20Fixation%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55267-cwe-434-unrestricted-upload-of-file-effaa833</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55267%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55268-cwe-799-improper-control-of-interac-a9785c6b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55268%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55269-cwe-521-weak-password-requirements--4fb9c015</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55269%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-caught-deep-within-telecom-backbon-b3568828</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Caught%20Deep%20Within%20Telecom%20Backbone%20Infrastructure&amp;severity=high&amp;id=69c52e06f4197a8e3bc6dce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55270-cwe-20-improper-input-validation-in-faaf28cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55270%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55271-cwe-113-improper-control-of-http-me-7d4c8383</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55271%3A%20CWE-113%3A%20Improper%20Control%20of%20HTTP%20Messages%20and%20Headers%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55272-cwe-200-exposure-of-sensitive-infor-a28716b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55272%3A%20CWE-200-Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1961-vulnerability-in-red-hat-red-hat-sat-9642e238</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1961%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69c531a1f4197a8e3bc7dda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55273-cwe-829-inclusion-of-functionality--e07fdb4b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55273%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55274-cwe-942-permissive-cross-domain-sec-e7c033c9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55274%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55275-cwe-557-concurrency-issues-is-a-cat-9231170e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55275%3A%20CWE-557%3A%20Concurrency%20Issues%20is%20a%20Category%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c531a1f4197a8e3bc7dd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55276-cwe-200-exposure-of-sensitive-infor-18030854</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55276%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c531a1f4197a8e3bc7dda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55277-cwe-1104-use-of-unmaintained-third--aa83e0be</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55277%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third-Party%20Components%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c531a1f4197a8e3bc7dda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-multiple-vulnerabilities-in-ios-soft-c1715c9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Multiple%20Vulnerabilities%20in%20IOS%20Software&amp;severity=high&amp;id=69c52a81f4197a8e3bc08f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4875-unrestricted-upload-in-itsourcecode--64bdb215</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4875%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c52aaff4197a8e3bc10e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41359-cwe-428-unquoted-search-path-or-ele-581de0c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41359%3A%20CWE-428%20Unquoted%20search%20path%20or%20element%20in%20Smallsrv%20Small%20HTTP&amp;severity=high&amp;id=69c52aaff4197a8e3bc10dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4887-off-by-one-error-in-red-hat-red-hat--b0d53159</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4887%3A%20Off-by-one%20Error%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69c531a1f4197a8e3bc7ddac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/illuminating-voidlink-technical-analysis-of-the-vo-858d2e9f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Illuminating%20VoidLink%3A%20Technical%20analysis%20of%20the%20VoidLink%20rootkit%20framework&amp;severity=medium&amp;id=69c575383c064ed76f98c818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41368-cwe-428-unquoted-search-path-or-ele-6e2efc0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41368%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Smallsrv%20Small%20HTTP&amp;severity=high&amp;id=69c51ff3f4197a8e3baa8dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4809-cwe-434-unrestricted-upload-of-file--9d4d9e8e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4809%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20plank%20laravel-mediable&amp;severity=critical&amp;id=69c57a7f3c064ed76f9f9d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24068-cwe-306-missing-authentication-for--4e55fde7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24068%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Vienna%20Symphonic%20Library%20GmbH%20Vienna%20Assistant&amp;severity=high&amp;id=69c57a7f3c064ed76f9f9d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alleged-redline-malware-administrator-extradited-t-54054e19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alleged%20RedLine%20Malware%20Administrator%20Extradited%20to%20US&amp;severity=medium&amp;id=69c50757f4197a8e3b57d4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-scammers-use-legitimate-surveys-to-link-to-mal-1b778cc8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20scammers%20use%20legitimate%20surveys%20to%20link%20to%20malicious%20sites%20%7C%20Kaspersky%20official%20blog&amp;severity=high&amp;id=69c503f9f4197a8e3b5009f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4263-cwe-863-in-hijiffy-hijiffy-chatbot-8b422826</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4263%3A%20CWE-863%20in%20HiJiffy%20HiJiffy%20Chatbot&amp;severity=medium&amp;id=69c5004ef4197a8e3b4e0c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4262-cwe-863-in-hijiffy-hijiffy-chatbot-f2ca6e4c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4262%3A%20CWE-863%20in%20HiJiffy%20HiJiffy%20Chatbot&amp;severity=medium&amp;id=69c5004ef4197a8e3b4e0c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4862-buffer-overflow-in-utt-hiper-1250gw-40a2fb82</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4862%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69c57a813c064ed76f9f9d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4861-stack-based-buffer-overflow-in-wavli-146cf306</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4861%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=69c57a813c064ed76f9f9d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4860-deserialization-in-648540858-wvp-gb2-3497b1a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4860%3A%20Deserialization%20in%20648540858%20wvp-GB28181-pro&amp;severity=medium&amp;id=69c57a813c064ed76f9f9d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4850-sql-injection-in-code-projects-simpl-7c6222f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4850%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c4eb47f4197a8e3b1b37b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4849-cross-site-scripting-in-code-project-04fed99d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4849%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c4eb47f4197a8e3b1b37b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4874-server-side-request-forgery-ssrf-in--bac01e84</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4874%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69c4e45ef4197a8e3b077baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4848-cross-site-scripting-in-dameng100-mu-d6b7d599</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4848%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c4dd2ff4197a8e3b036cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32680-incorrect-default-permissions-in-ra-38982bf7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32680%3A%20Incorrect%20default%20permissions%20in%20RATOC%20Systems%2C%20Inc.%20RATOC%20RAID%20Monitoring%20Manager%20for%20Windows&amp;severity=high&amp;id=69c4dd2ff4197a8e3b036ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28760-uncontrolled-search-path-element-in-f4dfdefd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28760%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RATOC%20Systems%2C%20Inc.%20RATOC%20RAID%20Monitoring%20Manager%20for%20Windows&amp;severity=high&amp;id=69c4dd2ff4197a8e3b036ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4847-cross-site-scripting-in-dameng100-mu-5ccb2c60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4847%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c57a813c064ed76f9f9d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1890-cwe-862-missing-authorization-in-lea-c5d9e609</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1890%3A%20CWE-862%20Missing%20Authorization%20in%20LeadConnector&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1430-cwe-79-cross-site-scripting-xss-in-w-525b9be3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1430%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Lightbox%202&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15488-cwe-863-incorrect-authorization-in--8e7b0524</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15488%3A%20CWE-863%20Incorrect%20Authorization%20in%20Responsive%20Plus&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15433-cwe-22-improper-limitation-of-a-pat-8ca8af04</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15433%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Shared%20Files&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4846-cross-site-scripting-in-dameng100-mu-b3f0d512</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4846%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c4cbeaf4197a8e3be7e188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4845-cross-site-scripting-in-dameng100-mu-4a854e54</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4845%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c4cbeaf4197a8e3be7e182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1206-cwe-639-authorization-bypass-through-4a5589d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1206%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=69c4cbeaf4197a8e3be7e17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4844-sql-injection-in-code-projects-onlin-007ab24e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4844%3A%20SQL%20Injection%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c4c10df4197a8e3be33f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4842-sql-injection-in-itsourcecode-online-aa2c2ede</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4842%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69c4c10df4197a8e3be33f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4389-cwe-79-improper-neutralization-of-in-91fdf8a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4389%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20DSGVO%20snippet%20for%20Leaflet%20Map%20and%20its%20Extensions&amp;severity=medium&amp;id=69c4c10df4197a8e3be33f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33201-active-debug-code-in-green-house-co-51d82983</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33201%3A%20Active%20debug%20code%20in%20GREEN%20HOUSE%20CO.%2C%20LTD.%20Digital%20Photo%20Frame%20GH-WDF10A&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4841-sql-injection-in-code-projects-onlin-8238b60a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4841%3A%20SQL%20Injection%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4840-os-command-injection-in-netcore-powe-abf3a5bc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4840%3A%20OS%20Command%20Injection%20in%20Netcore%20Power%2015AX&amp;severity=high&amp;id=69c4b67cf4197a8e3bc62afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4278-cwe-79-improper-neutralization-of-in-e053026e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Simple%20Download%20Counter&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4329-cwe-79-improper-neutralization-of-in-7fadd817</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4329%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Blackhole%20for%20Bad%20Bots&amp;severity=high&amp;id=69c4b67cf4197a8e3bc62ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4281-cwe-862-missing-authorization-in-tra-3757da8b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4281%3A%20CWE-862%20Missing%20Authorization%20in%20trainingbusinesspros%20FormLift%20for%20Infusionsoft%20Web%20Forms&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2931-cwe-269-improper-privilege-managemen-010fd6d0</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2931%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=high&amp;id=69c4b67cf4197a8e3bc62abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4331-cwe-862-missing-authorization-in-pr--0dab2dca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4331%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4839-sql-injection-in-sourcecodester-food-e8aa90c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4839%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4838-sql-injection-in-sourcecodester-mala-615eeafb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4838%3A%20SQL%20Injection%20in%20SourceCodester%20Malawi%20Online%20Market&amp;severity=medium&amp;id=69c57a813c064ed76f9f9d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4075-cwe-79-improper-neutralization-of-in-12e2e055</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4075%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xenioushk%20BWL%20Advanced%20FAQ%20Manager%20Lite&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1986-cwe-79-improper-neutralization-of-in-080d1d18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bakkbone%20FloristPress%20for%20Woo%20%E2%80%93%20Customize%20your%20eCommerce%20store%20for%20your%20Florist&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4335-cwe-79-improper-neutralization-of-in-06c1049a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4335%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shortpixel%20ShortPixel%20Image%20Optimizer%20%E2%80%93%20Optimize%20Images%2C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=69c574363c064ed76f968193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3328-cwe-502-deserialization-of-untrusted-c6e58efd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3328%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=high&amp;id=69c574363c064ed76f96818d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15101-cwe-352-cross-site-request-forgery--69e6a66a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15101%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ASUS%20Router&amp;severity=high&amp;id=69c49a9bf4197a8e3ba4b858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4836-sql-injection-in-code-projects-accou-316a9d9c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4836%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c49a9bf4197a8e3ba4b863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4835-cross-site-scripting-in-code-project-fa7a83cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4835%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c49a9bf4197a8e3ba4b85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4484-cwe-862-missing-authorization-in-mas-b0ab7a1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4484%3A%20CWE-862%20Missing%20Authorization%20in%20masteriyo%20Masteriyo%20LMS%20%E2%80%93%20Online%20Course%20Builder%20for%20eLearning%2C%20LMS%20%26%20Education&amp;severity=high&amp;id=69c574363c064ed76f96819b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4833-uncontrolled-recursion-in-orc-discou-358572e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4833%3A%20Uncontrolled%20Recursion%20in%20Orc%20discount&amp;severity=medium&amp;id=69c57a813c064ed76f9f9da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4831-improper-authentication-in-kalcaddle-40f256df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4831%3A%20Improper%20Authentication%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33285-cwe-20-improper-input-validation-in-e876aad9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33285%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33287-cwe-20-improper-input-validation-in-8d1f4372</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33287%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33942-cwe-502-deserialization-of-untruste-6acf0f28</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33942%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20saloonphp%20saloon&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33183-cwe-22-improper-limitation-of-a-pat-6fc6a028</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33183%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20saloonphp%20saloon&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33182-cwe-918-server-side-request-forgery-18e7372d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33182%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20saloonphp%20saloon&amp;severity=medium&amp;id=69c4854ef4197a8e3b9c70b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4830-unrestricted-upload-in-kalcaddle-kod-a213e944</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4830%3A%20Unrestricted%20Upload%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c4854ef4197a8e3b9c70d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33526-cwe-416-use-after-free-in-squid-cac-5f2ea159</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33526%3A%20CWE-416%3A%20Use%20After%20Free%20in%20squid-cache%20squid&amp;severity=critical&amp;id=69c4854ef4197a8e3b9c70cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33515-cwe-125-out-of-bounds-read-in-squid-bad315ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33515%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20squid-cache%20squid&amp;severity=medium&amp;id=69c4854ef4197a8e3b9c70c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32748-cwe-413-improper-resource-locking-i-9668aaa3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32748%3A%20CWE-413%3A%20Improper%20Resource%20Locking%20in%20squid-cache%20squid&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-26-90d7bb1a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-26&amp;severity=medium&amp;id=69c5cbec3c064ed76fe7358e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30463-na-586b440c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30463%3A%20n%2Fa&amp;severity=high&amp;id=69c589313c064ed76fb167c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29969-na-1728d200</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29969%3A%20n%2Fa&amp;severity=medium&amp;id=69c589313c064ed76fb167bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30458-na-4904e2a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30458%3A%20n%2Fa&amp;severity=critical&amp;id=69c582253c064ed76fa7cc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30457-na-d7294d25</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30457%3A%20n%2Fa&amp;severity=critical&amp;id=69c582253c064ed76fa7cc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30162-na-48435b40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30162%3A%20n%2Fa&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29934-na-6cb2fe65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29934%3A%20n%2Fa&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29933-na-76fc1d31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29933%3A%20n%2Fa&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29905-na-f2c91621</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29905%3A%20n%2Fa&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29976-na-cc0463b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29976%3A%20n%2Fa&amp;severity=medium&amp;id=69c5583ef4197a8e3bdf81dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-26-e34c1331</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-26&amp;severity=medium&amp;id=69c5155ff4197a8e3b699407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-26-6fa2acb9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-26&amp;severity=low&amp;id=69c5155ff4197a8e3b6993ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4826-sql-injection-in-sourcecodester-sale-014c0565</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4826%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c473c4f4197a8e3b95d0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4758-cwe-22-improper-limitation-of-a-path-df4e4af3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4758%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=high&amp;id=69c473c4f4197a8e3b95d0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4825-sql-injection-in-sourcecodester-sale-57e01f2e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4825%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c465a0f4197a8e3b8c5c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-campaigns-targeting-windows-and-macos-c26c50a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Campaigns%20Targeting%20Windows%20and%20macOS&amp;severity=medium&amp;id=69c45b4af4197a8e3b8530f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4824-improper-privilege-management-in-ent-256ebce0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4824%3A%20Improper%20Privilege%20Management%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=high&amp;id=69c45b4bf4197a8e3b853230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4823-information-disclosure-in-enter-soft-fe52e1e0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4823%3A%20Information%20Disclosure%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=low&amp;id=69c45b4bf4197a8e3b853229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-almost-everything-again-march-2026-e-8a57b153</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20(almost)%20everything%20again.%20March%202026%20edition.%2C%20(Wed%2C%20Mar%2025th)&amp;severity=medium&amp;id=69c4540cf4197a8e3b8345f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36187-cwe-532-insertion-of-sensitive-info-21a2100b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36187%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Knowledge%20Catalog%20Standard%20Cartridge&amp;severity=medium&amp;id=69c45423f4197a8e3b8350cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14684-cwe-117-improper-output-neutralizat-675e266b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14684%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20Maximo%20Application%20Suite%20-%20Monitor%20Component&amp;severity=medium&amp;id=69c45423f4197a8e3b8350cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14807-cwe-644-improper-neutralization-of--e705d38e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14807%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44d04f4197a8e3b816de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1015-cwe-918-server-side-request-forgery--fe2a9abf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1015%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44d04f4197a8e3b816de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1014-cwe-319-cleartext-transmission-of-se-5bb59961</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1014%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b808341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2483-cwe-79-improper-neutralization-of-in-01b82064</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2483%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b808344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64648-cwe-319-cleartext-transmission-of-s-948f3d08</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64648%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b80833e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64647-cwe-1240-use-of-a-cryptographic-pri-9d2f9c2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64647%3A%20CWE-1240%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b80833b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2484-cwe-79-improper-neutralization-of-in-8686e32a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2484%3A%20CWE-209%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b808347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64646-cwe-14-compiler-removal-of-code-to--9d00dd55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64646%3A%20CWE-14%20Compiler%20Removal%20of%20Code%20to%20Clear%20Buffers%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b808338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36440-cwe-522-insufficiently-protected-cr-ac354b6d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36440%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b808335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4822-creation-of-temporary-file-with-inse-2bbaf2cd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4822%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=high&amp;id=69c44986f4197a8e3b808396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36438-cwe-923-improper-restriction-of-com-1070ef1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36438%3A%20CWE-923%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b808332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36422-cwe-352-cross-site-request-forgery--9037caee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36422%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b80832f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36258-cwe-256-plaintext-storage-of-a-pass-144ff010</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36258%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=69c44983f4197a8e3b80832c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2485-cwe-79-improper-neutralization-of-in-d0e0e6f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2485%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33249-cwe-863-incorrect-authorization-in--7f6c995e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33249%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c4460af4197a8e3b7fad03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14974-cwe-639-authorization-bypass-throug-7e5352bf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14974%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33223-cwe-290-authentication-bypass-by-sp-e3ccf04a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33223%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c4460af4197a8e3b7facfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1262-cwe-209-generation-of-error-message--4ed78fae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1262%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33248-cwe-287-improper-authentication-in--a81f505e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33248%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c4460af4197a8e3b7facff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14917-cwe-1393-use-of-default-password-in-ab8c3ff9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14917%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=medium&amp;id=69c44608f4197a8e3b7facc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14912-cwe-918-server-side-request-forgery-cb0e7d2f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14912%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14915-cwe-200-exposure-of-sensitive-infor-533c205b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14915%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=medium&amp;id=69c44608f4197a8e3b7facc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14810-cwe-613-insufficient-session-expira-0d27dc5a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14810%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33222-cwe-285-improper-authorization-in-n-d2948671</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33222%3A%20CWE-285%3A%20Improper%20Authorization%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1561-cwe-918-server-side-request-forgery--adcc7a2a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1561%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=medium&amp;id=69c44608f4197a8e3b7faccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14808-cwe-598-use-of-get-request-method-w-b05e7948</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14808%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=low&amp;id=69c44608f4197a8e3b7facb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14790-cwe-522-insufficiently-protected-cr-373250bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14790%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c4427ef4197a8e3b7e9793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12708-cwe-798-use-of-hard-coded-credentia-e429c055</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12708%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c4427ef4197a8e3b7e9790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33247-cwe-215-insertion-of-sensitive-info-38b359f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33247%3A%20CWE-215%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c4427ef4197a8e3b7e9796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33219-cwe-770-allocation-of-resources-wit-c95e60aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33219%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c43f15f4197a8e3b7dafe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33218-cwe-20-improper-input-validation-in-fea485f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33218%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33246-cwe-287-improper-authentication-in--c898d481</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33246%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c43f15f4197a8e3b7dafee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33217-cwe-863-incorrect-authorization-in--c7070ad9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33217%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33216-cwe-256-plaintext-storage-of-a-pass-27b1c15c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33216%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29785-cwe-476-null-pointer-dereference-in-7dd3aed5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29785%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27889-cwe-190-integer-overflow-or-wraparo-32673245</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27889%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43b99f4197a8e3b7c5650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33751-cwe-90-improper-neutralization-of-s-b0a156ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33751%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c430e5f4197a8e3b78e0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33749-cwe-79-improper-neutralization-of-i-904c9e5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33749%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c430e5f4197a8e3b78e0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33724-cwe-639-authorization-bypass-throug-8d5f5a1d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33724%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c42db5f4197a8e3b77dc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33809-cwe-400-uncontrolled-resource-consu-beac3202</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33809%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20golang.org%2Fx%2Fimage%20golang.org%2Fx%2Fimage%2Ftiff&amp;severity=medium&amp;id=69c42db5f4197a8e3b77dc29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33722-cwe-863-incorrect-authorization-in--3e68670b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33722%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c477fbf4197a8e3b97b114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33720-cwe-863-incorrect-authorization-in--1556d918</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33720%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c4427ef4197a8e3b7e979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33713-cwe-89-improper-neutralization-of-s-44a2cba0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33713%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c422f4f4197a8e3b7492f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartapesg-campaign-pushes-remcos-rat-netsupport-r-ee8c4812</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartApeSG%20campaign%20pushes%20Remcos%20RAT%2C%20NetSupport%20RAT%2C%20StealC%2C%20and%20Sectop%20RAT%20(ArechClient2)%2C%20(Wed%2C%20Mar%2025th)&amp;severity=medium&amp;id=69c33747f4197a8e3bad16e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33696-cwe-1321-improperly-controlled-modi-9ddf2aba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33696%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69c422f4f4197a8e3b7492f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33665-cwe-287-improper-authentication-in--29d56016</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33665%3A%20CWE-287%3A%20Improper%20Authentication%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c422f4f4197a8e3b7492f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33663-cwe-639-authorization-bypass-throug-7119d589</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33663%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c41f52f4197a8e3b733a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33660-cwe-94-improper-control-of-generati-e1c73d20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33660%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69c41f52f4197a8e3b733a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27496-cwe-908-use-of-uninitialized-resour-028f34c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27496%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c41f52f4197a8e3b733a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2414-cwe-639-authorization-bypass-through-311195cb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2414%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20HYPR%20Server&amp;severity=medium&amp;id=69c41848f4197a8e3b706bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25645-cwe-377-insecure-temporary-file-in--0a7a2193</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25645%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20psf%20requests&amp;severity=medium&amp;id=69c41848f4197a8e3b706bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29092-cwe-613-insufficient-session-expira-030605f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29092%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20kiteworks%20Kiteworks%20Email%20Protection%20Gateway&amp;severity=medium&amp;id=69c41848f4197a8e3b706bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23636-cwe-434-unrestricted-upload-of-file-e86233b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23636%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kiteworks%20Secure%20Data%20Forms&amp;severity=medium&amp;id=69c41848f4197a8e3b706bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23635-cwe-523-unprotected-transport-of-cr-3edcc72b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23635%3A%20CWE-523%3A%20Unprotected%20Transport%20of%20Credentials%20in%20kiteworks%20Secure%20Data%20Forms&amp;severity=medium&amp;id=69c41848f4197a8e3b706bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1712-cwe-266-incorrect-privilege-assignme-5bbca1c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1712%3A%20CWE-266%20Incorrect%20privilege%20assignment%20in%20HYPR%20Server&amp;severity=medium&amp;id=69c41848f4197a8e3b706bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34085-cwe-193-off-by-one-error-in-fontcon-a1337185</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34085%3A%20CWE-193%20Off-by-one%20Error%20in%20fontconfig%20project%20fontconfig&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df38204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trojanization-of-trivy-checkmarx-and-litellm-solut-76ab2283</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trojanization%20of%20Trivy%2C%20Checkmarx%2C%20and%20LiteLLM%20solutions%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69c40dfef4197a8e3b6b43ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32573-improper-control-of-generation-of-c-2c0edccd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32573%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=critical&amp;id=69c41186f4197a8e3b6d7015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32567-improper-limitation-of-a-pathname-t-3382e216</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32567%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20icopydoc%20YML%20for%20Yandex%20Market&amp;severity=medium&amp;id=69c41186f4197a8e3b6d7012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32562-missing-authorization-in-wp-folio-t-f0e51ed8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32562%3A%20Missing%20Authorization%20in%20WP%20Folio%20Team%20PPWP&amp;severity=medium&amp;id=69c41186f4197a8e3b6d700f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32546-missing-authorization-in-stellarwp--93cf40ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32546%3A%20Missing%20Authorization%20in%20StellarWP%20Restrict%20Content&amp;severity=high&amp;id=69c41186f4197a8e3b6d700c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32545-improper-neutralization-of-input-du-8a5633fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Taboola%20Taboola%20Pixel&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32544-improper-neutralization-of-input-du-b8adb14f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OOPSpam%20Team%20OOPSpam%20Anti-Spam&amp;severity=high&amp;id=69c41184f4197a8e3b6d6feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32542-improper-neutralization-of-input-du-830f7ea0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32541-missing-authorization-in-premmerce--c97b7d13</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32541%3A%20Missing%20Authorization%20in%20Premmerce%20Premmerce%20Redirect%20Manager&amp;severity=medium&amp;id=69c41184f4197a8e3b6d6fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32539-improper-neutralization-of-special--8d618b97</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32539%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PublishPress%20PublishPress%20Revisions&amp;severity=critical&amp;id=69c41184f4197a8e3b6d6fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32538-insertion-of-sensitive-information--6016ed45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32538%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Noor%20Alam%20SMTP%20Mailer&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32537-improper-control-of-filename-for-in-c5fa8348</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32537%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nK%20Visual%20Portfolio%2C%20Photo%20Gallery%20%26%20Post%20Grid&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32536-unrestricted-upload-of-file-with-da-30e15f7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32536%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20halfdata%20Green%20Downloads&amp;severity=critical&amp;id=69c41184f4197a8e3b6d6fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32535-authorization-bypass-through-user-c-fbf0d9b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32535%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=medium&amp;id=69c41184f4197a8e3b6d6fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32534-improper-neutralization-of-special--17829d2c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32534%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32532-improper-neutralization-of-input-du-ac5edecc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHunk%20Contact%20Form%20%26%20Lead%20Form%20Elementor%20Builder&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32531-improper-control-of-filename-for-in-3d6efdb5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32531%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Kunco&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32530-incorrect-privilege-assignment-in-w-8827c7ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32530%3A%20Incorrect%20Privilege%20Assignment%20in%20WPFunnels%20Creator%20LMS&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32529-improper-neutralization-of-input-du-a9882ad5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32529%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20don-themes%20Molla&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32528-improper-neutralization-of-input-du-976fcd8a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20don-themes%20Riode&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32527-missing-authorization-in-crm-perks--eda475e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32527%3A%20Missing%20Authorization%20in%20CRM%20Perks%20WP%20Insightly%20for%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%20and%20Ninja%20Forms&amp;severity=medium&amp;id=69c41182f4197a8e3b6d6f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32526-improper-neutralization-of-input-du-eb7cf27d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VillaTheme%20Abandoned%20Cart%20Recovery%20for%20WooCommerce&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32525-improper-control-of-generation-of-c-10cda367</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32525%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20jetmonsters%20JetFormBuilder&amp;severity=critical&amp;id=69c41182f4197a8e3b6d6f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32524-unrestricted-upload-of-file-with-da-ddbe7892</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32524%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Jordy%20Meow%20Photo%20Engine&amp;severity=critical&amp;id=69c41182f4197a8e3b6d6f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32523-unrestricted-upload-of-file-with-da-30c41908</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32523%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20denishua%20WPJAM%20Basic&amp;severity=critical&amp;id=69c41182f4197a8e3b6d6f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32522-improper-limitation-of-a-pathname-t-fa6877c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32522%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20WooCommerce%20Support%20Ticket%20System&amp;severity=high&amp;id=69c41180f4197a8e3b6d6f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32521-improper-neutralization-of-input-du-4a72f545</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Northern%20Beaches%20Websites%20WP%20Custom%20Admin%20Interface&amp;severity=medium&amp;id=69c41180f4197a8e3b6d6f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32520-incorrect-privilege-assignment-in-a-5d9f8707</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32520%3A%20Incorrect%20Privilege%20Assignment%20in%20Andrew%20Munro%20%2F%20AffiliateWP%20RewardsWP&amp;severity=critical&amp;id=69c41180f4197a8e3b6d6f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32519-incorrect-privilege-assignment-in-b-8aea8889</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32519%3A%20Incorrect%20Privilege%20Assignment%20in%20Bit%20Apps%20Bit%20SMTP&amp;severity=critical&amp;id=69c41180f4197a8e3b6d6efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32518-improper-neutralization-of-input-du-9053212d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imithemes%20Gaea&amp;severity=high&amp;id=69c41180f4197a8e3b6d6efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32517-improper-neutralization-of-input-du-a0590be1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kleor%20Contact%20Manager&amp;severity=high&amp;id=69c41180f4197a8e3b6d6ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32516-improper-neutralization-of-special--35bb8d98</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32516%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20Miraculous%20Core%20Plugin&amp;severity=high&amp;id=69c41180f4197a8e3b6d6ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32515-missing-authorization-in-kamleshyad-ed9cf013</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32515%3A%20Missing%20Authorization%20in%20kamleshyadav%20Miraculous&amp;severity=high&amp;id=69c41180f4197a8e3b6d6ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32514-missing-authorization-in-anton-voyt-091d3c0d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32514%3A%20Missing%20Authorization%20in%20Anton%20Voytenko%20Petitioner&amp;severity=medium&amp;id=69c41180f4197a8e3b6d6eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32513-deserialization-of-untrusted-data-i-d00dee70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32513%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Miguel%20Useche%20JS%20Archive%20List&amp;severity=high&amp;id=69c41180f4197a8e3b6d6eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32512-deserialization-of-untrusted-data-i-b9608d49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32512%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Pelicula&amp;severity=critical&amp;id=69c4117ef4197a8e3b6d6a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32511-deserialization-of-untrusted-data-i-e2a4eb69</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32511%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mikado-Themes%20St%C3%A5l&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32510-deserialization-of-untrusted-data-i-81fc87c4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32510%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Kamperen&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32509-deserialization-of-untrusted-data-i-91be25ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32509%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Gracey&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32508-deserialization-of-untrusted-data-i-aaac9dad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32508%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mikado-Themes%20Halstein&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32507-deserialization-of-untrusted-data-i-86a48eec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32507%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Elated-Themes%20Leroux&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32506-deserialization-of-untrusted-data-i-11a3f625</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32506%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Archicon&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32505-improper-control-of-filename-for-in-756108d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32505%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20Kiddy&amp;severity=high&amp;id=69c4117ef4197a8e3b6d6a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32504-improper-control-of-filename-for-in-eb99558c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32504%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20VintWood&amp;severity=high&amp;id=69c4117ef4197a8e3b6d6a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32503-improper-control-of-filename-for-in-db36e62f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32503%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20Trendustry&amp;severity=high&amp;id=69c4117ef4197a8e3b6d6a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32502-deserialization-of-untrusted-data-i-259fb77d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Select-Themes%20Borgholm&amp;severity=critical&amp;id=69c4117bf4197a8e3b6d698e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32501-missing-authorization-in-wp-configu-85e5ff6c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32501%3A%20Missing%20Authorization%20in%20wp-configurator%20WP%20Configurator%20Pro&amp;severity=high&amp;id=69c4117bf4197a8e3b6d698b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32500-improper-control-of-filename-for-in-f87d3394</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32500%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20MetaMax&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32499-improper-neutralization-of-special--f2e4594a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32499%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20QuantumCloud%20ChatBot&amp;severity=critical&amp;id=69c4117bf4197a8e3b6d6985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32498-missing-authorization-in-metagauss--fd323904</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32498%3A%20Missing%20Authorization%20in%20Metagauss%20RegistrationMagic&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32497-weak-authentication-in-pickplugins--65a7d26f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32497%3A%20Weak%20Authentication%20in%20PickPlugins%20User%20Verification&amp;severity=medium&amp;id=69c4117bf4197a8e3b6d697f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32496-improper-limitation-of-a-pathname-t-f9367de2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32496%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NYSL%20Spam%20Protect%20for%20Contact%20Form%207&amp;severity=medium&amp;id=69c4117bf4197a8e3b6d697c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32495-missing-authorization-in-link-softw-0177db45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32495%3A%20Missing%20Authorization%20in%20Link%20Software%20LLC%20WP%20Terms%20Popup&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32494-improper-neutralization-of-input-du-0a3167aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32494%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Image%20Slider%20by%20Ays&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32493-improper-neutralization-of-input-du-7e045118</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32493%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyecix%20JobSearch&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32492-authentication-bypass-by-spoofing-i-48fca6f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32492%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32491-improper-neutralization-of-input-du-4b1d4953</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20Review%20Slider&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32490-improper-neutralization-of-input-du-a19709b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32490%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20TripAdvisor%20Review%20Slider&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32489-missing-authorization-in-bplugins-b-e50c755d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32489%3A%20Missing%20Authorization%20in%20bPlugins%20B%20Blocks&amp;severity=medium&amp;id=69c41179f4197a8e3b6d693f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32488-incorrect-privilege-assignment-in-w-e8ce43f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32488%3A%20Incorrect%20Privilege%20Assignment%20in%20wpeverest%20User%20Registration&amp;severity=high&amp;id=69c41179f4197a8e3b6d693c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32485-missing-authorization-in-wedevs-wp--d23f13b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32485%3A%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=high&amp;id=69c41179f4197a8e3b6d6939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32484-deserialization-of-untrusted-data-i-c5fa625c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32484%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldGrid%20weForms&amp;severity=high&amp;id=69c41179f4197a8e3b6d6936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32483-missing-authorization-in-codepeople-f65c56f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32483%3A%20Missing%20Authorization%20in%20codepeople%20Contact%20Form%20Email&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32482-unrestricted-upload-of-file-with-da-5ecc0844</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32482%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20deothemes%20Ona&amp;severity=critical&amp;id=69c41179f4197a8e3b6d6930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32441-missing-authorization-in-webtoffee--d04ac58b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32441%3A%20Missing%20Authorization%20in%20WebToffee%20Comments%20Import%20%26%20Export&amp;severity=high&amp;id=69c41179f4197a8e3b6d692d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31921-missing-authorization-in-devteam-ha-ce279ec3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31921%3A%20Missing%20Authorization%20in%20Devteam%20HaywoodTech%20Product%20Rearrange%20for%20WooCommerce&amp;severity=high&amp;id=69c41177f4197a8e3b6d6918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31920-improper-neutralization-of-special--f0f4e53d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31920%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Devteam%20HaywoodTech%20Product%20Rearrange%20for%20WooCommerce&amp;severity=critical&amp;id=69c41177f4197a8e3b6d6915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31914-improper-neutralization-of-input-du-4e199ded</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31914%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hookandhook%20WP%20Courses%20LMS&amp;severity=medium&amp;id=69c41177f4197a8e3b6d6912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31913-improper-limitation-of-a-pathname-t-190f10fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31913%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Whitebox-Studio%20Scape&amp;severity=high&amp;id=69c41177f4197a8e3b6d690f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27095-deserialization-of-untrusted-data-i-3a0c4341</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27095%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Bus%20Ticket%20Booking%20with%20Seat%20Reservation&amp;severity=critical&amp;id=69c41177f4197a8e3b6d690c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27088-improper-neutralization-of-input-du-10a8339d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Darna%20Framework&amp;severity=high&amp;id=69c41177f4197a8e3b6d6909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27087-improper-neutralization-of-input-du-c3c61ba6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27087%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Wolverine%20Framework&amp;severity=high&amp;id=69c41177f4197a8e3b6d6906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27084-deserialization-of-untrusted-data-i-e6ad1406</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27084%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Buisson&amp;severity=critical&amp;id=69c41177f4197a8e3b6d6903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27083-deserialization-of-untrusted-data-i-fb46cf45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27083%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Work%20%26%20Travel%20Company&amp;severity=critical&amp;id=69c41177f4197a8e3b6d6900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27082-deserialization-of-untrusted-data-i-3c16b289</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27082%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Love%20Story&amp;severity=critical&amp;id=69c41177f4197a8e3b6d68fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27081-improper-control-of-filename-for-in-b9e8b6ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27081%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Rosebud&amp;severity=high&amp;id=69c41174f4197a8e3b6d686b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27080-improper-control-of-filename-for-in-dd489a67</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27080%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Deston&amp;severity=high&amp;id=69c41174f4197a8e3b6d6868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27079-improper-control-of-filename-for-in-5336a0a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27079%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Amfissa&amp;severity=high&amp;id=69c41174f4197a8e3b6d6865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27078-improper-control-of-filename-for-in-72ce9988</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27078%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Emaurri&amp;severity=high&amp;id=69c41174f4197a8e3b6d6862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27077-improper-control-of-filename-for-in-40b7dc68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27077%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20MultiOffice&amp;severity=high&amp;id=69c41174f4197a8e3b6d685f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27076-improper-control-of-filename-for-in-b31dff94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20LuxeDrive&amp;severity=high&amp;id=69c41174f4197a8e3b6d685c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27075-improper-control-of-filename-for-in-9116c16b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27075%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Belfort&amp;severity=high&amp;id=69c41174f4197a8e3b6d6859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27073-use-of-hard-coded-credentials-in-ad-760a6dc7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27073%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Addi%20Addi%20%E2%80%93%20Cuotas%20que%20se%20adaptan%20a%20ti&amp;severity=high&amp;id=69c41174f4197a8e3b6d6856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27071-missing-authorization-in-arraytics--f16ab7b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27071%3A%20Missing%20Authorization%20in%20Arraytics%20WPCafe&amp;severity=critical&amp;id=69c41174f4197a8e3b6d6853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27054-improper-neutralization-of-input-du-761ca3e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27054%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Soledad%20Data%20Migrator&amp;severity=high&amp;id=69c41174f4197a8e3b6d6850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27051-incorrect-privilege-assignment-in-u-035d2e67</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27051%3A%20Incorrect%20Privilege%20Assignment%20in%20uxper%20Golo&amp;severity=critical&amp;id=69c41172f4197a8e3b6d683f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27049-authentication-bypass-using-an-alte-24d72b53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27049%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20NooTheme%20Jobica%20Core&amp;severity=critical&amp;id=69c41172f4197a8e3b6d683c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27048-improper-control-of-filename-for-in-8b7ba223</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27048%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20The%20Aisle%20Core&amp;severity=high&amp;id=69c41172f4197a8e3b6d6839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27047-improper-control-of-filename-for-in-845e4f48</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Curly%20Core&amp;severity=high&amp;id=69c41172f4197a8e3b6d6836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27046-missing-authorization-in-kaira-stor-444e1023</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27046%3A%20Missing%20Authorization%20in%20Kaira%20StoreCustomizer&amp;severity=medium&amp;id=69c41172f4197a8e3b6d6833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27045-deserialization-of-untrusted-data-i-a6914a73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27045%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sbthemes%20WooCommerce%20Infinite%20Scroll&amp;severity=high&amp;id=69c41172f4197a8e3b6d6830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27044-improper-control-of-generation-of-c-c10f38bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27044%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20TotalSuite%20Total%20Poll%20Lite&amp;severity=critical&amp;id=69c41172f4197a8e3b6d682d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27040-improper-limitation-of-a-pathname-t-dc8cd6ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27040%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AA-Team%20WZone&amp;severity=high&amp;id=69c41172f4197a8e3b6d682a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27039-improper-neutralization-of-special--9707ccfb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27039%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20WZone&amp;severity=high&amp;id=69c41172f4197a8e3b6d6827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25469-missing-authorization-in-viabill-fo-0b2405f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25469%3A%20Missing%20Authorization%20in%20ViaBill%20for%20WooCommerce%20ViaBill%20%E2%80%93%20WooCommerce&amp;severity=medium&amp;id=69c41172f4197a8e3b6d6824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25465-improper-neutralization-of-input-du-b9f38aef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20CP%20Multi%20View%20Event%20Calendar&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25464-improper-control-of-filename-for-in-9d7d7430</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25464%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TieLabs%20Jannah&amp;severity=high&amp;id=69c41170f4197a8e3b6d67e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25461-improper-neutralization-of-input-du-d64bbe4c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25461%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20Listeo%20Core&amp;severity=high&amp;id=69c41170f4197a8e3b6d67e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25460-missing-authorization-in-liquidthem-dc3e13e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25460%3A%20Missing%20Authorization%20in%20LiquidThemes%20Ave%20Core&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25458-improper-control-of-filename-for-in-993290d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25458%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Moments&amp;severity=high&amp;id=69c41170f4197a8e3b6d67e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25457-improper-control-of-filename-for-in-027ff191</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25457%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Mixtape&amp;severity=high&amp;id=69c41170f4197a8e3b6d67dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25456-missing-authorization-in-aarsiv-gro-66b0cf89</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25456%3A%20Missing%20Authorization%20in%20Aarsiv%20Groups%20Automated%20FedEx%20live%2Fmanual%20rates%20with%20shipping%20labels&amp;severity=high&amp;id=69c41170f4197a8e3b6d67da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25455-missing-authorization-in-pickplugin-51114f3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25455%3A%20Missing%20Authorization%20in%20PickPlugins%20Product%20Slider%20for%20WooCommerce&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25454-missing-authorization-in-mvpthemes--168504b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25454%3A%20Missing%20Authorization%20in%20MVPThemes%20The%20League&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25452-improper-neutralization-of-input-du-98103dff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDO%20Remoji&amp;severity=high&amp;id=69c41170f4197a8e3b6d67d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25447-improper-control-of-generation-of-c-a962fb02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25447%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jonathan%20Daggerhart%20Widget%20Wrangler&amp;severity=critical&amp;id=69c4116ef4197a8e3b6d676b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25437-missing-authorization-in-gzseo-37f57a2b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25437%3A%20Missing%20Authorization%20in%20GZSEO&amp;severity=medium&amp;id=69c4116ef4197a8e3b6d6768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25435-improper-neutralization-of-input-du-6e8a091b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25435%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25430-missing-authorization-in-crm-perks--2f7a8884</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25430%3A%20Missing%20Authorization%20in%20CRM%20Perks%20Integration%20for%20Mailchimp%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Ninja%20Forms&amp;severity=medium&amp;id=69c4116ef4197a8e3b6d6762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25429-deserialization-of-untrusted-data-i-c090ef86</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25429%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpdive%20Nexa%20Blocks&amp;severity=critical&amp;id=69c4116ef4197a8e3b6d675f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25417-improper-neutralization-of-input-du-db9ee3e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25417%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=medium&amp;id=69c4116ef4197a8e3b6d675c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25414-incorrect-privilege-assignment-in-i-ae58ac67</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25414%3A%20Incorrect%20Privilege%20Assignment%20in%20iqonicdesign%20WPBookit%20Pro&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25413-unrestricted-upload-of-file-with-da-6b6e6389</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25413%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20iqonicdesign%20WPBookit%20Pro&amp;severity=critical&amp;id=69c4116ef4197a8e3b6d6756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25406-authentication-bypass-using-an-alte-113a07b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25406%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Themeum%20Tutor%20LMS%20Pro&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25401-missing-authorization-in-arni-cinco-2a8cc6d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25401%3A%20Missing%20Authorization%20in%20Arni%20Cinco%20WPCargo%20Track%20%26%20Trace&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25400-deserialization-of-untrusted-data-i-e01202e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25400%3A%20Deserialization%20of%20Untrusted%20Data%20in%20thememount%20Apicona&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25398-missing-authorization-in-webilia-in-56d79e3f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25398%3A%20Missing%20Authorization%20in%20Webilia%20Inc.%20Vertex%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69c4116bf4197a8e3b6d6694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25397-path-traversal-in-snowray-software--101897ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25397%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Snowray%20Software%20File%20Uploader%20for%20WooCommerce&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25396-missing-authorization-in-coderpress-f1f55866</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25396%3A%20Missing%20Authorization%20in%20CoderPress%20Commerce%20Coinbase%20For%20WooCommerce&amp;severity=high&amp;id=69c4116bf4197a8e3b6d668e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25390-missing-authorization-in-saad-iqbal-30d5d6a8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25390%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=medium&amp;id=69c4116bf4197a8e3b6d668b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25383-improper-neutralization-of-input-du-ad52f22e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25383%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Iqonic%20Design%20KiviCare&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25382-improper-control-of-filename-for-in-b1a3f429</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25382%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20IdealAuto&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25381-improper-control-of-filename-for-in-bf3ae8f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20LoveDate&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25380-improper-control-of-filename-for-in-4e514365</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25380%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20Feedy&amp;severity=high&amp;id=69c4116bf4197a8e3b6d667f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25379-improper-control-of-filename-for-in-41f5b03d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25379%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20StreamVid&amp;severity=high&amp;id=69c4116bf4197a8e3b6d667c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25377-improper-neutralization-of-special--774b684d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25377%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20eyecix%20Addon%20Jobsearch%20Chat&amp;severity=critical&amp;id=69c41169f4197a8e3b6d6605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25376-improper-neutralization-of-input-du-2017ea9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25376%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyecix%20Addon%20Jobsearch%20Chat&amp;severity=high&amp;id=69c41169f4197a8e3b6d6602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25373-improper-neutralization-of-input-du-50c7553d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25373%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ProgressionStudios%20Vayvo&amp;severity=high&amp;id=69c41169f4197a8e3b6d65ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25371-improper-neutralization-of-special--46b7e8b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25371%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20King-Theme%20Lumise%20Product%20Designer&amp;severity=critical&amp;id=69c41169f4197a8e3b6d65fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25366-improper-control-of-generation-of-c-95f22122</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25366%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Themeisle%20Woody%20ad%20snippets&amp;severity=critical&amp;id=69c41169f4197a8e3b6d65f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25365-missing-authorization-in-zgr-karala-13cb1701</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25365%3A%20Missing%20Authorization%20in%20%C3%96zg%C3%BCr%20KARALAR%20Kargo%20Takip&amp;severity=medium&amp;id=69c41169f4197a8e3b6d65f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25361-improper-neutralization-of-input-du-4f4fc631</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20WpEvently&amp;severity=high&amp;id=69c41169f4197a8e3b6d65f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25360-deserialization-of-untrusted-data-i-d79678be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25360%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Vex&amp;severity=high&amp;id=69c41169f4197a8e3b6d65f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25359-deserialization-of-untrusted-data-i-e2af6acf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25359%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Pendulum&amp;severity=high&amp;id=69c41169f4197a8e3b6d65ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25358-deserialization-of-untrusted-data-i-869f82c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25358%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Meloo&amp;severity=high&amp;id=69c41169f4197a8e3b6d65e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25357-authentication-bypass-using-an-alte-e7be9ed2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25357%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20azzaroco%20Ultimate%20Membership%20Pro&amp;severity=high&amp;id=69c41167f4197a8e3b6d65d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25356-improper-neutralization-of-input-du-aedbab8d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Yobazar&amp;severity=high&amp;id=69c41167f4197a8e3b6d65cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25355-improper-neutralization-of-input-du-75f9668b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Sanzo&amp;severity=medium&amp;id=69c41167f4197a8e3b6d65cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25354-improper-neutralization-of-input-du-58fc7554</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Reebox&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25353-improper-neutralization-of-input-du-b074cc58</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Nooni&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25352-improper-neutralization-of-input-du-3bf1831f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20MyDecor&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25351-improper-neutralization-of-input-du-ab648dad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20MyMedi&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25350-improper-neutralization-of-input-du-cf606794</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Miti&amp;severity=high&amp;id=69c41167f4197a8e3b6d65bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25349-improper-neutralization-of-input-du-ed2d256e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Loobek&amp;severity=high&amp;id=69c41167f4197a8e3b6d65ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25347-improper-neutralization-of-input-du-88ea1079</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Acato%20WP%20REST%20Cache&amp;severity=high&amp;id=69c41167f4197a8e3b6d65b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25346-improper-neutralization-of-input-du-d7dfaca8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25346%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20FAQ%20Builder%20AYS&amp;severity=high&amp;id=69c41165f4197a8e3b6d653d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25345-improper-validation-of-specified-qu-69a2904c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25345%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20GalleryCreator%20SimpLy%20Gallery&amp;severity=critical&amp;id=69c41165f4197a8e3b6d6539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25344-exposure-of-sensitive-system-inform-64e99ef5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25344%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20RadiusTheme%20Review%20Schema&amp;severity=medium&amp;id=69c41165f4197a8e3b6d6536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25342-improper-neutralization-of-input-du-75a343ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25342%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kutethemes%20Boutique&amp;severity=high&amp;id=69c41165f4197a8e3b6d6533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25341-improper-neutralization-of-input-du-de6a8483</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RSJoomla!%20RSFirewall!&amp;severity=high&amp;id=69c41165f4197a8e3b6d6530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25340-improper-neutralization-of-special--f22658f3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25340%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=critical&amp;id=69c41165f4197a8e3b6d6527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25339-insertion-of-sensitive-information--fdbd3e98</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25339%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=medium&amp;id=69c41165f4197a8e3b6d6523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25334-incorrect-privilege-assignment-in-w-09e2a0d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25334%3A%20Incorrect%20Privilege%20Assignment%20in%20wordpresschef%20Salon%20Booking%20System%20Pro&amp;severity=high&amp;id=69c41165f4197a8e3b6d6520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25328-improper-limitation-of-a-pathname-t-501c9a47</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25328%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20add-ons.org%20Product%20File%20Upload%20for%20WooCommerce&amp;severity=medium&amp;id=69c41165f4197a8e3b6d651d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25327-missing-authorization-in-rustaurius-33400d06</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25327%3A%20Missing%20Authorization%20in%20Rustaurius%20Five%20Star%20Restaurant%20Reservations&amp;severity=medium&amp;id=69c41165f4197a8e3b6d651a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25317-missing-authorization-in-tychesoftw-01e3cefb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25317%3A%20Missing%20Authorization%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=high&amp;id=69c41163f4197a8e3b6d6267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25309-missing-authorization-in-publishpre-c18d5b56</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25309%3A%20Missing%20Authorization%20in%20PublishPress%20PublishPress%20Authors&amp;severity=high&amp;id=69c41163f4197a8e3b6d6264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25306-improper-neutralization-of-input-du-407c5d8f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25306%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=high&amp;id=69c41163f4197a8e3b6d6261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25304-improper-neutralization-of-input-du-3a5b82f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25304%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Jaroti&amp;severity=high&amp;id=69c41163f4197a8e3b6d625e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25035-authentication-bypass-using-an-alte-6dd433fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25035%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=critical&amp;id=69c41163f4197a8e3b6d625b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25034-missing-authorization-in-iqonic-des-53bb8eb7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25034%3A%20Missing%20Authorization%20in%20Iqonic%20Design%20KiviCare&amp;severity=medium&amp;id=69c41163f4197a8e3b6d6258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25033-improper-neutralization-of-input-du-fc49554a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uixthemes%20Motta%20Addons&amp;severity=high&amp;id=69c41163f4197a8e3b6d6255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25032-deserialization-of-untrusted-data-i-9bca17dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25032%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20Ricky&amp;severity=critical&amp;id=69c41163f4197a8e3b6d6252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25031-deserialization-of-untrusted-data-i-4588f14a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25031%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20Tasty%20Daily&amp;severity=critical&amp;id=69c41163f4197a8e3b6d624f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25030-deserialization-of-untrusted-data-i-0109f9ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25030%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20Goldish&amp;severity=critical&amp;id=69c41163f4197a8e3b6d624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25029-deserialization-of-untrusted-data-i-e68eb6ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25029%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20KIDZ&amp;severity=critical&amp;id=69c41161f4197a8e3b6d6200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25026-missing-authorization-in-radiusthem-020ee7c9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25026%3A%20Missing%20Authorization%20in%20RadiusTheme%20Team&amp;severity=high&amp;id=69c41161f4197a8e3b6d61fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25025-improper-neutralization-of-input-du-08bd84c1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikRestaurants&amp;severity=high&amp;id=69c41161f4197a8e3b6d61fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25018-improper-neutralization-of-input-du-acecd365</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stmcan%20NaturaLife%20Extensions&amp;severity=high&amp;id=69c41161f4197a8e3b6d61f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25017-improper-control-of-filename-for-in-23c8041c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20stmcan%20NaturaLife%20Extensions&amp;severity=high&amp;id=69c41161f4197a8e3b6d61f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25013-improper-neutralization-of-input-du-5848b46d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25013%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WHMCSdes%20Phox%20Hosting&amp;severity=high&amp;id=69c41161f4197a8e3b6d61f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25009-missing-authorization-in-raratheme--b64d4e55</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25009%3A%20Missing%20Authorization%20in%20raratheme%20Education%20Zone&amp;severity=medium&amp;id=69c41161f4197a8e3b6d61ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25007-improper-neutralization-of-special--a4ed9879</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25007%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=high&amp;id=69c41161f4197a8e3b6d61eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25002-authentication-bypass-using-an-alte-c78d2045</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25002%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ThimPress%20LearnPress%20%E2%80%93%20Sepay%20Payment&amp;severity=high&amp;id=69c41161f4197a8e3b6d61e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25001-improper-control-of-generation-of-c-ae6f032c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25001%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Saad%20Iqbal%20Post%20Snippets&amp;severity=high&amp;id=69c41161f4197a8e3b6d61e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24993-improper-neutralization-of-special--b883dbcf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24993%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFactory%20Advanced%20WooCommerce%20Product%20Sales%20Reporting&amp;severity=critical&amp;id=69c4115ef4197a8e3b6d6123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24989-deserialization-of-untrusted-data-i-0edb2e84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24989%3A%20Deserialization%20of%20Untrusted%20Data%20in%20FantasticPlugins%20SUMO%20Affiliates%20Pro&amp;severity=critical&amp;id=69c4115ef4197a8e3b6d6120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24987-missing-authorization-in-activity-l-48712d63</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24987%3A%20Missing%20Authorization%20in%20activity-log.com%20WP%20System%20Log&amp;severity=medium&amp;id=69c4115ef4197a8e3b6d611d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24983-improper-neutralization-of-input-du-8a35f7d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UpSolution%20UpSolution%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d611a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24981-deserialization-of-untrusted-data-i-1a27f81f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24981%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Visionary%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24980-improper-neutralization-of-input-du-1df2a693</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24980%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Visionary%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24979-improper-neutralization-of-input-du-023f42da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24979%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Jobica%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24978-deserialization-of-untrusted-data-i-03d2a2f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24978%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Jobica%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d610e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24977-improper-neutralization-of-special--9ccd0146</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24977%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NooTheme%20Organici%20Library&amp;severity=high&amp;id=69c4115ef4197a8e3b6d610b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24976-deserialization-of-untrusted-data-i-46cea663</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24976%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Organici%20Library&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24975-improper-neutralization-of-input-du-0f06049c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24975%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Organici%20Library&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24974-deserialization-of-untrusted-data-i-4f8b54a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24974%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20CitiLights&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24973-improper-neutralization-of-input-du-1a6da9e0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20CitiLights&amp;severity=high&amp;id=69c4115bf4197a8e3b6d602d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24972-missing-authorization-in-elated-the-25a8605d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24972%3A%20Missing%20Authorization%20in%20Elated-Themes%20Elated%20Listing&amp;severity=medium&amp;id=69c4115bf4197a8e3b6d602a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24971-incorrect-privilege-assignment-in-e-e65fc594</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24971%3A%20Incorrect%20Privilege%20Assignment%20in%20Elated-Themes%20Search%20%26%20Go&amp;severity=critical&amp;id=69c4115bf4197a8e3b6d6027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24970-improper-limitation-of-a-pathname-t-d928e49c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24970%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20designingmedia%20Energox&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24969-improper-limitation-of-a-pathname-t-073273ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24969%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20designingmedia%20Instant%20VA&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24964-server-side-request-forgery-ssrf-in-d35e9aca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24964%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=medium&amp;id=69c4115bf4197a8e3b6d601e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24391-improper-neutralization-of-input-du-8ccacf79</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24391%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeMakers%20Car%20Dealer&amp;severity=high&amp;id=69c4115bf4197a8e3b6d601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24382-missing-authorization-in-wproyal-ne-1ebfd1e3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24382%3A%20Missing%20Authorization%20in%20wproyal%20News%20Magazine%20X&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24378-deserialization-of-untrusted-data-i-c4842179</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24378%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Metagauss%20EventPrime&amp;severity=critical&amp;id=69c41159f4197a8e3b6d5335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24376-missing-authorization-in-javier-cas-3689cba3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24376%3A%20Missing%20Authorization%20in%20Javier%20Casares%20WPVulnerability&amp;severity=medium&amp;id=69c41159f4197a8e3b6d5331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24373-incorrect-privilege-assignment-in-m-6a717786</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24373%3A%20Incorrect%20Privilege%20Assignment%20in%20Metagauss%20RegistrationMagic&amp;severity=high&amp;id=69c41159f4197a8e3b6d532d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24372-authentication-bypass-by-spoofing-i-e801fb02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24372%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20WP%20Swings%20Subscriptions%20for%20WooCommerce&amp;severity=high&amp;id=69c41159f4197a8e3b6d5329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24370-improper-neutralization-of-input-du-a2a0caf6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24370%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Theme-one%20The%20Grid&amp;severity=medium&amp;id=69c41159f4197a8e3b6d5325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24369-missing-authorization-in-theme-one--f3e247a3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24369%3A%20Missing%20Authorization%20in%20Theme-one%20The%20Grid&amp;severity=high&amp;id=69c41159f4197a8e3b6d5322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24364-missing-authorization-in-wedevs-wp--d6b24059</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24364%3A%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=medium&amp;id=69c41159f4197a8e3b6d531f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24363-missing-authorization-in-loopus-wp--d34c4544</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24363%3A%20Missing%20Authorization%20in%20loopus%20WP%20Cost%20Estimation%20%26%20Payment%20Forms%20Builder&amp;severity=high&amp;id=69c41159f4197a8e3b6d531c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24362-missing-authorization-in-bdthemes-u-661e960a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24362%3A%20Missing%20Authorization%20in%20bdthemes%20Ultimate%20Post%20Kit&amp;severity=medium&amp;id=69c41159f4197a8e3b6d5319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24359-authentication-bypass-using-an-alte-949b7d59</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24359%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Dokan%2C%20Inc.%20Dokan&amp;severity=high&amp;id=69c41159f4197a8e3b6d5316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23979-improper-neutralization-of-input-du-b95473dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23979%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Softwebmedia%20Gyan%20Elements&amp;severity=high&amp;id=69c41156f4197a8e3b6d52a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23977-missing-authorization-in-wpfactory--09d6c217</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23977%3A%20Missing%20Authorization%20in%20WPFactory%20Helpdesk%20Support%20Ticket%20System%20for%20WooCommerce&amp;severity=high&amp;id=69c41156f4197a8e3b6d52a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23973-improper-neutralization-of-input-du-e36b0bae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Golo&amp;severity=high&amp;id=69c41156f4197a8e3b6d52a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23972-missing-authorization-in-magepeople-6a39edcf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23972%3A%20Missing%20Authorization%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=medium&amp;id=69c41156f4197a8e3b6d529f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23971-deserialization-of-untrusted-data-i-107d0db3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23971%3A%20Deserialization%20of%20Untrusted%20Data%20in%20xtemos%20WoodMart&amp;severity=high&amp;id=69c41156f4197a8e3b6d529c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23807-improper-neutralization-of-input-du-e08c0582</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23807%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Socio%20WP%20Telegram%20Widget%20and%20Join%20Link&amp;severity=high&amp;id=69c41156f4197a8e3b6d5299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23806-missing-authorization-in-blueglass--7be7b6a1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23806%3A%20Missing%20Authorization%20in%20BlueGlass%20Interactive%20AG%20Jobs%20for%20WordPress&amp;severity=high&amp;id=69c41156f4197a8e3b6d5296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22524-improper-neutralization-of-input-du-722e83cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22524%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepassion%20Legacy%20Admin&amp;severity=high&amp;id=69c41156f4197a8e3b6d5293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22523-improper-neutralization-of-input-du-2f292154</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22523%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepassion%20Ultra%20WordPress%20Admin&amp;severity=high&amp;id=69c41156f4197a8e3b6d5290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22520-improper-neutralization-of-input-du-bf44ecfb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Handmade%20Framework&amp;severity=high&amp;id=69c41156f4197a8e3b6d528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22516-improper-control-of-filename-for-in-411fc406</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22516%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Wizor&apos;s&amp;severity=high&amp;id=69c41154f4197a8e3b6d521d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22515-improper-control-of-filename-for-in-92e1df77</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22515%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20VegaDays&amp;severity=high&amp;id=69c41154f4197a8e3b6d521a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22514-improper-control-of-filename-for-in-20e19566</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22514%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Unica&amp;severity=high&amp;id=69c41154f4197a8e3b6d5217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22513-improper-control-of-filename-for-in-1c531a8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22513%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Triompher&amp;severity=high&amp;id=69c41154f4197a8e3b6d5214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22512-improper-control-of-filename-for-in-602d5c6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22512%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Roisin&amp;severity=high&amp;id=69c41154f4197a8e3b6d5211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22511-improper-control-of-filename-for-in-deff7abf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22511%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20NeoBeat&amp;severity=high&amp;id=69c41154f4197a8e3b6d520e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22510-deserialization-of-untrusted-data-i-194f8c21</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22510%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Melody&amp;severity=high&amp;id=69c41154f4197a8e3b6d520b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22509-improper-control-of-filename-for-in-b5770cc2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22509%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Gioia&amp;severity=high&amp;id=69c41154f4197a8e3b6d5208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22508-improper-control-of-filename-for-in-57f9b376</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22508%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Dentalux&amp;severity=high&amp;id=69c41154f4197a8e3b6d5205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22507-deserialization-of-untrusted-data-i-af73ebf3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22507%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Beelove&amp;severity=critical&amp;id=69c41154f4197a8e3b6d5202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22506-improper-control-of-filename-for-in-9c54f3e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22506%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Amoli&amp;severity=high&amp;id=69c41151f4197a8e3b6d5199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22505-deserialization-of-untrusted-data-i-3904281b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22505%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Morning%20Records&amp;severity=high&amp;id=69c41151f4197a8e3b6d5196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22504-improper-control-of-filename-for-in-e912a8a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22504%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ProLingua&amp;severity=high&amp;id=69c41151f4197a8e3b6d5193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22503-improper-control-of-filename-for-in-7fb487ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22503%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Nelson&amp;severity=high&amp;id=69c41151f4197a8e3b6d5190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22502-improper-control-of-filename-for-in-b429c1bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22502%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Mr.%20Cobbler&amp;severity=high&amp;id=69c41151f4197a8e3b6d518d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22500-deserialization-of-untrusted-data-i-6b3e8a60</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22500%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20m2%20%7C%20Construction%20and%20Tools%20Store&amp;severity=critical&amp;id=69c41151f4197a8e3b6d518a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22499-improper-control-of-filename-for-in-e88a1c55</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22499%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Lella&amp;severity=high&amp;id=69c41151f4197a8e3b6d5187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22498-improper-control-of-filename-for-in-8cb213f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22498%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Laurent&amp;severity=high&amp;id=69c41151f4197a8e3b6d5184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22496-improper-control-of-filename-for-in-3fd5999d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22496%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Hypnotherapy&amp;severity=high&amp;id=69c41151f4197a8e3b6d5181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22495-improper-control-of-filename-for-in-e572e336</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22495%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Greenville&amp;severity=high&amp;id=69c41151f4197a8e3b6d517e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22494-improper-control-of-filename-for-in-108280d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22494%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Good%20Homes&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22493-improper-control-of-filename-for-in-85abbaf4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22493%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Gaspard&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22491-improper-neutralization-of-input-du-c9c8f055</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22485-missing-authorization-in-ruhul-amin-fe036a67</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22485%3A%20Missing%20Authorization%20in%20Ruhul%20Amin%20My%20Album%20Gallery&amp;severity=medium&amp;id=69c4114ff4197a8e3b6d50b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22484-improper-neutralization-of-special--ea184701</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22484%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pebas%20Lisfinity%20Core&amp;severity=critical&amp;id=69c4114ff4197a8e3b6d50b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22480-deserialization-of-untrusted-data-i-beede38d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22480%3A%20Deserialization%20of%20Untrusted%20Data%20in%20WebToffee%20Product%20Feed%20for%20WooCommerce&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22448-improper-limitation-of-a-pathname-t-60ea4cb8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22448%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flexcubed%20PitchPrint&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69358-missing-authorization-in-metagauss--bf9d4e77</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69358%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69347-authorization-bypass-through-user-c-13002512</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69347%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Convers%20Lab%20WPSubscription&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69096-improper-neutralization-of-input-du-080c5391</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69096%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Zorka&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20108-improper-neutralization-of-input-du-72c89549</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20108%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=69c40a64f4197a8e3b6998ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20112-improper-neutralization-of-input-du-a16672bd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20112%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b699905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20113-improper-neutralization-of-crlf-seq-c2135bf5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a67f4197a8e3b699a42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20114-improper-validation-of-syntactic-co-57e09085</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20114%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a67f4197a8e3b699a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20115-cleartext-transmission-of-sensitive-2338cc47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20115%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a67f4197a8e3b699a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20083-improper-handling-of-extra-paramete-30a02b67</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20083%3A%20Improper%20Handling%20of%20Extra%20Parameters%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b6998f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20110-incorrect-privilege-assignment-in-c-02a77f10</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20110%3A%20Incorrect%20Privilege%20Assignment%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b699902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20104-buffer-underwrite-buffer-underflow--3de1764a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20104%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b6998fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20004-missing-reference-to-active-allocat-e6f24850</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20004%3A%20Missing%20Reference%20to%20Active%20Allocated%20Resource%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=69c40a64f4197a8e3b6998ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58341-cwe-89-improper-neutralization-of-s-4c430d30</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58341%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Opencart%20OpenCart%20Core&amp;severity=high&amp;id=69c40a64f4197a8e3b6998e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20125-improper-handling-of-syntactically--365ab152</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20125%3A%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20Cisco%20IOS&amp;severity=high&amp;id=69c40a67f4197a8e3b699a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20012-missing-release-of-memory-after-eff-62169714</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20012%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20IOS&amp;severity=high&amp;id=69c40a64f4197a8e3b6998f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20086-improper-handling-of-missing-values-f636f063</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20086%3A%20Improper%20Handling%20of%20Missing%20Values%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=69c40a64f4197a8e3b6998f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20084-uncontrolled-resource-consumption-i-1bc72f79</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20084%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=69c40a64f4197a8e3b6998f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3218-cwe-79-improper-neutralization-of-in-846bf146</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3218%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Responsive%20Favicons&amp;severity=medium&amp;id=69c40334f4197a8e3b666f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3217-cwe-79-improper-neutralization-of-in-91bf5ea2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20SAML%20SSO%20-%20Service%20Provider&amp;severity=medium&amp;id=69c40334f4197a8e3b666f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3216-cwe-918-server-side-request-forgery--13e3758e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3216%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Drupal%20Drupal%20Canvas&amp;severity=medium&amp;id=69c40334f4197a8e3b666f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3215-cwe-79-improper-neutralization-of-in-677d9a3a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3215%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Islandora&amp;severity=medium&amp;id=69c40331f4197a8e3b666ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3214-cwe-288-authentication-bypass-using--0a2b53c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3214%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20CAPTCHA&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3213-cwe-79-improper-neutralization-of-in-bf87487f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3213%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Anti-Spam%20by%20CleanTalk&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24750-cwe-79-improper-neutralization-of-i-ce0f5c25</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24750%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kiteworks%20Secure%20Data%20Forms&amp;severity=high&amp;id=69c40331f4197a8e3b666eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3212-cwe-79-improper-neutralization-of-in-591aa3ee</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Tagify&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3211-cwe-352-cross-site-request-forgery-c-81964679</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3211%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Theme%20Negotiation%20by%20Rules&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3210-cwe-863-incorrect-authorization-in-d-21752fb0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3210%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Material%20Icons&amp;severity=medium&amp;id=69c40331f4197a8e3b666ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2349-cwe-79-improper-neutralization-of-in-08f298cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20UI%20Icons&amp;severity=medium&amp;id=69c40331f4197a8e3b666eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2348-cwe-79-improper-neutralization-of-in-8bb7024f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2348%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Quick%20Edit&amp;severity=medium&amp;id=69c40331f4197a8e3b666eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1917-cwe-288-authentication-bypass-using--e6ab6029</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1917%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Login%20Disable&amp;severity=medium&amp;id=69c40331f4197a8e3b666eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-cybercriminal-gets-2-year-prison-sentence--eacebc06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Cybercriminal%20Gets%202-Year%20Prison%20Sentence%20in%20US&amp;severity=medium&amp;id=69c3f19cf4197a8e3b553b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33268-cwe-400-uncontrolled-resource-consu-67964107</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33268%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Nanoleaf%20Lines&amp;severity=medium&amp;id=69c3f1b2f4197a8e3b5542d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23514-cwe-282-improper-ownership-manageme-7a0173a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23514%3A%20CWE-282%3A%20Improper%20Ownership%20Management%20in%20kiteworks%20core&amp;severity=high&amp;id=69c3f1b2f4197a8e3b5542d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-speeds-attacks-but-identity-remains-cybersecuri-34bed359</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Speeds%20Attacks%2C%20But%20Identity%20Remains%20Cybersecurity%E2%80%99s%20Weakest%20Link&amp;severity=medium&amp;id=69c3ee18f4197a8e3b53b59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3591-cwe-562-return-of-stack-variable-add-0a50bc6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3591%3A%20CWE-562%20Return%20of%20Stack%20Variable%20Address%20in%20ISC%20BIND%209&amp;severity=medium&amp;id=69c3eaa6f4197a8e3b5259f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3119-cwe-617-reachable-assertion-in-isc-b-7dde1da1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3119%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20BIND%209&amp;severity=medium&amp;id=69c3eaa6f4197a8e3b5259ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4815-cwe-89-improper-neutralization-of-sp-86ce3b3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4815%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4816-cwe-79-improper-neutralization-of-in-bb35cca3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4816%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=medium&amp;id=69c3eaa6f4197a8e3b5259fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3104-cwe-772-missing-release-of-resource--9a88f86a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3104%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20ISC%20BIND%209&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ios-macos-264-roll-out-with-fresh-security-patches-b250a770</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=iOS%2C%20macOS%2026.4%20Roll%20Out%20With%20Fresh%20Security%20Patches&amp;severity=medium&amp;id=69c3e38cf4197a8e3b4fd60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1519-cwe-606-unchecked-input-for-loop-con-5c130d5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1519%3A%20CWE-606%20Unchecked%20Input%20for%20Loop%20Condition%20in%20ISC%20BIND%209&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40842-cwe-79-improper-neutralization-of-i-f4ccbe80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40842%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=69c3e3c7f4197a8e3b4fe9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40841-cwe-352-cross-site-request-forgery--52cb0b35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40841%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=medium&amp;id=69c3e3c7f4197a8e3b4fe9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27260-cwe-790-in-ericsson-indoor-connect--70b4897e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27260%3A%20CWE-790%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=69c3e3c7f4197a8e3b4fe9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4761-cwe-732-incorrect-permission-assignm-1eae1c84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4761%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20CODRA%20Panorama%20Suite&amp;severity=low&amp;id=69c3dca4f4197a8e3b4d5c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-bans-new-routers-made-outside-the-us-over-nati-0079eee7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Bans%20New%20Routers%20Made%20Outside%20the%20US%20Over%20National%20Security%20Risks&amp;severity=medium&amp;id=69c3d900f4197a8e3b4c48ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4760-cwe-552-files-or-directories-accessi-bd7c05a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4760%3A%20CWE-552%20Files%20or%20directories%20accessible%20to%20external%20parties%20in%20CODRA%20Panorama%20Suite&amp;severity=high&amp;id=69c3e3c7f4197a8e3b4fe9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-trivy-to-broad-oss-compromise-teampcp-hits-do-703cdc7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Trivy%20to%20Broad%20OSS%20Compromise%3A%20TeamPCP%20Hits%20Docker%20Hub%2C%20VS%20Code%2C%20PyPI&amp;severity=medium&amp;id=69c3ce74f4197a8e3b4950bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-malicious-pypi-packages-091bfe2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Attack%3A%20Malicious%20PyPI%20Packages&amp;severity=medium&amp;id=69c3f1aef4197a8e3b553f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-package-litellm-supply-chain-compro-c04058b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20Package%20-%20LiteLLM%20Supply%20Chain%20Compromise&amp;severity=medium&amp;id=69c3ee28f4197a8e3b53b8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23333-6b151339</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23333&amp;severity=null&amp;id=69dcf3cf82d89c981fee9b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23320-fa1f52b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23320&amp;severity=null&amp;id=69cfe4200a160ebd923f9c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-prisons-russian-access-broker-for-aiding-ransom-df65fd02</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Prisons%20Russian%20Access%20Broker%20for%20Aiding%20Ransomware%20Attacks&amp;severity=medium&amp;id=69c3ab4cf4197a8e3b3a1b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3608-cwe-617-reachable-assertion-in-isc-k-fed4f439</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3608%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20Kea&amp;severity=high&amp;id=69c3a455f4197a8e3b370141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackerone-employee-data-exposed-in-massive-navia-b-c6b11c77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HackerOne%20Employee%20Data%20Exposed%20in%20Massive%20Navia%20Breach&amp;severity=medium&amp;id=69c3963cf4197a8e3b2f4bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32326-missing-authentication-for-critical-9a481b76</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32326%3A%20Missing%20authentication%20for%20critical%20function%20in%20Sharp%20Corporation%20home%205G%20HR01&amp;severity=medium&amp;id=69c39653f4197a8e3b2f5482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2343-cwe-200-information-exposure-in-pepr-b24bfe87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2343%3A%20CWE-200%20Information%20Exposure%20in%20PeproDev%20Ultimate%20Invoice&amp;severity=medium&amp;id=69c37d98f4197a8e3b0cd267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26306-uncontrolled-search-path-element-in-ee774158</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26306%3A%20Uncontrolled%20Search%20Path%20Element%20in%20OM%20Digital%20Solutions%20Corporation%20OM%20Workspace%20(Windows%20Edition)&amp;severity=high&amp;id=69c37d98f4197a8e3b0cd263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33253-unquoted-search-path-or-element-in--97bdffae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33253%3A%20Unquoted%20search%20path%20or%20element%20in%20SANYO%20DENKI%20CO.%2C%20LTD.%20SANUPS%20SOFTWARE%20STANDALONE&amp;severity=medium&amp;id=69c37690f4197a8e3bfb90e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guidance-for-detecting-investigating-and-defending-f813b422</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guidance%20for%20detecting%2C%20investigating%2C%20and%20defending%20against%20the%20Trivy%20supply%20chain%20compromise&amp;severity=medium&amp;id=69c3b5e5f4197a8e3b411ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2072-cwe-79-improper-neutralization-of-in-c6f3add7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2072%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=high&amp;id=69c34c81f4197a8e3bc565a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1166-cwe-601-url-redirection-to-untrusted-7de2151a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1166%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20Hitachi%20Hitachi%20Ops%20Center%20Administrator&amp;severity=medium&amp;id=69c34c7ef4197a8e3bc56508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4766-cwe-79-improper-neutralization-of-in-c6d9900c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4766%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devrix%20Easy%20Image%20Gallery&amp;severity=medium&amp;id=69c33e4ff4197a8e3bb9c1b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4784-sql-injection-in-code-projects-simpl-1ba821cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4784%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c33e4ff4197a8e3bb9c1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28864-a-local-attacker-may-gain-access-to-881070fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28864%3A%20A%20local%20attacker%20may%20gain%20access%20to%20user&apos;s%20Keychain%20items%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69c333e1f4197a8e3baaec88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20691-a-maliciously-crafted-webpage-may-b-25f0d1f1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20691%3A%20A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333d8f4197a8e3baae891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28833-an-app-may-be-able-to-enumerate-a-u-fa046f85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28833%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28825-an-app-may-be-able-to-modify-protec-1aa50dd2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28825%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333dcf4197a8e3baaea7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20668-an-app-may-be-able-to-access-sensit-fb27d790</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20668%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20687-an-app-may-be-able-to-cause-unexpec-a39ac789</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20687%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333d8f4197a8e3baae878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20701-an-app-may-be-able-to-connect-to-a--7a65470e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20701%3A%20An%20app%20may%20be%20able%20to%20connect%20to%20a%20network%20share%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d9f4197a8e3baae9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43534-a-user-with-physical-access-to-an-i-a6c8aefa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43534%3A%20A%20user%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20bypass%20Activation%20Lock%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28868-an-app-may-be-able-to-disclose-kern-ac04a2d9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28868%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20633-an-app-may-be-able-to-access-user-s-84a84ff2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20633%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28829-an-app-may-be-able-to-modify-protec-e359e57b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28829%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20664-processing-maliciously-crafted-web--5c90b907</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20664%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333d8f4197a8e3baae856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28891-an-app-may-be-able-to-break-out-of--ee90eae8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28891%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333e4f4197a8e3baaeda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28852-an-app-may-be-able-to-cause-a-denia-6621e6ee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28852%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28844-an-attacker-may-gain-access-to-prot-bb0e69d0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28844%3A%20An%20attacker%20may%20gain%20access%20to%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28845-an-app-may-be-able-to-access-protec-f04601d9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28845%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28890-an-app-may-be-able-to-cause-unexpec-f5b333b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28890%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69c333e4f4197a8e3baaeda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20665-processing-maliciously-crafted-web--1173ad63</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20665%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20prevent%20Content%20Security%20Policy%20from%20being%20enforced%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333d8f4197a8e3baae85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28828-an-app-may-be-able-to-access-sensit-9a0b8461</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28828%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20632-an-app-may-be-able-to-access-sensit-13673933</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20632%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28886-a-user-in-a-privileged-network-posi-e3bd49f5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28886%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20686-an-app-may-be-able-to-access-sensit-9f6a0432</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20686%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28824-an-app-may-be-able-to-access-sensit-b959c5c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28824%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28832-an-app-may-be-able-to-disclose-kern-40d9ae89</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28832%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333ddf4197a8e3baaeaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20690-processing-an-audio-stream-in-a-mal-83d58a53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20690%3A%20Processing%20an%20audio%20stream%20in%20a%20maliciously%20crafted%20media%20file%20may%20terminate%20the%20process%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28865-an-attacker-in-a-privileged-network-fc3fc9e2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28865%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20intercept%20network%20traffic%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e1f4197a8e3baaec91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28881-an-app-may-be-able-to-access-sensit-0e9705ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28881%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28839-an-app-may-be-able-to-access-sensit-0f2f7834</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28839%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28878-an-app-may-be-able-to-enumerate-a-u-d79e680b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28878%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28842-a-buffer-overflow-may-result-in-mem-7b712ac1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28842%3A%20A%20buffer%20overflow%20may%20result%20in%20memory%20corruption%20and%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333dff4197a8e3baaeb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28862-an-app-may-be-able-to-access-user-s-3d9dc891</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28862%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaec7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4783-sql-injection-in-itsourcecode-colleg-35d140b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4783%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69c333e4f4197a8e3baaedbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20697-an-app-may-be-able-to-access-sensit-9485ad53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20697%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28835-mounting-a-maliciously-crafted-smb--0003d53f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28835%3A%20Mounting%20a%20maliciously%20crafted%20SMB%20network%20share%20may%20lead%20to%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28823-an-app-with-root-privileges-may-be--b80563d9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28823%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20delete%20protected%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20639-processing-a-maliciously-crafted-st-e26a8a3e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20639%3A%20Processing%20a%20maliciously%20crafted%20string%20may%20lead%20to%20heap%20corruption%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d6f4197a8e3baae827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28874-a-remote-attacker-may-cause-an-unex-410e92ff</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28874%3A%20A%20remote%20attacker%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e1f4197a8e3baaecc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28858-a-remote-user-may-be-able-to-cause--a262d8bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28858%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69c333dff4197a8e3baaeb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28818-an-app-may-be-able-to-access-sensit-ad0b9870</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28818%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28859-a-malicious-website-may-be-able-to--67e98019</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28859%3A%20A%20malicious%20website%20may%20be%20able%20to%20process%20restricted%20web%20content%20outside%20the%20sandbox%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28875-a-remote-attacker-may-be-able-to-ca-8e041a65</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28875%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e3f4197a8e3baaed0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28822-an-attacker-may-be-able-to-cause-un-ca536b77</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28822%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28834-an-app-may-be-able-to-cause-unexpec-2543d750</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28834%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28863-an-app-may-be-able-to-fingerprint-t-22945cdf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28863%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaec82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28855-an-app-may-be-able-to-access-protec-629e8fff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28855%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333dff4197a8e3baaeb35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28879-processing-maliciously-crafted-web--a5982e22</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28879%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28838-an-app-may-be-able-to-break-out-of--321bc65e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28838%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20622-an-app-may-be-able-to-capture-a-use-271f13f5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20622%3A%20An%20app%20may%20be%20able%20to%20capture%20a%20user&apos;s%20screen%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d6f4197a8e3baae80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28880-an-app-may-be-able-to-enumerate-a-u-f03c14ba</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28880%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28817-a-sandboxed-process-may-be-able-to--7f2dd0fb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28817%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d9f4197a8e3baae9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28856-an-attacker-with-physical-access-to-d9983940</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28856%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28895-an-attacker-with-physical-access-to-e2dd54e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28895%3A%20An%20attacker%20with%20physical%20access%20to%20an%20iOS%20device%20with%20Stolen%20Device%20Protection%20enabled%20may%20be%20able%20to%20access%20biometrics-gated%20Protected%20Apps%20with%20the%20passcode%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e4f4197a8e3baaedb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20637-an-app-may-be-able-to-cause-unexpec-2b4e9d40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20637%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20699-an-app-may-be-able-to-access-user-s-e0ba9421</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20699%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28876-an-app-may-be-able-to-access-sensit-f8905d44</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28876%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e3f4197a8e3baaed11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28821-an-app-may-be-able-to-gain-elevated-3346a830</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28821%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333dcf4197a8e3baaea68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28837-an-app-may-be-able-to-access-sensit-51de8014</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28837%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333ddf4197a8e3baaeb02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20695-an-app-may-be-able-to-determine-ker-86e9b47e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20695%3A%20An%20app%20may%20be%20able%20to%20determine%20kernel%20memory%20layout%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28861-a-malicious-website-may-be-able-to--0a3ac84d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28861%3A%20A%20malicious%20website%20may%20be%20able%20to%20access%20script%20message%20handlers%20intended%20for%20other%20origins%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20694-an-app-may-be-able-to-access-user-s-27d0a0a8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20694%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28820-an-app-may-be-able-to-access-sensit-892a3022</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28820%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28877-an-app-may-be-able-to-access-sensit-cde6f9f7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28877%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20657-parsing-a-maliciously-crafted-file--fe48ac48</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20657%3A%20Parsing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20698-an-app-may-be-able-to-cause-unexpec-ee089061</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20698%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28882-an-app-may-be-able-to-enumerate-a-u-1f178a94</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28882%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28894-a-remote-attacker-may-be-able-to-ca-94559fd5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28894%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e4f4197a8e3baaedb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28857-processing-maliciously-crafted-web--033a4e0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28857%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28841-a-buffer-overflow-may-result-in-mem-7edff32a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28841%3A%20A%20buffer%20overflow%20may%20result%20in%20memory%20corruption%20and%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28816-an-app-may-be-able-to-delete-files--0d563ae5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28816%3A%20An%20app%20may%20be%20able%20to%20delete%20files%20for%20which%20it%20does%20not%20have%20permission%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20607-an-app-may-be-able-to-access-protec-e1636f7c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20607%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28870-an-app-may-be-able-to-access-sensit-61a14a2e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28870%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaecb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28827-an-app-may-be-able-to-break-out-of--866bf185</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28827%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=69c333dcf4197a8e3baaea86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28831-an-app-may-be-able-to-access-sensit-0a0d5960</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28831%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20693-an-attacker-with-root-privileges-ma-fd1df3d2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20693%3A%20An%20attacker%20with%20root%20privileges%20may%20be%20able%20to%20delete%20protected%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28866-an-app-may-be-able-to-access-sensit-e391ed81</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28866%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaec9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28889-an-app-may-be-able-to-read-arbitrar-fc523636</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28889%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20as%20root%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69c333e4f4197a8e3baaeda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28893-a-document-may-be-written-to-a-temp-bf2cd019</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28893%3A%20A%20document%20may%20be%20written%20to%20a%20temporary%20file%20when%20using%20print%20preview%20in%20Apple%20macOS&amp;severity=low&amp;id=69c333e4f4197a8e3baaedb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20631-a-user-may-be-able-to-elevate-privi-d06eaa8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20631%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d6f4197a8e3baae812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20670-an-app-may-be-able-to-access-sensit-ebf18b3c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20670%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20688-an-app-may-be-able-to-break-out-of--e375fe5c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20688%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69c333d8f4197a8e3baae880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28892-an-app-may-be-able-to-modify-protec-85f340ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28892%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e4f4197a8e3baaedab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28867-an-app-may-be-able-to-leak-sensitiv-4e056b54</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28867%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20kernel%20state%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaeca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28888-an-app-may-be-able-to-gain-root-pri-ce802b59</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28888%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20692-hide-ip-address-and-block-all-remot-38515bb6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20692%3A%20%22Hide%20IP%20Address%22%20and%20%22Block%20All%20Remote%20Content%22%20may%20not%20apply%20to%20all%20mail%20content%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28826-a-malicious-app-may-be-able-to-brea-b4ee0304</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28826%3A%20A%20malicious%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28871-visiting-a-maliciously-crafted-webs-0bb72ba0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28871%3A%20Visiting%20a%20maliciously%20crafted%20website%20may%20lead%20to%20a%20cross-site%20scripting%20attack%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333e1f4197a8e3baaecbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20684-an-app-may-bypass-gatekeeper-checks-adf5ef9f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20684%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=low&amp;id=69c333d8f4197a8e3baae872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20651-an-app-may-be-able-to-access-sensit-2ad8b257</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20651%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70888-na-374234a8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70888%3A%20n%2Fa&amp;severity=critical&amp;id=69c437ecf4197a8e3b7b145b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70887-na-c70e4b84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70887%3A%20n%2Fa&amp;severity=high&amp;id=69c430e5f4197a8e3b78e0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70952-na-2156d229</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70952%3A%20n%2Fa&amp;severity=high&amp;id=69c42db5f4197a8e3b77dc20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67030-na-afb99fd4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67030%3A%20n%2Fa&amp;severity=high&amp;id=69c422f4f4197a8e3b7492ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30587-na-f23f021a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30587%3A%20n%2Fa&amp;severity=medium&amp;id=69c41f52f4197a8e3b733a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26833-na-3aff288d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26833%3A%20n%2Fa&amp;severity=critical&amp;id=69c40a67f4197a8e3b699a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26832-na-97f776ec</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26832%3A%20n%2Fa&amp;severity=critical&amp;id=69c40a67f4197a8e3b699a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26831-na-efc1cb46</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26831%3A%20n%2Fa&amp;severity=critical&amp;id=69c40a67f4197a8e3b699a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26830-na-8e48233f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26830%3A%20n%2Fa&amp;severity=critical&amp;id=69c3fc2ef4197a8e3b6310ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59707-na-0e36166b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59707%3A%20n%2Fa&amp;severity=critical&amp;id=69c3f8fbf4197a8e3b5a5697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59706-na-7647217d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59706%3A%20n%2Fa&amp;severity=critical&amp;id=69c3f8fbf4197a8e3b5a5692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32991-na-ad6453b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32991%3A%20n%2Fa&amp;severity=critical&amp;id=69c3f8fbf4197a8e3b5a568e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-25-a4c3da16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-25&amp;severity=medium&amp;id=69c3f89bf4197a8e3b58cf35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51348-na-49839eae</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51348%3A%20n%2Fa&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51347-na-d4cb4e6b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51347%3A%20n%2Fa&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51346-na-9901719e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51346%3A%20n%2Fa&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-25-79be0e8f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-25&amp;severity=low&amp;id=69c36877f4197a8e3bf0fc7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4781-sql-injection-in-sourcecodester-sale-8fea11d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4781%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31eacf4197a8e3b930252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4780-sql-injection-in-sourcecodester-sale-0aabb496</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4780%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31eacf4197a8e3b93024b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4779-sql-injection-in-sourcecodester-sale-34a97998</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4779%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31444f4197a8e3b89c8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4778-sql-injection-in-sourcecodester-sale-e2f8a6fb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4778%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31444f4197a8e3b89c89f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4777-sql-injection-in-sourcecodester-sale-7679cc78</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4777%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c30994f4197a8e3b843569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33215-cwe-287-improper-authentication-in--f98c82ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33215%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c2ff45f4197a8e3b7e83b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3912-vulnerability-in-tibco-activematrix--51059409</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3912%3A%20Vulnerability%20in%20Tibco%20ActiveMatrix%20BusinessWorks&amp;severity=high&amp;id=69c2fb83f4197a8e3b7c5800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24159-cwe-502-deserialization-of-untruste-4cf367d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24159%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69c2f483f4197a8e3b756250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4371-vulnerability-in-mozilla-thunderbird-58e87494</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4371%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=high&amp;id=69c2f483f4197a8e3b75625a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24157-cwe-502-deserialization-of-untruste-51ca158e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24157%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69c2f483f4197a8e3b756246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3889-vulnerability-in-mozilla-thunderbird-acd3fb47</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3889%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=69c2f483f4197a8e3b756255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24141-cwe-502-deserialization-of-untruste-4a313153</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24141%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NVIDIA%20Model%20Optimizer&amp;severity=high&amp;id=69c2f481f4197a8e3b7561ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24158-cwe-789-memory-allocation-with-exce-76762b56</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24158%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69c2f483f4197a8e3b75624b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4433-cwe-16-configuration-in-tenable-inc--77e088cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4433%3A%20CWE-16%3A%20Configuration%20in%20Tenable%2C%20Inc.%20Tenable%20Operation%20Technology&amp;severity=low&amp;id=69c2f483f4197a8e3b75625f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33254-cwe-362-concurrent-execution-using--358dfacc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33254%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69c2f481f4197a8e3b7561ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33238-cwe-362-concurrent-execution-using--5023a4c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33238%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69c2f481f4197a8e3b7561d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33244-cwe-502-deserialization-of-untruste-bbcc3bf7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33244%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Apex&amp;severity=critical&amp;id=69c2f481f4197a8e3b7561db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24152-cwe-502-deserialization-of-untruste-f1609282</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24152%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f483f4197a8e3b756240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24151-cwe-502-deserialization-of-untruste-edcc003d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24151%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f483f4197a8e3b75623b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24150-cwe-502-deserialization-of-untruste-7d7967df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24150%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f481f4197a8e3b7561f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33248-cwe-502-deserialization-of-untruste-b308316e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33248%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f481f4197a8e3b7561e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33247-cwe-502-deserialization-of-untruste-7c655a3d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33247%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f481f4197a8e3b7561e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33242-cwe-1234-hardware-internal-or-debug-7f05d71a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33242%3A%20CWE-1234%20Hardware%20Internal%20or%20Debug%20Modes%20Allow%20Override%20of%20Locks%20in%20NVIDIA%20HGX%20and%20DGX%20B300&amp;severity=medium&amp;id=69c2f481f4197a8e3b7561d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33216-cwe-131-incorrect-calculation-of-bu-e9c18c9f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33216%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20NVIDIA%20SNAP-4%20Container&amp;severity=medium&amp;id=69c2f481f4197a8e3b7561cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33215-cwe-823-use-of-out-of-range-pointer-770a2bb2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33215%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20NVIDIA%20SNAP-4%20Container&amp;severity=medium&amp;id=69c2f481f4197a8e3b7561c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21790-cwe-346-origin-validation-error-in--93f27af8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21790%3A%20CWE-346%20Origin%20Validation%20Error%20in%20HCLSoftware%20Traveler&amp;severity=medium&amp;id=69c2f483f4197a8e3b756262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21783-cwe-209-generation-of-error-message-d80a7b98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21783%3A%20CWE-209%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20HCLSoftware%20Traveler&amp;severity=medium&amp;id=69c2edf6f4197a8e3b721c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doe-publishes-5-year-energy-security-plan-6d04c94f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoE%20Publishes%205-Year%20Energy%20Security%20Plan&amp;severity=critical&amp;id=69c2e9f1f4197a8e3b6b4be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33353-cwe-200-exposure-of-sensitive-infor-83abbf70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33353%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20charmbracelet%20soft-serve&amp;severity=high&amp;id=69c2edf6f4197a8e3b721c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33349-cwe-1284-improper-validation-of-spe-5951d6d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33349%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b6441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33345-cwe-639-authorization-bypass-throug-35b2980a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33345%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20solidtime-io%20solidtime&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b6437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33347-cwe-79-improper-neutralization-of-i-6f555a6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33347%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thephpleague%20commonmark&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b643c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33344-cwe-22-improper-limitation-of-a-pat-0882b1ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33344%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dagu-org%20dagu&amp;severity=high&amp;id=69c2ea08f4197a8e3b6b6433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33332-cwe-20-improper-input-validation-in-2d869574</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33332%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b642e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33331-cwe-79-improper-neutralization-of-i-b93f3ccf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33331%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20middleapi%20orpc&amp;severity=high&amp;id=69c2ea08f4197a8e3b6b6429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33330-cwe-863-incorrect-authorization-in--38a1725c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33330%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20error311%20FileRise&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33329-cwe-22-improper-limitation-of-a-pat-32ac2e5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33329%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20error311%20FileRise&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33326-cwe-863-incorrect-authorization-in--8907ce9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33326%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20keystonejs%20keystone&amp;severity=medium&amp;id=69c2e66df4197a8e3b68b9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22559-vulnerability-in-ubiquiti-inc-unifi-0f8f5993</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22559%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Server&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33769-cwe-20-improper-input-validation-in-371658e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33769%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20withastro%20astro&amp;severity=low&amp;id=69c2dfdbf4197a8e3b622b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33768-cwe-441-unintended-proxy-or-interme-3218654b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33768%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=69c2dfdbf4197a8e3b622b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29772-cwe-770-allocation-of-resources-wit-9b870df0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29772%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20withastro%20astro&amp;severity=medium&amp;id=69c2dfdbf4197a8e3b622b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33627-cwe-200-exposure-of-sensitive-infor-57b44982</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33627%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2dfdbf4197a8e3b622b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33624-cwe-367-time-of-check-time-of-use-t-3f3de1c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33624%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69c2dfdbf4197a8e3b622b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-agentic-ai-systems-need-better-governance-less-960019ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Agentic%20AI%20Systems%20Need%20Better%20Governance%20%E2%80%93%20Lessons%20from%20OpenClaw&amp;severity=medium&amp;id=69c2d85cf4197a8e3b5f901d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33539-cwe-89-improper-neutralization-of-s-dc735645</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33539%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2dfdbf4197a8e3b622b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33538-cwe-400-uncontrolled-resource-consu-c4ec715d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33538%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d885f4197a8e3b5f9731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33527-cwe-863-incorrect-authorization-in--61241643</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33527%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f966e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33508-cwe-674-uncontrolled-recursion-in-p-88d9bc87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33508%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33498-cwe-674-uncontrolled-recursion-in-p-f531b788</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33498%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33429-cwe-203-observable-discrepancy-in-p-94a62658</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33429%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f9659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33421-cwe-863-incorrect-authorization-in--e6ca8acf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33421%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33409-cwe-287-improper-authentication-in--997c90ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33409%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2417-cwe-306-missing-authentication-for-c-51d6a910</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2417%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Pharos%20Controls%20Mosaic%20Show%20Controller&amp;severity=critical&amp;id=69c2d884f4197a8e3b5f963d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33323-cwe-204-observable-response-discrep-6bee72c1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33323%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f9640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33417-cwe-613-insufficient-session-expira-936c37e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33417%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f964e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1995-cwe-269-improper-privilege-managemen-7a93156b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1995%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IDrive%20IDrive%20Cloud%20Backup%20Client%20for%20Windows&amp;severity=high&amp;id=69c2d884f4197a8e3b5f963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33401-cwe-918-server-side-request-forgery-4e8fa50b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33401%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69c2d885f4197a8e3b5f9738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/poland-faced-a-surge-in-cyberattacks-in-2025-inclu-3b57db40</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Poland%20Faced%20a%20Surge%20in%20Cyberattacks%20in%202025%2C%20Including%20a%20Major%20Assault%20on%20the%20Energy%20Sector&amp;severity=medium&amp;id=69c2d155f4197a8e3b5d60aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33400-cwe-79-improper-neutralization-of-i-493e3777</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33400%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69c2f483f4197a8e3b756265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33399-cwe-918-server-side-request-forgery-cf84da1e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33399%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69c2dfdbf4197a8e3b622b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33407-cwe-918-server-side-request-forgery-a7731ef1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33407%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69c32654f4197a8e3b9def6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33162-cwe-285-improper-authorization-in-c-da1da056</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33162%3A%20CWE-285%3A%20Improper%20Authorization%20in%20craftcms%20cms&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32854-cwe-476-null-pointer-dereference-in-d1594274</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32854%3A%20CWE-476%20NULL%20pointer%20dereference%20in%20LibVNC%20LibVNCServer&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33161-cwe-200-exposure-of-sensitive-infor-cd01c76d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33161%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20cms&amp;severity=low&amp;id=69c2cdd9f4197a8e3b58a8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32853-cwe-125-out-of-bounds-read-in-libvn-e16c0516</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32853%3A%20CWE-125%20Out-of-bounds%20read%20in%20LibVNC%20LibVNCServer&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33160-cwe-639-authorization-bypass-throug-464a6dc9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33160%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=low&amp;id=69c2cdd9f4197a8e3b58a8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33159-cwe-306-missing-authentication-for--f5031588</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33159%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20craftcms%20cms&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33158-cwe-639-authorization-bypass-throug-363e3163</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33158%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33157-cwe-470-use-of-externally-controlle-3699fcc5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33157%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69c2cdd9f4197a8e3b58a8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11571-cwe-78-improper-neutralization-of-s-3fc53108</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11571%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20silabs.com%20Simplicity%20Studio%20v5&amp;severity=low&amp;id=69c2c348f4197a8e3b526730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33340-cwe-306-missing-authentication-for--5fb325d8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33340%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ParisNeo%20lollms-webui&amp;severity=critical&amp;id=69c2bc3ff4197a8e3b4e78c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33700-cwe-639-authorization-bypass-throug-054a316e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33700%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a082a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33680-cwe-285-improper-authorization-in-g-fb472728</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33680%3A%20CWE-285%3A%20Improper%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b56bf4197a8e3b4a0825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33679-cwe-918-server-side-request-forgery-eaf389a0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33679%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a0820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33678-cwe-639-authorization-bypass-throug-7a8fbc15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33678%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b56bf4197a8e3b4a081c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33677-cwe-200-exposure-of-sensitive-infor-7005c106</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33677%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a0818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33676-cwe-863-incorrect-authorization-in--430de562</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33676%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a0812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33675-cwe-918-server-side-request-forgery-a4a2e4ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33675%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33668-cwe-285-improper-authorization-in-g-db7e34de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33668%3A%20CWE-285%3A%20Improper%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b1b2f4197a8e3b48d1b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33474-cwe-400-uncontrolled-resource-consu-cbc62c26</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33474%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71275-improper-neutralization-of-special--43d87f37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71275&amp;severity=critical&amp;id=69c2b1b2f4197a8e3b48d19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33473-cwe-287-improper-authentication-in--a2cf1947</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33473%3A%20CWE-287%3A%20Improper%20Authentication%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33336-cwe-94-improper-control-of-generati-f13f91f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33336%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33335-cwe-939-improper-authorization-in-h-13d64f3e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33335%3A%20CWE-939%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33334-cwe-94-improper-control-of-generati-8c4529ce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33334%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33316-cwe-284-improper-access-control-in--e7133b87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33316%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b1b2f4197a8e3b48d1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33315-cwe-288-authentication-bypass-using-33a19297</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33315%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33313-cwe-639-authorization-bypass-throug-3819a7c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33313%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4775-integer-overflow-or-wraparound-in-re-40cceae4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4775%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69c2b1b4f4197a8e3b48d204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27651-cwe-476-null-pointer-dereference-in-912c3cca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27651%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27654-cwe-122-heap-based-buffer-overflow--2af0e08b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27654%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28755-cwe-863-incorrect-authorization-in--f467972a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28755%3A%20CWE-863%20Incorrect%20Authorization%20in%20F5%20NGINX%20Open%20Source&amp;severity=medium&amp;id=69c2a3a3f4197a8e3b3ed944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28753-cwe-93-improper-neutralization-of-c-1339d031</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28753%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20F5%20NGINX%20Open%20Source&amp;severity=low&amp;id=69c2a3a3f4197a8e3b3ed941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32647-cwe-125-out-of-bounds-read-in-f5-ng-a7252f06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32647%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27784-cwe-190-integer-overflow-or-wraparo-253e3178</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27784%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detecting-ip-kvms-tue-mar-24th-4cc76409</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detecting%20IP%20KVMs%2C%20(Tue%2C%20Mar%2024th)&amp;severity=medium&amp;id=69c29929f4197a8e3b3ab299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/extortion-group-claims-it-hacked-astrazeneca-c789ce2f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Extortion%20Group%20Claims%20It%20Hacked%20AstraZeneca&amp;severity=medium&amp;id=69c29914f4197a8e3b3aa81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-146-update-patches-high-severity-vulnerabil-2b284599</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20146%20Update%20Patches%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69c29590f4197a8e3b399a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33497-cwe-22-improper-limitation-of-a-pat-87983cfc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33497%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c32654f4197a8e3b9def72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33484-cwe-284-improper-access-control-in--12cb985b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33484%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c29cc3f4197a8e3b3c19e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33475-cwe-74-improper-neutralization-of-s-73b70903</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33475%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69c28b09f4197a8e3b35a4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33309-cwe-22-improper-limitation-of-a-pat-84fddebc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33309%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69c28b09f4197a8e3b35a4b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4721-vulnerability-in-mozilla-firefox-6dd025a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4721%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b320700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4729-vulnerability-in-mozilla-firefox-f354bef4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4729%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c2878af4197a8e3b320775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4720-vulnerability-in-mozilla-firefox-5d43aced</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4720%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4719-vulnerability-in-mozilla-firefox-960c9a13</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4719%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28788f4197a8e3b3206f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4718-vulnerability-in-mozilla-firefox-fa7e8262</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4718%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28788f4197a8e3b3206f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4728-vulnerability-in-mozilla-firefox-5ddb899b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4728%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69c2878af4197a8e3b320771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4727-vulnerability-in-mozilla-firefox-919ac0a3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4727%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c2878af4197a8e3b32076d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4726-vulnerability-in-mozilla-firefox-f6103856</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4726%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c2878af4197a8e3b320769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4717-vulnerability-in-mozilla-firefox-922cb8a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4717%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4716-vulnerability-in-mozilla-firefox-a027e1cb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4716%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4715-vulnerability-in-mozilla-firefox-b5163d43</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4715%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4714-vulnerability-in-mozilla-firefox-e1e63892</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4714%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4713-vulnerability-in-mozilla-firefox-8fab9dfe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4713%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b32065b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4712-vulnerability-in-mozilla-firefox-09347642</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4712%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4725-vulnerability-in-mozilla-firefox-59f68556</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4725%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c2878af4197a8e3b320765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4711-vulnerability-in-mozilla-firefox-ac9b31bb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4711%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28786f4197a8e3b320651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4710-vulnerability-in-mozilla-firefox-a367fc3b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4710%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28786f4197a8e3b32064c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4709-vulnerability-in-mozilla-firefox-72f81ae4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4709%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4708-vulnerability-in-mozilla-firefox-666a9c38</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4708%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4707-vulnerability-in-mozilla-firefox-b30575b3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4707%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b32063b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4706-vulnerability-in-mozilla-firefox-41dc456f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4706%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4705-vulnerability-in-mozilla-firefox-aebd74cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4705%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28786f4197a8e3b320630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4704-vulnerability-in-mozilla-firefox-48a24581</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4704%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4724-vulnerability-in-mozilla-firefox-7e256640</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4724%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b32070e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4723-vulnerability-in-mozilla-firefox-de4dae1e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4723%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b32070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4702-vulnerability-in-mozilla-firefox-7faf28c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4702%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4722-vulnerability-in-mozilla-firefox-76ac478f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4722%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28788f4197a8e3b320706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4701-vulnerability-in-mozilla-firefox-0c790ff2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4701%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4700-vulnerability-in-mozilla-firefox-3c91843a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4700%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4699-vulnerability-in-mozilla-firefox-c673b182</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4699%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4698-vulnerability-in-mozilla-firefox-d3d4ca52</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4698%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4697-vulnerability-in-mozilla-firefox-d3acfb7e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4697%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4696-vulnerability-in-mozilla-firefox-8a27d3d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4696%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4695-vulnerability-in-mozilla-firefox-3f6b7028</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4695%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4694-vulnerability-in-mozilla-firefox-bf4db9f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4694%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4693-vulnerability-in-mozilla-firefox-eacfa2e0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4693%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b32057c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4692-vulnerability-in-mozilla-firefox-5fc771f4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4692%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4691-vulnerability-in-mozilla-firefox-9174de8f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4691%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4690-vulnerability-in-mozilla-firefox-ee977b2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4690%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b32056a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4689-vulnerability-in-mozilla-firefox-b716733f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4689%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4688-vulnerability-in-mozilla-firefox-dfce27ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4688%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b32055f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4687-vulnerability-in-mozilla-firefox-56480adc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4687%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4686-vulnerability-in-mozilla-firefox-acd27d6c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4686%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b320553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4685-vulnerability-in-mozilla-firefox-5488cd5b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4685%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b32054d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4684-vulnerability-in-mozilla-firefox-c7909fc2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4684%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b320547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/31-million-impacted-by-qualderm-data-breach-357a3657</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3.1%20Million%20Impacted%20by%20QualDerm%20Data%20Breach&amp;severity=medium&amp;id=69c283fef4197a8e3b30f536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-built-a-vast-camera-network-to-control-dissen-3256d1f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Built%20a%20Vast%20Camera%20Network%20to%20Control%20Dissent.%20Israel%20Turned%20It%20Into%20a%20Targeting%20Tool&amp;severity=medium&amp;id=69c28077f4197a8e3b2f50b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bubbles-role-in-phishing-scams-kaspersky-official--90945582</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bubble%E2%80%99s%20role%20in%20phishing%20scams%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69c28095f4197a8e3b2f5da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64998-cwe-522-insufficiently-protected-cr-c68fc6ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64998%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69c2796ff4197a8e3b2bf4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-citrix-netscaler-vulnerability-poised-for-a0221796</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Citrix%20NetScaler%20Vulnerability%20Poised%20for%20Exploitation%2C%20Security%20Firms%20Warn&amp;severity=critical&amp;id=69c275ecf4197a8e3b2a01dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canisterworm-gets-teeth-teampcps-kubernetes-wiper--dacfd3cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CanisterWorm%20Gets%20Teeth%3A%20TeamPCP&apos;s%20Kubernetes%20Wiper%20Targets%20Iran&amp;severity=medium&amp;id=69c27268f4197a8e3b26b87f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mazda-says-employee-partner-information-stolen-in--76691a7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mazda%20Says%20Employee%2C%20Partner%20Information%20Stolen%20in%20Cyberattack&amp;severity=medium&amp;id=69c26b5ff4197a8e3b1ca237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stryker-says-malicious-file-found-during-probe-int-19d82340</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stryker%20Says%20Malicious%20File%20Found%20During%20Probe%20Into%20Iran-Linked%20Attack&amp;severity=medium&amp;id=69c259ccf4197a8e3b0ee67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-compromise-spreads-from-trivy-to-chec-c6a7f036</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20chain%20compromise%20spreads%20from%20Trivy%20to%20Checkmarx%20GitHub%20Actions&amp;severity=medium&amp;id=69c27606f4197a8e3b2a0dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kics-github-action-compromised-teampcp-supply-chai-d4e55ee8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KICS%20GitHub%20Action%20Compromised%3A%20TeamPCP%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69c27268f4197a8e3b26b875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracing-a-multi-vector-malware-campaign-from-vbs-t-a4e44d8f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracing%20a%20Multi-Vector%20Malware%20Campaign%3A%20From%20VBS%20to%20Open%20Infrastructure&amp;severity=medium&amp;id=69c27606f4197a8e3b2a0df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4649-cwe-306-missing-authentication-for-c-54868a12</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4649%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20KNIME%20KNIME%20Business%20Hub&amp;severity=medium&amp;id=69c24bbbf4197a8e3b0767dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32642-cwe-863-incorrect-authorization-in--6d40c7c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32642%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Artemis&amp;severity=low&amp;id=69c24838f4197a8e3b038194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3509-cwe-134-use-of-externally-controlled-c3c53097</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3509%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20CODESYS%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=69c244c0f4197a8e3b01d2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41660-cwe-669-incorrect-resource-transfer-2b926cb7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41660%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20CODESYS%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=69c244c0f4197a8e3b01d2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4756-cwe-787-out-of-bounds-write-in-molot-3c347234</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4756%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c2331ef4197a8e3bf9e000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4755-cwe-20-cwe-20-in-molotovcherry-andro-fb2c95b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4755%3A%20CWE-20%20CWE-20%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=critical&amp;id=69c2331ef4197a8e3bf9dffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4754-cwe-79-cwe-79-in-molotovcherry-andro-178e7ad4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4754%3A%20CWE-79%20CWE-79%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=medium&amp;id=69c2331ef4197a8e3bf9dffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33852-cwe-401-missing-release-of-memory-a-fe4efbca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33852%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c2331ef4197a8e3bf9dff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33856-cwe-401-missing-release-of-memory-a-56d151b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33856%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c32654f4197a8e3b9def75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33855-cwe-190-integer-overflow-or-wraparo-ba6009c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33855%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=medium&amp;id=69c2d885f4197a8e3b5f9740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33854-cwe-787-out-of-bounds-write-in-molo-4afe3ba1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33854%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c2d885f4197a8e3b5f973d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33853-cwe-476-null-pointer-dereference-in-978106cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33853%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=medium&amp;id=69c2a3a5f4197a8e3b3eda10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33847-cwe-119-improper-restriction-of-ope-65d3a8ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33847%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20linkingvision%20rapidvms&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33849-cwe-119-improper-restriction-of-ope-4e22bddd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33849%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20linkingvision%20rapidvms&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33848-cwe-119-improper-restriction-of-ope-37a09f65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33848%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20linkingvision%20rapidvms&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33851-cwe-119-improper-restriction-of-ope-a4819350</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33851%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20joncampbell123%20doslib&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33850-cwe-787-out-of-bounds-write-in-wuje-e46fe604</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33850%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WujekFoliarz%20DualSenseY-v2&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4753-cwe-125-out-of-bounds-read-in-slajer-90f09ae8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4753%3A%20CWE-125%20Out-of-bounds%20Read%20in%20slajerek%20RetroDebugger&amp;severity=critical&amp;id=69c2a3a7f4197a8e3b3eda43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4752-cwe-416-use-after-free-in-no-chicken-d883c0b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4752%3A%20CWE-416%20Use%20After%20Free%20in%20No-Chicken%20Echo-Mate&amp;severity=medium&amp;id=69c2a3a5f4197a8e3b3eda21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4751-cwe-476-null-pointer-dereference-in--212babee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4751%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20tmate-io%20tmate&amp;severity=medium&amp;id=69c2a3a5f4197a8e3b3eda1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4750-cwe-125-out-of-bounds-read-in-fabian-95af46f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4750%3A%20CWE-125%20Out-of-bounds%20Read%20in%20fabiangreffrath%20woof&amp;severity=critical&amp;id=69c2a3a5f4197a8e3b3eda1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4749-nvd-cwe-noinfo-nvd-cwe-noinfo-in-alb-4161dd2e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4749%3A%20NVD-CWE-noinfo%20NVD-CWE-noinfo%20in%20albfan%20miraclecast&amp;severity=medium&amp;id=69c2250ef4197a8e3bf52229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4662-cwe-89-improper-neutralization-of-sp-f493c1eb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4662%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69c29cc3f4197a8e3b3c19ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4283-cwe-862-missing-authorization-in-leg-b0b3a8d9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4283%3A%20CWE-862%20Missing%20Authorization%20in%20legalweb%20WP%20DSGVO%20Tools%20(GDPR)&amp;severity=critical&amp;id=69c32654f4197a8e3b9def78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3138-cwe-862-missing-authorization-in-woo-b7898757</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3138%3A%20CWE-862%20Missing%20Authorization%20in%20woobewoo%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=medium&amp;id=69c2b1b4f4197a8e3b48d1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4640-cwe-306-missing-authentication-for-c-99bcad95</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4640%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4639-cwe-863-incorrect-authorization-in-g-0d3ccdb7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4639%3A%20CWE-863%20Incorrect%20Authorization%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3260-allocation-of-resources-without-limi-9c8abed1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3260%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=medium&amp;id=69c2137bf4197a8e3be1035e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4632-sql-injection-in-itsourcecode-online-6fae771c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4632%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69c2137bf4197a8e3be10369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4627-os-command-injection-in-d-link-dir-8-f88408e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4627%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=69c2137bf4197a8e3be10362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4746-cwe-787-out-of-bounds-write-in-timep-fbe0e14b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4746%3A%20CWE-787%20Out-of-bounds%20Write%20in%20timeplus-io%20proton&amp;severity=critical&amp;id=69c2137bf4197a8e3be10373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4745-cwe-94-improper-control-of-generatio-1708b5aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4745%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20dendibakh%20perf-ninja&amp;severity=critical&amp;id=69c2137bf4197a8e3be10370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4744-cwe-125-out-of-bounds-read-in-rizone-16fef5f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4744%3A%20CWE-125%20Out-of-bounds%20Read%20in%20rizonesoft%20Notepad3&amp;severity=critical&amp;id=69c2056ef4197a8e3bc8620e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4743-cwe-476-null-pointer-dereference-in--e4f3d4f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4743%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20taurusxin%20ncmdump&amp;severity=medium&amp;id=69c2056ef4197a8e3bc8620b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4742-cwe-444-inconsistent-interpretation--085908b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4742%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20visualfc%20liteide&amp;severity=low&amp;id=69c2056ef4197a8e3bc86208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4741-cwe-22-improper-limitation-of-a-path-4f50da47</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4741%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TeamJCD%20JoyConDroid&amp;severity=high&amp;id=69c2056ef4197a8e3bc86205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4739-cwe-190-integer-overflow-or-wraparou-4dc9a6b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4739%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20InsightSoftwareConsortium%20ITK&amp;severity=critical&amp;id=69c2056ef4197a8e3bc86201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4738-cwe-119-improper-restriction-of-oper-a4946c18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4738%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20OSGeo%20gdal&amp;severity=critical&amp;id=69c2056cf4197a8e3bc861d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4737-cwe-416-use-after-free-in-no-chicken-d056668f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4737%3A%20CWE-416%20Use%20After%20Free%20in%20No-Chicken%20Echo-Mate&amp;severity=high&amp;id=69c2056cf4197a8e3bc861cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4736-cwe-229-improper-handling-of-values--bea050a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4736%3A%20CWE-229%20Improper%20Handling%20of%20Values%20in%20No-Chicken%20Echo-Mate&amp;severity=high&amp;id=69c2056cf4197a8e3bc861ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4735-cwe-502-deserialization-of-untrusted-f029cb07</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4735%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20DTStack%20chunjun&amp;severity=high&amp;id=69c2056cf4197a8e3bc861c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4734-cwe-119-improper-restriction-of-oper-382b79d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4734%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20yoyofr%20modizer&amp;severity=critical&amp;id=69c2056cf4197a8e3bc861c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4733-cwe-200-exposure-of-sensitive-inform-1fe2438a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4733%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=medium&amp;id=69c2056cf4197a8e3bc861c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4732-cwe-125-out-of-bounds-read-in-tildea-3c7e0e4a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4732%3A%20CWE-125%20Out-of-bounds%20Read%20in%20tildearrow%20furnace&amp;severity=high&amp;id=69c2056cf4197a8e3bc861be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4626-cross-site-scripting-in-projectworld-7ed09412</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4626%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Lawyer%20Management%20System&amp;severity=medium&amp;id=69c2056cf4197a8e3bc861b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4625-sql-injection-in-sourcecodester-onli-4ad2c890</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4625%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Admission%20System&amp;severity=medium&amp;id=69c2056cf4197a8e3bc861ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4731-cwe-190-integer-overflow-or-wraparou-38be7792</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4731%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20artraweditor%20ART&amp;severity=high&amp;id=69c2056cf4197a8e3bc861bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4624-sql-injection-in-sourcecodester-onli-ea1a8c4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4624%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Library%20Management%20System&amp;severity=medium&amp;id=69c2d885f4197a8e3b5f9743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4623-server-side-request-forgery-in-defau-82e4f91b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4623%3A%20Server-Side%20Request%20Forgery%20in%20DefaultFuction%20Jeson-Customer-Relationship-Management-System&amp;severity=medium&amp;id=69c2b1b4f4197a8e3b48d1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33308-cwe-295-improper-certificate-valida-88c7e708</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33308%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20airtower-luna%20mod_gnutls&amp;severity=medium&amp;id=69c29cc3f4197a8e3b3c19e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33307-cwe-121-stack-based-buffer-overflow-3ecaed11</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33307%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20airtower-luna%20mod_gnutls&amp;severity=high&amp;id=69c1ecd0f4197a8e3bb7abb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3079-cwe-89-improper-neutralization-of-sp-7040e58f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3079%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20StellarWP%20LearnDash%20LMS&amp;severity=medium&amp;id=69c1ecd0f4197a8e3bb7abb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4617-improper-authorization-in-sourcecode-a241b185</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4617%3A%20Improper%20Authorization%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69c1e243f4197a8e3baf9862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4680-use-after-free-in-google-chrome-7b4e006d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4680%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1dec2f4197a8e3babfa4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4679-integer-overflow-in-google-chrome-d856ab98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4679%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1dec2f4197a8e3babfa48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4678-use-after-free-in-google-chrome-a69cdcbc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4678%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4677-out-of-bounds-read-in-google-chrome-6eb5e212</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4677%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4676-use-after-free-in-google-chrome-4a02e249</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4676%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4675-heap-buffer-overflow-in-google-chrom-92539054</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4675%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4674-out-of-bounds-read-in-google-chrome-ba772d3f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4674%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4673-heap-buffer-overflow-in-google-chrom-5351942f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4673%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22739-vulnerability-in-spring-spring-clou-8aa646e0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22739%3A%20Vulnerability%20in%20Spring%20Spring%20Cloud&amp;severity=high&amp;id=69c1debff4197a8e3babf86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4616-cross-site-scripting-in-bolo-blog-12348d86</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4616%3A%20Cross%20Site%20Scripting%20in%20bolo-blog&amp;severity=medium&amp;id=69c1debff4197a8e3babf875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33320-cwe-674-uncontrolled-recursion-in-t-76bc80ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33320%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20TomWright%20dasel&amp;severity=medium&amp;id=69c1debff4197a8e3babf872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33298-cwe-122-heap-based-buffer-overflow--058a7b47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33298%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=69c1debff4197a8e3babf86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30655-na-d0820e15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30655%3A%20n%2Fa&amp;severity=medium&amp;id=69c2e66df4197a8e3b68b9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30653-na-24c18f7a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30653%3A%20n%2Fa&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29840-na-be31308d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29840%3A%20n%2Fa&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a080e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29839-na-b148bc9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29839%3A%20n%2Fa&amp;severity=high&amp;id=69c2b56bf4197a8e3b4a080a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33554-na-db22b7fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33554%3A%20n%2Fa&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30662-na-02471498</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30662%3A%20n%2Fa&amp;severity=medium&amp;id=69c2a3a3f4197a8e3b3ed94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30661-na-8fea80e0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30661%3A%20n%2Fa&amp;severity=medium&amp;id=69c2a3a3f4197a8e3b3ed947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-24-23e60c42</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-24&amp;severity=medium&amp;id=69c2482ff4197a8e3b034543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-24-d05ef2d3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-24&amp;severity=low&amp;id=69c2482ff4197a8e3b03453a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33211-cwe-22-improper-limitation-of-a-pat-2bb49643</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33211%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tektoncd%20pipeline&amp;severity=critical&amp;id=69c1e5e3f4197a8e3bb3f17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33286-cwe-913-improper-control-of-dynamic-fd76d864</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33286%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20graphiti-api%20graphiti&amp;severity=critical&amp;id=69c1e5e3f4197a8e3bb3f18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33283-cwe-476-null-pointer-dereference-in-5c3025db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33283%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c1e5e3f4197a8e3bb3f188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33282-cwe-476-null-pointer-dereference-in-f5a6c99c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33282%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=high&amp;id=69c1e5e3f4197a8e3bb3f185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33281-cwe-129-improper-validation-of-arra-f6f420a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33281%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c1d434f4197a8e3ba042b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33252-cwe-352-cross-site-request-forgery--1c298ddb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33252%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20modelcontextprotocol%20go-sdk&amp;severity=high&amp;id=69c1d434f4197a8e3ba042af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33241-cwe-770-allocation-of-resources-wit-6c94bc33</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33241%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=69c1d434f4197a8e3ba042a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33242-cwe-22-improper-limitation-of-a-pat-bedfd725</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33242%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=69c1d434f4197a8e3ba042a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4615-sql-injection-in-sourcecodester-onli-a3a45347</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4615%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Catering%20Reservation&amp;severity=medium&amp;id=69c1d434f4197a8e3ba042bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4614-sql-injection-in-itsourcecode-saniti-769926fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4614%3A%20SQL%20Injection%20in%20itsourcecode%20sanitize%20or%20validate%20this%20input&amp;severity=medium&amp;id=69c1d434f4197a8e3ba042b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33250-cwe-20-improper-input-validation-in-82eeaf69</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33250%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20longturn%20freeciv21&amp;severity=high&amp;id=69c1d434f4197a8e3ba042a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33202-cwe-74-improper-neutralization-of-s-ce0b2cbe</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33202%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20rails%20activestorage&amp;severity=medium&amp;id=69c1d434f4197a8e3ba04297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33195-cwe-22-improper-limitation-of-a-pat-44000d41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33195%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rails%20activestorage&amp;severity=high&amp;id=69c1d434f4197a8e3ba0428e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33176-cwe-400-uncontrolled-resource-consu-8c24e02c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33176%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20rails%20activesupport&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4021-cwe-287-improper-authentication-in-c-9308bb23</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4021%3A%20CWE-287%20Improper%20Authentication%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=high&amp;id=69c1d4a7f4197a8e3ba0b3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4056-cwe-862-missing-authorization-in-wpe-75122f33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4056%3A%20CWE-862%20Missing%20Authorization%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3533-cwe-434-unrestricted-upload-of-file--68a0c277</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3533%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20artbees%20Jupiter%20X%20Core&amp;severity=high&amp;id=69c1d4a7f4197a8e3ba0b3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4001-cwe-95-improper-neutralization-of-di-ac901da0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4001%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20acowebs%20Woocommerce%20Custom%20Product%20Addons%20Pro&amp;severity=critical&amp;id=69c1d4a7f4197a8e3ba0b3f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33174-cwe-789-memory-allocation-with-exce-2062726e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33174%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20rails%20activestorage&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33173-cwe-925-improper-verification-of-in-43111a4f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33173%3A%20CWE-925%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20rails%20activestorage&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33170-cwe-79-improper-neutralization-of-i-711e8380</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33170%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rails%20activesupport&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33169-cwe-400-uncontrolled-resource-consu-0628f812</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33169%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20rails%20activesupport&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4613-sql-injection-in-sourcecodester-e-co-ecbd9642</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4613%3A%20SQL%20Injection%20in%20SourceCodester%20E-Commerce%20Site&amp;severity=medium&amp;id=69c1cd2bf4197a8e3b9b9472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33168-cwe-79-improper-neutralization-of-i-bc39b860</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33168%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rails%20actionview&amp;severity=low&amp;id=69c1d4a7f4197a8e3ba0b408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33167-cwe-79-improper-neutralization-of-i-c52f453b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33167%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rails%20actionpack&amp;severity=low&amp;id=69c1d4a7f4197a8e3ba0b403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3225-cwe-862-missing-authorization-in-thi-90e5b57c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3225%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4306-cwe-89-improper-neutralization-of-sp-8504a3a8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4306%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=high&amp;id=69c1d4a9f4197a8e3ba0b48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2412-cwe-89-improper-neutralization-of-sp-8fc37751</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2412%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4066-cwe-862-missing-authorization-in-inc-871b678f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4066%3A%20CWE-862%20Missing%20Authorization%20in%20inc2734%20Smart%20Custom%20Fields&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4612-sql-injection-in-itsourcecode-free-h-7cf79c04</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4612%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c1d4adf4197a8e3ba0b53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4681-cwe-94-improper-control-of-generatio-dce2340b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4681%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PTC%20Windchill%20PDMLink&amp;severity=critical&amp;id=69c1d4adf4197a8e3ba0b545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33634-cwe-506-embedded-malicious-code-in--163a34d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33634%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20aquasecurity%20setup-trivy&amp;severity=critical&amp;id=69c1b815f4197a8e3b932274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32300-cwe-285-improper-authorization-in-o-34aa4212</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32300%3A%20CWE-285%3A%20Improper%20Authorization%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1b815f4197a8e3b93226e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32299-cwe-284-improper-access-control-in--8058e34f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32299%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1b815f4197a8e3b932269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32279-cwe-918-server-side-request-forgery-d5a848f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32279%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opensource-workshop%20connect-cms&amp;severity=medium&amp;id=69c1b815f4197a8e3b932262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32912-6010818f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32912&amp;severity=null&amp;id=69c1d4adf4197a8e3ba0b53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32911-8533cf6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32911&amp;severity=null&amp;id=69c1d4adf4197a8e3ba0b53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32910-685ea9ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32910&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32909-70fb35ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32909&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32908-d294f3c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32908&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32907-d72860c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32907&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32904-a79971b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32904&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32903-16e6c7e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32903&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32902-5d202bfe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32902&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32901-ed154d9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32901&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32900-a199f6df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32900&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32066-f88860ed</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32066&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32047-ddf09970</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32047&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32012-74b36520</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32012&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28483-12f1f14c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28483&amp;severity=null&amp;id=69c32654f4197a8e3b9def81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28455-d8f9feaf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28455&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22173-9c19c107</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22173&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32278-cwe-434-unrestricted-upload-of-file-f13f731d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32278%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1940-vulnerability-in-red-hat-red-hat-ent-05376571</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1940%3A%20Vulnerability%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c1d4adf4197a8e3ba0b548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32277-cwe-79-improper-neutralization-of-i-86b1f15c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32277%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4611-os-command-injection-in-totolink-x60-3ae7b1a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4611%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20X6000R&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32276-cwe-94-improper-control-of-generati-a03d82ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32276%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b55b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60949-cwe-200-exposure-of-sensitive-infor-63fae85a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60949%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Census%20CSWeb&amp;severity=critical&amp;id=69c1d4aef4197a8e3ba0b57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60948-cwe-79-improper-neutralization-of-i-341329c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60948%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Census%20CSWeb&amp;severity=medium&amp;id=69c1d4aef4197a8e3ba0b577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60947-cwe-434-unrestricted-upload-of-file-12a4f8c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60947%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Census%20CSWeb&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60946-cwe-22-improper-limitation-of-a-pat-1902b4db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60946%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Census%20CSWeb&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23882-cwe-78-improper-neutralization-of-s-d5b9e9d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23882%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20blinkospace%20blinko&amp;severity=high&amp;id=69c1aa03f4197a8e3b8c35ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23485-cwe-22-improper-limitation-of-a-pat-f4e3f9d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23485%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23488-cwe-639-authorization-bypass-throug-9ede2719</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23488%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23487-cwe-639-authorization-bypass-throug-99878f35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23487%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23486-cwe-200-exposure-of-sensitive-infor-22b9b024</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23486%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23480-cwe-288-authentication-bypass-using-857ce055</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23480%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tool-updates-lots-of-security-and-logic-fixes-mon--38257034</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tool%20updates%3A%20lots%20of%20security%20and%20logic%20fixes%2C%20(Mon%2C%20Mar%2023rd)&amp;severity=low&amp;id=69c1a67ff4197a8e3b8b7498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23481-cwe-22-improper-limitation-of-a-pat-6ab7581d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23481%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23484-cwe-22-improper-limitation-of-a-pat-c0f6a5a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23484%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23483-cwe-22-improper-limitation-of-a-pat-f1003822</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23483%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23482-cwe-22-improper-limitation-of-a-pat-7f430ae3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23482%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=high&amp;id=69c1a68ff4197a8e3b8b7ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3055-cwe-125-out-of-bounds-read-in-netsca-4eb4a414</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3055%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NetScaler%20ADC&amp;severity=critical&amp;id=69c1a302f4197a8e3b8aa1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4597-sql-injection-in-648540858-wvp-gb281-46ef2a06</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4597%3A%20SQL%20Injection%20in%20648540858%20wvp-GB28181-pro&amp;severity=medium&amp;id=69c1a302f4197a8e3b8aa1e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4368-vulnerability-in-netscaler-adc-9513ba21</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4368%3A%20Vulnerability%20in%20NetScaler%20ADC&amp;severity=high&amp;id=69c1a302f4197a8e3b8aa1e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2298-cwe-88-improper-neutralization-of-ar-dcfd6ea3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2298%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=69c19bf3f4197a8e3b887547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32879-cwe-287-improper-authentication-in--ddbd79c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32879%3A%20CWE-287%3A%20Improper%20Authentication%20in%20QuantumNous%20new-api&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4596-cross-site-scripting-in-projectworld-56938e19</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4596%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Lawyer%20Management%20System&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30886-cwe-639-authorization-bypass-throug-27f24178</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30886%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20QuantumNous%20new-api&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27131-cwe-200-exposure-of-sensitive-infor-620cdf71</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27131%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20putyourlightson%20craft-sprig&amp;severity=medium&amp;id=69c194ecf4197a8e3b85fa49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26209-cwe-674-uncontrolled-recursion-in-a-d5213351</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26209%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20agronholm%20cbor2&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33723-cwe-89-improper-neutralization-of-s-64220460</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33723%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de8f4197a8e3b82ea8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33719-cwe-306-missing-authentication-for--f550060a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33719%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de8f4197a8e3b82ea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33717-cwe-434-unrestricted-upload-of-file-69bcb40c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33717%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de8f4197a8e3b82ea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33716-cwe-287-improper-authentication-in--a45ab5c1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33716%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c18de6f4197a8e3b82dd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33690-cwe-348-use-of-less-trusted-source--d465d980</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33690%3A%20CWE-348%3A%20Use%20of%20Less%20Trusted%20Source%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33688-cwe-204-observable-response-discrep-2ae31524</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33688%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33685-cwe-862-missing-authorization-in-ww-72c96804</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33685%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0898-cwe-284-improper-access-control-in-p-030c9101</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0898%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Pegasystems%20Pega%20Robot%20Studio&amp;severity=critical&amp;id=69c18de6f4197a8e3b82dd78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33683-cwe-79-improper-neutralization-of-i-42f6a9a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33683%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33681-cwe-22-improper-limitation-of-a-pat-f4244785</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33681%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33651-cwe-89-improper-neutralization-of-s-783a9dad</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33651%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4595-cross-site-scripting-in-code-project-11b45a6f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4595%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c18de8f4197a8e3b82ea8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-iranian-nasir-security-is-targeting-the-energy-3994b510</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Iranian%20Nasir%20Security%20is%20Targeting%20The%20Energy%20Sector%20in%20the%20Middle%20East&amp;severity=medium&amp;id=69c1ad86f4197a8e3b8da034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15606-cwe-20-improper-input-validation-in-ebf95e38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15606%3A%20CWE-20%20Improper%20input%20validation%20in%20TP-Link%20Systems%20Inc.%20TD-W8961N%20v4.0&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33650-cwe-863-incorrect-authorization-in--5fb7dae5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33650%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33649-cwe-352-cross-site-request-forgery--1be8ecb0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33649%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33648-cwe-78-improper-neutralization-of-s-83c7ae01</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33648%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33647-cwe-434-unrestricted-upload-of-file-b82e976f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33647%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33513-cwe-22-improper-limitation-of-a-pat-063f790f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33513%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33512-cwe-287-improper-authentication-in--09a67f4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33512%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15605-cwe-321-use-of-hard-coded-cryptogra-411a871b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15605%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15519-cwe-78-improper-neutralization-of-s-1eec4ee0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15519%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15518-cwe-78-improper-neutralization-of-s-c83afbf0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15518%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15517-cwe-306-missing-authentication-for--d24caf26</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15517%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4594-sql-injection-hibernate-in-erupts-er-82ccc1b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4594%3A%20SQL%20Injection%20Hibernate%20in%20erupts%20erupt&amp;severity=medium&amp;id=69c17fd9f4197a8e3b7d5de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4593-sql-injection-hibernate-in-erupts-er-2d6076e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4593%3A%20SQL%20Injection%20Hibernate%20in%20erupts%20erupt&amp;severity=medium&amp;id=69c1754df4197a8e3b789141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33507-cwe-352-cross-site-request-forgery--676b8efb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33507%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c171cff4197a8e3b777515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33502-cwe-918-server-side-request-forgery-8b7e8739</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33502%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c171cff4197a8e3b777511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33501-cwe-862-missing-authorization-in-ww-15f1a843</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33501%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c16abef4197a8e3b7505b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33500-cwe-79-improper-neutralization-of-i-9b7b8f21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33500%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c16abef4197a8e3b7505ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33499-cwe-79-improper-neutralization-of-i-04b61f15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33499%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c16abef4197a8e3b7505aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4592-improper-authentication-in-kalcaddle-0e340947</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4592%3A%20Improper%20Authentication%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c17fd9f4197a8e3b7d5dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33493-cwe-22-improper-limitation-of-a-pat-e1c4f89a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33493%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c171cff4197a8e3b777519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32845-cwe-190-integer-overflow-or-wraparo-0511ec41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32845%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20jkuhlmann%20cgltf&amp;severity=medium&amp;id=69c17c7cf4197a8e3b7b5a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33492-cwe-384-session-fixation-in-wwbn-av-973399eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33492%3A%20CWE-384%3A%20Session%20Fixation%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c16032f4197a8e3b6f2c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33488-cwe-326-inadequate-encryption-stren-6b555353</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33488%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c16032f4197a8e3b6f2c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4591-os-command-injection-in-kalcaddle-ko-e34b5b79</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4591%3A%20OS%20Command%20Injection%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m-trends-2026-initial-access-handoff-shrinks-from--7bb1d2f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M-Trends%202026%3A%20Initial%20Access%20Handoff%20Shrinks%20From%20Hours%20to%2022%20Seconds&amp;severity=medium&amp;id=69c155a4f4197a8e3b687c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chip-services-firm-trio-tech-says-subsidiary-hit-b-aa4297ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chip%20Services%20Firm%20Trio-Tech%20Says%20Subsidiary%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=69c15220f4197a8e3b66a1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4590-cross-site-request-forgery-in-kalcad-72a943be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4590%3A%20Cross-Site%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=low&amp;id=69c1522ef4197a8e3b66a562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33485-cwe-89-improper-neutralization-of-s-c274543e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33485%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33483-cwe-770-allocation-of-resources-wit-75dd964b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33483%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33482-cwe-78-improper-neutralization-of-s-3886e14c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33482%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33480-cwe-918-server-side-request-forgery-e7b70dcf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33480%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33479-cwe-94-improper-control-of-generati-39924b37</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33479%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33478-cwe-78-improper-neutralization-of-s-b6c81f37</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33478%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c14e9ef4197a8e3b641c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33354-cwe-73-external-control-of-file-nam-49e4b6db</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33354%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33352-cwe-89-improper-neutralization-of-s-bb241f0f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33352%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c14797f4197a8e3b602ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33351-cwe-918-server-side-request-forgery-ae5efa9b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33351%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c14797f4197a8e3b602aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33297-cwe-639-authorization-bypass-throug-8f970b76</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33297%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c14797f4197a8e3b602aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aquas-trivy-vulnerability-scanner-hit-by-supply-ch-7c6dcbc1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aqua%E2%80%99s%20Trivy%20Vulnerability%20Scanner%20Hit%20by%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69c14410f4197a8e3b5e2f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/23rd-march-threat-intelligence-report-ceabc982</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=23rd%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69c14441f4197a8e3b5e3e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4647-out-of-bounds-read-in-red-hat-red-ha-36231e4b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4647%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c14797f4197a8e3b602ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4645-loop-with-unreachable-exit-condition-6cd7e4c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4645&amp;severity=null&amp;id=69c14797f4197a8e3b602abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4589-server-side-request-forgery-in-kalca-2067b409</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4589%3A%20Server-Side%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c14797f4197a8e3b602ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4588-use-of-hard-coded-cryptographic-key--6d0f896a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4588%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c1398bf4197a8e3b580fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4587-improper-certificate-validation-in-h-097d952b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4587%3A%20Improper%20Certificate%20Validation%20in%20HybridAuth&amp;severity=medium&amp;id=69c1398bf4197a8e3b580fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1958-cwe-798-use-of-hard-coded-credential-fc23d20f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1958%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20BRI%20KlinikaXP%20Insertino&amp;severity=high&amp;id=69c1398bf4197a8e3b580fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31851-cwe-307-improper-restriction-of-exc-a96497fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31851%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31850-cwe-256-plaintext-storage-of-a-pass-36d1e4ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31850%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=medium&amp;id=69c1d4aef4197a8e3ba0b599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31849-cwe-352-cross-site-request-forgery--9fe3828a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31849%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31848-cwe-312-cleartext-storage-of-sensit-384352d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31848%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4586-unrestricted-upload-in-codephiliax-c-82ce6b58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4586%3A%20Unrestricted%20Upload%20in%20CodePhiliaX%20Chat2DB&amp;severity=medium&amp;id=69c16abef4197a8e3b7505be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31847-cwe-912-hidden-functionality-in-nex-b07dd3af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31847%3A%20CWE-912%20Hidden%20Functionality%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31846-cwe-306-missing-authentication-for--a9c2d2c0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31846%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Nexxt%20Solutions%20Nebula%20300%2B%20%2F%20Tenda%20F3%20V2.0%20Firmware&amp;severity=high&amp;id=69c12ef9f4197a8e3b4f4049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32969-cwe-89-improper-neutralization-of-s-9351491e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32969%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69c127f2f4197a8e3b4567ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32968-cwe-78-improper-neutralization-of-s-6f1949ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32968%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20MB%20connect%20line%20mbCONNECT24&amp;severity=critical&amp;id=69c127f2f4197a8e3b4567e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4585-os-command-injection-in-tiandy-easy7-54d78cb3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4585%3A%20OS%20Command%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=critical&amp;id=69c127f2f4197a8e3b4567f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4584-cleartext-transmission-of-sensitive--afe1d79d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4584%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Shenzhen%20HCC%20Technology%20MPOS%20M6%20PLUS&amp;severity=low&amp;id=69c127f2f4197a8e3b4567f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-patches-four-vulnerabilities-exploited-at-pwn-c42a1500</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20Patches%20Four%20Vulnerabilities%20Exploited%20at%20Pwn2Own&amp;severity=low&amp;id=69c120e8f4197a8e3b40ecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4633-generation-of-error-message-containi-d7a7c0fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4633%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69c11d65f4197a8e3b3f53d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4583-authentication-bypass-by-capture-rep-6441f94b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4583%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Shenzhen%20HCC%20Technology%20MPOS%20M6%20PLUS&amp;severity=low&amp;id=69c119e0f4197a8e3b3cb44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tycoon-2fa-fully-operational-despite-law-enforceme-6358f581</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tycoon%202FA%20Fully%20Operational%20Despite%20Law%20Enforcement%20Takedown&amp;severity=medium&amp;id=69c1165cf4197a8e3b3b0692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28809-cwe-611-improper-restriction-of-xml-6e572eae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28809%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20dropbox%20esaml&amp;severity=medium&amp;id=69c119e0f4197a8e3b3cb44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4582-missing-authentication-in-shenzhen-h-bdf6f3ea</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4582%3A%20Missing%20Authentication%20in%20Shenzhen%20HCC%20Technology%20MPOS%20M6%20PLUS&amp;severity=low&amp;id=69c10bd0f4197a8e3b33b915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4581-sql-injection-in-code-projects-simpl-f864cf7c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4581%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c10bd0f4197a8e3b33b90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostclaw-expands-beyond-npm-github-repositories-a-368823f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostClaw%20expands%20beyond%20npm%3A%20GitHub%20repositories%20and%20AI%20workflows%20deliver%20macOS%20infostealer&amp;severity=medium&amp;id=69c10bcff4197a8e3b33b87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4580-sql-injection-in-code-projects-simpl-e7825aa4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4580%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c10142f4197a8e3b28a6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4628-improper-access-control-in-red-hat-r-36ac1ffc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4628%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69c0fdbff4197a8e3b25d07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3587-cwe-912-hidden-functionality-in-wago-a4c55a72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3587%3A%20CWE-912%20Hidden%20Functionality%20in%20WAGO%20Lean%20Managed%20Switch%20852-1812&amp;severity=critical&amp;id=69c0f6b6f4197a8e3b21d85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4579-sql-injection-in-code-projects-simpl-5f3bc715</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4579%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c0efaff4197a8e3b1e6aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4578-cross-site-scripting-in-code-project-c0d98763</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4578%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0efaff4197a8e3b1e6aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13997-cwe-200-exposure-of-sensitive-infor-d51b2161</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13997%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%2080%2B%20Elementor%20Widgets%2C%204%20000%2B%20Elementor%20Templates%2C%20WooCommerce%2C%20Mega%20Menu%2C%20Popup%20Builder&amp;severity=medium&amp;id=69c0e19ff4197a8e3b18a2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6229-cwe-79-improper-neutralization-of-in-231a13b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6229%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor&amp;severity=medium&amp;id=69c0e19ff4197a8e3b18a2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4577-cross-site-scripting-in-code-project-23780ee9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4577%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0e19ff4197a8e3b18a2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1969-cwe-434-unrestricted-upload-of-file--c0354933</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1969%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20trx_addons&amp;severity=medium&amp;id=69c0daaaf4197a8e3b15ada4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4576-cross-site-scripting-in-code-project-134b1b69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4576%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4575-cross-site-scripting-in-code-project-40472f6d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4575%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-releases-emergency-patch-for-critical-ident-3d33a815</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Releases%20Emergency%20Patch%20for%20Critical%20Identity%20Manager%20Vulnerability&amp;severity=critical&amp;id=69c0d38ff4197a8e3b12d6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10734-cwe-922-insecure-storage-of-sensiti-bad439f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10734%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10679-cwe-94-improper-control-of-generati-1b2de9ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10679%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=high&amp;id=69c0d39df4197a8e3b12da10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10731-cwe-285-improper-authorization-in-r-54a86519</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10731%3A%20CWE-285%20Improper%20Authorization%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4574-sql-injection-in-sourcecodester-simp-590bdc3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4574%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-learning%20System&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4573-sql-injection-in-sourcecodester-simp-6f478352</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4573%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-learning%20System&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4603-division-by-zero-in-jsrsasign-d0b63e96</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4603%3A%20Division%20by%20zero%20in%20jsrsasign&amp;severity=medium&amp;id=69c0d39ff4197a8e3b12db18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4601-missing-cryptographic-step-in-jsrsas-1b19c447</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4601%3A%20Missing%20Cryptographic%20Step%20in%20jsrsasign&amp;severity=critical&amp;id=69c0d39ff4197a8e3b12db0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4599-incomplete-comparison-with-missing-f-9aee8aa7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4599%3A%20Incomplete%20Comparison%20with%20Missing%20Factors%20in%20jsrsasign&amp;severity=critical&amp;id=69c0d39df4197a8e3b12da43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4598-infinite-loop-in-jsrsasign-37374acf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4598%3A%20Infinite%20loop%20in%20jsrsasign&amp;severity=high&amp;id=69c0d39df4197a8e3b12da3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4602-incorrect-conversion-between-numeric-8eab0826</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4602%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20jsrsasign&amp;severity=high&amp;id=69c0d39ff4197a8e3b12db12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4600-improper-verification-of-cryptograph-546ca5ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4600%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20jsrsasign&amp;severity=critical&amp;id=69c0d39df4197a8e3b12da49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10736-cwe-285-improper-authorization-in-r-8dcd9600</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10736%3A%20CWE-285%20Improper%20Authorization%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=medium&amp;id=69c1d4aef4197a8e3ba0b589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4572-sql-injection-in-sourcecodester-sale-bb457c93</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4572%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c12b75f4197a8e3b4d2fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4571-sql-injection-in-sourcecodester-sale-b8e8c39e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4571%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c16abef4197a8e3b7505b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4570-sql-injection-in-sourcecodester-sale-4006fb57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4570%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c171cff4197a8e3b77751d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4569-sql-injection-in-sourcecodester-sale-ef4f7718</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4569%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c0b3fdf4197a8e3be64bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4568-sql-injection-in-sourcecodester-sale-d163008f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4568%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c0a5dbf4197a8e3bdb4a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4567-stack-based-buffer-overflow-in-tenda-27ff1845</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4567%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A15&amp;severity=critical&amp;id=69c0a5dbf4197a8e3bdb4a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4566-stack-based-buffer-overflow-in-belki-8cb934b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4566%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c0a5dbf4197a8e3bdb4a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4606-cwe-250-execution-with-unnecessary-p-39d565c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4606%3A%20CWE-250%20Execution%20with%20unnecessary%20privileges%20in%20GeoVision%20GV-Edge%20Recording%20Manager&amp;severity=critical&amp;id=69c097cbf4197a8e3bd66623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4565-buffer-overflow-in-tenda-ac21-5d23ce15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4565%3A%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=69c090cbf4197a8e3bd36054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52204-na-030c791a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52204%3A%20n%2Fa&amp;severity=medium&amp;id=69c19bf3f4197a8e3b887542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46879-na-e2beb03b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46879%3A%20n%2Fa&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46878-na-66a3746b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46878%3A%20n%2Fa&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30007-na-1658d953</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30007%3A%20n%2Fa&amp;severity=medium&amp;id=69c171cff4197a8e3b77750d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30006-na-b7b35e80</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30006%3A%20n%2Fa&amp;severity=medium&amp;id=69c171cff4197a8e3b777509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26829-na-1d4912f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26829%3A%20n%2Fa&amp;severity=high&amp;id=69c16abef4197a8e3b7505a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26828-na-a163fedf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26828%3A%20n%2Fa&amp;severity=high&amp;id=69c16abef4197a8e3b7505a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24516-na-ecd959ea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24516%3A%20n%2Fa&amp;severity=high&amp;id=69c16abef4197a8e3b75059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51226-na-d76be320</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51226%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51225-na-6216ff27</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51225%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51224-na-96495e20</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51224%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51223-na-3bf6f4be</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51223%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51222-na-79d2d66d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51222%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-23-fcf08916</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-23&amp;severity=medium&amp;id=69c127e7f4197a8e3b450253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-23-8c3342de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-23&amp;severity=low&amp;id=69c097c3f4197a8e3bd6641a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4564-code-injection-in-yangzongzhuan-ruoy-64a205a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4564%3A%20Code%20Injection%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4563-authorization-bypass-in-maccms-eaf25abd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4563%3A%20Authorization%20Bypass%20in%20MacCMS&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2580-cwe-89-improper-neutralization-of-sp-b93f1b1b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2580%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=high&amp;id=69c07babf4197a8e3bc82349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4562-missing-authentication-in-maccms-3327321e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4562%3A%20Missing%20Authentication%20in%20MacCMS&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4558-os-command-injection-in-linksys-mr96-e5c4353d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4558%3A%20OS%20Command%20Injection%20in%20Linksys%20MR9600&amp;severity=high&amp;id=69c02acff4197a8e3ba6a972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4557-cross-site-scripting-in-code-project-2053ca14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4557%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c02acff4197a8e3ba6a96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33296-cwe-601-url-redirection-to-untruste-785f37e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33296%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WWBN%20AVideo&amp;severity=low&amp;id=69c023c9f4197a8e3ba36535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33295-cwe-79-improper-neutralization-of-i-4fafbbb4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33295%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c023c9f4197a8e3ba36531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33294-cwe-918-server-side-request-forgery-a13589f1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33294%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c02043f4197a8e3ba1f6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4555-stack-based-buffer-overflow-in-d-lin-d3320ca7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4555%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69c02043f4197a8e3ba1f6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4554-command-injection-in-tenda-f453-fa4e7404</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4554%3A%20Command%20Injection%20in%20Tenda%20F453&amp;severity=medium&amp;id=69c02043f4197a8e3ba1f6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33293-cwe-22-improper-limitation-of-a-pat-ff5dbc0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33293%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c02043f4197a8e3ba1f6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33319-cwe-78-improper-neutralization-of-s-96a640bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33319%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33292-cwe-22-improper-limitation-of-a-pat-24031473</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33292%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c0833cf4197a8e3bcdaa55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4553-stack-based-buffer-overflow-in-tenda-df9d32ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4553%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c00eaff4197a8e3b87db39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4552-stack-based-buffer-overflow-in-tenda-2d4d3dfc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4552%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c0009ff4197a8e3b7d8e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4551-stack-based-buffer-overflow-in-tenda-a56904d2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4551%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c0009ff4197a8e3b7d8e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4550-sql-injection-in-code-projects-simpl-5472b525</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4550%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Gym%20Management%20System&amp;severity=medium&amp;id=69bff615f4197a8e3b77b0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4549-authorization-bypass-in-mickasmt-nex-2c60ce48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4549%3A%20Authorization%20Bypass%20in%20mickasmt%20next-saas-stripe-starter&amp;severity=low&amp;id=69bff615f4197a8e3b77b0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4548-improper-authorization-in-mickasmt-n-c85f7652</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4548%3A%20Improper%20Authorization%20in%20mickasmt%20next-saas-stripe-starter&amp;severity=medium&amp;id=69bfef0bf4197a8e3b75ae83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4547-business-logic-errors-in-mickasmt-ne-eba15f55</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4547%3A%20Business%20Logic%20Errors%20in%20mickasmt%20next-saas-stripe-starter&amp;severity=medium&amp;id=69bfef0bf4197a8e3b75ae7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4546-uncontrolled-search-path-in-flos-fre-73cfae25</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4546%3A%20Uncontrolled%20Search%20Path%20in%20Flos%20Freeware%20Notepad2&amp;severity=high&amp;id=69bfef0bf4197a8e3b75ae78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4115-improper-verification-of-cryptograph-b4a4f2b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4115%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20PuTTY&amp;severity=medium&amp;id=69bfe0fbf4197a8e3b712c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4545-uncontrolled-search-path-in-flos-fre-4b0b234b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4545%3A%20Uncontrolled%20Search%20Path%20in%20Flos%20Freeware%20Notepad2&amp;severity=high&amp;id=69bfd2ebf4197a8e3b6b775b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4544-cross-site-scripting-in-wavlink-wl-w-1122168c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4544%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4543-command-injection-in-wavlink-wl-wn57-50f96d33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4543%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=69bfba4ff4197a8e3b61fc7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4542-path-traversal-in-sscms-2ffdaf39</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4542%3A%20Path%20Traversal%20in%20SSCMS&amp;severity=medium&amp;id=69bfafc3f4197a8e3b5ee767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4541-improper-verification-of-cryptograph-bb085ec7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4541%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20janmojzis%20tinyssh&amp;severity=low&amp;id=69bfafc3f4197a8e3b5ee75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4540-sql-injection-in-projectworlds-onlin-4351ab2e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4540%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Notes%20Sharing%20System&amp;severity=medium&amp;id=69bfa1b3f4197a8e3b5a1521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4539-inefficient-regular-expression-compl-cb34245c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4539%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20pygments&amp;severity=medium&amp;id=69bf85b4f4197a8e3b50f1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4538-deserialization-in-pytorch-3d5ae3d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4538%3A%20Deserialization%20in%20PyTorch&amp;severity=medium&amp;id=69bf707bf4197a8e3b474c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4537-command-injection-in-cudy-tr1200-eb876869</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4537%3A%20Command%20Injection%20in%20Cudy%20TR1200&amp;severity=medium&amp;id=69bf707bf4197a8e3b474c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4536-unrestricted-upload-in-acrel-environ-2a8656cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4536%3A%20Unrestricted%20Upload%20in%20Acrel%20Environmental%20Monitoring%20Cloud%20Platform&amp;severity=medium&amp;id=69bf707bf4197a8e3b474c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4535-stack-based-buffer-overflow-in-tenda-8f2fc263</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4535%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69bf707bf4197a8e3b474c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4534-stack-based-buffer-overflow-in-tenda-65a33e73</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4534%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69bf707bf4197a8e3b474c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3427-cwe-79-improper-neutralization-of-in-f396b435</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yoast%20Yoast%20SEO%20%E2%80%93%20Advanced%20SEO%20with%20real-time%20guidance%20and%20built-in%20AI&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4314-cwe-269-improper-privilege-managemen-df6f51b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4314%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=high&amp;id=69c0833cf4197a8e3bcdaa8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33550-cwe-308-use-of-single-factor-authen-6be57b9b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33550%3A%20CWE-308%20Use%20of%20Single-factor%20Authentication%20in%20Alinto%20SOGo&amp;severity=low&amp;id=69bf545af4197a8e3b1d674e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71276-cwe-79-improper-neutralization-of-i-4b87c96d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Alinto%20SOGo&amp;severity=medium&amp;id=69bf545af4197a8e3b1d674b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4533-sql-injection-in-code-projects-simpl-c9dcca98</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4533%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=69bf545af4197a8e3b1d6752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4532-files-or-directories-accessible-in-c-73433b3a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4532%3A%20Files%20or%20Directories%20Accessible%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=69bf49cef4197a8e3b18ce5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4531-denial-of-service-in-free5gc-a793a8cd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4531%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69bf49cef4197a8e3b18ce53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-22-08f7f078</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-22&amp;severity=medium&amp;id=69c00b23f4197a8e3b82758b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-22-2b31dbc7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-22&amp;severity=low&amp;id=69bf7afff4197a8e3b4d698b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4530-sql-injection-in-apconw-aix-db-2ac345d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4530%3A%20SQL%20Injection%20in%20apconw%20Aix-DB&amp;severity=medium&amp;id=69bf2daff4197a8e3b0c09df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4529-stack-based-buffer-overflow-in-d-lin-7f100378</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4529%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DHP-1320&amp;severity=high&amp;id=69bf26a7f4197a8e3b098306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3629-cwe-269-improper-privilege-managemen-61196a39</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3629%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=high&amp;id=69bf1f9ff4197a8e3b06ff51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4528-server-side-request-forgery-in-truel-6267e37d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4528%3A%20Server-Side%20Request%20Forgery%20in%20trueleaf%20ApiFlow&amp;severity=medium&amp;id=69bf1898f4197a8e3b034520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2756-missing-authentication-in-omnipemf-n-3c473c97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2756%3A%20Missing%20Authentication%20in%20OmniPEMF%20NeoRhythm&amp;severity=low&amp;id=69bed94ff4197a8e3be73e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4516-injection-in-foundation-agents-metag-cb474584</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4516%3A%20Injection%20in%20Foundation%20Agents%20MetaGPT&amp;severity=medium&amp;id=69beb627f4197a8e3bd740a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4515-code-injection-in-foundation-agents--00ba46ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4515%3A%20Code%20Injection%20in%20Foundation%20Agents%20MetaGPT&amp;severity=medium&amp;id=69be84f0f4197a8e3bc20cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-quest-kace-vulnerability-potentially-expl-c5cd699f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Quest%20KACE%20Vulnerability%20Potentially%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=69be7a63f4197a8e3bbd68e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4514-improper-access-controls-in-pbootcms-bb082049</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4514%3A%20Improper%20Access%20Controls%20in%20PbootCMS&amp;severity=medium&amp;id=69be7a70f4197a8e3bbd6d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4513-sql-injection-in-vanna-ai-vanna-6c0caded</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4513%3A%20SQL%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69be6fd7f4197a8e3bb95f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4511-injection-in-vanna-ai-vanna-87d5cbfc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4511%3A%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69be5ac1f4197a8e3bb09e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4510-cross-site-scripting-in-pbootcms-efcb0958</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4510%3A%20Cross%20Site%20Scripting%20in%20PbootCMS&amp;severity=medium&amp;id=69be45a8f4197a8e3ba73aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4373-cwe-36-absolute-path-traversal-in-je-12b1586f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4373%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20jetmonsters%20JetFormBuilder%20%E2%80%94%20Dynamic%20Blocks%20Form%20Builder&amp;severity=high&amp;id=69be45a8f4197a8e3ba73aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4509-incomplete-blacklist-in-pbootcms-c754c3d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4509%3A%20Incomplete%20Blacklist%20in%20PbootCMS&amp;severity=medium&amp;id=69be3796f4197a8e3ba0643f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4022-cwe-79-improper-neutralization-of-in-7a0fd10b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4022%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativedev4%20Show%20Posts%20list%20%E2%80%93%20Easy%20designs%2C%20filters%20and%20more&amp;severity=medium&amp;id=69be1811f4197a8e3b784400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3478-cwe-918-server-side-request-forgery--aeeaf0a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3478%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20benmoody%20Content%20Syndication%20Toolkit&amp;severity=high&amp;id=69be180ef4197a8e3b78435f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1914-cwe-79-improper-neutralization-of-in-2b6d007f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeremyshapiro%20FuseDesk&amp;severity=medium&amp;id=69be1809f4197a8e3b783d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2501-cwe-79-improper-neutralization-of-in-788a7318</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20waianaeboy702%20Ed&apos;s%20Social%20Share&amp;severity=medium&amp;id=69be180df4197a8e3b7842cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4004-cwe-94-improper-control-of-generatio-7256d48a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4004%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20eoxia%20Task%20Manager&amp;severity=medium&amp;id=69be1811f4197a8e3b7843f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1278-cwe-79-improper-neutralization-of-in-a7319460</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ketanmujumdar%20Mandatory%20Field&amp;severity=medium&amp;id=69be1806f4197a8e3b783bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2121-cwe-79-improper-neutralization-of-in-4523a2ff</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2121%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpweaver%20Weaver%20Show%20Posts&amp;severity=medium&amp;id=69be180bf4197a8e3b784269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2837-cwe-79-improper-neutralization-of-in-aca66766</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2837%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20systemsrtk%20Ricerca%20%E2%80%93%20advanced%20search&amp;severity=medium&amp;id=69be180df4197a8e3b7842e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1397-cwe-79-improper-neutralization-of-in-fe7f07ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peacefulqode%20PQ%20Addons%20%E2%80%93%20Creative%20Elementor%20Widgets&amp;severity=medium&amp;id=69be1807f4197a8e3b783c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2723-cwe-352-cross-site-request-forgery-c-29fc5831</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2723%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20phy9pas%20Post%20Snippits&amp;severity=medium&amp;id=69be180df4197a8e3b7842e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3997-cwe-79-improper-neutralization-of-in-6af7d70c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hoosierdragon%20Text%20Toggle&amp;severity=medium&amp;id=69be1811f4197a8e3b7843ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3354-cwe-79-improper-neutralization-of-in-c48c2947</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3354%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mooeypoo%20Wikilookup&amp;severity=medium&amp;id=69be180ef4197a8e3b784351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4143-cwe-352-cross-site-request-forgery-c-a75b1d3d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4143%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20neo2oo5%20Neos%20Connector%20for%20Fakturama&amp;severity=medium&amp;id=69be1813f4197a8e3b784eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4261-cwe-862-missing-authorization-in-hus-fa4ebb4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4261%3A%20CWE-862%20Missing%20Authorization%20in%20husobj%20Expire%20Users&amp;severity=high&amp;id=69be1813f4197a8e3b784ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4161-cwe-79-improper-neutralization-of-in-d6365643</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4161%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revukangaroo%20Review%20Map%20by%20RevuKangaroo&amp;severity=medium&amp;id=69be1813f4197a8e3b784eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2720-cwe-862-missing-authorization-in-cod-9f638a74</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2720%3A%20CWE-862%20Missing%20Authorization%20in%20codeclove%20Hr%20Press%20Lite&amp;severity=medium&amp;id=69be180df4197a8e3b7842d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3554-cwe-79-improper-neutralization-of-in-b5e9e6fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sherkspear%20Sherk%20Custom%20Post%20Type%20Displays&amp;severity=medium&amp;id=69be1810f4197a8e3b784383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2503-cwe-89-improper-neutralization-of-sp-845cf738</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2503%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdive%20ElementCamp&amp;severity=medium&amp;id=69be180df4197a8e3b7842d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3353-cwe-79-improper-neutralization-of-in-0976e5f0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20intermod%20Comment%20SPAM%20Wiper&amp;severity=medium&amp;id=69be180ef4197a8e3b78434c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2351-cwe-73-external-control-of-file-name-465411d5</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2351%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20eoxia%20Task%20Manager&amp;severity=medium&amp;id=69be180bf4197a8e3b784289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1911-cwe-79-improper-neutralization-of-in-cc3c042e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1911%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20viaviwebtech%20Twitter%20Feeds&amp;severity=medium&amp;id=69be1809f4197a8e3b783d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1648-cwe-918-server-side-request-forgery--062101f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1648%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20qrolic%20Performance%20Monitor&amp;severity=high&amp;id=69be1807f4197a8e3b783c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0609-cwe-79-improper-neutralization-of-in-c969af4b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20logichunt%20Logo%20Slider%20%E2%80%93%20Logo%20Carousel%2C%20Logo%20Showcase%20%26%20Client%20Logo%20Slider%20Plugin&amp;severity=medium&amp;id=69be1806f4197a8e3b783b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1575-cwe-79-improper-neutralization-of-in-408cd466</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1575%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeric_izon%20Schema%20Shortcode&amp;severity=medium&amp;id=69be1807f4197a8e3b783c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3645-cwe-862-missing-authorization-in-pun-2d45e1ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3645%3A%20CWE-862%20Missing%20Authorization%20in%20punnel%20Punnel%20%E2%80%93%20Landing%20Page%20Builder&amp;severity=medium&amp;id=69be1810f4197a8e3b7843aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1275-cwe-79-improper-neutralization-of-in-dba442e0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1275%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gbsdeveloper%20Multi%20Post%20Carousel%20by%20Category&amp;severity=medium&amp;id=69be1806f4197a8e3b783bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1908-cwe-79-improper-neutralization-of-in-b506e305</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1908%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minnur%20Integration%20with%20Hubspot%20Forms&amp;severity=medium&amp;id=69be1809f4197a8e3b783d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3617-cwe-79-improper-neutralization-of-in-1a4b1961</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20swergroup%20Paypal%20Shortcodes&amp;severity=medium&amp;id=69be1810f4197a8e3b78438f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1647-cwe-79-improper-neutralization-of-in-c9b2ffb5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20basiliskan%20Comment%20Genius&amp;severity=medium&amp;id=69be1807f4197a8e3b783c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3347-cwe-79-improper-neutralization-of-in-b23caa6d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arevico%20Multi%20Functional%20Flexi%20Lightbox&amp;severity=medium&amp;id=69be180ef4197a8e3b784345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2427-cwe-79-improper-neutralization-of-in-80f98a8b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kazunii%20itsukaita&amp;severity=medium&amp;id=69be180bf4197a8e3b78429b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4072-cwe-79-improper-neutralization-of-in-f39edd0d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4072%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tstachl%20WordPress%20PayPal%20Donation&amp;severity=medium&amp;id=69be1811f4197a8e3b78441d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3546-cwe-202-exposure-of-sensitive-inform-17645cba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3546%3A%20CWE-202%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20forfront%20e-shot&amp;severity=medium&amp;id=69be1810f4197a8e3b78437c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3333-cwe-79-improper-neutralization-of-in-6ad0c532</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3333%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minhnhut%20MinhNhut%20Link%20Gateway&amp;severity=medium&amp;id=69be180ef4197a8e3b784332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14037-cwe-352-cross-site-request-forgery--03a05b47</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14037%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20invelity%20Invelity%20Product%20Feeds&amp;severity=high&amp;id=69be1806f4197a8e3b783b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4087-cwe-89-improper-neutralization-of-sp-e5eec0f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4087%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20samperrow%20Pre*%20Party%20Resource%20Hints&amp;severity=medium&amp;id=69be1811f4197a8e3b784443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1503-cwe-352-cross-site-request-forgery-c-9ddba76f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1503%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frankkoenen%20Plugin%20Name%3A%20login_register&amp;severity=medium&amp;id=69be1807f4197a8e3b783c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13785-cwe-94-improper-control-of-generati-ab6a1f39</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13785%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20reputeinfosystems%20Contact%20Form%2C%20Survey%2C%20Quiz%20%26%20Popup%20Form%20Builder%20%E2%80%93%20ARForms&amp;severity=medium&amp;id=69be1806f4197a8e3b783b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3619-cwe-79-improper-neutralization-of-in-464c4dc3</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tonyh-1%20Sheets2Table&amp;severity=medium&amp;id=69be1810f4197a8e3b784398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3331-cwe-352-cross-site-request-forgery-c-9da5a7b9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3331%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chuckmo%20Lobot%20Slider%20Administrator&amp;severity=medium&amp;id=69be180ef4197a8e3b784328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1313-cwe-918-server-side-request-forgery--530406e8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1313%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20eagerterrier%20MimeTypes%20Link%20Icons&amp;severity=high&amp;id=69be1806f4197a8e3b783bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3003-cwe-79-improper-neutralization-of-in-1c64fa1c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3003%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vagaro%20Vagaro%20Booking%20Widget&amp;severity=high&amp;id=69be180df4197a8e3b7842f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1392-cwe-352-cross-site-request-forgery-c-4eab07f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1392%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20superrishi%20SR%20WP%20Minify%20HTML&amp;severity=medium&amp;id=69be1807f4197a8e3b783c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3460-cwe-20-improper-input-validation-in--49405daa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3460%3A%20CWE-20%20Improper%20Input%20Validation%20in%20xjb%20REST%20API%20TO%20MiniProgram&amp;severity=medium&amp;id=69be180ef4197a8e3b784356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3641-cwe-20-improper-input-validation-in--e26ee0b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3641%3A%20CWE-20%20Improper%20Input%20Validation%20in%20appmaxplataforma%20Appmax&amp;severity=medium&amp;id=69be1810f4197a8e3b78439f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3996-cwe-79-improper-neutralization-of-in-68478d14</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3996%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sammyb%20WP%20Games%20Embed&amp;severity=medium&amp;id=69be1810f4197a8e3b7843c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3332-cwe-352-cross-site-request-forgery-c-c2f5142d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3332%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xhanch_studio%20Xhanch%20%E2%80%93%20My%20Advanced%20Settings&amp;severity=medium&amp;id=69be180ef4197a8e3b78432d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2468-cwe-89-improper-neutralization-of-sp-1117943b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2468%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quentn%20Quentn%20WP&amp;severity=high&amp;id=69be180df4197a8e3b7842c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2294-cwe-285-improper-authorization-in-ad-117c9b16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2294%3A%20CWE-285%20Improper%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69be180bf4197a8e3b784285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1253-cwe-862-missing-authorization-in-ato-80830b1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1253%3A%20CWE-862%20Missing%20Authorization%20in%20atomchat%20Group%20Chat%20%26%20Video%20Chat%20by%20AtomChat&amp;severity=medium&amp;id=69be1806f4197a8e3b783ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1899-cwe-79-improper-neutralization-of-in-8084abd1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itpathsolutions%20Any%20Post%20Slider&amp;severity=medium&amp;id=69be1809f4197a8e3b783d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3651-cwe-862-missing-authorization-in-hak-486b71e7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3651%3A%20CWE-862%20Missing%20Authorization%20in%20hakeemnala%20Build%20App%20Online&amp;severity=medium&amp;id=69be1810f4197a8e3b7843b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1806-cwe-79-improper-neutralization-of-in-f97469bf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tourcms%20Tour%20%26%20Activity%20Operator%20Plugin%20for%20TourCMS&amp;severity=medium&amp;id=69be1809f4197a8e3b783d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1247-cwe-79-improper-neutralization-of-in-c6f3c974</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1247%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seosbg%20Survey&amp;severity=medium&amp;id=69be1806f4197a8e3b783ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1935-cwe-862-missing-authorization-in-bra-987f9535</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1935%3A%20CWE-862%20Missing%20Authorization%20in%20brainstation23%20Company%20Posts%20for%20LinkedIn&amp;severity=medium&amp;id=69be180bf4197a8e3b784264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1886-cwe-79-improper-neutralization-of-in-ac2ded26</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1886%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hrs2015%20Go%20Night%20Pro%20%7C%20WordPress%20Dark%20Mode%20Plugin&amp;severity=medium&amp;id=69be1809f4197a8e3b783d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1891-cwe-79-improper-neutralization-of-in-fbd941f7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dogrow%20Simple%20Football%20Scoreboard&amp;severity=medium&amp;id=69be1809f4197a8e3b783d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13910-cwe-79-improper-neutralization-of-i-f70b79dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20axton%20WP-WebAuthn&amp;severity=medium&amp;id=69be1806f4197a8e3b783b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4069-cwe-79-improper-neutralization-of-in-e056d151</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4069%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pftool%20Alfie%20%E2%80%93%20Feed%20Plugin&amp;severity=medium&amp;id=69be1811f4197a8e3b784412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2496-cwe-79-improper-neutralization-of-in-d1387e77</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20waianaeboy702%20Ed&apos;s%20Font%20Awesome&amp;severity=medium&amp;id=69be180df4197a8e3b7842c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2424-cwe-79-improper-neutralization-of-in-9fbdb9b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2424%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20applixir%20Reward%20Video%20Ad%20for%20WordPress&amp;severity=medium&amp;id=69be180bf4197a8e3b784294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4084-cwe-79-improper-neutralization-of-in-2ab00629</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbednarek%20fyyd%20podcast%20shortcodes&amp;severity=medium&amp;id=69be1811f4197a8e3b78442d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4127-cwe-862-missing-authorization-in-cha-4f808c50</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4127%3A%20CWE-862%20Missing%20Authorization%20in%20charlycharm%20Speedup%20Optimization&amp;severity=medium&amp;id=69be1813f4197a8e3b784ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1093-cwe-79-improper-neutralization-of-in-2d469579</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1093%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativewerkdesigns%20WPFAQBlock%E2%80%93%20FAQ%20%26%20Accordion%20Plugin%20For%20Gutenberg&amp;severity=medium&amp;id=69be1806f4197a8e3b783b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2290-cwe-918-server-side-request-forgery--493a61c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2290%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jurajsim%20Post%20Affiliate%20Pro&amp;severity=low&amp;id=69be180bf4197a8e3b784280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3506-cwe-862-missing-authorization-in-lar-e3524987</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3506%3A%20CWE-862%20Missing%20Authorization%20in%20larrykim%20WP-Chatbot%20for%20Messenger&amp;severity=medium&amp;id=69be1810f4197a8e3b784372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4067-cwe-79-improper-neutralization-of-in-bc0cb2da</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4067%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nocaredev%20Ad%20Short&amp;severity=medium&amp;id=69be1811f4197a8e3b78440b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2277-cwe-79-improper-neutralization-of-in-34e2f15d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2277%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20larsdrasmussen%20rexCrawler&amp;severity=medium&amp;id=69be180bf4197a8e3b784272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1851-cwe-79-improper-neutralization-of-in-f86fc823</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deckercz%20iVysilani%20Shortcode&amp;severity=medium&amp;id=69be1809f4197a8e3b783d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4077-cwe-79-improper-neutralization-of-in-a742ebf9</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miguelmartinezlopez%20Ecover%20Builder%20For%20Dummies&amp;severity=medium&amp;id=69be1811f4197a8e3b784424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1390-cwe-352-cross-site-request-forgery-c-5d433691</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1390%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20haghs%20Redirect%20countdown&amp;severity=medium&amp;id=69be1807f4197a8e3b783c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1378-cwe-352-cross-site-request-forgery-c-1972715a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1378%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20suifengtec%20WP%20Posts%20Re-order&amp;severity=medium&amp;id=69be1807f4197a8e3b783c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1393-cwe-352-cross-site-request-forgery-c-60eef6f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1393%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20omarnas%20Add%20Google%20Social%20Profiles%20to%20Knowledge%20Graph%20Box&amp;severity=medium&amp;id=69be1807f4197a8e3b783c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1854-cwe-79-improper-neutralization-of-in-ba6d190e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1854%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nosoycesaros%20Post%20Flagger&amp;severity=medium&amp;id=69be1809f4197a8e3b783d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1822-cwe-79-improper-neutralization-of-in-be7013d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tonysamperi%20WP%20NG%20Weather&amp;severity=medium&amp;id=69be1809f4197a8e3b783d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2941-cwe-862-missing-authorization-in-plu-785289cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2941%3A%20CWE-862%20Missing%20Authorization%20in%20plugli%20Linksy%20Search%20and%20Replace&amp;severity=high&amp;id=69be180df4197a8e3b7842ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4086-cwe-79-improper-neutralization-of-in-d801ad0f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4086%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20newbiesup%20WP%20Random%20Button&amp;severity=medium&amp;id=69be1811f4197a8e3b78443c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2375-cwe-269-improper-privilege-managemen-b429e3ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2375%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20appcheap%20App%20Builder%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Flight&amp;severity=medium&amp;id=69be180bf4197a8e3b78428f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1800-cwe-89-improper-neutralization-of-sp-6508487b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1800%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wisdomlogix%20Fonts%20Manager%20%7C%20Custom%20Fonts&amp;severity=high&amp;id=69be1807f4197a8e3b783c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2440-cwe-79-improper-neutralization-of-in-5cce452d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=high&amp;id=69be180df4197a8e3b7842bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3335-cwe-862-missing-authorization-in-fli-d6558976</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3335%3A%20CWE-862%20Missing%20Authorization%20in%20flightbycanto%20Canto&amp;severity=medium&amp;id=69be180ef4197a8e3b78433c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3570-cwe-862-missing-authorization-in-acu-58dc6d36</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3570%3A%20CWE-862%20Missing%20Authorization%20in%20acumenconsulting%20Smarter%20Analytics&amp;severity=medium&amp;id=69be1810f4197a8e3b78438a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3334-cwe-89-improper-neutralization-of-sp-c25ae167</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3334%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thoefter%20CMS%20Commander%20%E2%80%93%20Manage%20Multiple%20Sites&amp;severity=high&amp;id=69be180ef4197a8e3b784337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2279-cwe-89-improper-neutralization-of-sp-9177e77e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2279%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20silvercover%20myLinksDump&amp;severity=high&amp;id=69be180bf4197a8e3b784279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4302-cwe-918-server-side-request-forgery--5793ece4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4302%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpxpo%20WowOptin%3A%20Next-Gen%20Popup%20Maker%20%E2%80%93%20Create%20Stunning%20Popups%20and%20Optins%20for%20Lead%20Generation&amp;severity=high&amp;id=69bdff57f4197a8e3b623666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-21-7d29c70a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-21&amp;severity=medium&amp;id=69be5ab7f4197a8e3bb06acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-21-efa95b81</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-21&amp;severity=low&amp;id=69be5ab7f4197a8e3bb06ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33238-cwe-22-improper-limitation-of-a-pat-e1bc9bf4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33238%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bdda56b462d409683a8be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33237-cwe-918-server-side-request-forgery-84e662a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33237%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bdda56b462d409683a8bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2430-cwe-79-improper-neutralization-of-in-b2e5892d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2430%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimizingmatters%20Autoptimize&amp;severity=medium&amp;id=69bdda56b462d409683a8bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3474-cwe-22-improper-limitation-of-a-path-67cc90df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3474%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20roxnor%20EmailKit%20%E2%80%93%20Email%20Customizer%20for%20WooCommerce%20%26%20WP&amp;severity=medium&amp;id=69bdda56b462d409683a8c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3350-cwe-79-improper-neutralization-of-in-800f77b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsaad%20Image%20Alt%20Text%20Manager%20%E2%80%93%20Bulk%20%26%20Dynamic%20Alt%20Tags%20For%20image%20SEO%20Optimization%20%2B%20AI&amp;severity=medium&amp;id=69bdda56b462d409683a8bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3567-cwe-862-missing-authorization-in-swe-2ac2bc12</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3567%3A%20CWE-862%20Missing%20Authorization%20in%20sweetdaisy86%20RepairBuddy%20%E2%80%93%20Repair%20Shop%20CRM%20%26%20Booking%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69bdda57b462d409683a8c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3516-cwe-79-improper-neutralization-of-in-7a01a687</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3516%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anssilaitila%20Contact%20List%20%E2%80%93%20Online%20Staff%20Directory%20%26%20Address%20Book&amp;severity=medium&amp;id=69bdda56b462d409683a8c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2352-cwe-79-improper-neutralization-of-in-eae8d2fd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2352%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimizingmatters%20Autoptimize&amp;severity=medium&amp;id=69bdda56b462d409683a8bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4083-cwe-79-improper-neutralization-of-in-fe5ebc60</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20demonisblack%20Scoreboard%20for%20HTML5%20Games%20Lite&amp;severity=medium&amp;id=69bdda57b462d409683a8c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3577-cwe-79-improper-neutralization-of-in-5f82dc59</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3577%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20Keep%20Backup%20Daily&amp;severity=medium&amp;id=69bdda57b462d409683a8c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3368-cwe-79-improper-neutralization-of-in-e08e88c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3368%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20Injection%20Guard&amp;severity=high&amp;id=69bdda56b462d409683a8bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3339-cwe-22-improper-limitation-of-a-path-290fd5b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3339%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20fahadmahmood%20Keep%20Backup%20Daily&amp;severity=low&amp;id=69bdda56b462d409683a8be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24060-cwe-319-in-automated-logic-webctrl--ad487a9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24060%3A%20CWE-319%20in%20Automated%20Logic%20WebCTRL%20Premium%20Server&amp;severity=critical&amp;id=69bdda56b462d409683a8bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32666-cwe-290-in-automated-logic-webctrl--daa6d934</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32666%3A%20CWE-290%20in%20Automated%20Logic%20WebCTRL%20Premium%20Server&amp;severity=high&amp;id=69bdd7ec1188d0bb0cbf88c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25086-cwe-605-in-automated-logic-webctrl--78c13bd9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25086%3A%20CWE-605%20in%20Automated%20Logic%20WebCTRL%20Premium%20Server&amp;severity=high&amp;id=69bdd7ec1188d0bb0cbf88c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33228-cwe-1321-improperly-controlled-modi-dfc6af7c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33228%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20WebReflection%20flatted&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31926-cwe-522-in-igl-technologies-eparkin-4991a4ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31926%3A%20CWE-522%20in%20IGL-Technologies%20eParking.fi&amp;severity=medium&amp;id=69bdd4681188d0bb0cbbf668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32663-cwe-613-in-igl-technologies-eparkin-e29ec125</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32663%3A%20CWE-613%20in%20IGL-Technologies%20eParking.fi&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33210-cwe-134-use-of-externally-controlle-d675dffc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33210%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20ruby%20json&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31903-cwe-307-in-igl-technologies-eparkin-667c311e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31903%3A%20CWE-307%20in%20IGL-Technologies%20eParking.fi&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29796-cwe-306-in-igl-technologies-eparkin-fcf429f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29796%3A%20CWE-306%20in%20IGL-Technologies%20eParking.fi&amp;severity=critical&amp;id=69bdd4681188d0bb0cbbf678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22163-cwe-820-missing-synchronization-419-71f757dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22163%3A%20CWE-820%3A%20Missing%20Synchronization%20(4.19)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69bdda57b462d409683a8c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21732-cwe-823-use-of-out-of-range-pointer-4944e32e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21732%3A%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20(4.16)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=critical&amp;id=69bdda57b462d409683a8c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28204-cwe-522-in-ctek-chargeportal-ff0258cc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28204%3A%20CWE-522%20in%20CTEK%20Chargeportal&amp;severity=medium&amp;id=69bdda57b462d409683a8c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27649-cwe-613-in-ctek-chargeportal-b04619a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27649%3A%20CWE-613%20in%20CTEK%20Chargeportal&amp;severity=high&amp;id=69bdda57b462d409683a8c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31904-cwe-307-in-ctek-chargeportal-4055e4ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31904%3A%20CWE-307%20in%20CTEK%20Chargeportal&amp;severity=high&amp;id=69bdda57b462d409683a8c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25192-cwe-306-in-ctek-chargeportal-a1a8a9ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25192%3A%20CWE-306%20in%20CTEK%20Chargeportal&amp;severity=critical&amp;id=69bdda57b462d409683a8c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32810-cwe-732-incorrect-permission-assign-df095845</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32810%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20squidowl%20halloy&amp;severity=medium&amp;id=69bdda59b462d409683a8cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33209-cwe-79-improper-neutralization-of-i-3b6d619b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33209%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20avo-hq%20avo&amp;severity=medium&amp;id=69bdda59b462d409683a8cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32733-cwe-22-improper-limitation-of-a-pat-279ffebb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32733%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20squidowl%20halloy&amp;severity=high&amp;id=69bdda57b462d409683a8c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33204-cwe-400-uncontrolled-resource-consu-bbf89418</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33204%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kelvinmo%20simplejwt&amp;severity=high&amp;id=69bdda59b462d409683a8ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33476-cwe-22-improper-limitation-of-a-pat-3381414c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33476%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69bdda59b462d409683a8cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33203-cwe-248-uncaught-exception-in-siyua-8441b75e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33203%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69bdda59b462d409683a8cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4508-sql-injection-in-pbootcms-c1d7dbaa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4508%3A%20SQL%20Injection%20in%20PbootCMS&amp;severity=medium&amp;id=69bdda59b462d409683a8cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33194-cwe-22-improper-limitation-of-a-pat-8d28cd73</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33194%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bdda59b462d409683a8cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33186-cwe-285-improper-authorization-in-g-3cfe069c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33186%3A%20CWE-285%3A%20Improper%20Authorization%20in%20grpc%20grpc-go&amp;severity=critical&amp;id=69bdcad201d25e334c8cba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3864-cwe-22-path-traversal-in-kubernetes--25c8737b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3864%3A%20CWE-22%20Path%20Traversal%20in%20Kubernetes%20CSI%20Driver%20for%20NFS&amp;severity=medium&amp;id=69bdcad201d25e334c8cba96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33180-cwe-200-exposure-of-sensitive-infor-6b7e33ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33180%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=high&amp;id=69bdcad201d25e334c8cba8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4507-sql-injection-in-mindinventory-minds-12bc1db4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4507%3A%20SQL%20Injection%20in%20Mindinventory%20MindSQL&amp;severity=medium&amp;id=69bdc5f74a1db2150bb853e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4506-code-injection-in-mindinventory-mind-8a38174d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4506%3A%20Code%20Injection%20in%20Mindinventory%20MindSQL&amp;severity=medium&amp;id=69bdc5f74a1db2150bb853dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23536-improper-limitation-of-a-pathname-t-62b17572</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23536%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%20(RHOAI)&amp;severity=high&amp;id=69bdc5f74a1db2150bb853d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33177-cwe-862-missing-authorization-in-st-f4221dee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33177%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69bdc1299e4ece4ed25050a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33172-cwe-79-improper-neutralization-of-i-2a2580b8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33172%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69bdc1299e4ece4ed25050a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33171-cwe-22-improper-limitation-of-a-pat-305244fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33171%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69bdc1299e4ece4ed25050a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33166-cwe-22-improper-limitation-of-a-pat-5defed82</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33166%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20allure-framework%20allure2&amp;severity=high&amp;id=69bdc1299e4ece4ed250509f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32887-cwe-362-concurrent-execution-using--4cdd057f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32887%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Effect-TS%20effect&amp;severity=high&amp;id=69bdc1299e4ece4ed250509c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3584-cwe-94-improper-control-of-generatio-1e9c9524</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3584%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpchill%20Kali%20Forms%20%E2%80%94%20Contact%20Form%20%26%20Drag-and-Drop%20Builder&amp;severity=critical&amp;id=69bdbd91e2bf98efc48d0977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2378-cwe-1021-improper-restriction-of-ren-2eceb389</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2378%3A%20CWE-1021%20Improper%20restriction%20of%20rendered%20UI%20layers%20or%20frames%20in%20The%20BrowserCompany%20of%20New%20York%20ArcSearch&amp;severity=high&amp;id=69bdbd91e2bf98efc48d0974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/libyan-oil-refinery-among-targets-in-long-running--c19cb829</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Libyan%20Oil%20Refinery%20Among%20Targets%20in%20Long-running%20Likely%20Espionage%20Campaign&amp;severity=medium&amp;id=69c10bcff4197a8e3b33b84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33164-cwe-122-heap-based-buffer-overflow--c1a273ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33164%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20strukturag%20libde265&amp;severity=high&amp;id=69bdb3ffe32a4fbe5fced8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33165-cwe-787-out-of-bounds-write-in-stru-44da5709</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33165%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20strukturag%20libde265&amp;severity=medium&amp;id=69bdb3ffe32a4fbe5fced8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33156-cwe-426-untrusted-search-path-in-ni-e5b4bfb7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33156%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20NickeManarin%20ScreenToGif&amp;severity=high&amp;id=69bdb079e32a4fbe5fcd3b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33155-cwe-400-uncontrolled-resource-consu-c4229f4e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33155%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20seperman%20deepdiff&amp;severity=high&amp;id=69bdb079e32a4fbe5fcd3b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33151-cwe-20-improper-input-validation-in-b9f920ea</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33151%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20socketio%20socket.io&amp;severity=high&amp;id=69bdacf5e32a4fbe5fcbbe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33147-cwe-121-stack-based-buffer-overflow-67cddc2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33147%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20GenericMappingTools%20gmt&amp;severity=high&amp;id=69bdacf5e32a4fbe5fcbbe12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4505-unrestricted-upload-in-eosphoros-ai--e3670476</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4505%3A%20Unrestricted%20Upload%20in%20eosphoros-ai%20DB-GPT&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4504-sql-injection-in-eosphoros-ai-db-gpt-5d8e60df</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4504%3A%20SQL%20Injection%20in%20eosphoros-ai%20db-gpt&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33140-cwe-79-improper-neutralization-of-i-dec26bff</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33140%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ParzivalHack%20PySpector&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33139-cwe-184-incomplete-list-of-disallow-d2e1b823</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33139%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20ParzivalHack%20PySpector&amp;severity=high&amp;id=69bda974e32a4fbe5fca0bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4438-cwe-20-improper-input-validation-in--8e885aca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4438%3A%20CWE-20%20Improper%20input%20validation%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4437-cwe-125-out-of-bounds-read-in-the-gn-cd83f98f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4437%3A%20CWE-125%20Out-of-bounds%20read%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69bda974e32a4fbe5fca0bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33126-cwe-918-server-side-request-forgery-49fe946d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33126%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20blakeblackshear%20frigate&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4500-injection-in-bagofwords1-bagofwords-0dcba076</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4500%3A%20Injection%20in%20bagofwords1%20bagofwords&amp;severity=medium&amp;id=69bda5ede32a4fbe5fc68a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4499-os-command-injection-in-d-link-dir-8-5874f0f3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4499%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-820LW&amp;severity=medium&amp;id=69bda5ede32a4fbe5fc68a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4497-os-command-injection-in-totolink-wa3-7ad2d73a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4497%3A%20OS%20Command%20Injection%20in%20Totolink%20WA300&amp;severity=medium&amp;id=69bd9b64e32a4fbe5fc09f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33010-cwe-942-permissive-cross-domain-pol-e7fe03ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33010%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20doobidoo%20mcp-memory-service&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4496-os-command-injection-in-sigmade-git--6d5ca08b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4496%3A%20OS%20Command%20Injection%20in%20sigmade%20Git-MCP-Server&amp;severity=medium&amp;id=69bd97dde32a4fbe5fbf1b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32710-cwe-122-heap-based-buffer-overflow--ac2e8bf6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32710%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20MariaDB%20server&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32317-cwe-346-origin-validation-error-in--0e3db814</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32317%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20cryptomator%20android&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32318-cwe-346-origin-validation-error-in--2dbac183</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32318%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20cryptomator%20ios&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4495-cross-site-scripting-in-atjiu-pybbs-524d3045</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4495%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=69bd8d53e32a4fbe5fb6509f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31836-cwe-285-improper-authorization-in-b-a370377c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31836%3A%20CWE-285%3A%20Improper%20Authorization%20in%20bluewave-labs%20Checkmate&amp;severity=high&amp;id=69bdbd91e2bf98efc48d097c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4494-cross-site-scripting-in-atjiu-pybbs-81e77a33</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4494%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d0993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4493-stack-based-buffer-overflow-in-tenda-568400c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4493%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bda974e32a4fbe5fca0bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32844-cwe-79-improper-neutralization-of-i-55ddce3c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32844%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20XinLiangCoder%20php_api_doc&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d097f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4492-stack-based-buffer-overflow-in-tenda-86e6b8d7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4492%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd82c5e32a4fbe5fb2018f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4491-stack-based-buffer-overflow-in-tenda-48c720e0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4491%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4490-stack-based-buffer-overflow-in-tenda-d44337bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4490%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15608-cwe-121-stack-based-buffer-overflow-5c3b0431</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15608%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15607-cwe-77-improper-neutralization-of-s-5bce1db6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15607%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59383-cwe-121-in-qnap-systems-inc-media-s-96baa7ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59383%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20Media%20Streaming%20Add-on&amp;severity=low&amp;id=69bdbd91e2bf98efc48d0999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62843-cwe-923-in-qnap-systems-inc-quroute-20f6e0c1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62843%3A%20CWE-923%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=low&amp;id=69bdbd93e2bf98efc48d0f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62844-cwe-1390-in-qnap-systems-inc-qurout-24231f48</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62844%3A%20CWE-1390%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62845-cwe-150-in-qnap-systems-inc-quroute-cc06e106</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62845%3A%20CWE-150%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62846-cwe-89-in-qnap-systems-inc-qurouter-0aebad47</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62846%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=high&amp;id=69bdbd93e2bf98efc48d0f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22895-cwe-79-in-qnap-systems-inc-quftp-se-12f14fbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22895%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20QuFTP%20Service&amp;severity=low&amp;id=69bdbd93e2bf98efc48d0f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22897-cwe-78-in-qnap-systems-inc-qunetswi-663db162</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22897%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=high&amp;id=69bdbd93e2bf98efc48d0f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22898-cwe-306-in-qnap-systems-inc-qvr-pro-d9605d37</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22898%3A%20CWE-306%20in%20QNAP%20Systems%20Inc.%20QVR%20Pro&amp;severity=critical&amp;id=69bdbd93e2bf98efc48d0f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22900-cwe-798-in-qnap-systems-inc-qunetsw-1c94d659</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22900%3A%20CWE-798%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22901-cwe-78-in-qnap-systems-inc-qunetswi-b98245bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22901%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22902-cwe-78-in-qnap-systems-inc-qunetswi-91e83569</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22902%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=medium&amp;id=69bd7bc3e32a4fbe5faf4b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4489-stack-based-buffer-overflow-in-tenda-7a1a4d9e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4489%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd713de32a4fbe5faaf81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-new-android-safeguards-operation-ali-1e852a2f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20New%20Android%20Safeguards%2C%20Operation%20Alice%2C%20UK%20Toughens%20Cyber%20Reporting&amp;severity=medium&amp;id=69bd70fee32a4fbe5faae813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32989-cross-site-request-forgery-csrf-in--4fdf15cf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32989%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20Precurio%20Precurio%20Intranet%20Portal&amp;severity=high&amp;id=69bd713de32a4fbe5faaf817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32986-cwe-79-improper-neutralization-of-i-53f46ee9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Textpattern%20Textpattern%20CMS&amp;severity=medium&amp;id=69bd6dade32a4fbe5fa8ba88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4488-buffer-overflow-in-utt-hiper-1250gw-bdf7a1ef</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4488%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69bd6dade32a4fbe5fa8ba8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4519-vulnerability-in-python-software-fou-ec881397</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4519%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69bd66a5e32a4fbe5fa5cd32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3-men-charged-with-conspiring-to-smuggle-us-artifi-a64fb585</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3%20Men%20Charged%20With%20Conspiring%20to%20Smuggle%20US%20Artificial%20Intelligence%20to%20China&amp;severity=high&amp;id=69bd5f6ae32a4fbe5fa2bedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33312-cwe-863-incorrect-authorization-in--770ceda6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33312%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69bd5fb1e32a4fbe5fa2ca4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29794-cwe-807-reliance-on-untrusted-input-e5332580</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29794%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69bd5fb1e32a4fbe5fa2ca49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4487-buffer-overflow-in-utt-hiper-1200gw-2ecb1ddb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4487%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201200GW&amp;severity=high&amp;id=69bd5fb1e32a4fbe5fa2ca51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4486-stack-based-buffer-overflow-in-d-lin-7fbf1468</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4486%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69bd5895e32a4fbe5f9d858c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4485-sql-injection-in-itsourcecode-colleg-6fa0fd0d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4485%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69bd5190e32a4fbe5f999477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31382-cwe-79-improper-neutralization-of-i-63cadc09</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31382%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Gainsight%20Gainsight%20Assist&amp;severity=medium&amp;id=69bd4e0ce32a4fbe5f8d64d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31381-cwe-598-use-of-get-request-method-w-f5d519cd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31381%3A%20CWE-598%20Use%20of%20GET%20request%20method%20with%20sensitive%20query%20strings%20in%20Gainsight%20Gainsight%20Assist&amp;severity=medium&amp;id=69bd4e0ce32a4fbe5f8d64d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4434-cwe-295-improper-certificate-validat-669c3b4e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4434%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Devolutions%20Server&amp;severity=high&amp;id=69bd4702e32a4fbe5f755168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-confirms-handala-link-to-iran-government-amid-t-ad25ca57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Confirms%20Handala%20Link%20to%20Iran%20Government%20Amid%20Takedown%20of%20Hackers%E2%80%99%20Sites&amp;severity=medium&amp;id=69bd3fc6e32a4fbe5f622e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/predator-spyware-disables-ios-camera-and-microphon-79d2b253</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Predator%20spyware%20disables%20iOS%20camera%20and%20microphone%20indicators%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69bdea2bf4197a8e3b3b6143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/navia-data-breach-impacts-27-million-45a1c180</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Navia%20Data%20Breach%20Impacts%202.7%20Million&amp;severity=medium&amp;id=69bd2aade32a4fbe5f53bb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33136-cwe-79-improper-neutralization-of-i-5f385205</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33136%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69bd275fe32a4fbe5f531f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33135-cwe-79-improper-neutralization-of-i-cdd783b5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33135%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69bd275fe32a4fbe5f531f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-magento-sites-hit-in-ongoing-defaceme-12b3db1c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20Magento%20Sites%20Hit%20in%20Ongoing%20Defacement%20Campaign&amp;severity=medium&amp;id=69bd23a5e32a4fbe5f51f85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33134-cwe-89-improper-neutralization-of-s-a410423a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33134%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69bd275fe32a4fbe5f531f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33133-cwe-89-improper-neutralization-of-s-e49a9cd5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33133%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69bd275fe32a4fbe5f531f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33131-cwe-290-authentication-bypass-by-sp-9e875424</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33131%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20h3js%20h3&amp;severity=high&amp;id=69bd23e7e32a4fbe5f52014e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/widespread-github-actions-tag-compromise-exposes-c-7ab138eb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Widespread%20GitHub%20Actions%20Tag%20Compromise%20Exposes%20CI%2FCD%20Secrets&amp;severity=medium&amp;id=69bdb74ce32a4fbe5fd0512f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidstealer-debugging-chrome-to-steal-its-secrets-eb82d6ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidStealer%3A%20Debugging%20Chrome%20to%20Steal%20Its%20Secrets&amp;severity=medium&amp;id=69bdb74ce32a4fbe5fd0512a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33130-cwe-98-improper-control-of-filename-66c6c7a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33130%3A%20CWE-98%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20louislam%20uptime-kuma&amp;severity=medium&amp;id=69bd1cd0e32a4fbe5f4fde03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33129-cwe-208-observable-timing-discrepan-1f7546b2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33129%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20h3js%20h3&amp;severity=medium&amp;id=69bd1cd0e32a4fbe5f4fddfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33128-cwe-93-improper-neutralization-of-c-fff9b3de</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33128%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20h3js%20h3&amp;severity=high&amp;id=69bd194ce32a4fbe5f4ea6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22324-cwe-98-improper-control-of-filename-ec806458</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22324%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Melania&amp;severity=high&amp;id=69bd194ce32a4fbe5f4ea6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0677-cwe-502-deserialization-of-untrusted-eca92283</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0677%3A%20Deserialization%20of%20Untrusted%20Data%20in%20TotalSuite%20TotalContest%20Lite&amp;severity=null&amp;id=69bd194ce32a4fbe5f4ea6b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33125-cwe-285-improper-authorization-in-b-c66f9dc6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33125%3A%20CWE-285%3A%20Improper%20Authorization%20in%20blakeblackshear%20frigate&amp;severity=high&amp;id=69bd194ce32a4fbe5f4ea6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33124-cwe-287-improper-authentication-in--31f1f111</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33124%3A%20CWE-287%3A%20Improper%20Authentication%20in%20blakeblackshear%20frigate&amp;severity=high&amp;id=69bd5190e32a4fbe5f999481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32537-cwe-352-cross-site-request-forgery--fee9ab07</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32537%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20joshuae1974%20Flash%20Video%20Player&amp;severity=high&amp;id=69bd5895e32a4fbe5f9d8595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33123-cwe-400-uncontrolled-resource-consu-be1333fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33123%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69bd945ce32a4fbe5fbc7f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31119-cwe-79-improper-neutralization-of-i-e477788d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31119%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Vasilis%20Triantafyllou%20Special%20Box%20for%20Content&amp;severity=medium&amp;id=69bd38f3e32a4fbe5f57f055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33080-cwe-79-improper-neutralization-of-i-6232979d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33080%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20filamentphp%20filament&amp;severity=high&amp;id=69bd0ec2e32a4fbe5f4a70d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32701-cwe-843-access-of-resource-using-in-4cc8eb58</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32701%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20QwikDev%20qwik&amp;severity=high&amp;id=69bd0ec2e32a4fbe5f4a70d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27625-cwe-22-improper-limitation-of-a-pat-64c622ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27625%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=high&amp;id=69bd0ec2e32a4fbe5f4a70d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gsocket-backdoor-delivered-through-bash-script-fri-cf8c30b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GSocket%20Backdoor%20Delivered%20Through%20Bash%20Script%2C%20(Fri%2C%20Mar%2020th)&amp;severity=medium&amp;id=69bd0b08e32a4fbe5f491c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-langflow-vulnerability-exploited-hours-af-bdeb0c89</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Langflow%20Vulnerability%20Exploited%20Hours%20After%20Public%20Disclosure&amp;severity=critical&amp;id=69bd0b09e32a4fbe5f491c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33075-cwe-494-download-of-code-without-in-52a1ff21</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33075%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20labring%20FastGPT&amp;severity=critical&amp;id=69bd0b4ce32a4fbe5f4933bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33072-cwe-798-use-of-hard-coded-credentia-9bae99e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33072%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20error311%20FileRise&amp;severity=high&amp;id=69bd0b4ce32a4fbe5f4933b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33071-cwe-434-unrestricted-upload-of-file-61b95bec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33071%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20error311%20FileRise&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2432-cwe-79-improper-neutralization-of-in-f8cd0cf5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2432%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20Custom%20Reports%20%E2%80%93%20Flexible%20reporting%20to%20track%20what%20matters%20most&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3550-cwe-862-missing-authorization-in-fir-75c59a70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3550%3A%20CWE-862%20Missing%20Authorization%20in%20firetree%20RockPress&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2421-cwe-22-improper-limitation-of-a-path-f2c4c46a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2421%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ghera74%20ilGhera%20Carta%20Docente%20for%20WooCommerce&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33070-cwe-306-missing-authentication-for--851eeec5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33070%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20error311%20FileRise&amp;severity=low&amp;id=69bd0b4ce32a4fbe5f4933b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33069-cwe-125-out-of-bounds-read-in-pjsip-9b1ff4fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33069%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=69bd6dade32a4fbe5fa8ba92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33068-cwe-807-reliance-on-untrusted-input-81883495</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33068%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69bd5190e32a4fbe5f99947e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33067-cwe-79-improper-neutralization-of-i-1a61bc50</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33067%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bd945ce32a4fbe5fbc7f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copyright-lures-mask-a-multi-stage-purelog-stealer-54532eb6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Copyright%20Lures%20Mask%20a%20Multi-Stage%20PureLog%20Stealer%20Attack%20on%20Key%20Industries&amp;severity=medium&amp;id=69bd0401e32a4fbe5f43542f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beast-ransomware-toolkit-a-proactive-threat-intell-3c323286</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beast%20Ransomware%20Toolkit%3A%20A%20Proactive%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69bd0401e32a4fbe5f435424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33066-cwe-79-improper-neutralization-of-i-f75d32b5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33066%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d0983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33022-cwe-129-improper-validation-of-arra-b543ace7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33022%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69bcfd2fe32a4fbe5f3cd696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-and-kimwolf-ddos-botnets-disrupted-in-inter-329eec84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20and%20Kimwolf%20DDoS%20Botnets%20Disrupted%20in%20International%20Operation&amp;severity=medium&amp;id=69bcf975e32a4fbe5f3bc392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33060-cwe-918-server-side-request-forgery-1b50a38a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33060%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ondata%20ckan-mcp-server&amp;severity=medium&amp;id=69bcf9b8e32a4fbe5f3bdae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33057-cwe-94-improper-control-of-generati-7b233148</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33057%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mesop-dev%20mesop&amp;severity=critical&amp;id=69bcf9b8e32a4fbe5f3bdae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33056-cwe-61-unix-symbolic-link-symlink-f-a61b77da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33056%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20alexcrichton%20tar-rs&amp;severity=medium&amp;id=69bcf9b8e32a4fbe5f3bdae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33055-cwe-843-access-of-resource-using-in-0fc0ef28</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33055%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20alexcrichton%20tar-rs&amp;severity=medium&amp;id=69bcf624e32a4fbe5f3a710c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4478-improper-verification-of-cryptograph-dd0fa87f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4478%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=critical&amp;id=69bcf624e32a4fbe5f3a7116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4477-use-of-hard-coded-cryptographic-key--fb0d66fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4477%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=low&amp;id=69bcf624e32a4fbe5f3a7111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33054-cwe-22-improper-limitation-of-a-pat-0da03659</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33054%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mesop-dev%20mesop&amp;severity=critical&amp;id=69bcf624e32a4fbe5f3a7107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33053-cwe-639-authorization-bypass-throug-1e144efc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33053%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69bcf624e32a4fbe5f3a7104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4476-missing-authentication-in-yi-technol-4206d120</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4476%3A%20Missing%20Authentication%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=medium&amp;id=69bcef1ee32a4fbe5f36fb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4475-hard-coded-credentials-in-yi-technol-fc23c5af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4475%3A%20Hard-coded%20Credentials%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=high&amp;id=69bceb98e32a4fbe5f35b7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4474-cross-site-scripting-in-itsourcecode-f76aefd3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4474%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69bceb98e32a4fbe5f35b7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33051-cwe-79-improper-neutralization-of-i-bc102802</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33051%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69bce490e32a4fbe5f3388a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33043-cwe-942-permissive-cross-domain-pol-745876a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33043%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bce490e32a4fbe5f3388a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33041-cwe-200-exposure-of-sensitive-infor-3ba0bea1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33041%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bce490e32a4fbe5f3388a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33040-cwe-190-integer-overflow-or-wraparo-df6446c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33040%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69bce490e32a4fbe5f33889e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33039-cwe-918-server-side-request-forgery-15e3e0b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33039%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bce490e32a4fbe5f33889a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33038-cwe-306-missing-authentication-for--912771fc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33038%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bd945ce32a4fbe5fbc7f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4473-sql-injection-in-itsourcecode-online-f08070d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4473%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69bd713ee32a4fbe5faaf827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32768-cwe-284-improper-access-control-in--07d9feb3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32768%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20chall-manager&amp;severity=high&amp;id=69bd713de32a4fbe5faaf822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33037-cwe-1188-insecure-default-initializ-824a27f5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33037%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bdbd96e2bf98efc48d1059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33036-cwe-776-improper-restriction-of-rec-ba51d0ac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33036%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=high&amp;id=69bdbd93e2bf98efc48d0f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33035-cwe-79-improper-neutralization-of-i-f45160e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33035%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bcda04e32a4fbe5f30468e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4472-sql-injection-in-itsourcecode-online-b296bbe9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4472%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcda04e32a4fbe5f304699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4471-sql-injection-in-itsourcecode-online-86d996d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4471%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcda04e32a4fbe5f304692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33025-cwe-89-improper-neutralization-of-s-1f4cc4d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33025%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo-Encoder&amp;severity=high&amp;id=69bcda04e32a4fbe5f30468a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33024-cwe-918-server-side-request-forgery-82e88a08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33024%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo-Encoder&amp;severity=critical&amp;id=69bcda04e32a4fbe5f304686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33017-cwe-94-improper-control-of-generati-d875cfa4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33017%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69bcda04e32a4fbe5f304681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33013-cwe-835-loop-with-unreachable-exit--ffe4a179</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33013%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20micronaut-projects%20micronaut-core&amp;severity=high&amp;id=69bcda04e32a4fbe5f30467a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33012-cwe-770-allocation-of-resources-wit-0ddd6ec8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33012%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20micronaut-projects%20micronaut-core&amp;severity=high&amp;id=69bcda04e32a4fbe5f304675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33011-cwe-670-always-incorrect-control-fl-dbb9303d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33011%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20nestjs%20nest&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4470-sql-injection-in-itsourcecode-online-eb805163</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4470%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32954-cwe-89-improper-neutralization-of-s-2ba0bacc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32954%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20frappe%20erpnext&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32953-cwe-303-incorrect-implementation-of-27501f28</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32953%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20tillitis%20tkeyclient&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32950-cwe-89-improper-neutralization-of-s-bc0e21ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32950%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dataease%20SQLBot&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32949-cwe-918-server-side-request-forgery-12b78e1c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32949%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dataease%20SQLBot&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32947-cwe-693-protection-mechanism-failur-f8ad5311</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32947%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4469-sql-injection-in-itsourcecode-online-bfdb9d05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4469%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32946-cwe-693-protection-mechanism-failur-35e9b997</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32946%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a7913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32945-cwe-122-heap-based-buffer-overflow--9ea99f4b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32945%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69bcc873e32a4fbe5f2a790f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32942-cwe-416-use-after-free-in-pjsip-pjp-5ca2cca4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32942%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69bcc873e32a4fbe5f2a790a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32941-cwe-770-allocation-of-resources-wit-1e571571</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32941%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a7907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4136-cwe-640-weak-password-recovery-mecha-33439421</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4136%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a791b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4038-cwe-862-missing-authorization-in-cod-c5151216</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4038%3A%20CWE-862%20Missing%20Authorization%20in%20CodeRevolution%20Aimogen%20Pro%20-%20All-in-One%20AI%20Content%20Writer%2C%20Editor%2C%20ChatBot%20%26%20Automation%20Toolkit&amp;severity=critical&amp;id=69bcc873e32a4fbe5f2a7917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32940-cwe-79-improper-neutralization-of-i-a0d7ab4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32940%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69bcc873e32a4fbe5f2a7901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4468-command-injection-in-comfast-cf-ac10-b912fa2b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4468%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a7920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32938-cwe-22-improper-limitation-of-a-pat-6777c83d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32938%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69bcc873e32a4fbe5f2a78fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33063-cwe-476-null-pointer-dereference-in-e3e3c4cc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33063%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20ausf&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33062-cwe-284-improper-access-control-in--3530c734</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33062%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20free5gc%20nrf&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32937-cwe-129-improper-validation-of-arra-5fe376e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32937%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20free5gc%20chf&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32891-cwe-80-improper-neutralization-of-s-b6e950f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32891%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20openVESSL%20Anchorr&amp;severity=critical&amp;id=69bcbde5e32a4fbe5f2545b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32933-cwe-674-uncontrolled-recursion-in-l-7067c409</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32933%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20LuckyPennySoftware%20AutoMapper&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32890-cwe-79-improper-neutralization-of-i-5121d7eb</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32890%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openVESSL%20Anchorr&amp;severity=critical&amp;id=69bcbde5e32a4fbe5f2545aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4467-command-injection-in-comfast-cf-ac10-d886df59</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4467%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69bcbde5e32a4fbe5f2545ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21992-easily-exploitable-vulnerability-al-8b5ed83f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21992%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Identity%20Manager%20and%20Oracle%20Web%20Services%20Manager.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Identity%20Manager%20and%20Oracle%20Web%20Services%20Manager.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager&amp;severity=critical&amp;id=69bcbde5e32a4fbe5f2545a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4466-command-injection-in-comfast-cf-ac10-988ceedb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4466%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69bcafd9e32a4fbe5f174d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4465-os-command-injection-in-d-link-dir-5-60ae23ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4465%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-513&amp;severity=medium&amp;id=69bcafd9e32a4fbe5f174cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32811-cwe-116-improper-encoding-or-escapi-b3515139</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32811%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20dadrus%20heimdall&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4464-integer-overflow-in-google-chrome-fa62e2e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4464%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4463-heap-buffer-overflow-in-google-chrom-dcdbc2fd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4463%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4462-out-of-bounds-read-in-google-chrome-90b629db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4462%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4461-inappropriate-implementation-in-goog-911b60aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4461%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4460-out-of-bounds-read-in-google-chrome-1b58436f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4460%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4459-out-of-bounds-read-and-write-in-goog-a1209755</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4459%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4458-use-after-free-in-google-chrome-badd5fd5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4458%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4457-type-confusion-in-google-chrome-f25568f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4457%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4456-use-after-free-in-google-chrome-262b8b39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4456%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4455-heap-buffer-overflow-in-google-chrom-1912bf38</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4455%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4454-use-after-free-in-google-chrome-fca0b857</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4454%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4453-integer-overflow-in-google-chrome-558bb25a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4453%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69bcafd7e32a4fbe5f174c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4452-integer-overflow-in-google-chrome-6c804567</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4452%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4451-insufficient-validation-of-untrusted-327de6f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4451%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4450-out-of-bounds-write-in-google-chrome-3ac733c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4450%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4449-use-after-free-in-google-chrome-ed5f7a7e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4449%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4448-heap-buffer-overflow-in-google-chrom-b57aa6f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4448%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4447-inappropriate-implementation-in-goog-a053af5d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4447%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4446-use-after-free-in-google-chrome-e7753fdb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4446%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4445-use-after-free-in-google-chrome-7854d5d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4445%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4444-stack-buffer-overflow-in-google-chro-e900039f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4444%3A%20Stack%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4443-heap-buffer-overflow-in-google-chrom-546130a4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4443%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4442-heap-buffer-overflow-in-google-chrom-6134e6a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4442%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4441-use-after-free-in-google-chrome-1460e210</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4441%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4440-out-of-bounds-read-and-write-in-goog-915aee25</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4440%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4439-out-of-bounds-memory-access-in-googl-367adac0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4439%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32881-cwe-183-permissive-list-of-allowed--e7cfd7f1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32881%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20vshakitskiy%20ewe&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32873-cwe-825-expired-pointer-dereference-5f2b4614</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32873%3A%20CWE-825%3A%20Expired%20Pointer%20Dereference%20in%20vshakitskiy%20ewe&amp;severity=high&amp;id=69bca5a4e32a4fbe5f143324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32880-cwe-79-improper-neutralization-of-i-0f4748dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32880%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32829-cwe-201-insertion-of-sensitive-info-e3d06045</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32829%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20PSeitz%20lz4_flex&amp;severity=high&amp;id=69bc9abfe32a4fbe5f103102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32828-cwe-918-server-side-request-forgery-fd4580ce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32828%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20akuity%20kargo&amp;severity=medium&amp;id=69bc9abfe32a4fbe5f1030fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32771-cwe-22-improper-limitation-of-a-pat-ee98cf31</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32771%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ctfer-io%20monitoring&amp;severity=high&amp;id=69bc9abfe32a4fbe5f1030f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32769-cwe-284-improper-access-control-in--1b163257</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32769%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20fullchain&amp;severity=high&amp;id=69bc9abfe32a4fbe5f1030f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32767-cwe-89-improper-neutralization-of-s-8a5766fd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32767%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69bc9abfe32a4fbe5f1030ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32766-cwe-436-interpretation-conflict-in--17af23a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32766%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20astral-sh%20tokio-tar&amp;severity=low&amp;id=69bc9033e32a4fbe5f0c4187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32985-cwe-306-missing-authentication-for--04629a96</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32985%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Xerte%20Xerte%20Online%20Toolkits&amp;severity=critical&amp;id=69bc9033e32a4fbe5f0c418b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30580-na-acb3a12b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30580%3A%20n%2Fa&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d098f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63260-na-ee22ee42</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63260%3A%20n%2Fa&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d0987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55988-na-a8eae2c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55988%3A%20n%2Fa&amp;severity=high&amp;id=69bdb3ffe32a4fbe5fced8e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63261-na-1b8a124a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63261%3A%20n%2Fa&amp;severity=high&amp;id=69bdacf5e32a4fbe5fcbbe0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30579-na-7fa2a6e3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30579%3A%20n%2Fa&amp;severity=medium&amp;id=69bd82c5e32a4fbe5fb2018b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30578-na-78c92819</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30578%3A%20n%2Fa&amp;severity=medium&amp;id=69bd82c5e32a4fbe5fb20187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29828-na-1e771d97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29828%3A%20n%2Fa&amp;severity=medium&amp;id=69bd7bc3e32a4fbe5faf4b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67260-na-ea50c466</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67260%3A%20n%2Fa&amp;severity=high&amp;id=69bd6dade32a4fbe5fa8ba81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46597-na-da22297e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46597%3A%20n%2Fa&amp;severity=high&amp;id=69bd6dade32a4fbe5fa8ba7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46598-na-c6f81fe9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46598%3A%20n%2Fa&amp;severity=medium&amp;id=69bd66a5e32a4fbe5fa5cd2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33372-na-01a2c6aa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33372%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33371-na-d0924778</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33371%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33370-na-e6316dfc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33370%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d857a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33369-na-78a1b374</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33369%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33368-na-9732165f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33368%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d856e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44722-na-6ff47388</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44722%3A%20n%2Fa&amp;severity=critical&amp;id=69bd5190e32a4fbe5f999473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33370-na-e6316dfc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33370%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d857a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33369-na-78a1b374</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33369%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33368-na-9732165f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33368%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d856e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44722-na-6ff47388</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44722%3A%20n%2Fa&amp;severity=critical&amp;id=69bd5190e32a4fbe5f999473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-20-e4da03c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-20&amp;severity=medium&amp;id=69bd3c3fe32a4fbe5f59b660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-20-85216207</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-20&amp;severity=low&amp;id=69bd3c3ee32a4fbe5f59b636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-tax-search-leads-to-kernel-mode-avedr-kill-d1d929de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20Tax%20Search%20Leads%20to%20Kernel-Mode%20AV%2FEDR%20Kill&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22737-vulnerability-in-spring-spring-fram-c8bf04a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22737%3A%20Vulnerability%20in%20Spring%20Spring%20Framework&amp;severity=medium&amp;id=69bc9033e32a4fbe5f0c418f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22735-vulnerability-in-spring-spring-foun-8a91afe3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22735%3A%20Vulnerability%20in%20Spring%20Spring%20Foundation&amp;severity=low&amp;id=69bc8cafe32a4fbe5f0a920a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22733-cwe-288-authentication-bypass-using-e6f80fbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22733%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20Spring%20Spring%20Security&amp;severity=high&amp;id=69bc8929e32a4fbe5f08fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32763-cwe-89-improper-neutralization-of-s-62f7ca75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32763%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kysely-org%20kysely&amp;severity=high&amp;id=69bc85a4e32a4fbe5f07b2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32697-cwe-639-authorization-bypass-throug-143009ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32697%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=69bc85a4e32a4fbe5f07b2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29109-cwe-502-deserialization-of-untruste-fbc0e466</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29109%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=high&amp;id=69bc85a4e32a4fbe5f07b2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29108-cwe-200-exposure-of-sensitive-infor-95944982</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29108%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=69bc85a4e32a4fbe5f07b2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22732-vulnerability-in-spring-spring-secu-2c8fbdd8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22732%3A%20Vulnerability%20in%20VMware%20Spring%20Security&amp;severity=critical&amp;id=69bc8223e32a4fbe5f062176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32721-cwe-79-improper-neutralization-of-i-8871f1a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32721%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openwrt%20luci&amp;severity=high&amp;id=69bc8223e32a4fbe5f062179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22731-cwe-288-authentication-bypass-using-09055fef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22731%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20Spring%20Spring%20Boot&amp;severity=high&amp;id=69bc7e9ce32a4fbe5f04d5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4342-cwe-20-improper-input-validation-in--e41533f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4342%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69bc708fe32a4fbe5ffd51a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32815-cwe-287-improper-authentication-in--a6c343f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32815%3A%20CWE-287%3A%20Improper%20Authentication%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bc708fe32a4fbe5ffd51b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32754-cwe-79-improper-neutralization-of-i-21923976</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32754%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69bc708fe32a4fbe5ffd51ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32753-cwe-80-improper-neutralization-of-s-a6d22d39</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32753%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69bc708fe32a4fbe5ffd51a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32194-cwe-77-improper-neutralization-of-s-b13d0979</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32194%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Bing%20Images&amp;severity=critical&amp;id=69bca5a4e32a4fbe5f143342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32750-cwe-22-improper-limitation-of-a-pat-1494f6ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32750%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32751-cwe-79-improper-neutralization-of-i-e319aed5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32751%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32749-cwe-73-external-control-of-file-nam-faba7104</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32749%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69bc698ee32a4fbe5ffae0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3229-cwe-122-heap-based-buffer-overflow-i-110c9450</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3229%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20wofSSL%20wolfSSL&amp;severity=low&amp;id=69bc698ee32a4fbe5ffae0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26137-cwe-918-server-side-request-forgery-45e722c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26137%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Exchange%20Online&amp;severity=critical&amp;id=69bc698ce32a4fbe5ffae00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26136-cwe-77-improper-neutralization-of-s-5da576f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26136%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Copilot&amp;severity=medium&amp;id=69bc698ce32a4fbe5ffae00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24299-cwe-77-improper-neutralization-of-s-66ef9f33</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24299%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&amp;severity=medium&amp;id=69bc698ce32a4fbe5ffae004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23659-cwe-200-exposure-of-sensitive-infor-8cb9cf5a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23659%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Data%20Factory&amp;severity=high&amp;id=69bc698ce32a4fbe5ffae001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26120-cwe-918-server-side-request-forgery-1d36a6ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26120%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Bing&amp;severity=medium&amp;id=69bc698ce32a4fbe5ffae007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23658-cwe-522-insufficiently-protected-cr-3581b2ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23658%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Microsoft%20Azure%20DevOps%3A%20msazure&amp;severity=high&amp;id=69bc698ce32a4fbe5ffadffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32191-cwe-78-improper-neutralization-of-s-97a170f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32191%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Bing%20Images&amp;severity=critical&amp;id=69bc698ce32a4fbe5ffae019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26138-cwe-918-server-side-request-forgery-ebca77b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26138%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=69bc698ce32a4fbe5ffae010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26139-cwe-918-server-side-request-forgery-d1f7bdbc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26139%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=69bc698ce32a4fbe5ffae013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32169-cwe-918-server-side-request-forgery-b6b36f7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32169%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Cloud%20Shell&amp;severity=critical&amp;id=69bc698ce32a4fbe5ffae016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32747-cwe-22-improper-limitation-of-a-pat-54548a0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32747%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bc698ee32a4fbe5ffae09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32622-cwe-862-missing-authorization-in-da-a6bc8eb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32622%3A%20CWE-862%3A%20Missing%20Authorization%20in%20dataease%20SQLBot&amp;severity=high&amp;id=69bc6600e32a4fbe5ff98433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30924-cwe-942-permissive-cross-domain-pol-3c08973c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30924%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20autobrr%20qui&amp;severity=critical&amp;id=69bc6600e32a4fbe5ff9842f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4428-cwe-299-improper-check-for-certifica-6e7e17f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4428%3A%20CWE-299%20Improper%20check%20for%20certificate%20revocation%20in%20AWS%20AWS-LC&amp;severity=high&amp;id=69bc6600e32a4fbe5ff98437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30836-cwe-287-improper-authentication-in--146fb37a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30836%3A%20CWE-287%3A%20Improper%20Authentication%20in%20smallstep%20certificates&amp;severity=critical&amp;id=69bca5a4e32a4fbe5f14337a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3849-cwe-787-out-of-bounds-write-in-wolfs-5398bc77</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3849%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20wolfSSL%20Inc.%20wolfSSL&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27953-cwe-915-improperly-controlled-modif-7873cd73</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27953%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20ormar-orm%20ormar&amp;severity=high&amp;id=69bca5a4e32a4fbe5f143360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3549-cwe-122-heap-based-buffer-overflow-i-c0d00cf3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3549%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20wofSSL%20wolfSSL&amp;severity=high&amp;id=69bc5b75e32a4fbe5ff4fefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3503-cwe-335-incorrect-usage-of-seeds-in--21219b3e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3503%3A%20CWE-335%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20wolfSSL%20Inc.%20wolfSSL%20(wolfCrypt)&amp;severity=medium&amp;id=69bc42d8e32a4fbe5fe8af3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-screenconnect-vulnerability-exposes-machi-7e07b842</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20ScreenConnect%20Vulnerability%20Exposes%20Machine%20Keys&amp;severity=critical&amp;id=69bc381ae32a4fbe5fe48fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26940-cwe-1284-improper-validation-of-spe-3f14668f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26940%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26939-cwe-862-missing-authorization-in-el-103dd2d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26939%3A%20CWE-862%20Missing%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26933-cwe-129-improper-validation-of-arra-1b9518eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26933%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26931-cwe-789-memory-allocation-with-exce-91f97db1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26931%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20Elastic%20Metricbeat&amp;severity=medium&amp;id=69bc2dc4e32a4fbe5fdefa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3029-cwe-22-improper-limitation-of-a-path-729e317c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3029%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Artifex%20Software%20Inc.%20*PyMuPDF*%20PyMuPDF&amp;severity=high&amp;id=69bc1fb1e32a4fbe5fd8213b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32869-cwe-79-improper-neutralization-of-i-9b4095a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eComplaint&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd82137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32868-cwe-79-improper-neutralization-of-i-19f98a35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eComplaint&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd82133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32867-cwe-639-authorization-bypass-throug-7f856db1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32867%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20OPEXUS%20eComplaint&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd8212f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32866-cwe-79-improper-neutralization-of-i-54776fae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd8212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32865-cwe-200-exposure-of-sensitive-infor-6b65c58b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32865%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20OPEXUS%20eComplaint&amp;severity=critical&amp;id=69bc1fb1e32a4fbe5fd82127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-readied-cyberattack-capabilities-for-response-f9c5f962</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Readied%20Cyberattack%20Capabilities%20for%20Response%20Prior%20to%20Epic%20Fury&amp;severity=medium&amp;id=69bc1876e32a4fbe5fd0e091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edr-killers-explained-beyond-the-drivers-086c7370</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EDR%20killers%20explained%3A%20Beyond%20the%20drivers&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-tax-season-becomes-cyberattack-season-phishin-ea935d25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20tax%20season%20becomes%20cyberattack%20season%3A%20Phishing%20and%20malware%20campaigns%20using%20tax-related%20lures&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marquis-data-breach-affects-672000-individuals-63033f85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marquis%20Data%20Breach%20Affects%20672%2C000%20Individuals&amp;severity=medium&amp;id=69bc116ee32a4fbe5fcdf9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27043-cwe-434-unrestricted-upload-of-file-cba2eddd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27043%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=69bc11b6e32a4fbe5fce058b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32843-cwe-79-improper-neutralization-of-i-a49337fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32843%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20LinkItONEDevGroup%20Location%20Aware%20Sensor%20System%20(LASS)&amp;severity=medium&amp;id=69bc11b6e32a4fbe5fce058e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22557-vulnerability-in-ubiquiti-inc-unifi-b488b1a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22557%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Application&amp;severity=critical&amp;id=69bc0a99e32a4fbe5fcbe3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22558-vulnerability-in-ubiquiti-inc-unifi-ab721e24</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22558%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Application&amp;severity=high&amp;id=69bc0a99e32a4fbe5fcbe402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4427-improper-validation-of-array-index-i-ded74843</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4427&amp;severity=null&amp;id=69bc0a99e32a4fbe5fcbe40e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-spotlight-shinyhunters-fast-tracks-saas-acc-d16b4341</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Spotlight%3A%20ShinyHunters%20Fast-Tracks%20SaaS%20Access%20with%20Subdomain%20Impersonation&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2369-integer-underflow-wrap-or-wraparound-1a25d932</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2369%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69bc0a99e32a4fbe5fcbe405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-firm-aura-discloses-data-breach-impacting-e11ac2db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Firm%20Aura%20Discloses%20Data%20Breach%20Impacting%20900%2C000%20Records&amp;severity=medium&amp;id=69bc06e1e32a4fbe5fca1251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4426-incorrect-bitwise-shift-of-integer-i-9edcaece</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4426%3A%20Incorrect%20Bitwise%20Shift%20of%20Integer%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69bc0726e32a4fbe5fca202e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4424-out-of-bounds-read-in-red-hat-red-ha-49c7e3de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4424%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69bc0726e32a4fbe5fca2029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71260-cwe-502-deserialization-of-untruste-21e3c5f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71260%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=high&amp;id=69bc0011e32a4fbe5fc6a5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71259-cwe-918-server-side-request-forgery-2c78bf47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71259%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=medium&amp;id=69bc0011e32a4fbe5fc6a5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71258-cwe-918-server-side-request-forgery-6d09c567</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71258%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=medium&amp;id=69bc0011e32a4fbe5fc6a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71257-cwe-306-missing-authentication-for--cfdd0e6a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71257%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=medium&amp;id=69bc0011e32a4fbe5fc6a5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-exploits-zimbra-vulnerability-against--747fd31c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20Exploits%20Zimbra%20Vulnerability%20Against%20Ukraine&amp;severity=medium&amp;id=69bbfc57e32a4fbe5fc44ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3511-cwe-611-improper-restriction-of-xml--d3394379</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3511%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Slovensko.Digital%20Autogram&amp;severity=high&amp;id=69bc0011e32a4fbe5fc6a5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3658-cwe-89-improper-neutralization-of-sp-4ce634e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3658%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69bbdce4e32a4fbe5fb75e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-invitation-to-infection-how-silentconnect-del-4ebdc8bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Invitation%20to%20Infection%3A%20How%20SILENTCONNECT%20Delivers%20ScreenConnect&amp;severity=medium&amp;id=69bbfc73e32a4fbe5fc45109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-targets-users-of-cobra-docguard-softwa-1c4323bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Malware%20Targets%20Users%20of%20Cobra%20DocGuard%20Software&amp;severity=medium&amp;id=69bbfc73e32a4fbe5fc45100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dto-malware-that-takes-notes-d4134ff7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DTO%20malware%20that%20takes%20notes&amp;severity=medium&amp;id=69bbffd8e32a4fbe5fc68b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14716-cwe-287-improper-authentication-in--a0439e26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14716%3A%20CWE-287%20Improper%20Authentication%20in%20Secomea%20GateManager&amp;severity=medium&amp;id=69bbd963e32a4fbe5fb5a576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-attacks-exploiting-recent-sharepoint-171abc90</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Attacks%20Exploiting%20Recent%20SharePoint%20Vulnerability&amp;severity=critical&amp;id=69bbc79ae32a4fbe5faeae91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-firewall-vulnerability-exploited-as-zero-day-1e82d87b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Firewall%20Vulnerability%20Exploited%20as%20Zero-Day%20in%20Interlock%20Ransomware%20Attacks&amp;severity=medium&amp;id=69bbbd0de32a4fbe5fa90d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21788-cwe-79-improper-neutralization-of-i-8231cd45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21788%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20HCLSoftware%20Connections&amp;severity=medium&amp;id=69bbbd50e32a4fbe5fa91b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27070-cwe-79-improper-neutralization-of-i-037c654a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27070%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=high&amp;id=69bbbd50e32a4fbe5fa91b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27068-cwe-79-improper-neutralization-of-i-6464da4e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27068%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Howard%20Website%20LLMs.txt&amp;severity=high&amp;id=69bbbd50e32a4fbe5fa91b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27067-cwe-434-unrestricted-upload-of-file-001b9b9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27067%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Syarif%20Mobile%20App%20Editor&amp;severity=critical&amp;id=69bbb9bce32a4fbe5fa803c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27065-cwe-98-improper-control-of-filename-c54e685b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20BuilderPress&amp;severity=critical&amp;id=69bbb9bce32a4fbe5fa803c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25445-cwe-502-deserialization-of-untruste-38c3b1fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25445%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Membership%20Software%20WishList%20Member%20X&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25443-cwe-862-missing-authorization-in-do-b2a17dc0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25443%3A%20Missing%20Authorization%20in%20Dotstore%20Fraud%20Prevention%20For%20Woocommerce&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25442-cwe-79-improper-neutralization-of-i-53e83f86</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25442%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QantumThemes%20Kentha&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25438-cwe-79-improper-neutralization-of-i-5ae4c863</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHunk%20Gutenberg%20Blocks&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68836-cwe-79-improper-neutralization-of-i-442407f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68836%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Markbeljaars%20Table%20of%20Contents%20Creator&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67618-cwe-79-improper-neutralization-of-i-392796e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ArtstudioWorks%20Brookside&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62043-cwe-79-improper-neutralization-of-i-1f545989</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62043%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20WPSight%20WPCasa&amp;severity=medium&amp;id=69bbb9bce32a4fbe5fa803ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60237-cwe-502-deserialization-of-untruste-02398e83</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60237%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Themeton%20Finag&amp;severity=critical&amp;id=69bbb638e32a4fbe5fa6afee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60233-cwe-502-deserialization-of-untruste-e4dbbeab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60233%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Themeton%20Zuut&amp;severity=critical&amp;id=69bbb638e32a4fbe5fa6afeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53222-cwe-79-improper-neutralization-of-i-30abad9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53222%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Opt-In%20Builder&amp;severity=high&amp;id=69bbb638e32a4fbe5fa6afe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50001-cwe-79-improper-neutralization-of-i-e0727e1a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50001%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=high&amp;id=69bbb638e32a4fbe5fa6afe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32223-cwe-639-authorization-bypass-throug-f19f8659</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32223%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Themeum%20Tutor%20LMS&amp;severity=medium&amp;id=69bbb638e32a4fbe5fa6afe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3475-cwe-862-missing-authorization-in-ins-dcfee312</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3475%3A%20CWE-862%20Missing%20Authorization%20in%20instantpopupbuilder%20Instant%20Popup%20Builder%20%E2%80%93%20Powerful%20Popup%20Maker%20for%20Opt-ins%2C%20Email%20Newsletters%20%26%20Lead%20Generation&amp;severity=medium&amp;id=69bbabafe32a4fbe5fa0f1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42210-cwe-79-improper-neutralization-of-i-959be701</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42210%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20HCLSoftware%20Unica%20Marketing%20Operations%20(Plan)&amp;severity=high&amp;id=69bbabafe32a4fbe5fa0f1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25312-missing-authorization-in-metagauss--6088bf26</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25312%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=high&amp;id=69cd7410e6bfc5ba1def5044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25471-cwe-288-authentication-bypass-using-fb51444f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25471%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Themepaste%20Admin%20Safety%20Guard&amp;severity=high&amp;id=69bba828e32a4fbe5f9f514f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27091-cwe-862-missing-authorization-in-ui-51d16ecd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27091%3A%20Missing%20Authorization%20in%20UiPress%20UiPress%20lite&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2571-cwe-200-exposure-of-sensitive-inform-4433356b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2571%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4006-cwe-79-improper-neutralization-of-in-57adcf74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4006%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Draft%20List&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4120-cwe-79-improper-neutralization-of-in-ace8a1f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Info%20Cards%20%E2%80%93%20Add%20Text%20and%20Media%20in%20Card%20Layouts&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4068-cwe-352-cross-site-request-forgery-c-e2deb8f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4068%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pattihis%20Add%20Custom%20Fields%20to%20Media&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27093-cwe-98-improper-control-of-filename-113afdb1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27093%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Tripgo&amp;severity=high&amp;id=69bba122e32a4fbe5f9bab6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indonesianfoods-spam-campaign-89-000-junk-packages-02add850</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IndonesianFoods%20Spam%20Campaign%3A%2089%20000%20junk%20packages%20in%20npm&amp;severity=medium&amp;id=69bb8fc7e32a4fbe5f94a83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27096-cwe-502-deserialization-of-untruste-c54c368b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27096%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20BuddhaThemes%20ColorFolio%20-%20Freelance%20Designer%20WordPress%20Theme&amp;severity=high&amp;id=69bb8f8fe32a4fbe5f949e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27397-cwe-639-authorization-bypass-throug-fd1f474c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27397%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Really%20Simple%20Plugins%20B.V.%20Really%20Simple%20Security%20Pro&amp;severity=medium&amp;id=69bb8f8fe32a4fbe5f949e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27413-cwe-89-improper-neutralization-of-s-2b17e884</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27413%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozmoslabs%20Profile%20Builder%20Pro&amp;severity=critical&amp;id=69bb8f8fe32a4fbe5f949e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27540-cwe-434-unrestricted-upload-of-file-64999286</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27540%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Rymera%20Web%20Co%20Pty%20Ltd.%20Woocommerce%20Wholesale%20Lead%20Capture&amp;severity=critical&amp;id=69bb8f8fe32a4fbe5f949e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27542-cwe-266-incorrect-privilege-assignm-fdf0645e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27542%3A%20Incorrect%20Privilege%20Assignment%20in%20Rymera%20Web%20Co%20Pty%20Ltd.%20Woocommerce%20Wholesale%20Lead%20Capture&amp;severity=critical&amp;id=69bb8f8fe32a4fbe5f949e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28044-cwe-79-improper-neutralization-of-i-4c6375df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Media%20WP%20Rocket&amp;severity=medium&amp;id=69bc0726e32a4fbe5fca2033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28070-cwe-862-missing-authorization-in-ti-af8d6a7a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28070%3A%20CWE-862%20Missing%20Authorization%20in%20Tips%20and%20Tricks%20HQ%20WP%20eMember&amp;severity=medium&amp;id=69bc11b6e32a4fbe5fce0592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28073-cwe-79-improper-neutralization-of-i-1bc1903b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tips%20and%20Tricks%20HQ%20WP%20eMember&amp;severity=high&amp;id=69bc0726e32a4fbe5fca2036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1238-cwe-79-improper-neutralization-of-in-a993bd3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=high&amp;id=69bb817ee32a4fbe5f8e86eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36051-cwe-538-insertion-of-sensitive-info-ab618e1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36051%3A%20CWE-538%20Insertion%20of%20sensitive%20information%20into%20Externally-Accessible%20file%20or%20directory%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13995-cwe-1286-improper-validation-of-syn-68a57170</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13995%3A%20CWE-1286%20Improper%20validation%20of%20syntactic%20correctness%20of%20input%20in%20IBM%20QRadar&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d4fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15051-cwe-79-improper-neutralization-of-i-ad185818</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15051%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1276-cwe-79-improper-neutralization-of-in-5c8d8570</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1276%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interesting-message-stored-in-cowrie-logs-wed-mar--eed73e9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interesting%20Message%20Stored%20in%20Cowrie%20Logs%2C%20(Wed%2C%20Mar%2018th)&amp;severity=low&amp;id=69bb4676771bdb1749e386d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-19-f789201b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-19&amp;severity=medium&amp;id=69bc8ffae32a4fbe5f0bc8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25667-na-4878ddad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25667%3A%20n%2Fa&amp;severity=high&amp;id=69bc42d8e32a4fbe5fe8af3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30694-na-109950b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30694%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67115-na-fd8f50f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67115%3A%20n%2Fa&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67114-na-cfe87a40</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67114%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fcac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67113-na-f177756a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67113%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67112-na-167598ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67112%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30403-na-47aad45b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30403%3A%20n%2Fa&amp;severity=high&amp;id=69bc2336e32a4fbe5fd9a333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30404-na-dc0e3c16</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30404%3A%20n%2Fa&amp;severity=high&amp;id=69bc1fb1e32a4fbe5fd82123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-19-a4f74c0b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-19&amp;severity=medium&amp;id=69bc1bf7e32a4fbe5fd2fcb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30402-na-cbd8e1be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30402%3A%20n%2Fa&amp;severity=critical&amp;id=69bc1527e32a4fbe5fcfae7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69720-na-186d574f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69720%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20GNU%20ncurses&amp;severity=high&amp;id=69bc11b6e32a4fbe5fce0585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30711-na-52d1a31a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30711%3A%20n%2Fa&amp;severity=high&amp;id=69bc0a99e32a4fbe5fcbe40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-19-1560c5bd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-19&amp;severity=low&amp;id=69bb8f56e32a4fbe5f948e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32743-cwe-121-stack-based-buffer-overflow-abcf5c62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32743%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69bb389a771bdb1749cfdbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32255-cwe-918-server-side-request-forgery-b38e16f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32255%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kanbn%20kan&amp;severity=high&amp;id=69bb3516771bdb1749cf1e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32805-cwe-22-improper-limitation-of-a-pat-c9094e96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32805%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ctfer-io%20romeo&amp;severity=high&amp;id=69bb2a8a771bdb1749cbc625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32737-cwe-284-improper-access-control-in--390bca84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32737%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20romeo&amp;severity=high&amp;id=69bb2a8a771bdb1749cbc621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32735-cwe-20-improper-input-validation-in-02f3ed92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32735%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Chrimle%20openapi-to-java-records-mustache-templates-parent&amp;severity=low&amp;id=69bb2706771bdb1749cae220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15031-cwe-22-improper-limitation-of-a-pat-b338a25f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15031%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=69bb2706771bdb1749cae217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32736-cwe-862-missing-authorization-in-hy-bd2f85e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32736%3A%20CWE-862%3A%20Missing%20Authorization%20in%20HytaleModding%20wiki&amp;severity=medium&amp;id=69bb2706771bdb1749cae226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32731-cwe-22-improper-limitation-of-a-pat-efa014e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32731%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20apostrophecms%20import-export&amp;severity=critical&amp;id=69bb2706771bdb1749cae21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32730-cwe-287-improper-authentication-in--15c69b59</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32730%3A%20CWE-287%3A%20Improper%20Authentication%20in%20apostrophecms%20apostrophe&amp;severity=high&amp;id=69bb2706771bdb1749cae21a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33163-cwe-200-exposure-of-sensitive-infor-bf0b3710</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33163%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2382771bdb1749c98987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33042-cwe-287-improper-authentication-in--316c227c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33042%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2382771bdb1749c98982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32944-cwe-674-uncontrolled-recursion-in-p-89a0ff68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32944%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2382771bdb1749c9897d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32943-cwe-367-time-of-check-time-of-use-t-09ac7473</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32943%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69bb2001771bdb1749c89335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32886-cwe-1321-improperly-controlled-modi-1739e4ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32886%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2001771bdb1749c89330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32878-cwe-1321-improperly-controlled-modi-f8c4ad57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32878%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2001771bdb1749c8932b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32770-cwe-248-uncaught-exception-in-parse-654e3258</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32770%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2001771bdb1749c89326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32742-cwe-915-improperly-controlled-modif-464116df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32742%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2001771bdb1749c89321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32728-cwe-79-improper-neutralization-of-i-9f80ada8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32728%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2001771bdb1749c8931a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32723-cwe-362-concurrent-execution-using--576a2875</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32723%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20nyariv%20SandboxJS&amp;severity=medium&amp;id=69bb1c7a771bdb1749c7cd1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32722-cwe-79-improper-neutralization-of-i-088ed356</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32722%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bloomberg%20memray&amp;severity=low&amp;id=69bb1c7a771bdb1749c7cd16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32703-cwe-79-improper-neutralization-of-i-f2afc489</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32703%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=69bb18f8771bdb1749c6e132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32698-cwe-89-improper-neutralization-of-s-a9afd70e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32698%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=69bb18f8771bdb1749c6e12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32700-cwe-362-concurrent-execution-using--b102bd89</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32700%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20heartcombo%20devise&amp;severity=medium&amp;id=69bb5534e32a4fbe5f378d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25873-cwe-502-deserialization-of-untruste-9e0b0036</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25873%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Beijing%20Academy%20of%20Artificial%20Intelligence%20(BAAI)%20OmniGen2-RL&amp;severity=critical&amp;id=69bb11f2771bdb1749c4fa31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32638-cwe-639-authorization-bypass-throug-a9775966</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32638%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=low&amp;id=69bb11f2771bdb1749c4fa3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32321-cwe-89-improper-neutralization-of-s-5fdfa0b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32321%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=69bb11f2771bdb1749c4fa39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31971-cwe-121-stack-based-buffer-overflow-442a3df6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31971%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb03e2771bdb1749c142f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31970-cwe-122-heap-based-buffer-overflow--d4a345e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31970%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb03e2771bdb1749c142f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31969-cwe-122-heap-based-buffer-overflow--a2fbcdcb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31969%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb03e2771bdb1749c142f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4396-cwe-295-improper-certificate-validat-50860779</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4396%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Devolutions%20Hub%20Reporting%20Service&amp;severity=high&amp;id=69bb03e2771bdb1749c142fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31968-cwe-121-stack-based-buffer-overflow-dd9916c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31968%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb0078771bdb1749c07554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-collapse-of-predictive-security-in-the-age-of--11cf38f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Collapse%20of%20Predictive%20Security%20in%20the%20Age%20of%20Machine-Speed%20Attacks&amp;severity=medium&amp;id=69bb0027771bdb1749c06483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31967-cwe-125-out-of-bounds-read-in-samto-87c20809</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31967%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20samtools%20htslib&amp;severity=medium&amp;id=69bb0079771bdb1749c0755e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31966-cwe-125-out-of-bounds-read-in-samto-83340784</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31966%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20samtools%20htslib&amp;severity=medium&amp;id=69bb0078771bdb1749c07558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31965-cwe-125-out-of-bounds-read-in-samto-74a2b192</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31965%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20samtools%20htslib&amp;severity=medium&amp;id=69baf5d2771bdb1749bce2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31964-cwe-476-null-pointer-dereference-in-af5a51cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31964%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20samtools%20htslib&amp;severity=medium&amp;id=69baf24a771bdb1749bb3c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31963-cwe-122-heap-based-buffer-overflow--76b649a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31963%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69baf24a771bdb1749bb3c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3479-vulnerability-in-python-software-fou-7c646350</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3479%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=69baf24a771bdb1749bb3c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31962-cwe-122-heap-based-buffer-overflow--f8425e97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31962%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69baf5d2771bdb1749bce2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32634-cwe-346-origin-validation-error-in--30d65730</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32634%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20nicolargo%20glances&amp;severity=high&amp;id=69baf5d2771bdb1749bce2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32633-cwe-200-exposure-of-sensitive-infor-1b1c198b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32633%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=critical&amp;id=69baf5d2771bdb1749bce2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32632-cwe-346-origin-validation-error-in--5bc32449</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32632%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20nicolargo%20glances&amp;severity=medium&amp;id=69bae7bf771bdb1749b795a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26948-cwe-1258-exposure-of-sensitive-syst-080f0205</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26948%3A%20CWE-1258%3A%20Exposure%20of%20Sensitive%20System%20Information%20Due%20to%20Uncleared%20Debug%20Information%20in%20Dell%20Integrated%20Dell%20Remote%20Access%20Controller&amp;severity=medium&amp;id=69bae7bf771bdb1749b7959c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26945-cwe-114-process-control-in-dell-int-7305f643</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26945%3A%20CWE-114%3A%20Process%20Control%20in%20Dell%20Integrated%20Dell%20Remote%20Access%20Controller&amp;severity=medium&amp;id=69bae7bf771bdb1749b79599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32611-cwe-89-improper-neutralization-of-s-86e6c23f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32611%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69bae0bb771bdb1749b563de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32610-cwe-942-permissive-cross-domain-pol-3fbd2cf4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32610%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20nicolargo%20glances&amp;severity=high&amp;id=69bad9b2771bdb1749b240a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1463-cwe-98-improper-control-of-filename--497abb3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1463%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20smub%20Photo%20Gallery%2C%20Sliders%2C%20Proofing%20and%20Themes%20%E2%80%93%20NextGEN%20Gallery&amp;severity=high&amp;id=69bad9b2771bdb1749b2409e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-network-of-20000-fake-shops-9f73b038</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20network%20of%2020%2C000%2B%20fake%20shops&amp;severity=medium&amp;id=69bad271771bdb1749aed170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24063-cwe-276-incorrect-default-permissio-bcb180bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24063%3A%20CWE-276%20Incorrect%20default%20permissions%20in%20Arturia%20Software%20Center&amp;severity=high&amp;id=69bac82e771bdb1749ab0136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darksword-ios-exploit-kit-used-by-state-sponsored--9559b6ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98DarkSword%E2%80%99%20iOS%20Exploit%20Kit%20Used%20by%20State-Sponsored%20Hackers%2C%20Spyware%20Vendors&amp;severity=medium&amp;id=69bac7e7771bdb1749aaf3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-snappyclient-9437d7d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20SnappyClient&amp;severity=medium&amp;id=69bad5f5771bdb1749b06b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2992-cwe-862-missing-authorization-in-iqo-61572437</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2992%3A%20CWE-862%20Missing%20Authorization%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=high&amp;id=69bac82e771bdb1749ab014c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2991-cwe-287-improper-authentication-in-i-f76202b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2991%3A%20CWE-287%20Improper%20Authentication%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=high&amp;id=69bac82e771bdb1749ab0146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3090-cwe-79-improper-neutralization-of-in-ac88dbf3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3090%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=high&amp;id=69bac830771bdb1749ab0209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2512-cwe-79-improper-neutralization-of-in-bd7804ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Code%20Embed&amp;severity=medium&amp;id=69bac82e771bdb1749ab0139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2559-cwe-862-missing-authorization-in-saa-20f1bf38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2559%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=medium&amp;id=69bac82e771bdb1749ab0140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24062-cwe-306-missing-authentication-for--28feee6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24062%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Arturia%20Software%20Center&amp;severity=high&amp;id=69bac82e771bdb1749ab0133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33004-vulnerability-in-jenkins-project-je-d55a21b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33004%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20LoadNinja%20Plugin&amp;severity=medium&amp;id=69bac82e771bdb1749ab015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33003-vulnerability-in-jenkins-project-je-bd0a6730</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33003%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20LoadNinja%20Plugin&amp;severity=medium&amp;id=69bac82e771bdb1749ab0158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33002-vulnerability-in-jenkins-project-je-feb222ea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33002%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=69bac82e771bdb1749ab0155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33001-vulnerability-in-jenkins-project-je-34f276c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33001%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=69bac82e771bdb1749ab0152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eu-sanctions-chinese-iranian-firms-supporting-hack-8cec962a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EU%20Sanctions%20Chinese%2C%20Iranian%20Firms%20Supporting%20Hacking%20Operations&amp;severity=medium&amp;id=69babd5c771bdb1749a7527b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32609-cwe-200-exposure-of-sensitive-infor-2b5dd630</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32609%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69baba10771bdb1749a5df7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadow-ai-risk-how-saas-apps-are-quietly-enabling--358e50ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shadow%20AI%20Risk%3A%20How%20SaaS%20Apps%20Are%20Quietly%20Enabling%20Massive%20Breaches&amp;severity=medium&amp;id=69bab2d0771bdb1749a27281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3278-cwe-79-improper-neutralization-of-in-b96fd83c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3278%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20OpenText%E2%84%A2%20ZENworks%20Service%20Desk&amp;severity=high&amp;id=69bab319771bdb1749a293df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scans-for-adminer-wed-mar-18th-1dc2dc26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scans%20for%20%22adminer%22%2C%20(Wed%2C%20Mar%2018th)&amp;severity=medium&amp;id=69baa842771bdb17499e7319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25449-cwe-502-deserialization-of-untruste-72874dad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25449%3A%20Deserialization%20of%20Untrusted%20Data%20in%20shinetheme%20Traveler&amp;severity=critical&amp;id=69baabfa771bdb1749a00bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32694-cwe-343-predictable-value-range-fro-eff99390</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32694%3A%20CWE-343%20Predictable%20value%20range%20from%20previous%20values%20in%20Canonical%20Juju&amp;severity=medium&amp;id=69baabfa771bdb1749a00bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32693-cwe-863-incorrect-authorization-in--0e03cd1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32693%3A%20CWE-863%20Incorrect%20Authorization%20in%20Canonical%20Juju&amp;severity=high&amp;id=69baa17f771bdb17499a872d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-likely-used-malware-stolen-credent-ec3ce55e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Likely%20Used%20Malware-Stolen%20Credentials%20in%20Stryker%20Breach&amp;severity=medium&amp;id=69baa13b771bdb17499a51a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-debuts-background-security-improvements-with-43f317f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Debuts%20Background%20Security%20Improvements%20With%20Fresh%20WebKit%20Patches&amp;severity=medium&amp;id=69ba9db7771bdb17499562f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32692-cwe-285-improper-authorization-in-c-8bb2a045</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32692%3A%20CWE-285%20Improper%20Authorization%20in%20Canonical%20Juju&amp;severity=high&amp;id=69baa17f771bdb17499a872a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32691-cwe-708-incorrect-ownership-assignm-4976f2b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32691%3A%20CWE-708%20Incorrect%20ownership%20assignment%20in%20Canonical%20Juju&amp;severity=medium&amp;id=69ba9df8771bdb1749975689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-uncover-a-horabot-campaign-and-detect-this--b14c9474</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20uncover%20a%20Horabot%20campaign%20and%20detect%20this%20malware&amp;severity=medium&amp;id=69bad5f5771bdb1749b06b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41258-cwe-284-improper-access-control-in--8af3e8ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41258%3A%20CWE-284%20Improper%20Access%20Control%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69baba10771bdb1749a5df8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12518-cwe-79-improper-neutralization-of-i-9e0f1fb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12518%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bee%20Content%20Design%20Befree%20SDK&amp;severity=medium&amp;id=69ba88d6771bdb17497e74c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casting-a-wider-net-scaling-threat-c5bddf9f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casting%20a%20Wider%20Net%3A%20Scaling%20Threat&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-roundish-uncovering-an-apt28-roundcube-e-a41e6b6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Roundish%3A%20Uncovering%20an%20APT28%20Roundcube%20Exploitation%20Toolkit%20Targeting%20Ukraine&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-trader-campaign-coordinated-weaponisati-15cb4f31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Trader%20campaign%20-%20Coordinated%20weaponisation%20of%20cryptocurrency%20trading%20bots%20by%20suspected%20DPRK%20malware%20operators&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-spear-phishing-and-kakaotalk-linke-3131ee7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20the%20Spear-Phishing%20and%20KakaoTalk-Linked%20Threat%20Campaign&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-discovers-4th-whatsapp-view-once-bypass-c88d9741</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20Discovers%204th%20WhatsApp%20View%20Once%20Bypass%3B%20Meta%20Won%E2%80%99t%20Patch&amp;severity=medium&amp;id=69ba851a771bdb17497b443d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/minecraft-dark-tale-of-scams-malware-extortion-8865f2fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Minecraft%3A%20Dark%20Tale%20of%20Scams%2C%20Malware%20%26%20Extortion&amp;severity=medium&amp;id=69ba8c21771bdb174982ab3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-pudgy-world-site-steals-crypto-passwords-2eef4b1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Pudgy%20World%20site%20steals%20crypto%20passwords&amp;severity=medium&amp;id=69ba8195771bdb174978bc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32565-cwe-862-missing-authorization-in-we-3beba4f5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32565%3A%20Missing%20Authorization%20in%20Ajay%20Contextual%20Related%20Posts&amp;severity=medium&amp;id=69ba73bc771bdb174968082d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1217-cwe-862-missing-authorization-in-yoa-3986046b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1217%3A%20CWE-862%20Missing%20Authorization%20in%20yoast%20Yoast%20Duplicate%20Post&amp;severity=medium&amp;id=69ba73bc771bdb174968081d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22729-vulnerability-in-vmware-spring-ai-96356f4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22729%3A%20Vulnerability%20in%20VMware%20Spring%20AI&amp;severity=high&amp;id=69ba5b20771bdb174957e258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22730-vulnerability-in-vmware-spring-ai-ddcf48d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22730%3A%20Vulnerability%20in%20VMware%20Spring%20AI&amp;severity=high&amp;id=69ba5b20771bdb174957e25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22323-cwe-352-cross-site-request-forgery--ebdd149c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22323%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=69ba579c771bdb17495548ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22322-cwe-79-improper-neutralization-of-i-b70e5235</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22322%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=69ba579c771bdb17495548fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22321-cwe-121-stack-based-buffer-overflow-a8c2437b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22321%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22320-cwe-121-stack-based-buffer-overflow-da50b6da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22320%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22319-cwe-121-stack-based-buffer-overflow-5a355e4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22319%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22318-cwe-121-stack-based-buffer-overflow-6c12e31f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22318%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22317-cwe-77-improper-neutralization-of-s-2550f32c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22317%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=69ba579c771bdb17495548ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22316-cwe-121-stack-based-buffer-overflow-8a351159</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22316%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31703-cwe-305-authentication-bypass-by-pr-50832b2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31703%3A%20CWE-305%20Authentication%20bypass%20by%20primary%20weakness%20in%20dahua%20NVR2-4KS3&amp;severity=low&amp;id=69ba579c771bdb17495548e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3512-cwe-79-improper-neutralization-of-in-0c263e50</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alhadeff%20Writeprint%20Stylometry&amp;severity=medium&amp;id=69ba5091771bdb1749512c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32608-cwe-78-improper-neutralization-of-s-c704207d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32608%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69ba4605771bdb17494b9a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15363-cwe-79-cross-site-scripting-xss-in--97d02cde</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15363%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Get%20Use%20APIs&amp;severity=medium&amp;id=69ba4605771bdb17494b99fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32596-cwe-200-exposure-of-sensitive-infor-34b688da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32596%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69bacf27771bdb1749ad833a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32606-cwe-522-insufficiently-protected-cr-e3768d6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32606%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20lxc%20incus-os&amp;severity=high&amp;id=69bacf27771bdb1749ad833f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32268-cwe-862-missing-authorization-in-cr-ce09a57b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32268%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craftcms%20azure-blob&amp;severity=high&amp;id=69bae0bb771bdb1749b563e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4366-server-side-request-forgery-ssrf-in--602d24ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4366%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69baebb5771bdb1749b8ee09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32266-cwe-200-exposure-of-sensitive-infor-d1e81751</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32266%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20google-cloud&amp;severity=low&amp;id=69baebb5771bdb1749b8edfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1926-cwe-862-missing-authorization-in-wps-f2df5907</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1926%3A%20CWE-862%20Missing%20Authorization%20in%20wpswings%20Subscriptions%20for%20WooCommerce&amp;severity=medium&amp;id=69baba10771bdb1749a5df96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1780-cwe-79-improper-neutralization-of-in-1f16c6d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1780%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silentwind%20%5BCR%5DPaid%20Link%20Manager&amp;severity=medium&amp;id=69baba10771bdb1749a5df91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32265-cwe-200-exposure-of-sensitive-infor-a82c09db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32265%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20aws-s3&amp;severity=medium&amp;id=69baabfa771bdb1749a00be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32256-cwe-835-loop-with-unreachable-exit--10f47bf0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32256%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Borewit%20music-metadata&amp;severity=high&amp;id=69bab319771bdb1749a293e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2575-improper-handling-of-highly-compress-5b72b4d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2575%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69bab319771bdb1749a293e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32254-cwe-284-improper-access-control-in--d7b8155f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32254%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20cloudnativelabs%20kube-router&amp;severity=high&amp;id=69ba1bd6771bdb17491a1d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31938-cwe-79-improper-neutralization-of-i-32085433</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31938%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parallax%20jsPDF&amp;severity=critical&amp;id=69ba1bd6771bdb17491a1d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31898-cwe-116-improper-encoding-or-escapi-53f2e4d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31898%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69ba1bd6771bdb17491a1d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31891-cwe-89-improper-neutralization-of-s-bc4a2f9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31891%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cockpit-HQ%20Cockpit&amp;severity=high&amp;id=69ba1bd6771bdb17491a1d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31865-cwe-1321-improperly-controlled-modi-a5a2e633</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31865%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20elysiajs%20elysia&amp;severity=medium&amp;id=69ba1bd6771bdb17491a1d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30884-cwe-639-authorization-bypass-throug-1e3f429f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30884%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mdjnelson%20moodle-mod_customcert&amp;severity=critical&amp;id=69ba1bd6771bdb17491a1d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4268-cwe-79-improper-neutralization-of-in-8e1b8afd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=69baba10771bdb1749a5dfa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28499-cwe-79-improper-neutralization-of-i-dfb77ddf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28499%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vapor%20leaf-kit&amp;severity=medium&amp;id=69b9ffb5771bdb17490566fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2603-missing-authentication-for-critical--81951507</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2603%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69b9ffb5771bdb174905670b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2092-improper-validation-of-specified-typ-9fe41714</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2092%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69b9ffb5771bdb1749056703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4356-cross-site-scripting-in-itsourcecode-e19faf6c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4356%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69b9ffb5771bdb1749056714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28674-cwe-434-unrestricted-upload-of-file-bf2dede6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28674%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20danvei233%20xiaoheiFS&amp;severity=high&amp;id=69b9f8b0771bdb174900ac99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28673-cwe-78-improper-neutralization-of-s-cbfc2cfc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28673%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20danvei233%20xiaoheiFS&amp;severity=high&amp;id=69b9f8b0771bdb174900ac96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29057-cwe-444-inconsistent-interpretation-3abf3602</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29057%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9f8b0771bdb174900ac9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27980-cwe-400-uncontrolled-resource-consu-0da2877b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27980%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9f8b0771bdb174900ac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27979-cwe-770-allocation-of-resources-wit-c71ea8d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27979%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9f8b0771bdb174900ac8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-18-7a4bc157</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-18&amp;severity=medium&amp;id=69bb3f6b771bdb1749d20ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26740-na-479e1e73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26740%3A%20n%2Fa&amp;severity=high&amp;id=69baf5d2771bdb1749bce2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58112-na-453304de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58112%3A%20n%2Fa&amp;severity=high&amp;id=69baf5d2771bdb1749bce2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29859-na-26756cb3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29859%3A%20n%2Fa&amp;severity=critical&amp;id=69bae7bf771bdb1749b7959f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30704-na-88a06cf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30704%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30703-na-b3658dbf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30703%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30702-na-67ba7464</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30702%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30701-na-29b2ed2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30701%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30048-na-a1cd5795</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30048%3A%20n%2Fa&amp;severity=medium&amp;id=69bae0bb771bdb1749b563c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29858-na-6892327b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29858%3A%20n%2Fa&amp;severity=high&amp;id=69bae0bb771bdb1749b563c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29856-na-335a9813</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29856%3A%20n%2Fa&amp;severity=high&amp;id=69bae0bb771bdb1749b563c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30695-na-bc21bf4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30695%3A%20n%2Fa&amp;severity=medium&amp;id=69badd33771bdb1749b3b1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30345-na-468e728e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30345%3A%20n%2Fa&amp;severity=high&amp;id=69badd33771bdb1749b3b1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67830-na-7a5c8d00</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67830%3A%20n%2Fa&amp;severity=critical&amp;id=69bad9b2771bdb1749b2409b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67829-na-b7fdee79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67829%3A%20n%2Fa&amp;severity=critical&amp;id=69bacf27771bdb1749ad8337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55046-na-0b9434d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55046%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad8333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55045-na-8ce233db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55045%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad832e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55044-na-2ac840c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55044%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad8329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55043-na-d4d61f97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55043%3A%20n%2Fa&amp;severity=medium&amp;id=69bacf27771bdb1749ad8325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55041-na-16a37252</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55041%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad8321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55040-na-ade2e734</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55040%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad831d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-18-7ef0fac3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-18&amp;severity=medium&amp;id=69ba6fff771bdb174964e9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-18-d1a9599d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-18&amp;severity=low&amp;id=69ba6fff771bdb174964e9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27978-cwe-352-cross-site-request-forgery--f467b97f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27978%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9ee21771bdb1749ef1e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27977-cwe-1385-missing-origin-validation--d3f0918a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27977%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20vercel%20next.js&amp;severity=low&amp;id=69b9ee21771bdb1749ef1e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27895-cwe-185-incorrect-regular-expressio-4f0c19f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27895%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20LDAPAccountManager%20lam&amp;severity=medium&amp;id=69b9ee21771bdb1749ef1e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27894-cwe-98-improper-control-of-filename-350674cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27894%3A%20CWE-98%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LDAPAccountManager%20lam&amp;severity=high&amp;id=69b9ea9e771bdb1749ed199c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27459-cwe-120-buffer-copy-without-checkin-dc2b5449</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27459%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pyca%20pyopenssl&amp;severity=high&amp;id=69b9e71a771bdb1749eb4c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4355-cross-site-scripting-in-portabilis-i-bdf7c588</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4355%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=69b9e71a771bdb1749eb4c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4354-cross-site-scripting-in-trendnet-tew-1222775d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4354%3A%20Cross%20Site%20Scripting%20in%20TRENDnet%20TEW-824DRU&amp;severity=medium&amp;id=69b9e71a771bdb1749eb4c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27448-cwe-636-not-failing-securely-failin-92685d63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27448%3A%20CWE-636%3A%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20pyca%20pyopenssl&amp;severity=low&amp;id=69b9e71a771bdb1749eb4c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26004-cwe-639-authorization-bypass-throug-a14a243d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26004%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20getsentry%20sentry&amp;severity=medium&amp;id=69b9e71a771bdb1749eb4c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26001-cwe-89-improper-neutralization-of-s-74e88095</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26001%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=high&amp;id=69b9e397771bdb1749e6bc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25937-cwe-287-improper-authentication-in--e6802984</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25937%3A%20CWE-287%3A%20Improper%20Authentication%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69b9e397771bdb1749e6bc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22727-cwe-306-in-cloudfoundry-cloud-found-0a9b4ea6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22727%3A%20CWE-306%20in%20Cloudfoundry%20Cloud%20Foundry&amp;severity=high&amp;id=69baebb5771bdb1749b8ee31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21994-easily-exploitable-vulnerability-al-d3394a07</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21994%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Edge%20Cloud%20Infrastructure%20Designer%20and%20Visualisation%20Toolkit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Edge%20Cloud%20Infrastructure%20Designer%20and%20Visualisation%20Toolkit.%20in%20Oracle%20Corporation%20Oracle%20Edge%20Cloud%20Infrastructure%20Designer%20and%20Visualisation%20Toolkit&amp;severity=critical&amp;id=69baba10771bdb1749a5df9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1264-cwe-306-missing-authentication-for-c-f24c86cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1264%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=high&amp;id=69baebb5771bdb1749b8ee24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14031-cwe-77-improper-neutralization-of-s-5ae99fea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14031%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=high&amp;id=69baebb5771bdb1749b8ee17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20643-processing-maliciously-crafted-web--a352aaea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20643%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20bypass%20Same%20Origin%20Policy%20in%20Apple%20Safari&amp;severity=medium&amp;id=69b9d90c771bdb1749de4be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3856-cwe-353-missing-support-for-integrit-0459f212</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3856%3A%20CWE-353%20Missing%20support%20for%20integrity%20check%20in%20IBM%20Db2%20Recovery%20Expert&amp;severity=medium&amp;id=69baebb5771bdb1749b8ee3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1376-cwe-770-allocation-of-resources-with-360a5243</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1376%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=high&amp;id=69b9d201771bdb1749dc5690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1267-cwe-200-exposure-of-sensitive-inform-952ffa1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1267%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=69b9d201771bdb1749dc568d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14806-cwe-524-use-of-cache-containing-sen-0e309db2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14806%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=69b9d201771bdb1749dc568a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32838-cwe-319-cleartext-transmission-of-s-bf676878</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32838%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=high&amp;id=69b9ce80771bdb1749db6340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32839-cwe-352-cross-site-request-forgery--bbbd3906</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32839%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=medium&amp;id=69b9ce80771bdb1749db6345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32840-cwe-79-improper-neutralization-of-i-ec50d642</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32840%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=medium&amp;id=69b9ce80771bdb1749db634a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32842-cwe-312-cleartext-storage-of-sensit-517159b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32842%3A%20CWE-312%20Cleartext%20storage%20of%20sensitive%20information%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=high&amp;id=69b9ce80771bdb1749db6354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32841-cwe-1108-excessive-reliance-on-glob-a4b3dee3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32841%3A%20CWE-1108%20Excessive%20reliance%20on%20global%20variables%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=critical&amp;id=69b9ce80771bdb1749db634f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4349-improper-authentication-in-duende-id-d9d51608</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4349%3A%20Improper%20Authentication%20in%20Duende%20IdentityServer4&amp;severity=medium&amp;id=69b9ce80771bdb1749db6359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2809-cwe-190-integer-overflow-or-wraparou-22bef509</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2809%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Netskope%20Endpoint%20DLP%20Module%20for%20Netskope%20Client&amp;severity=medium&amp;id=69b9bceb771bdb1749d5ffa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4359-cwe-158-improper-neutralization-of-n-2d40f3cd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4359%3A%20CWE-158%20Improper%20neutralization%20of%20null%20byte%20or%20NUL%20character%20in%20MongoDB%20Inc%20MongoDB%20C%20Driver&amp;severity=low&amp;id=69b9b25d771bdb1749d3370d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25936-cwe-89-improper-neutralization-of-s-c21df4bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25936%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69b9b25d771bdb1749d33705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32981-cwe-22-improper-limitation-of-a-pat-0fe01765</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32981%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ray-project%20Ray&amp;severity=high&amp;id=69b9b25d771bdb1749d33708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3563-cwe-1289-improper-validation-of-unsa-d870739f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3563%3A%20CWE-1289%20Improper%20validation%20of%20unsafe%20equivalence%20in%20input%20in%20Devolutions%20PowerShell%20Universal&amp;severity=medium&amp;id=69b9aedc771bdb1749d151fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4064-cwe-862-in-devolutions-powershell-un-f966a742</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4064%3A%20CWE-862%20in%20Devolutions%20PowerShell%20Universal&amp;severity=high&amp;id=69b9aedc771bdb1749d15200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4295-cwe-829-inclusion-of-functionality-f-7d79dd05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4295%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20AWS%20Kiro%20IDE&amp;severity=high&amp;id=69b9aedc771bdb1749d15203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32836-cwe-789-memory-allocation-with-exce-2ce301df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32836%3A%20CWE-789%20Memory%20allocation%20with%20excessive%20size%20value%20in%20mackron%20dr_libs%20dr_flac.h&amp;severity=medium&amp;id=69b9aedc771bdb1749d151f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32837-cwe-170-improper-null-termination-i-5eedb995</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32837%3A%20CWE-170%20Improper%20null%20termination%20in%20mackron%20miniaudio&amp;severity=medium&amp;id=69b9aedc771bdb1749d151f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4358-cwe-415-double-free-in-mongodb-inc-m-68de9898</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4358%3A%20CWE-415%20Double%20free%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=69b9aedc771bdb1749d15207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15584-cwe-190-integer-overflow-or-wraparo-8dfc12a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15584%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Netskope%20Endpoint%20DLP%20Module%20for%20Netskope%20Client&amp;severity=medium&amp;id=69b9aedc771bdb1749d151ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66342-cwe-843-access-of-resource-using-in-3d123839</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66342%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Canva%20Affinity&amp;severity=high&amp;id=69b9aee0771bdb1749d152d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62500-cwe-125-out-of-bounds-read-in-canva-15a9bf0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62500%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aedc771bdb1749d1520e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61979-cwe-125-out-of-bounds-read-in-canva-485677cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61979%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aedc771bdb1749d1520a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64733-cwe-125-out-of-bounds-read-in-canva-1672385e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64733%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d1527e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66000-cwe-125-out-of-bounds-read-in-canva-8e074563</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66000%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64301-cwe-787-out-of-bounds-write-in-canv-6642b6f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64301%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canva%20Affinity&amp;severity=high&amp;id=69b9aede771bdb1749d1527a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64776-cwe-125-out-of-bounds-read-in-canva-f769b895</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64776%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64735-cwe-125-out-of-bounds-read-in-canva-856c0bfd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64735%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66633-cwe-125-out-of-bounds-read-in-canva-a1da5d6c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66633%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58427-cwe-125-out-of-bounds-read-in-canva-9906ffa1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58427%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d1526e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66617-cwe-125-out-of-bounds-read-in-canva-fd95fd2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66617%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47873-cwe-125-out-of-bounds-read-in-canva-f292661c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47873%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d1526a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61952-cwe-125-out-of-bounds-read-in-canva-67336838</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61952%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66503-cwe-125-out-of-bounds-read-in-canva-0c616519</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66503%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66042-cwe-125-out-of-bounds-read-in-canva-69b1913a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66042%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65119-cwe-125-out-of-bounds-read-in-canva-509aa906</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65119%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62403-cwe-125-out-of-bounds-read-in-canva-ce41bab2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62403%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20726-cwe-125-out-of-bounds-read-in-canva-d616f23f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20726%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22882-cwe-125-out-of-bounds-read-in-canva-faf26082</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22882%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3207-cwe-306-missing-authentication-for-c-2e3ff132</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3207%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20TIBCO%20TIBCO%20BPM%20Enterprise&amp;severity=high&amp;id=69b9a0ca771bdb1749cca9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21570-rce-remote-code-execution-in-atlass-f80a393b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21570%3A%20RCE%20(Remote%20Code%20Execution)%20in%20Atlassian%20Bamboo%20Data%20Center&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25534-cwe-918-server-side-request-forgery-618622b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25534%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20io.spinnaker.clouddriver%20clouddriver-artifacts&amp;severity=critical&amp;id=69b992ba771bdb1749c53e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32298-cwe-78-improper-neutralization-of-s-126d8a3d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32298%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ANGEET%20ES3%20KVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32297-cwe-306-missing-authentication-for--72cb42a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32297%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ANGEET%20ES3%20KVM&amp;severity=critical&amp;id=69b992ba771bdb1749c53e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32296-cwe-306-missing-authentication-for--85524cc6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32296%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Sipeed%20NanoKVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32293-cwe-295-improper-certificate-valida-f28092a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32293%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20GL-iNet%20Comet%20KVM&amp;severity=low&amp;id=69b992ba771bdb1749c53e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32292-cwe-307-improper-restriction-of-exc-7d4b6f55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32292%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20GL-iNet%20Comet%20KVM&amp;severity=critical&amp;id=69b992ba771bdb1749c53e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32291-cwe-306-missing-authentication-for--185e1423</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32291%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20GL-iNet%20Comet%20KVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32290-cwe-345-insufficient-verification-o-e7ed7343</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32290%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20GL-iNet%20Comet%20KVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4319-sql-injection-in-code-projects-simpl-7d8938bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4319%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69b98f36771bdb1749c45e0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4148-cwe-416-use-after-free-in-mongodb-in-c2315488</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4148%3A%20CWE-416%20Use%20after%20free%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4147-cwe-457-use-of-uninitialized-variabl-286bf321</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4147%3A%20CWE-457%20Use%20of%20uninitialized%20variable%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-companies-house-exposed-details-of-millions-of--23f1964d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Companies%20House%20Exposed%20Details%20of%20Millions%20of%20Firms&amp;severity=medium&amp;id=69b97666771bdb1749bd173a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21886-cwe-285-improper-authorization-in-o-93d93ba5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21886%3A%20CWE-285%3A%20Improper%20Authorization%20in%20OpenCTI-Platform%20opencti&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23759-cwe-78-improper-neutralization-of-s-623ecb96</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23759%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Perle%20Systems%20IOLAN%20STS&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-botnet-exposed-via-open-directory-15-node--998fdeec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Botnet%20Exposed%20via%20Open%20Directory%3A%2015-Node%20Relay%20Network%20and%20Active%20C2&amp;severity=medium&amp;id=69b9ab21771bdb1749cfc092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4318-buffer-overflow-in-utt-hiper-810g-ec790824</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4318%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69b96f91771bdb1749ba8fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3564-cwe-347-improper-verification-of-cry-bef713bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3564%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ConnectWise%20ScreenConnect&amp;severity=critical&amp;id=69b96f91771bdb1749ba8fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13406-cwe-476-null-pointer-dereference-in-1d82e42d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13406%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Softing%20smartLink%20SW-HT&amp;severity=medium&amp;id=69b9688b771bdb1749b843f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3888-cwe-268-privilege-chaining-eecd8b2c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3888%3A%20CWE-268%20Privilege%20chaining&amp;severity=high&amp;id=69b96182771bdb1749b5a60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4324-improper-neutralization-of-special-e-98fe071b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4324%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.17%20for%20RHEL%209&amp;severity=medium&amp;id=69b96182771bdb1749b5a60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/robotic-surgery-giant-intuitive-discloses-cyberatt-4fdbff55</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Robotic%20Surgery%20Giant%20Intuitive%20Discloses%20Cyberattack&amp;severity=medium&amp;id=69b95a46771bdb1749b2c340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/174-vulnerabilities-targeted-by-rondodox-botnet-bc9d0c8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=174%20Vulnerabilities%20Targeted%20by%20RondoDox%20Botnet&amp;severity=medium&amp;id=69b94c36771bdb1749acf1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62320-cwe-79-improper-neutralization-of-i-2b1a260a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62320%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20HCL%20Sametime&amp;severity=medium&amp;id=69b948e6771bdb1749ab9e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ipv4-mapped-ipv6-addresses-tue-mar-17th-d7adc16f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IPv4%20Mapped%20IPv6%20Addresses%2C%20(Tue%2C%20Mar%2017th)&amp;severity=medium&amp;id=69b93e26771bdb1749a50eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31966-cwe-20-improper-input-validation-in-92f29c54</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31966%3A%20CWE-20%20Improper%20input%20validation%20in%20HCL%20Sametime&amp;severity=low&amp;id=69b93e6f771bdb1749a53234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4271-use-after-free-in-red-hat-red-hat-en-295694a0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4271%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b93ad5771bdb1749a35140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hydra-saiga-covert-espionage-and-infiltration-of-c-bebbdde9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hydra%20Saiga%3A%20Covert%20Espionage%20and%20Infiltration%20of%20Critical%20Utilities&amp;severity=medium&amp;id=69b9371d771bdb17499ff040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-backdoor-targeting-ukrainian-entities-with-pos-73165a5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20backdoor%20targeting%20Ukrainian%20entities%20with%20possible%20links%20to%20Laundry%20Bear&amp;severity=medium&amp;id=69b93aa1771bdb1749a33193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-slopoly-start-to-ai-enhanced-ransomware-attacks-1c535291</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Slopoly%20start%20to%20AI-enhanced%20ransomware%20attacks&amp;severity=medium&amp;id=69b93aa1771bdb1749a3316b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-year-old-wing-ftp-vulnerability-as-expl-5d2349a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Year-Old%20Wing%20FTP%20Vulnerability%20as%20Exploited&amp;severity=medium&amp;id=69b9339a771bdb17499dd609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/endgame-harvesting-inside-acrstealers-modern-infra-956f280d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Endgame%20Harvesting%3A%20Inside%20ACRStealer&apos;s%20Modern%20Infrastructure&amp;severity=medium&amp;id=69b93aa1771bdb1749a33163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28563-cwe-732-incorrect-permission-assign-799b8643</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28563%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69b93751771bdb1749a0201b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26929-cwe-732-incorrect-permission-assign-fb1d7d04</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26929%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69b93751771bdb1749a02016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30911-cwe-862-missing-authorization-in-ap-4e7a9ef7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30911%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69b93751771bdb1749a0201f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-apis-and-ddos-collide-in-new-era-of-coordinated-b3ee374b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%2C%20APIs%20and%20DDoS%20Collide%20in%20New%20Era%20of%20Coordinated%20Cyberattacks&amp;severity=medium&amp;id=69b93017771bdb17499c4735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28779-cwe-668-exposure-of-resource-to-wro-1025f596</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28779%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69b92cc9771bdb17499ac8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3633-improper-neutralization-of-crlf-sequ-26894e87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3633%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69b95372771bdb1749b00bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3632-improper-validation-of-syntactic-cor-2a317359</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3632%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69b95372771bdb1749b00bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3634-improper-neutralization-of-crlf-sequ-4222e252</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3634%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69b99a3b771bdb1749cb0cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacked-sites-deliver-vidar-infostealer-to-windows--2b7c4a7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacked%20sites%20deliver%20Vidar%20infostealer%20to%20Windows%20users&amp;severity=medium&amp;id=69b91afd771bdb17498f40cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4208-cwe-639-in-typo3-extension-e-mail-mf-74236ea3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4208%3A%20CWE-639%20in%20TYPO3%20Extension%20%22E-Mail%20MFA%20Provider%22&amp;severity=high&amp;id=69b917ad771bdb17498cd9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4202-cwe-862-in-typo3-extension-redirect--04ee806f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4202%3A%20CWE-862%20in%20TYPO3%20Extension%20%22Redirect%20Tabs%22&amp;severity=low&amp;id=69b917ad771bdb17498cd9da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1323-cwe-502-deserialization-of-untrusted-3f51a0d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1323%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20TYPO3%20Extension%20%22Mailqueue%22&amp;severity=medium&amp;id=69b917ad771bdb17498cd9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32586-cwe-862-missing-authorization-in-pl-b291f66c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32586%3A%20Missing%20Authorization%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=69b9142a771bdb17498971f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4312-cwe-306-missing-authentication-for-c-6cd3271e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4312%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20DrangSoft%20GCB%2FFCB%20Audit%20Software&amp;severity=critical&amp;id=69b90619771bdb17497bdc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3237-low-privilege-user-can-modify-global-3a86964d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3237%3A%20Low-Privilege%20User%20Can%20Modify%20Global%20Signing%20Key%20Settings%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=low&amp;id=69b8ff11771bdb174976d616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4258-improper-verification-of-cryptograph-603f7543</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4258%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20sjcl&amp;severity=high&amp;id=69b8e675771bdb17495b6829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4308-server-side-request-forgery-in-frdel-ed62dd56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4308%3A%20Server-Side%20Request%20Forgery%20in%20frdel%20agent-zero&amp;severity=medium&amp;id=69b8d4e1771bdb17492801c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2373-cwe-862-missing-authorization-in-wpr-b6b21bec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2373%3A%20CWE-862%20Missing%20Authorization%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69b8d4e1771bdb17492801b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4307-path-traversal-in-frdel-agent-zero-cefe85ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4307%3A%20Path%20Traversal%20in%20frdel%20agent-zero&amp;severity=medium&amp;id=69b8d4e1771bdb17492801bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2579-cwe-89-improper-neutralization-of-sp-b6d47505</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2579%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpxpo%20WowStore%20%E2%80%93%20Store%20Builder%20%26%20Product%20Blocks%20for%20WooCommerce&amp;severity=high&amp;id=69b99a3b771bdb1749cb0ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4289-sql-injection-in-tiandy-easy7-integr-ae21908d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4289%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4288-sql-injection-in-tiandy-easy7-integr-06ab2258</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4288%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-17-e13fec01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-17&amp;severity=medium&amp;id=69b9edea771bdb1749ee41fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-17-2ec304ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-17&amp;severity=medium&amp;id=69b9dfdb771bdb1749e025a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30707-na-821062bf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30707%3A%20n%2Fa&amp;severity=high&amp;id=69b9aedc771bdb1749d151f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-17-ef279015</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-17&amp;severity=low&amp;id=69b94fb7771bdb1749ae96c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4287-sql-injection-in-tiandy-easy7-integr-93aff348</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4287%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b8991d771bdb17496c94d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4285-path-traversal-in-taoofagi-easegen-a-f6a4578b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4285%3A%20Path%20Traversal%20in%20taoofagi%20easegen-admin&amp;severity=medium&amp;id=69b895a6771bdb17496b6f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iocs-indicators-of-compromise-for-the-coruna-ios-i-77074cb0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IoCs%20(Indicators%20of%20Compromise)%20for%20the%20Coruna%20iOS%20iPhone%20Web%20Malware%20Client%20Side%20Exploits%20Serving%20Web%20Malware%20Exploitation%20Kit&amp;severity=medium&amp;id=69b8a719771bdb1749884ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4284-server-side-request-forgery-in-taoof-abfaecba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4284%3A%20Server-Side%20Request%20Forgery%20in%20taoofagi%20easegen-admin&amp;severity=medium&amp;id=69b88e92771bdb17496901d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4177-cwe-122-heap-based-buffer-overflow-i-afb533fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4177%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TODDR%20YAML%3A%3ASyck&amp;severity=critical&amp;id=69b96182771bdb1749b5a612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21991-a-dtrace-component-dtprobed-allows--d5010724</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21991%3A%20A%20DTrace%20component%2C%20dtprobed%2C%20allows%20arbitrary%20file%20creation%20through%20crafted%20USDT%20provider%20names.%20in%20Oracle%20Corporation%20Oracle%20Linux&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29522-cwe-22-improper-limitation-of-a-pat-de2651fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29522%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ZwickRoell%20GmbH%20%26%20Co.%20KG%20Test%20Data%20Management&amp;severity=high&amp;id=69b86eef771bdb1749567832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30882-cwe-79-improper-neutralization-of-i-1bcc0b7d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30882%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69b860dd771bdb17494840b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30881-cwe-89-improper-neutralization-of-s-35a3f971</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30881%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69b859da771bdb17492b2d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30876-cwe-204-observable-response-discrep-5062e6d7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30876%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69b859da771bdb17492b2d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30875-cwe-94-improper-control-of-generati-e8036721</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30875%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69b859da771bdb17492b2d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28430-cwe-89-improper-neutralization-of-s-36133b16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28430%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69b859da771bdb17492b2d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29516-cwe-732-incorrect-permission-assign-d2fa831b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29516%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Buffalo%20TeraStation%20NAS%20TS5400R&amp;severity=medium&amp;id=69b859da771bdb17492b2d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32267-cwe-863-incorrect-authorization-in--65bf3522</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32267%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20craftcms%20cms&amp;severity=high&amp;id=69b859da771bdb17492b2db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32264-cwe-470-use-of-externally-controlle-86230fad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32264%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b859da771bdb17492b2dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32263-cwe-470-use-of-externally-controlle-1ff05d12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32263%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b859da771bdb17492b2da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32262-cwe-22-improper-limitation-of-a-pat-86adf377</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32262%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69b859da771bdb17492b2da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32261-cwe-1336-improper-neutralization-of-a2ec3f2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32261%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20webhooks&amp;severity=high&amp;id=69b852cf771bdb174922885d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69196-cwe-863-incorrect-authorization-in--28778044</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69196%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20jlowin%20fastmcp&amp;severity=high&amp;id=69b84f4b771bdb17491f5f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4269-cwe-340-generation-of-predictable-nu-fb138d24</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4269%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20AWS%20Bedrock%20AgentCore%20Starter%20Toolkit&amp;severity=high&amp;id=69b84a02771bdb1749186945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4224-vulnerability-in-python-software-fou-801a81ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4224%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69b84a02771bdb174918693d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3644-vulnerability-in-python-software-fou-f654c911</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3644%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69b84a02771bdb174918694f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4254-stack-based-buffer-overflow-in-tenda-501e8b3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4254%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=critical&amp;id=69b84a02771bdb174918695c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23862-cwe-77-improper-neutralization-of-s-596c049d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23862%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20ThinOS%2010&amp;severity=high&amp;id=69b84a02771bdb1749186949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23489-cwe-20-improper-input-validation-in-9483a14f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23489%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pluginsGLPI%20fields&amp;severity=critical&amp;id=69b83bfc9d4df4518377219e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4253-os-command-injection-in-tenda-ac8-dda13ebe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4253%3A%20OS%20Command%20Injection%20in%20Tenda%20AC8&amp;severity=medium&amp;id=69b83bfc9d4df451837721b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29510-cwe-79-improper-neutralization-of-i-09a1b43e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29510%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29513-cwe-79-improper-neutralization-of-i-f7867d3d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29513%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29520-cwe-79-improper-neutralization-of-i-b64081a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29520%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29521-cwe-352-cross-site-request-forgery--51f9174d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29521%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4252-reliance-on-ip-address-for-authentic-a9de4650</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4252%3A%20Reliance%20on%20IP%20Address%20for%20Authentication%20in%20Tenda%20AC8&amp;severity=critical&amp;id=69b834f39d4df4518372fd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4270-cwe-424-improper-protection-of-alter-47f937dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4270%3A%20CWE-424%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20AWS%20AWS%20API%20MCP%20Server&amp;severity=medium&amp;id=69b8316f9d4df4518370fea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4251-unprotected-storage-of-credentials-i-283d0ba5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4251%3A%20Unprotected%20Storage%20of%20Credentials%20in%20CityData%20CityChat&amp;severity=low&amp;id=69b8316f9d4df4518370fea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-ebs-hack-only-4-corporate-giants-still-sile-f1281a4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20EBS%20Hack%3A%20Only%204%20Corporate%20Giants%20Still%20Silent%20on%20Potential%20Impact&amp;severity=medium&amp;id=69b826b09d4df451836ba889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4250-unprotected-storage-of-credentials-i-16e58c2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4250%3A%20Unprotected%20Storage%20of%20Credentials%20in%20Albert%20Sa%C4%9Fl%C4%B1k%20Hizmetleri%20ve%20Ticaret%20Albert%20Health&amp;severity=low&amp;id=69b84a02771bdb1749186969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4276-cwe-20-improper-input-validation-in--25cdf739</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4276%3A%20CWE-20%20Improper%20Input%20Validation%20in%20LibreChat%20RAG%20API&amp;severity=high&amp;id=69b8316f9d4df4518370feb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62319-cwe-89-improper-neutralization-of-s-e743fbfb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62319%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20HCL%20Unica&amp;severity=critical&amp;id=69b84a02771bdb1749186966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32587-cwe-862-missing-authorization-in-sa-b875c90e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32587%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20WP%20EasyPay&amp;severity=medium&amp;id=69b82a679d4df451836d9f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covert-rat-phishing-campaign-78be4171</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=COVERT%20RAT%3A%20Phishing%20Campaign&amp;severity=medium&amp;id=69b84937771bdb1749174e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gopix-banking-trojan-targeting-brazilian-financial-e4520c26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoPix%20banking%20Trojan%20targeting%20Brazilian%20financial%20institutions&amp;severity=medium&amp;id=69b84bd2771bdb17491b7596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-ai-hallucinations-turn-fatal-how-to-stay-grou-32659fc4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20AI%20hallucinations%20turn%20fatal%3A%20how%20to%20stay%20grounded%20in%20reality%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b820159d4df4518368ef91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32583-cwe-862-missing-authorization-in-we-e193183a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32583%3A%20CWE-862%20Missing%20Authorization%20in%20Webnus%20Inc.%20Modern%20Events%20Calendar&amp;severity=medium&amp;id=69b84a02771bdb174918694c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/16th-march-threat-intelligence-report-4bbef5d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=16th%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69b8200e9d4df4518368ee85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4243-unprotected-storage-of-credentials-i-1cba1252</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4243%3A%20Unprotected%20Storage%20of%20Credentials%20in%20La%20Nacion%20App&amp;severity=low&amp;id=69b84a03771bdb1749186ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2274-cwe-79-improper-neutralization-of-in-84affa94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2274%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Forcepoint%20Web%20Security%20(On-Prem)&amp;severity=medium&amp;id=69b84a03771bdb1749186ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52642-vulnerability-in-hcl-aion-2fa9faee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52642%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b84a03771bdb1749186ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52646-vulnerability-in-hcl-aion-de4338ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52646%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b84a03771bdb1749186add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-firm-executive-targeted-in-sophisticated--5b7b2a9f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Firm%20Executive%20Targeted%20in%20Sophisticated%20Phishing%20Attack&amp;severity=medium&amp;id=69b8189f9d4df451836392af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52645-vulnerability-in-hcl-aion-65575b34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52645%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b84a03771bdb1749186ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52649-vulnerability-in-hcl-aion-0c892b9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52649%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b818e49d4df4518363a2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4242-unprotected-storage-of-credentials-i-626d3672</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4242%3A%20Unprotected%20Storage%20of%20Credentials%20in%20BabyChakra%20Pregnancy%20%26%20Parenting%20App&amp;severity=low&amp;id=69b818e49d4df4518363a2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52644-vulnerability-in-hcl-aion-d7b212a1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52644%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b818e49d4df4518363a2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52643-vulnerability-in-hcl-aion-ed82191c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52643%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b818e49d4df4518363a2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52636-vulnerability-in-hcl-aion-eb617ebe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52636%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b818e49d4df4518363a2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25369-cwe-79-improper-neutralization-of-i-14cd5f30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25369%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexmls%20Flexmls%C2%AE%20IDX&amp;severity=high&amp;id=69b818e49d4df4518363a2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4241-sql-injection-in-itsourcecode-colleg-d3050c33</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4241%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69b818e49d4df4518363a30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proxy-url-scans-with-ip-addresses-mon-mar-16th-c643cc2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2Fproxy%2F%20URL%20scans%20with%20IP%20addresses%2C%20(Mon%2C%20Mar%2016th)&amp;severity=medium&amp;id=69b80a8f9d4df451835f7661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4240-denial-of-service-in-open5gs-6a8519b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4240%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69b818e49d4df4518363a301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10461-cwe-20-improper-input-validation-in-97b28249</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10461%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Softing%20smartLink%20SW-HT&amp;severity=medium&amp;id=69b8073f9d4df451835e8b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10685-cwe-122-heap-based-buffer-overflow--75669fe2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10685%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Softing%20smartLink%20SW-PN&amp;severity=high&amp;id=69b8073f9d4df451835e8b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4239-improperly-controlled-modification-o-027708a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4239%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20Lagom%20WHMCS%20Template&amp;severity=medium&amp;id=69b8073f9d4df451835e8b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52648-vulnerability-in-hcl-aion-ac473d72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52648%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b800489d4df451835c3dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-hit-asian-militaries-in-patie-149f8505</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Hit%20Asian%20Militaries%20in%20Patient%20Espionage%20Operation&amp;severity=medium&amp;id=69b800039d4df451835c3061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52638-vulnerability-in-hcl-aion-8685d6f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52638%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b800489d4df451835c3deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4238-sql-injection-in-itsourcecode-colleg-f8d11167</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4238%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69b7f94a9d4df45183593df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-targeting-vpn-users-in-new-credential-3b4bb8bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Targeting%20VPN%20Users%20in%20New%20Credential%20Theft%20Campaign&amp;severity=medium&amp;id=69b7f8fb9d4df45183592dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52637-vulnerability-in-hcl-aion-8b430d7c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52637%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b7f94a9d4df45183593df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4237-sql-injection-in-itsourcecode-free-h-77ceda32</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4237%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69b7f5ac9d4df45183583c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/forcememo-python-repositories-compromised-in-glass-95b214ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ForceMemo%3A%20Python%20Repositories%20Compromised%20in%20GlassWorm%20Aftermath&amp;severity=medium&amp;id=69b7f1f59d4df45183566d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3476-cwe-94-improper-control-of-generatio-12313441</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3476%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20Desktop&amp;severity=high&amp;id=69b7f2399d4df4518356864e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4236-sql-injection-in-itsourcecode-online-f9dbc71d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4236%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69b84a03771bdb1749186ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4235-sql-injection-in-itsourcecode-online-b710fa80</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4235%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69b7e79a9d4df45183527dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/web-shells-tunnels-and-ransomware-dissecting-a-war-60be0a41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Web%20Shells%2C%20Tunnels%2C%20and%20Ransomware%3A%20Dissecting%20a%20Warlock%20Attack&amp;severity=medium&amp;id=69b8529a771bdb1749224218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maas-vipkeylogger-campaign-62b90e30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MAAS%20VIP_Keylogger%20Campaign&amp;severity=medium&amp;id=69b7e3e19d4df45183505ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15554-cwe-525-use-of-web-browser-cache-co-e8f7211f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15554%3A%20CWE-525%20Use%20of%20web%20browser%20cache%20containing%20sensitive%20information%20in%20Truesec%20LAPSWebUI&amp;severity=medium&amp;id=69b7e4169d4df451835079ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15553-cwe-613-insufficient-session-expira-9c9413c3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15553%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20Truesec%20LAPSWebUI&amp;severity=medium&amp;id=69b7e4169d4df451835079c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15552-cwe-613-insufficient-session-expira-6d752576</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15552%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20Truesec%20LAPSWebUI&amp;severity=medium&amp;id=69b7e4169d4df451835079c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4234-sql-injection-in-sscms-de760972</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4234%3A%20SQL%20Injection%20in%20SSCMS&amp;severity=medium&amp;id=69b7e4169d4df451835079cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigating-a-new-click-fix-variant-2fbb75b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigating%20a%20new%20Click-fix%20variant&amp;severity=medium&amp;id=69b7e3e19d4df45183505ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-camelclone-multi-region-espionage-campai-046fce4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20CamelClone%3A%20Multi-Region%20Espionage%20Campaign%20Targets%20Government%20and%20Defense%20Entities%20Amidst%20Regional%20Tensions&amp;severity=medium&amp;id=69b7e05e9d4df451834e770f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-nexus-threat-actor-targets-persian-gulf-regi-90bc51f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-nexus%20Threat%20Actor%20Targets%20Persian%20Gulf%20Region%20With%20PlugX&amp;severity=medium&amp;id=69b7e05e9d4df451834e7746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-2561-uses-seo-poisoning-to-distribute-fake-v-c8e82c49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-2561%20uses%20SEO%20poisoning%20to%20distribute%20fake%20VPN%20clients%20for%20credential%20theft&amp;severity=medium&amp;id=69b7e05e9d4df451834e7765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/handala-hack-unveiling-groups-modus-operandi-18c33a2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Handala%20Hack%22%20-%20Unveiling%20Group&apos;s%20Modus%20Operandi&amp;severity=medium&amp;id=69b7dcda9d4df451834d1c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishers-hide-scam-links-with-ipv6-trick-in-free-t-c357d956</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishers%20hide%20scam%20links%20with%20IPv6%20trick%20in%20&apos;free%20toothbrush&apos;%20emails&amp;severity=medium&amp;id=69b7dcda9d4df451834d1c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3024-cwe-79-improper-neutralization-of-in-84fc643b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3024%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=medium&amp;id=69b8073f9d4df451835e8b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3023-cwe-943-improper-neutralization-of-s-0133fd93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3023%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=medium&amp;id=69b8073f9d4df451835e8b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3022-cwe-943-improper-neutralization-of-s-a0c7d77b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3022%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=high&amp;id=69b84a03771bdb1749186ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3021-cwe-943-improper-neutralization-of-s-fb751ce2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3021%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=high&amp;id=69b84a03771bdb1749186ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3020-cwe-639-authorization-bypass-through-ef6ac061</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3020%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=high&amp;id=69b84a03771bdb1749186acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4233-path-traversal-in-thingsgateway-9caba6cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4233%3A%20Path%20Traversal%20in%20ThingsGateway&amp;severity=medium&amp;id=69b8316f9d4df4518370feac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3111-cwe-284-improper-access-control-in-e-4e65eb21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3111%3A%20CWE-284%20Improper%20Access%20Control%20in%20Educativa%20Campus&amp;severity=medium&amp;id=69b84a05771bdb1749186bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3110-cwe-284-improper-access-control-in-e-26eaccd0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3110%3A%20CWE-284%20Improper%20Access%20Control%20in%20Educativa%20Campus&amp;severity=high&amp;id=69b84a03771bdb1749186af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4232-sql-injection-in-tiandy-integrated-m-54116443</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4232%3A%20SQL%20Injection%20in%20Tiandy%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7d6069d4df45183495a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11500-cwe-261-weak-encoding-for-password--70649efc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11500%3A%20CWE-261%20Weak%20Encoding%20for%20Password%20in%20tinycontrol%20Lan%20Kontroler%20v3.5&amp;severity=high&amp;id=69b7d6069d4df45183495a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15587-cwe-425-direct-request-forced-brows-8a07be74</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15587%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20tinycontrol%20Lan%20Kontroler%20v3.5&amp;severity=high&amp;id=69b7d6069d4df45183495a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4231-server-side-request-forgery-in-vanna-0c884c83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4231%3A%20Server-Side%20Request%20Forgery%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69b7d6069d4df45183495a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-attempt-reported-at-polands-nuclear-resear-c106b6db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20Attempt%20Reported%20at%20Poland%E2%80%99s%20Nuclear%20Research%20Center&amp;severity=medium&amp;id=69b7c7c39d4df451833df70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4230-sql-injection-in-vanna-ai-vanna-d326f237</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4230%3A%20SQL%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69b7c4789d4df451833a5b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4229-sql-injection-in-vanna-ai-vanna-f50509b5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4229%3A%20SQL%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69b7c4789d4df451833a5b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4228-command-injection-in-lb-link-bl-wr90-96738fe4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4228%3A%20Command%20Injection%20in%20LB-LINK%20BL-WR9000&amp;severity=medium&amp;id=69b7bd6a9d4df45183343b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4227-buffer-overflow-in-lb-link-bl-wr9000-4695df8e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4227%3A%20Buffer%20Overflow%20in%20LB-LINK%20BL-WR9000&amp;severity=high&amp;id=69b7bd6a9d4df45183343b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4226-stack-based-buffer-overflow-in-lb-li-1aa90b19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4226%3A%20Stack-based%20Buffer%20Overflow%20in%20LB-LINK%20BL-WR9000&amp;severity=high&amp;id=69b7c1479d4df451833752d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4225-cross-site-scripting-in-cms-made-sim-fb8a5324</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4225%3A%20Cross%20Site%20Scripting%20in%20CMS%20Made%20Simple&amp;severity=medium&amp;id=69b7c1479d4df451833752cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4255-cwe-829-inclusion-of-functionality-f-64ab002d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4255%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20thermalright%20TR-VISION%20HOME&amp;severity=high&amp;id=69b7af5b9d4df4518329b048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32778-cwe-476-null-pointer-dereference-in-bd1cfa53</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32778%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=69b7af5b9d4df4518329b03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4223-sql-injection-in-itsourcecode-payrol-f7fd3546</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4223%3A%20SQL%20Injection%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69b7af5b9d4df4518329b041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32777-cwe-835-loop-with-unreachable-exit--d8732131</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32777%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20libexpat%20project%20libexpat&amp;severity=medium&amp;id=69b7af5b9d4df4518329b037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32776-cwe-476-null-pointer-dereference-in-7a031374</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32776%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20libexpat%20project%20libexpat&amp;severity=medium&amp;id=69b7af5b9d4df4518329b033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25083-missing-authorization-in-growi-inc--8bfd0964</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25083%3A%20Missing%20authorization%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=high&amp;id=69b7af5b9d4df4518329b02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4222-path-traversal-in-sscms-6eb6cec9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4222%3A%20Path%20Traversal%20in%20SSCMS&amp;severity=medium&amp;id=69b7a8549d4df4518325f337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4221-unrestricted-upload-in-tiandy-easy7--730344dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4221%3A%20Unrestricted%20Upload%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7a8549d4df4518325f331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32775-cwe-191-integer-underflow-wrap-or-w-3ea2e343</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32775%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20libexif%20project%20libexif&amp;severity=high&amp;id=69dbe51682d89c981fa14167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4220-unrestricted-upload-in-technologies--184c105f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4220%3A%20Unrestricted%20Upload%20in%20Technologies%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7a8549d4df4518325f32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4219-hard-coded-credentials-in-index-conf-0c602181</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4219%3A%20Hard-coded%20Credentials%20in%20INDEX%20Conferences%20%26%20Exhibitions%20Organization%20YWF%20BPOF%20APGCS%20App&amp;severity=medium&amp;id=69b7a8549d4df4518325f325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4218-information-disclosure-in-myaedes-ap-e4a157bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4218%3A%20Information%20Disclosure%20in%20myAEDES%20App&amp;severity=low&amp;id=69b79ecc9d4df451831f7147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31386-improper-neutralization-of-special--9aa4ef0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31386%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LiteSpeed%20Technologies%20OpenLiteSpeed&amp;severity=high&amp;id=69b796c19d4df451831b8462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4217-key-management-error-in-xreal-nebula-2089e6f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4217%3A%20Unprotected%20Storage%20of%20Credentials%20in%20XREAL%20Nebula%20App&amp;severity=low&amp;id=69b796c19d4df451831b846d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4216-hard-coded-credentials-in-i-sens-sma-30d479c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4216%3A%20Hard-coded%20Credentials%20in%20i-SENS%20SmartLog%20App&amp;severity=medium&amp;id=69b796c19d4df451831b8467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21005-cwe-22-improper-limitation-of-a-pat-3e867367</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21005%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(%26%2339%3BPath%20Traversal%26%2339%3B)%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c359d4df4518315ee9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21004-cwe-287-improper-authentication-in--b29f3ccc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21004%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=69b78c359d4df4518315ee9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4215-server-side-request-forgery-in-flowc-146eba46</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4215%3A%20Server-Side%20Request%20Forgery%20in%20FlowCI%20flow-core-x&amp;severity=medium&amp;id=69b78c359d4df4518315eeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21002-cwe-347-improper-verification-of-cr-3a79b2e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21002%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=69b78c359d4df4518315ee98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4214-stack-based-buffer-overflow-in-d-lin-5afe7392</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4214%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b78c359d4df4518315eeaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21001-cwe-35-path-traversal-in-samsung-mo-756e512d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21001%3A%20CWE-35%3A%20Path%20Traversal%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=69b78c359d4df4518315ee95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21000-cwe-284-improper-access-control-in--8c6fbad1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21000%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=high&amp;id=69b78c359d4df4518315ee92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20999-cwe-294-authentication-bypass-by-re-a52b7f65</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20999%3A%20CWE-294%20-%20Authentication%20Bypass%20by%20Replay%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c359d4df4518315ee8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20998-cwe-287-improper-authentication-in--725ff812</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20998%3A%20CWE-287%20-%20Improper%20Authentication%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c359d4df4518315ee8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20997-cwe-347-improper-verification-of-cr-1bb3868e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20997%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=69b78c339d4df4518315ee12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20996-cwe-327-use-of-a-broken-or-risky-cr-af2f35f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20996%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c339d4df4518315ee0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20995-cwe-200-exposure-of-sensitive-infor-f4b85c12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20995%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=69b78c339d4df4518315ee0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20994-cwe-601-url-redirection-to-untruste-392c7409</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20994%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(%26%2339%3BOpen%20Redirect%26%2339%3B)%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=high&amp;id=69b78c339d4df4518315ee09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20993-cwe-926-improper-export-of-android--cdf26a4d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20993%3A%20CWE-926%20%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Assistant&amp;severity=medium&amp;id=69b78c339d4df4518315ee06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20992-cwe-285-improper-authorization-in-s-28f63449</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20992%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315ee03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20991-cwe-269-improper-privilege-manageme-789aa04d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20991%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315ee00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20990-cwe-926-improper-export-of-android--139f9df1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20990%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69b78c339d4df4518315edfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20989-cwe-347-improper-verification-of-cr-0138dde6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20989%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315edfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20988-cwe-925-improper-verification-of-in-ab79f070</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20988%3A%20CWE-925%20%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315edf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4213-stack-based-buffer-overflow-in-d-lin-87c01e3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4213%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b78c359d4df4518315eea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4212-stack-based-buffer-overflow-in-d-lin-423aef88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4212%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b77e229d4df45183f020d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4211-stack-based-buffer-overflow-in-d-lin-0a1f49a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4211%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b77e229d4df45183f020cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4210-command-injection-in-d-link-dns-120-af98b267</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4210%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b77e229d4df45183f020c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4209-command-injection-in-d-link-dns-120-7d0fc20f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4209%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b77e229d4df45183f020b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4207-command-injection-in-d-link-dns-120-f37b1a52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4207%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b77e229d4df45183f020a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4206-command-injection-in-d-link-dns-120-65477eea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4206%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b76c8f9d4df45183da5ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-march-16th-2026-httpsiscs-72e69648</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20March%2016th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9850%2C%20(Mon%2C%20Mar%2016th)&amp;severity=medium&amp;id=69b765529d4df45183d1e2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4205-command-injection-in-d-link-dns-120-1782b85d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4205%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b762029d4df45183c8a8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4204-command-injection-in-d-link-dns-120-ebd2c6f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4204%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b762029d4df45183c8a8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4203-command-injection-in-d-link-dns-120-d99c6b55</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4203%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b762029d4df45183c8a8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4201-unrestricted-upload-in-glowxq-glowxq-224c8b75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4201%3A%20Unrestricted%20Upload%20in%20glowxq%20glowxq-oj&amp;severity=medium&amp;id=69b757769d4df45183ae649a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4200-server-side-request-forgery-in-glowx-4505f74b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4200%3A%20Server-Side%20Request%20Forgery%20in%20glowxq%20glowxq-oj&amp;severity=medium&amp;id=69b7c1479d4df451833752e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4199-command-injection-in-bazinga012-mcpc-577e7fdd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4199%3A%20Command%20Injection%20in%20bazinga012%20mcp_code_executor&amp;severity=medium&amp;id=69b7c1479d4df451833752d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-16-2b9e1ab1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-16&amp;severity=medium&amp;id=69b89c6a771bdb17496e1b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69902-na-285ff70a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69902%3A%20n%2Fa&amp;severity=critical&amp;id=69b86eef771bdb174956782c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50881-na-5ae0b55c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50881%3A%20n%2Fa&amp;severity=high&amp;id=69b867e7771bdb17494e9bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68971-na-bb07e2a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68971%3A%20n%2Fa&amp;severity=medium&amp;id=69b8648d771bdb17494b0d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69693-na-1c752da6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69693%3A%20n%2Fa&amp;severity=medium&amp;id=69b859da771bdb17492b2d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69809-na-431ba23d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69809%3A%20n%2Fa&amp;severity=critical&amp;id=69b852cf771bdb1749228859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69808-na-ee6b7db8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69808%3A%20n%2Fa&amp;severity=critical&amp;id=69b852cf771bdb1749228855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69727-na-a25b3bc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69727%3A%20n%2Fa&amp;severity=medium&amp;id=69b84f4b771bdb17491f5f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57543-na-c23cf64e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57543%3A%20n%2Fa&amp;severity=medium&amp;id=69b84a02771bdb1749186963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69768-na-d4afeab5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69768%3A%20n%2Fa&amp;severity=high&amp;id=69b84a02771bdb1749186957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66687-na-bffe2a7f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66687%3A%20n%2Fa&amp;severity=high&amp;id=69b83bfc9d4df4518377219a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65734-na-11ff5127</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65734%3A%20n%2Fa&amp;severity=medium&amp;id=69b834f39d4df4518372fd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30405-na-47c1317e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30405%3A%20n%2Fa&amp;severity=high&amp;id=69b8316f9d4df4518370fe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-16-a2ad58b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-16&amp;severity=medium&amp;id=69b831389d4df451837030f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69784-na-7ea76be7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69784%3A%20n%2Fa&amp;severity=high&amp;id=69b82a679d4df451836d9f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69783-na-b19d29eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69783%3A%20n%2Fa&amp;severity=high&amp;id=69b82a679d4df451836d9f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-16-ee2f10f7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-16&amp;severity=low&amp;id=69b7a1159d4df4518320e4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4198-command-injection-in-hypermodel-labs-54b14dd8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4198%3A%20Command%20Injection%20in%20hypermodel-labs%20mcp-server-auto-commit&amp;severity=medium&amp;id=69b745e29d4df451838ed4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4197-command-injection-in-d-link-dns-120-3ef2e999</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4197%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b745e29d4df451838ed4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4196-command-injection-in-d-link-dns-120-f9eb82fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4196%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b745e29d4df451838ed4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4195-command-injection-in-d-link-dns-120-0f05e6b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4195%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b73b569d4df45183888209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4194-improper-access-controls-in-d-link-d-75e423f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4194%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b73b569d4df45183888202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4193-improper-access-controls-in-d-link-d-86e0555a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4193%3A%20Improper%20Access%20Controls%20in%20D-Link%20DIR-823G&amp;severity=medium&amp;id=69b73b569d4df451838881f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4192-command-injection-in-avinashbole-qui-2518a2fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4192%3A%20Command%20Injection%20in%20AvinashBole%20quip-mcp-server&amp;severity=medium&amp;id=69b71bb39d4df451836c6ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4191-unrestricted-upload-in-jawherkl-node-89ece630</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4191%3A%20Unrestricted%20Upload%20in%20JawherKl%20node-api-postgres&amp;severity=medium&amp;id=69b7c1479d4df451833752e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4190-sql-injection-in-jawherkl-node-api-p-a54029ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4190%3A%20SQL%20Injection%20in%20JawherKl%20node-api-postgres&amp;severity=medium&amp;id=69b70a219d4df451835b4b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4189-sql-injection-in-phpipam-ff9d192d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4189%3A%20SQL%20Injection%20in%20phpipam&amp;severity=medium&amp;id=69b70a219d4df451835b4b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4188-stack-based-buffer-overflow-in-d-lin-4643e6f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4188%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=69b70a219d4df451835b4b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4187-missing-authentication-in-tiandy-eas-d0083b25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4187%3A%20Missing%20Authentication%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7069a9d4df451835804bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4186-cross-site-scripting-in-ueditor-9903830f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4186%3A%20Cross%20Site%20Scripting%20in%20UEditor&amp;severity=medium&amp;id=69b7069a9d4df451835804b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4185-stack-based-buffer-overflow-in-gpac-3793df76</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4185%3A%20Stack-based%20Buffer%20Overflow%20in%20GPAC&amp;severity=medium&amp;id=69b7c1479d4df451833752ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4184-stack-based-buffer-overflow-in-d-lin-8b4d54d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4184%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b6f1829d4df45183499980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4183-stack-based-buffer-overflow-in-d-lin-2982ced2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4183%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b7c1479d4df451833752f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4182-stack-based-buffer-overflow-in-d-lin-4b5e9537</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4182%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b7c1479d4df45183375304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4181-stack-based-buffer-overflow-in-d-lin-ddee0ed4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4181%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b7c1479d4df451833752fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28522-null-pointer-dereference-in-tuya-ar-2a93d27c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28522%3A%20NULL%20Pointer%20Dereference%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1499d4df45183375333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28519-heap-based-buffer-overflow-in-tuya--81bb398e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28519%3A%20Heap-based%20Buffer%20Overflow%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1479d4df4518337530b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28521-out-of-bounds-read-in-tuya-arduino--e207a043</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28521%3A%20Out-of-bounds%20Read%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1499d4df4518337532e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28520-off-by-one-error-in-tuya-arduino-tu-f1d3cb47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28520%3A%20Off-by-one%20Error%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1499d4df45183375329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4180-improper-access-controls-in-d-link-d-2aa3ab3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4180%3A%20Improper%20Access%20Controls%20in%20D-Link%20DIR-816&amp;severity=medium&amp;id=69b7c1499d4df45183375338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4175-cross-site-scripting-in-aureus-erp-ce517057</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4175%3A%20Cross%20Site%20Scripting%20in%20Aureus%20ERP&amp;severity=medium&amp;id=69b68f139d4df451830604a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4174-resource-consumption-in-radare2-2650e8ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4174%3A%20Resource%20Consumption%20in%20Radare2&amp;severity=medium&amp;id=69b68f139d4df4518306049a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/loblaw-data-breach-impacts-customer-information-81750628</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Loblaw%20Data%20Breach%20Impacts%20Customer%20Information&amp;severity=medium&amp;id=69b684539d4df45183fde128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14287-cwe-94-improper-control-of-generati-d9c339c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14287%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=69b7c1499d4df4518337533f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4173-sql-injection-in-codephiliax-chat2db-3df7a560</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4173%3A%20SQL%20Injection%20in%20CodePhiliaX%20Chat2DB&amp;severity=medium&amp;id=69b67d7e9d4df45183f8681b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4172-stack-based-buffer-overflow-in-trend-df028a4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4172%3A%20Stack-based%20Buffer%20Overflow%20in%20TRENDnet%20TEW-632BRP&amp;severity=high&amp;id=69b676769d4df45183f31fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4171-authorization-bypass-in-codegenieapp-cf6d9b09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4171%3A%20Authorization%20Bypass%20in%20CodeGenieApp%20serverless-express&amp;severity=medium&amp;id=69b66e0a9b0f87e881d5b32f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4170-os-command-injection-in-topsec-topac-9e1efe11</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4170%3A%20OS%20Command%20Injection%20in%20Topsec%20TopACM&amp;severity=critical&amp;id=69b670ed9d4df45183e9aed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4169-cross-site-scripting-in-tecnick-tcex-fd1ffac8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4169%3A%20Cross%20Site%20Scripting%20in%20Tecnick%20TCExam&amp;severity=medium&amp;id=69b64e669b0f87e881babec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4168-cross-site-scripting-in-tecnick-tcex-9346d093</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4168%3A%20Cross%20Site%20Scripting%20in%20Tecnick%20TCExam&amp;severity=medium&amp;id=69b64e669b0f87e881babeba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4167-stack-based-buffer-overflow-in-belki-ac4818a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4167%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69b64ae29b0f87e881b8f1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4166-cross-site-scripting-in-wavlink-wl-n-93ca904f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4166%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=69b64ae29b0f87e881b8f1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4165-cross-site-scripting-in-worksuite-hr-a0a0992f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4165%3A%20Cross%20Site%20Scripting%20in%20Worksuite%20HR%2C%20CRM%20and%20Project%20Management&amp;severity=medium&amp;id=69b670ed9d4df45183e9aedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4164-command-injection-in-wavlink-wl-wn57-c028dcbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4164%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=critical&amp;id=69b62b3e9b0f87e881a99067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2233-cwe-862-missing-authorization-in-wed-191cba37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2233%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20User%20Frontend%3A%20AI%20Powered%20Frontend%20Posting%2C%20User%20Directory%2C%20Profile%2C%20Membership%20%26%20User%20Registration&amp;severity=medium&amp;id=69b619aa9b0f87e8819c13f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1947-cwe-639-authorization-bypass-through-412339ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1947%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=high&amp;id=69b60f1e9b0f87e88192b131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1883-cwe-639-authorization-bypass-through-0e12c6db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1883%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wickedplugins%20Wicked%20Folders%20%E2%80%93%20Folder%20Organizer%20for%20Pages%2C%20Posts%2C%20and%20Custom%20Post%20Types&amp;severity=medium&amp;id=69b60f1e9b0f87e88192b12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3441-out-of-bounds-read-in-red-hat-red-ha-c29ec58c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3441%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b604929b0f87e88177d6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3442-out-of-bounds-read-in-red-hat-red-ha-01e6e081</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3442%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b604929b0f87e88177d6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-15-32473807</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-15&amp;severity=medium&amp;id=69b7492f9d4df45183906444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-15-4b6db233</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-15&amp;severity=medium&amp;id=69b680cc9d4df45183fb5170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-15-fc6b6048</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-15&amp;severity=low&amp;id=69b680cc9d4df45183fb5150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4163-command-injection-in-wavlink-wl-wn57-5fa0760b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4163%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=critical&amp;id=69b5e4e22f860ef94356585f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4179-loop-with-unreachable-exit-condition-9616b361</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4179%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=69b5ff079b0f87e881671219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0849-buffer-copy-without-checking-size-of-03e4aa02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0849%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=low&amp;id=69b5cfcb2f860ef94341a096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1870-cwe-862-missing-authorization-in-thi-2dfc483a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1870%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20Thim%20Kit%20for%20Elementor%20%E2%80%93%20Pre-built%20Templates%20%26%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69b562ce2f860ef943ef5275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-hpe-aos-cx-vulnerability-allows-admin-pas-c92fd2bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20HPE%20AOS-CX%20Vulnerability%20Allows%20Admin%20Password%20Resets&amp;severity=critical&amp;id=69b53f722f860ef943baf10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54920-cwe-502-deserialization-of-untruste-513e22e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54920%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Spark&amp;severity=high&amp;id=69b527072f860ef943974709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1948-cwe-862-missing-authorization-in-web-88b87899</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1948%3A%20CWE-862%20Missing%20Authorization%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69b4dd372f860ef94382b90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartapesg-campaign-uses-clickfix-page-to-push-rem-aa9c64ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartApeSG%20campaign%20uses%20ClickFix%20page%20to%20push%20Remcos%20RAT%2C%20(Sat%2C%20Mar%2014th)&amp;severity=medium&amp;id=69b4b9d92f860ef94307e3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-14-20b6e0de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-14&amp;severity=medium&amp;id=69b5f9c02f860ef9436a67d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-14-ad0bb0a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-14&amp;severity=low&amp;id=69b4d2712f860ef9434a4b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-14-1eabe221</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-14&amp;severity=medium&amp;id=69b4d2712f860ef9434a1b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0385-spoofing-in-microsoft-microsoft-edge-1b431653</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0385%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=69b48c5d2f860ef943c0bebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32724-cwe-416-use-after-free-in-px4-px4-a-01ac43e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32724%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b488d62f860ef943ba416b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3227-cwe-78-improper-neutralization-of-sp-ac440341</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3227%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20TL-WR802N%20v4&amp;severity=high&amp;id=69b488d62f860ef943ba4172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32720-cwe-284-improper-access-control-in--c14eb5d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32720%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20monitoring&amp;severity=high&amp;id=69b485502f860ef943b83400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32719-cwe-22-improper-limitation-of-a-pat-c20be6ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32719%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=medium&amp;id=69b485502f860ef943b833fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32717-cwe-863-incorrect-authorization-in--a6c8c004</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32717%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mintplex-Labs%20anything-llm&amp;severity=low&amp;id=69b485502f860ef943b833f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32715-cwe-863-incorrect-authorization-in--02a0b72c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32715%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mintplex-Labs%20anything-llm&amp;severity=low&amp;id=69b485502f860ef943b833f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32713-cwe-670-always-incorrect-control-fl-e4fe0408</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32713%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b485502f860ef943b833ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32709-cwe-22-improper-limitation-of-a-pat-51bc0c50</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32709%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b485502f860ef943b833ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32708-cwe-121-stack-based-buffer-overflow-a8d143e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32708%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=high&amp;id=69b485502f860ef943b833e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32707-cwe-121-stack-based-buffer-overflow-87d08068</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32707%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b481d42f860ef943b5ebc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32706-cwe-120-buffer-copy-without-checkin-09d5c9f0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32706%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20PX4%20PX4-Autopilot&amp;severity=high&amp;id=69b481d42f860ef943b5ebc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32705-cwe-121-stack-based-buffer-overflow-487fae4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32705%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b481d42f860ef943b5ebc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32616-cwe-74-improper-neutralization-of-s-ab6dc709</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32616%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20kasuganosoras%20Pigeon&amp;severity=high&amp;id=69b481d42f860ef943b5ebb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32704-cwe-285-improper-authorization-in-s-8e36d108</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32704%3A%20CWE-285%3A%20Improper%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69b481d42f860ef943b5ebc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26133-information-disclosure-in-microsoft-fe3e9176</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26133%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot%20for%20Android&amp;severity=high&amp;id=69b481d42f860ef943b5ebb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32640-cwe-915-improperly-controlled-modif-c6dbc3dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32640%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20danthedeckie%20simpleeval&amp;severity=high&amp;id=69b481d42f860ef943b5ebbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32772-cwe-669-incorrect-resource-transfer-fd58534d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32772%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20GNU%20inetutils&amp;severity=low&amp;id=69b47e482f860ef943b3ab7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32635-cwe-79-improper-neutralization-of-i-dc8aa9bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32635%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20%40angular%20compiler&amp;severity=high&amp;id=69b47e482f860ef943b3ab77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32630-cwe-409-improper-handling-of-highly-276ae7f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32630%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20sindresorhus%20file-type&amp;severity=medium&amp;id=69b47e482f860ef943b3ab73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32628-cwe-89-improper-neutralization-of-s-a6db85bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32628%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=69b47e482f860ef943b3ab6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32627-cwe-295-improper-certificate-valida-93534cac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32627%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69b47ac82f860ef943b21729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2491-cwe-306-missing-authentication-for-c-5feeb71e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2491%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20A-40&amp;severity=medium&amp;id=69b47ac82f860ef943b21725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3562-cwe-347-improper-verification-of-cry-0705c7b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3562%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Philips%20Hue%20Bridge&amp;severity=medium&amp;id=69b47ac82f860ef943b21741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3561-cwe-122-heap-based-buffer-overflow-i-375556a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3561%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2173e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3560-cwe-122-heap-based-buffer-overflow-i-45c1d76e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3560%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2173b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3559-cwe-323-reusing-a-nonce-key-pair-in--315b5e3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3559%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b21738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3558-cwe-306-missing-authentication-for-c-e7247790</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3558%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b21735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3557-cwe-122-heap-based-buffer-overflow-i-348800c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3557%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b21732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3556-cwe-122-heap-based-buffer-overflow-i-ceca564d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3556%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2172f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3555-cwe-122-heap-based-buffer-overflow-i-9ade4958</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3555%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2172c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32621-cwe-1321-improperly-controlled-modi-1de28d7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32621%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20%40apollo%20federation-internals&amp;severity=critical&amp;id=69b477402f860ef943af037e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32626-cwe-79-improper-neutralization-of-i-a50f3d86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32626%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=critical&amp;id=69b473bd2f860ef943aa93f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32614-cwe-347-improper-verification-of-cr-469bafa7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32614%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20emmansun%20gmsm&amp;severity=high&amp;id=69b473bd2f860ef943aa93f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0977-cwe-284-in-ibm-cics-transaction-gate-0f24da33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0977%3A%20CWE-284%20in%20IBM%20CICS%20Transaction%20Gateway%20for%20Multiplatforms&amp;severity=medium&amp;id=69b473bd2f860ef943aa93ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32617-cwe-942-permissive-cross-domain-pol-afe0fc22</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32617%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=69b473bd2f860ef943aa93f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32600-cwe-354-improper-validation-of-inte-e8cd52c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32600%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20simplesamlphp%20xml-security&amp;severity=high&amp;id=69b473bf2f860ef943aa9457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32594-cwe-306-missing-authentication-for--2bea7820</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32594%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b473bd2f860ef943aa940d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13212-cwe-799-improper-control-of-interac-fc1bf1b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13212%3A%20CWE-799%20Improper%20Control%20of%20Interaction%20Frequency%20in%20IBM%20Aspera%20Console&amp;severity=medium&amp;id=69b473bd2f860ef943aa93fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13459-cwe-841-improper-enforcement-of-beh-49253c6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13459%3A%20CWE-841%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20IBM%20Aspera%20Console&amp;severity=low&amp;id=69b473bd2f860ef943aa93ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13460-cwe-204-observable-response-discrep-b46d5ee6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13460%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20IBM%20Aspera%20Console&amp;severity=medium&amp;id=69b473bd2f860ef943aa9402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32314-cwe-248-uncaught-exception-in-libp2-e25d0c75</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32314%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20libp2p%20rust-yamux&amp;severity=high&amp;id=69b473bd2f860ef943aa940a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32313-cwe-354-improper-validation-of-inte-f09d9228</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32313%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20robrichards%20xmlseclibs&amp;severity=high&amp;id=69b473bd2f860ef943aa9405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31949-cwe-248-uncaught-exception-in-danny-d7418f23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31949%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69b4732e2f860ef943a92620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31944-cwe-306-missing-authentication-for--349af3c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31944%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69b4732e2f860ef943a9261d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31899-cwe-674-uncontrolled-recursion-in-k-d8a020a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31899%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Kozea%20CairoSVG&amp;severity=high&amp;id=69b4732e2f860ef943a92619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36368-cwe-89-improper-neutralization-of-s-eb4d8f1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36368%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b4732e2f860ef943a92616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31886-cwe-22-improper-limitation-of-a-pat-116cb11a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31886%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dagu-org%20dagu&amp;severity=critical&amp;id=69b469392f860ef943905692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31882-cwe-306-missing-authentication-for--5fd57a74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31882%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dagu-org%20dagu&amp;severity=high&amp;id=69b469392f860ef94390568c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31814-cwe-190-integer-overflow-or-wraparo-40e288f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31814%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20libp2p%20rust-yamux&amp;severity=high&amp;id=69b465b22f860ef9438da28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14483-cwe-201-insertion-of-sensitive-info-0baf0879</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14483%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b465b22f860ef9438da275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30961-cwe-770-allocation-of-resources-wit-d12c59e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30961%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69b465b22f860ef9438da289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14504-cwe-79-improper-neutralization-of-i-1f69d1bd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b465b22f860ef9438da278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30955-cwe-400-uncontrolled-resource-consu-c9a9ab34</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30955%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69b465b22f860ef9438da285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30943-cwe-863-incorrect-authorization-in--0656b1a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30943%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69b465b22f860ef9438da281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30915-cwe-22-improper-limitation-of-a-pat-da7d087b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30915%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20drakkan%20sftpgo&amp;severity=medium&amp;id=69b465b22f860ef9438da27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30914-cwe-22-improper-limitation-of-a-pat-bd6cd91e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30914%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20drakkan%20sftpgo&amp;severity=medium&amp;id=69b465b22f860ef9438da27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30853-cwe-22-improper-limitation-of-a-pat-6923c988</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30853%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69b4622a2f860ef9438be2c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0835-cwe-79-improper-neutralization-of-in-35334f5f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0835%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b4622a2f860ef9438be2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71263-cwe-120-buffer-copy-without-checkin-49ff0d18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71263%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20AT%26T%20Bell%20Labs%20UNIX&amp;severity=high&amp;id=69b45b242f860ef94386c25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13702-vulnerability-in-ibm-sterling-partn-f430fe6b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13702%3A%20Vulnerability%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=69b45b242f860ef94386c251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13718-cwe-319-cleartext-transmission-of-s-470e2432</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13718%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=low&amp;id=69b45b242f860ef94386c254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13723-cwe-324-use-of-a-key-past-its-expir-824e411a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13723%3A%20CWE-324%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=69b45b242f860ef94386c257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12453-cwe-79-improper-neutralization-of-i-d48ad297</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12453%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=69b45b242f860ef94386c248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12454-cwe-79-improper-neutralization-of-i-b626b0fb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12454%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=69b45b242f860ef94386c24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12455-cwe-204-observable-response-discrep-bfc71dd8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12455%3A%20CWE-204%20Observable%20response%20discrepancy%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=69b45b242f860ef94386c24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13726-cwe-209-generation-of-error-message-c3b107e6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13726%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=69b45b242f860ef94386c25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wide-scale-opportunistic-sms-pumping-attacks-targe-0c35fd17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wide-scale%2C%20opportunistic%20SMS%20pumping%20attacks%20target%20customer%20sign-up%20pages&amp;severity=medium&amp;id=69b7d9569d4df451834af53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14811-cwe-598-use-of-get-request-method-w-bc6a9c1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14811%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=low&amp;id=69b457cc2f860ef943762155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32746-cwe-120-buffer-copy-without-checkin-0ceead78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32746%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20GNU%20inetutils&amp;severity=critical&amp;id=69b4498e2f860ef94328433b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1668-cwe-20-improper-input-validation-in--944966a6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1668%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20SG2008P%203.2x&amp;severity=high&amp;id=69b4440c2f860ef9430eaa02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26954-cwe-94-improper-control-of-generati-35790079</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26954%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69b45b752f860ef943872ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32745-cwe-614-in-jetbrains-datalore-e0b6f632</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32745%3A%20CWE-614%20in%20JetBrains%20Datalore&amp;severity=medium&amp;id=69b45b752f860ef943872ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4092-cwe-22-improper-limitation-of-a-path-4edecfa5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4092%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Google%20Clasp&amp;severity=high&amp;id=69b45b752f860ef943872ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60012-cwe-20-improper-input-validation-in-45b604ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60012%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Livy&amp;severity=medium&amp;id=69b42da82f860ef943f7d5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66249-cwe-22-improper-limitation-of-a-pat-cb731667</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66249%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Livy&amp;severity=medium&amp;id=69b42da82f860ef943f7d5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/starbucks-data-breach-impacts-employees-cd090120</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Starbucks%20Data%20Breach%20Impacts%20Employees&amp;severity=medium&amp;id=69b42d392f860ef943f7a2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0956-cwe-125-out-of-bounds-read-in-digile-9c731add</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0956%3A%20CWE-125%20Out-of-bounds%20read%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b42da82f860ef943f7d604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0955-cwe-125-out-of-bounds-read-in-digile-1617a903</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0955%3A%20CWE-125%20Out-of-bounds%20read%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b42da82f860ef943f7d601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0957-cwe-787-out-of-bounds-write-in-digil-a0dbc562</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0957%3A%20CWE-787%20Out-of-bounds%20write%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b422e32f860ef943ee8229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0954-cwe-787-out-of-bounds-write-in-digil-5904e41d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0954%3A%20CWE-787%20Out-of-bounds%20write%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b422e32f860ef943ee8226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-n8n-flaw-exploited-slopoly-malware-i-1257d1a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20N8n%20Flaw%20Exploited%2C%20Slopoly%20Malware%2C%20Interpol%20Cybercrime%20Crackdown&amp;severity=low&amp;id=69b41f282f860ef943ebe1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13779-cwe-306-missing-authentication-for--4936bb9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13779%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20ABB%20AWIN%20GW100%20rev.2&amp;severity=high&amp;id=69b414d22f860ef943e394b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13778-cwe-306-missing-authentication-for--89a37f0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13778%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20ABB%20AWIN%20GW100%20rev.2&amp;severity=medium&amp;id=69b40df72f860ef943ddd9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13777-cwe-294-authentication-bypass-by-ca-4adcb152</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13777%3A%20CWE-294%20Authentication%20bypass%20by%20capture-replay%20in%20ABB%20AWIN%20GW100%20rev.2&amp;severity=high&amp;id=69b40df72f860ef943ddd9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-take-aim-at-us-and-other-targe-9bcfe572</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Take%20Aim%20at%20US%20and%20Other%20Targets%2C%20Raising%20Risk%20of%20Cyberattacks%20During%20War&amp;severity=medium&amp;id=69b4068c2f860ef943d8f890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4111-loop-with-unreachable-exit-condition-fe816334</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4111%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69b3fc832f860ef943d17f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32543-missing-authorization-in-cyberchimp-8017ca52</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32543%3A%20Missing%20Authorization%20in%20CyberChimps%20Responsive%20Blocks&amp;severity=medium&amp;id=69b3fc832f860ef943d17f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32487-missing-authorization-in-raratheme--191fac15</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32487%3A%20Missing%20Authorization%20in%20raratheme%20Lawyer%20Landing%20Page&amp;severity=medium&amp;id=69b3fc832f860ef943d17f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32486-missing-authorization-in-wptravelen-38838032</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32486%3A%20Missing%20Authorization%20in%20wptravelengine%20Travel%20Booking&amp;severity=medium&amp;id=69b3fc832f860ef943d17f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32462-improper-neutralization-of-input-du-9c426d46</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32462%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b3fc832f860ef943d17f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32461-missing-authorization-in-really-sim-fffa3e1d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32461%3A%20Missing%20Authorization%20in%20Really%20Simple%20Plugins%20Really%20Simple%20SSL&amp;severity=medium&amp;id=69b3fc832f860ef943d17f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32460-improper-neutralization-of-input-du-d89a53a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32460%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themefic%20Ultimate%20Addons%20for%20Contact%20Form%207&amp;severity=medium&amp;id=69b3fc832f860ef943d17f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32459-improper-neutralization-of-special--db7bd114</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32459%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flycart%20UpsellWP&amp;severity=high&amp;id=69b3fc832f860ef943d17f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32458-improper-neutralization-of-special--eb6e8174</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32458%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RealMag777%20WOLF&amp;severity=high&amp;id=69b3fc832f860ef943d17f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32457-missing-authorization-in-wombat-plu-4784041d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32457%3A%20Missing%20Authorization%20in%20Wombat%20Plugins%20Advanced%20Product%20Fields%20(Product%20Addons)%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc832f860ef943d17f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32456-cross-site-request-forgery-csrf-in--9291cbc0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32456%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Janis%20Elsts%20Admin%20Menu%20Editor&amp;severity=medium&amp;id=69b3fc812f860ef943d17f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32455-improper-neutralization-of-input-du-7de85790</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20MDTF&amp;severity=medium&amp;id=69b3fc812f860ef943d17f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32454-improper-neutralization-of-input-du-53b4d6ce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32454%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Avada%20Core&amp;severity=medium&amp;id=69b3fc812f860ef943d17f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32453-missing-authorization-in-themefusio-6f99cd0b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32453%3A%20Missing%20Authorization%20in%20ThemeFusion%20Avada%20Core&amp;severity=medium&amp;id=69b3fc812f860ef943d17f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32452-missing-authorization-in-themefusio-896f48b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32452%3A%20Missing%20Authorization%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=69b3fc812f860ef943d17f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32451-missing-authorization-in-themefusio-dde6c7ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32451%3A%20Missing%20Authorization%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=69b3fc812f860ef943d17f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32450-improper-neutralization-of-input-du-a3960304</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32450%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20Active%20Products%20Tables%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc812f860ef943d17f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32449-improper-neutralization-of-input-du-d3119f43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32449%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Event%20Post&amp;severity=medium&amp;id=69b3fc812f860ef943d17f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32448-improper-neutralization-of-input-du-a2e879f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32448%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eric%20Teubert%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=69b3fc812f860ef943d17f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32447-missing-authorization-in-vito-peleg-dc3d9cb0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32447%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=69b3fc812f860ef943d17f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32446-missing-authorization-in-syed-balkh-9e5eebf2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32446%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32445-missing-authorization-in-elementor--89cd866e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32445%3A%20Missing%20Authorization%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=low&amp;id=69b3fc7f2f860ef943d17e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32443-cross-site-request-forgery-csrf-in--31384905</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32443%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Josh%20Kohlbach%20Product%20Feed%20PRO%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32440-missing-authorization-in-ex-themes--35f616df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32440%3A%20Missing%20Authorization%20in%20Ex-Themes%20WP%20Food&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32439-missing-authorization-in-webgeniusl-d0e96da4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32439%3A%20Missing%20Authorization%20in%20WebGeniusLab%20BigHearts&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32438-missing-authorization-in-vowelweb-v-d91f803d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32438%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20School%20Education&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32437-missing-authorization-in-vowelweb-v-ff2fb1ea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32437%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Portfolio&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32436-missing-authorization-in-vowelweb-v-330cef25</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32436%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Photography&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32435-missing-authorization-in-vowelweb-v-16582c1d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32435%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Pet%20Shop&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32434-missing-authorization-in-vowelweb-v-a3a8714f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32434%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Fitness&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32433-improper-neutralization-of-special--6e960526</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32433%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20codepeople%20CP%20Contact%20Form%20with%20Paypal&amp;severity=high&amp;id=69b3fc7d2f860ef943d17e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32432-missing-authorization-in-codepeople-bf935de5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32432%3A%20Missing%20Authorization%20in%20codepeople%20WP%20Time%20Slots%20Booking%20Form&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32431-improper-neutralization-of-input-du-fd10a23c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32431%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Astra%20Bulk%20Edit&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32430-improper-neutralization-of-input-du-ca001993</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32430%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IdeaBox%20Creations%20PowerPack%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32429-improper-neutralization-of-input-du-360d0c55</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32429%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Magical%20Addons%20For%20Elementor&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32428-missing-authorization-in-ays-pro-po-c5de410e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32428%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Popup%20Like%20box&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32427-missing-authorization-in-vowelweb-v-9d4a6be6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32427%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Education%20Lite&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32426-improper-control-of-filename-for-in-05e0db0a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32426%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themelexus%20Medilazar%20Core&amp;severity=high&amp;id=69b3fc7d2f860ef943d17e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32425-missing-authorization-in-linknacion-39cfb0ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32425%3A%20Missing%20Authorization%20in%20linknacional%20Payment%20Gateway%20Pix%20For%20GiveWP&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32424-improper-neutralization-of-input-du-cd3cbd9f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32424%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BoldGrid%20Sprout%20Clients&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32423-missing-authorization-in-bowo-admin-6ca8630e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32423%3A%20Missing%20Authorization%20in%20Bowo%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32422-improper-neutralization-of-special--ceec3e00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32422%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20levelfourdevelopment%20WP%20EasyCart&amp;severity=high&amp;id=69b3fc7b2f860ef943d17d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32421-missing-authorization-in-agile-logi-ac7a0873</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32421%3A%20Missing%20Authorization%20in%20Agile%20Logix%20Post%20Timeline&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32420-cross-site-request-forgery-csrf-in--f8e9d754</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32420%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ruben%20Garcia%20GamiPress&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32419-improper-neutralization-of-input-du-d6192675</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32419%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fernando%20Briano%20List%20category%20posts&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32418-improper-neutralization-of-special--406aedf9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32418%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jordy%20Meow%20Meow%20Gallery&amp;severity=high&amp;id=69b3fc7b2f860ef943d17d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32417-missing-authorization-in-wppochipp--0e63fb08</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32417%3A%20Missing%20Authorization%20in%20wppochipp%20Pochipp&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32416-missing-authorization-in-bplugins-p-b8ccda05</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32416%3A%20Missing%20Authorization%20in%20bPlugins%20PDF%20Poster&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32415-path-traversal-in-bogdan-bendziukov-7cff31d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32415%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Bogdan%20Bendziukov%20Squeeze&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32414-improper-control-of-generation-of-c-c501db48</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32414%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ILLID%20Advanced%20Woo%20Labels&amp;severity=high&amp;id=69b3fc7b2f860ef943d17d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32413-missing-authorization-in-maciej-bis-326cf9ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32413%3A%20Missing%20Authorization%20in%20Maciej%20Bis%20Permalink%20Manager%20Lite&amp;severity=medium&amp;id=69b3fc792f860ef943d17d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32412-server-side-request-forgery-ssrf-in-be99818f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32412%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Gift%20Up!%20Gift%20Up%20Gift%20Cards%20for%20WordPress%20and%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32411-improper-neutralization-of-input-du-20534a8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32411%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Simpma%20Embed%20Calendly&amp;severity=medium&amp;id=69b3fc792f860ef943d17cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32410-missing-authorization-in-wbw-plugin-7a2cec48</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32410%3A%20Missing%20Authorization%20in%20WBW%20Plugins%20WBW%20Currency%20Switcher%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32409-missing-authorization-in-wpmu-dev-y-fb9f790f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32409%3A%20Missing%20Authorization%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Forminator&amp;severity=medium&amp;id=69b3fc792f860ef943d17cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32408-missing-authorization-in-themefusec-54b63062</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32408%3A%20Missing%20Authorization%20in%20themefusecom%20Brizy&amp;severity=medium&amp;id=69b3fc792f860ef943d17cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32407-missing-authorization-in-wpclever-w-5b109433</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32407%3A%20Missing%20Authorization%20in%20WPClever%20WPC%20Smart%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32406-missing-authorization-in-wpclever-w-4a6bc9a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32406%3A%20Missing%20Authorization%20in%20WPClever%20WPC%20Product%20Bundles%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32405-exposure-of-sensitive-system-inform-c9b093e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32405%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20xtemos%20WoodMart&amp;severity=medium&amp;id=69b3fc792f860ef943d17ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32404-missing-authorization-in-studio99-s-0ba83ffa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32404%3A%20Missing%20Authorization%20in%20Studio99%20Studio99%20WP%20Monitor&amp;severity=medium&amp;id=69b3fc792f860ef943d17ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32403-improper-neutralization-of-input-du-fbc598bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32403%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20toocheke%20Toocheke%20Companion&amp;severity=medium&amp;id=69b3fc762f860ef943d17bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32402-missing-authorization-in-ays-pro-im-e86a5a00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32402%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Image%20Slider%20by%20Ays&amp;severity=medium&amp;id=69b3fc762f860ef943d17bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32401-improper-control-of-filename-for-in-714f1e8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32401%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=high&amp;id=69b3fc762f860ef943d17bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32400-improper-control-of-filename-for-in-672cf594</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32400%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemetechMount%20Boldman&amp;severity=high&amp;id=69b3fc762f860ef943d17bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32399-improper-neutralization-of-special--f3f5d513</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32399%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=high&amp;id=69b3fc762f860ef943d17bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32398-concurrent-execution-using-shared-r-1c37c90c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32398%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Subrata%20Mal%20TeraWallet%20%E2%80%93%20For%20WooCommerce&amp;severity=medium&amp;id=69b3fc762f860ef943d17bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32397-missing-authorization-in-ymc-filter-9676781d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32397%3A%20Missing%20Authorization%20in%20YMC%20Filter%20%26%20Grids&amp;severity=medium&amp;id=69b3fc762f860ef943d17bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32396-missing-authorization-in-radiusthem-60534463</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32396%3A%20Missing%20Authorization%20in%20RadiusTheme%20Team&amp;severity=medium&amp;id=69b3fc762f860ef943d17bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32395-missing-authorization-in-xpro-xpro--39384c2f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32395%3A%20Missing%20Authorization%20in%20Xpro%20Xpro%20Addons%20For%20Beaver%20Builder%20%E2%80%93%20Lite&amp;severity=medium&amp;id=69b3fc762f860ef943d17bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32394-missing-authorization-in-publishpre-dfc7113c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32394%3A%20Missing%20Authorization%20in%20PublishPress%20PublishPress%20Capabilities&amp;severity=medium&amp;id=69b3fc762f860ef943d17bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32393-improper-control-of-filename-for-in-45e6ac39</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32393%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Greenly%20Theme%20Addons&amp;severity=high&amp;id=69b3fc742f860ef943d17af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32392-improper-control-of-filename-for-in-9f269b2b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32392%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Greenly&amp;severity=high&amp;id=69b3fc742f860ef943d17af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32391-missing-authorization-in-linethemes-325eafba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32391%3A%20Missing%20Authorization%20in%20linethemes%20SmartFix&amp;severity=medium&amp;id=69b3fc742f860ef943d17af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32390-missing-authorization-in-linethemes-05abb297</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32390%3A%20Missing%20Authorization%20in%20linethemes%20Nanosoft&amp;severity=medium&amp;id=69b3fc742f860ef943d17aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32388-missing-authorization-in-linethemes-09a893de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32388%3A%20Missing%20Authorization%20in%20linethemes%20GLB&amp;severity=medium&amp;id=69b3fc742f860ef943d17aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32387-missing-authorization-in-noor-alam--347bfb66</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32387%3A%20Missing%20Authorization%20in%20Noor%20Alam%20Checkout%20for%20PayPal&amp;severity=medium&amp;id=69b3fc742f860ef943d17ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32386-missing-authorization-in-envothemes-724fa76f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32386%3A%20Missing%20Authorization%20in%20EnvoThemes%20Envo%20Extra&amp;severity=medium&amp;id=69b3fc742f860ef943d17ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32385-missing-authorization-in-metagauss--5a9cbabb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32385%3A%20Missing%20Authorization%20in%20Metagauss%20RegistrationMagic&amp;severity=medium&amp;id=69b3fc742f860ef943d17ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32384-improper-control-of-filename-for-in-18a09511</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32384%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magepeopleteam%20WpBookingly&amp;severity=high&amp;id=69b3fc742f860ef943d17ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32383-missing-authorization-in-raratheme--7af966ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32383%3A%20Missing%20Authorization%20in%20raratheme%20Ridhi&amp;severity=medium&amp;id=69b3fc742f860ef943d17add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32382-missing-authorization-in-raratheme--593105cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32382%3A%20Missing%20Authorization%20in%20raratheme%20Digital%20Download&amp;severity=medium&amp;id=69b3fc712f860ef943d17a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32381-missing-authorization-in-raratheme--287ddad3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32381%3A%20Missing%20Authorization%20in%20raratheme%20App%20Landing%20Page&amp;severity=medium&amp;id=69b3fc712f860ef943d17a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32380-missing-authorization-in-raratheme--18a1b659</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32380%3A%20Missing%20Authorization%20in%20raratheme%20Numinous&amp;severity=medium&amp;id=69b3fc712f860ef943d17a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32379-missing-authorization-in-raratheme--2fab580c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32379%3A%20Missing%20Authorization%20in%20raratheme%20Rara%20Academic&amp;severity=medium&amp;id=69b3fc712f860ef943d17a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32378-missing-authorization-in-raratheme--03ba613b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32378%3A%20Missing%20Authorization%20in%20raratheme%20Book%20Landing%20Page&amp;severity=medium&amp;id=69b3fc712f860ef943d17a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32377-missing-authorization-in-raratheme--14318444</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32377%3A%20Missing%20Authorization%20in%20raratheme%20Pranayama%20Yoga&amp;severity=medium&amp;id=69b3fc712f860ef943d17a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32376-missing-authorization-in-raratheme--817ef71a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32376%3A%20Missing%20Authorization%20in%20raratheme%20Kalon&amp;severity=medium&amp;id=69b3fc712f860ef943d17a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32375-missing-authorization-in-raratheme--153d1a60</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32375%3A%20Missing%20Authorization%20in%20raratheme%20Travel%20Diaries&amp;severity=medium&amp;id=69b3fc712f860ef943d17a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32374-missing-authorization-in-raratheme--311e6467</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32374%3A%20Missing%20Authorization%20in%20raratheme%20The%20Minimal&amp;severity=medium&amp;id=69b3fc712f860ef943d17a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32373-missing-authorization-in-cozy-visio-850a1769</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32373%3A%20Missing%20Authorization%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=medium&amp;id=69b3fc712f860ef943d17a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32372-exposure-of-sensitive-system-inform-cda0de09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32372%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20RadiusTheme%20ShopBuilder%20%E2%80%93%20Elementor%20WooCommerce%20Builder%20Addons&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32371-missing-authorization-in-raratheme--52c9dac8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32371%3A%20Missing%20Authorization%20in%20raratheme%20Elegant%20Pink&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32370-missing-authorization-in-raratheme--6b90ae32</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32370%3A%20Missing%20Authorization%20in%20raratheme%20Influencer&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32369-improper-control-of-filename-for-in-0988553a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32369%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Medilink-Core&amp;severity=high&amp;id=69b3fc6f2f860ef943d179cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32368-improper-neutralization-of-special--5cc971cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32368%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20delphiknight%20Geo%20to%20Lat&amp;severity=high&amp;id=69b3fc6f2f860ef943d179c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32367-improper-control-of-generation-of-c-4c66769d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32367%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Yannick%20Lefebvre%20Modal%20Dialog&amp;severity=critical&amp;id=69b3fc6f2f860ef943d179c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32366-improper-neutralization-of-special--0d1f7e9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32366%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robfelty%20Collapsing%20Categories&amp;severity=high&amp;id=69b3fc6f2f860ef943d179c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32365-improper-neutralization-of-special--243cc45a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32365%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robfelty%20Collapsing%20Archives&amp;severity=high&amp;id=69b3fc6f2f860ef943d179c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32364-improper-control-of-filename-for-in-be7da41c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20redqteam%20Turbo%20Manager&amp;severity=high&amp;id=69b3fc6f2f860ef943d179bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32363-missing-authorization-in-funlus-oy--5c71d6b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32363%3A%20Missing%20Authorization%20in%20Funlus%20Oy%20WPLifeCycle&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32362-missing-authorization-in-activity-l-d17a4d68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32362%3A%20Missing%20Authorization%20in%20activity-log.com%20WP%20Sessions%20Time%20Monitoring%20Full%20Automatic&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32361-improper-neutralization-of-input-du-dc91a949</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marketing%20Fire%20Editorial%20Calendar&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32360-improper-neutralization-of-input-du-0129744c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20richplugins%20Rich%20Showcase%20for%20Google%20Reviews&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32359-improper-neutralization-of-input-du-055fab5b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32359%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Icon%20List%20Block&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32358-improper-neutralization-of-special--b6dd4fca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32358%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=high&amp;id=69b3fc6e2f860ef943d1797d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32357-server-side-request-forgery-ssrf-in-f4e13b72</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32357%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Katsushi%20Kawamori%20Simple%20Blog%20Card&amp;severity=medium&amp;id=69b3fc6e2f860ef943d1797a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32356-improper-neutralization-of-input-du-d61982ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Robo%20Gallery&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32355-deserialization-of-untrusted-data-i-9218efa4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32355%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69b3fc6e2f860ef943d17974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32354-insertion-of-sensitive-information--9e564a09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32354%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32353-server-side-request-forgery-ssrf-in-fe177f7b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32353%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MailerPress%20Team%20MailerPress&amp;severity=medium&amp;id=69b3fc6e2f860ef943d1796e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32352-improper-neutralization-of-input-du-df53e92f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32351-improper-neutralization-of-input-du-5bf039b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32350-missing-authorization-in-wpradiant--fae14b80</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32350%3A%20Missing%20Authorization%20in%20wpradiant%20Chocolate%20House&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32349-server-side-request-forgery-ssrf-in-d09f4573</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32349%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Andy%20Fragen%20Embed%20PDF%20Viewer&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1793e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32348-missing-authorization-in-madrasthem-79cb9bfd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32348%3A%20Missing%20Authorization%20in%20MadrasThemes%20MAS%20Videos&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1793b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32347-missing-authorization-in-raratheme--ddfc26ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32347%3A%20Missing%20Authorization%20in%20raratheme%20Restaurant%20and%20Cafe&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32346-missing-authorization-in-raratheme--be3c9748</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32346%3A%20Missing%20Authorization%20in%20raratheme%20Travel%20Agency&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32345-missing-authorization-in-raratheme--e7f0c170</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32345%3A%20Missing%20Authorization%20in%20raratheme%20Perfect%20Portfolio&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32344-cross-site-request-forgery-csrf-in--f00dd3fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32344%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20desertthemes%20Corpiva&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1792f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32343-cross-site-request-forgery-csrf-in--ad2a2626</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32343%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Magazine3%20Easy%20Table%20of%20Contents&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1792c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32342-cross-site-request-forgery-csrf-in--4b314ef2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32341-missing-authorization-in-raratheme--98f6a5d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32341%3A%20Missing%20Authorization%20in%20raratheme%20Benevolent&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32340-missing-authorization-in-raratheme--fcdc0dc1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32340%3A%20Missing%20Authorization%20in%20raratheme%20Business%20One%20Page&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32339-missing-authorization-in-raratheme--0b1eb6aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32339%3A%20Missing%20Authorization%20in%20raratheme%20Bakes%20And%20Cakes&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32338-missing-authorization-in-raratheme--78ae7b59</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32338%3A%20Missing%20Authorization%20in%20raratheme%20Construction%20Landing%20Page&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32337-missing-authorization-in-raratheme--ac285de1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32337%3A%20Missing%20Authorization%20in%20raratheme%20Preschool%20and%20Kindergarten&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32336-missing-authorization-in-raratheme--c98d665b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32336%3A%20Missing%20Authorization%20in%20raratheme%20Rara%20Business&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32335-missing-authorization-in-raratheme--287fa8de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32335%3A%20Missing%20Authorization%20in%20raratheme%20The%20Conference&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32334-missing-authorization-in-raratheme--70528cc2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32334%3A%20Missing%20Authorization%20in%20raratheme%20JobScout&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32332-missing-authorization-in-ays-pro-ea-decd35d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32332%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Easy%20Form&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32331-missing-authorization-in-israpil-te-d9b6551a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32331%3A%20Missing%20Authorization%20in%20Israpil%20Textmetrics&amp;severity=medium&amp;id=69b3fc682f860ef943d17888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32330-cross-site-request-forgery-csrf-in--46f95374</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32330%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%2010Web%20Photo%20Gallery%20by%2010Web&amp;severity=medium&amp;id=69b3fc682f860ef943d17885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32329-missing-authorization-in-ays-pro-ad-8db73316</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32329%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Advanced%20Related%20Posts&amp;severity=medium&amp;id=69b3fc682f860ef943d17882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32328-cross-site-request-forgery-csrf-in--8416fb00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32328%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shufflehound%20Lemmony&amp;severity=medium&amp;id=69b3fc682f860ef943d1787f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31922-improper-neutralization-of-special--603cf965</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31922%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ays%20Pro%20Fox%20LMS&amp;severity=high&amp;id=69b3fc682f860ef943d1787c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31919-missing-authorization-in-josh-kohlb-f077f2be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31919%3A%20Missing%20Authorization%20in%20Josh%20Kohlbach%20Advanced%20Coupons%20for%20WooCommerce%20Coupons&amp;severity=medium&amp;id=69b3fc682f860ef943d17879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31918-improper-neutralization-of-input-du-978416ff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20immonex%20immonex%20Kickstart&amp;severity=medium&amp;id=69b3fc682f860ef943d17876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31917-improper-neutralization-of-special--06e00a70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31917%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20weDevs%20WP%20ERP&amp;severity=high&amp;id=69b3fc682f860ef943d17873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31916-missing-authorization-in-iulia-caza-a7c0b15c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31916%3A%20Missing%20Authorization%20in%20Iulia%20Cazan%20Latest%20Post%20Shortcode&amp;severity=medium&amp;id=69b3fc682f860ef943d17870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31915-missing-authorization-in-ux-themes--986caac9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31915%3A%20Missing%20Authorization%20in%20UX-themes%20Flatsome&amp;severity=medium&amp;id=69b3fc682f860ef943d1786d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-exfiltration-and-threat-actor-infrastructure--59260c61</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Exfiltration%20and%20Threat%20Actor%20Infrastructure%20Exposed&amp;severity=medium&amp;id=69b7d5d29d4df4518349438b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-paid-out-17-million-in-bug-bounty-rewards-i-2fdb9a10</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Paid%20Out%20%2417%20Million%20in%20Bug%20Bounty%20Rewards%20in%202025&amp;severity=medium&amp;id=69b3f1742f860ef943caf537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hacker-attack-on-stryker-disrupted-man-a7e24b42</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hacker%20Attack%20on%20Stryker%20Disrupted%20Manufacturing%20and%20Shipping&amp;severity=medium&amp;id=69b3ea6c2f860ef943c741ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2859-cwe-204-observable-response-discrepa-8005d70e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2859%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69b3e0242f860ef943bfc08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24097-cwe-204-observable-response-discrep-09daffb8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24097%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69b3e0242f860ef943bfc08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4063-cwe-862-missing-authorization-in-wpz-a1746f82</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4063%3A%20CWE-862%20Missing%20Authorization%20in%20wpzoom%20Social%20Icons%20Widget%20%26%20Block%20%E2%80%93%20Social%20Media%20Icons%20%26%20Share%20Buttons&amp;severity=medium&amp;id=69b3dc922f860ef943bc93c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23941-cwe-444-inconsistent-interpretation-11894fdc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23941%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Erlang%20OTP&amp;severity=high&amp;id=69b3d90e2f860ef943bac721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23943-cwe-409-improper-handling-of-highly-e97946a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23943%3A%20CWE-409%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69b3d90e2f860ef943bac72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23942-cwe-22-improper-limitation-of-a-pat-08d85e22</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23942%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69b3d90e2f860ef943bac728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4105-improper-access-control-in-red-hat-r-78746624</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4105%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69b41bd82f860ef943e9123e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3999-cwe-639-authorization-bypass-through-ed4f0cd8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3999%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Pointsharp%20ID%20Server&amp;severity=high&amp;id=69b3ceae2f860ef943b31146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/authorities-disrupt-socksescort-proxy-service-powe-66d041d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Authorities%20Disrupt%20SocksEscort%20Proxy%20Service%20Powered%20by%20AVrecon%20Botnet&amp;severity=medium&amp;id=69b3cacb2f860ef943b0650c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3986-cwe-79-improper-neutralization-of-in-06be8be9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=69b3ceae2f860ef943b3113f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2888-cwe-639-authorization-bypass-through-be10e6a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2888%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20strategy11team%20Formidable%20Forms%20%E2%80%93%20Contact%20Form%20Plugin%2C%20Survey%2C%20Quiz%2C%20Payment%2C%20Calculator%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=69b3ceae2f860ef943b31138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2879-cwe-639-authorization-bypass-through-33cd0f40</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2879%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20roxnor%20GetGenie%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%20%26%20SEO%20Tracking%20Tools&amp;severity=medium&amp;id=69b3ceae2f860ef943b31132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2257-cwe-639-authorization-bypass-through-450feceb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2257%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20roxnor%20GetGenie%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%20%26%20SEO%20Tracking%20Tools&amp;severity=medium&amp;id=69b3ceae2f860ef943b3112c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3873-cwe-798-use-of-hard-coded-credential-c885523b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3873%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20syslink%20software%20AG%20Avantra&amp;severity=high&amp;id=69b3cb0f2f860ef943b07f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-146-update-patches-two-exploited-zero-days-c3299c74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20146%20Update%20Patches%20Two%20Exploited%20Zero-Days&amp;severity=medium&amp;id=69b3c3c22f860ef943ab4d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2890-cwe-862-missing-authorization-in-str-3cbd25f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2890%3A%20CWE-862%20Missing%20Authorization%20in%20strategy11team%20Formidable%20Forms%20%E2%80%93%20Contact%20Form%20Plugin%2C%20Survey%2C%20Quiz%2C%20Payment%2C%20Calculator%20Form%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=69b3c0802f860ef943a8ad97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1704-cwe-639-authorization-bypass-through-bf6c8b22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1704%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=69b3c0802f860ef943a8ad8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3045-cwe-862-missing-authorization-in-cro-a77c0fc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3045%3A%20CWE-862%20Missing%20Authorization%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69b3c0802f860ef943a8ad9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3891-cwe-434-unrestricted-upload-of-file--f5fb3cc6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3891%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20linknacional%20Pix%20for%20WooCommerce&amp;severity=critical&amp;id=69b3c0802f860ef943a8ada4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-react-based-phishing-page-with-credential-exfilt-61aaf490</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20React-based%20phishing%20page%20with%20credential%20exfiltration%20via%20EmailJS%2C%20(Fri%2C%20Mar%2013th)&amp;severity=low&amp;id=69b3bcba2f860ef943a6b841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15515-cwe-306-missing-authentication-for--11564705</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15515%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20vivo%20Easyshare&amp;severity=medium&amp;id=69b3b5e82f860ef943a0e01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57849-incorrect-default-permissions-in-re-f1df4890</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57849%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Fuse%207&amp;severity=medium&amp;id=69b41f832f860ef943ec0b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8766-incorrect-default-permissions-in-red-f543bdcb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8766%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Openshift%20Data%20Foundation%204&amp;severity=medium&amp;id=69b37da62f860ef94357f3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22216-improper-control-of-interaction-fre-b8164faf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22216%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc22f860ef9434ef315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22215-cross-site-request-forgery-csrf-in--343e3edd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22215%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc22f860ef9434ef304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22210-improper-neutralization-of-input-du-1e5ecaf0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22210%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=low&amp;id=69b36fc22f860ef9434ef2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22209-improper-neutralization-of-input-du-b3cac329</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22209%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc22f860ef9434ef2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22204-improper-input-validation-in-gvecto-cc7b6f3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22204%3A%20Improper%20Input%20Validation%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22203-exposure-of-sensitive-information-t-7dc2dafb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22203%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22202-cross-site-request-forgery-csrf-in--0ad91517</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22202%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22201-use-of-less-trusted-source-in-gvect-1dd97214</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22201%3A%20Use%20of%20Less%20Trusted%20Source%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22199-authentication-bypass-by-spoofing-i-6e3b7ac2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22199%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Voltronic%20Power%20SNMP%20Web%20Pro&amp;severity=high&amp;id=69b36fc02f860ef9434ef29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22193-improper-neutralization-of-special--3f166beb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22193%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=critical&amp;id=69b36fc02f860ef9434ef29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22192-improper-neutralization-of-input-du-14954f30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22192%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Voltronic%20Power%20SNMP%20Web%20Pro&amp;severity=high&amp;id=69b36fc02f860ef9434ef295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22191-improper-control-of-generation-of-c-4cebc079</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22191%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Beghelli%20SicuroWeb%20(Sicuro24)&amp;severity=medium&amp;id=69b36fc02f860ef9434ef290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22183-improper-neutralization-of-input-du-c2f286a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22183%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22182-missing-authorization-in-gvectors-w-7c03bc66</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22182%3A%20Missing%20Authorization%20in%20gVectors%20wpDiscuz&amp;severity=high&amp;id=69b36fc02f860ef9434ef286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-13-7098392e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-13&amp;severity=medium&amp;id=69b4a8402f860ef943cf25a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-13-00a4f50f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-13&amp;severity=medium&amp;id=69b4424d2f860ef94305fd27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kadnap-botnet-ioc-mainly-asus-router-eedbb221</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KadNap%20botnet%20IOC%20(mainly%20Asus%20router)&amp;severity=low&amp;id=69b4424d2f860ef94305fced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-13-28ac8131</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-13&amp;severity=low&amp;id=69b3b22a2f860ef9439d7e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32612-cwe-79-improper-neutralization-of-i-f3855dcc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32612%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69b3375b2f860ef943024599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32597-cwe-345-insufficient-verification-o-0a93b017</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32597%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20jpadilla%20pyjwt&amp;severity=high&amp;id=69b3375b2f860ef943024596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32322-cwe-697-incorrect-comparison-in-ste-733aea35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32322%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20stellar%20rs-soroban-sdk&amp;severity=medium&amp;id=69b3375b2f860ef943024593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32320-cwe-125-out-of-bounds-read-in-ellan-b44add55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32320%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69b3375b2f860ef94302458b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32319-cwe-125-out-of-bounds-read-in-ellan-85cb4aa1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32319%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20ellanetworks%20core&amp;severity=high&amp;id=69b3375b2f860ef943024587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3910-inappropriate-implementation-in-goog-ead606c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3910%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69b333cf2f860ef943fdd755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3909-out-of-bounds-write-in-google-chrome-b07a2ef8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3909%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69b333cf2f860ef943fdd751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32304-cwe-94-improper-control-of-generati-7207fd62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32304%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20locutusjs%20locutus&amp;severity=critical&amp;id=69b333cf2f860ef943fdd74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32301-cwe-918-server-side-request-forgery-6022b45c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32301%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20centrifugal%20centrifugo&amp;severity=critical&amp;id=69b333cf2f860ef943fdd74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25076-sql-injection-in-anchore-anchore-en-d94b4892</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25076%3A%20SQL%20Injection%20in%20Anchore%20Anchore%20Enterprise&amp;severity=high&amp;id=69b3304b2f860ef943fa4693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3611-cwe-306-missing-authentication-for-c-2be1059b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3611%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Honeywell%20IQ4E&amp;severity=critical&amp;id=69b3223b2f860ef943f219ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32274-cwe-22-improper-limitation-of-a-pat-ca949827</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32274%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20psf%20black&amp;severity=high&amp;id=69b31b3a2f860ef943e8fcb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32269-cwe-683-function-call-with-incorrec-d0471610</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32269%3A%20CWE-683%3A%20Function%20Call%20With%20Incorrect%20Order%20of%20Arguments%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b31b3a2f860ef943e8fcab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32260-cwe-78-improper-neutralization-of-s-9c1d5a82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32260%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=69b31b3a2f860ef943e8fca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32251-cwe-611-improper-restriction-of-xml-6ee364da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32251%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20tolgee%20tolgee-platform&amp;severity=critical&amp;id=69b317b02f860ef943e64732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32248-cwe-943-improper-neutralization-of--cc26229b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32248%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b317b02f860ef943e6472d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32247-cwe-943-improper-neutralization-of--936b3588</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32247%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20getzep%20graphiti&amp;severity=high&amp;id=69b3294c2f860ef943f62e03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2376-url-redirection-to-untrusted-site-op-8ae8f8b9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2376%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69b3223b2f860ef943f219b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32246-cwe-287-improper-authentication-in--788ee6c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32246%3A%20CWE-287%3A%20Improper%20Authentication%20in%20steveiliop56%20tinyauth&amp;severity=high&amp;id=69b3294c2f860ef943f62df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32245-cwe-863-incorrect-authorization-in--778356e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32245%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20steveiliop56%20tinyauth&amp;severity=medium&amp;id=69b3294c2f860ef943f62df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32242-cwe-362-concurrent-execution-using--7a67bf5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32242%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b30d502f860ef943de4428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32237-cwe-200-exposure-of-sensitive-infor-f529e41f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32237%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20%40backstage%20plugin-scaffolder-backend&amp;severity=medium&amp;id=69b30d502f860ef943de4424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32236-cwe-918-server-side-request-forgery-ca31ec08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32236%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20%40backstage%20plugin-auth-backend&amp;severity=low&amp;id=69dffcc482d89c981f9a5a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32235-cwe-601-url-redirection-to-untruste-8786b7b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32235%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20%40backstage%20plugin-auth-backend&amp;severity=medium&amp;id=69b30d502f860ef943de441e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32138-cwe-284-improper-access-control-in--1d029b4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32138%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Stalin-143%20website&amp;severity=high&amp;id=69b30d502f860ef943de441a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3497-cwe-908-use-of-uninitialized-resourc-cddab41e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3497%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Ubuntu%20openssh&amp;severity=low&amp;id=69b30a4d2f860ef943dbc47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32232-cwe-22-improper-limitation-of-a-pat-5c2df155</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32232%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20qhkm%20zeptoclaw&amp;severity=high&amp;id=69b30a4d2f860ef943dbc47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32231-cwe-306-missing-authentication-for--ae638150</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32231%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20qhkm%20zeptoclaw&amp;severity=high&amp;id=69b30a4d2f860ef943dbc474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32142-cwe-200-exposure-of-sensitive-infor-6fbc29e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32142%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20shopware%20commercial&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13913-cwe-502-in-inductive-automation-ign-01f96f6b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13913%3A%20CWE-502%20in%20Inductive%20Automation%20Ignition%20Software&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32230-cwe-862-missing-authorization-in-lo-356bd849</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32230%3A%20CWE-862%3A%20Missing%20Authorization%20in%20louislam%20uptime-kuma&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32100-cwe-200-exposure-of-sensitive-infor-978514b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32100%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20swag%20platform-security&amp;severity=medium&amp;id=69b302c82f860ef943d65df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32141-cwe-674-uncontrolled-recursion-in-w-e8a42dbc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32141%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20WebReflection%20flatted&amp;severity=high&amp;id=69b302c82f860ef943d65df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13462-vulnerability-in-python-software-fo-9c4c971e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13462%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=69b302c82f860ef943d65de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32129-cwe-328-use-of-weak-hash-in-stellar-9ed57848</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32129%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20stellar%20rs-soroban-poseidon&amp;severity=high&amp;id=69b2ff142f860ef943d3c349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28256-cwe-547-use-of-hard-coded-security--5f1a8c05</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28256%3A%20CWE-547%20Use%20of%20hard-coded%2C%20security-relevant%20constants%20in%20Trane%20Tracer%20SC&amp;severity=medium&amp;id=69b2ff142f860ef943d3c346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28255-cwe-798-use-of-hard-coded-credentia-0910cf57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28255%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Trane%20Tracer%20SC&amp;severity=high&amp;id=69b2ff142f860ef943d3c343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28254-cwe-862-missing-authorization-in-tr-73884a61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28254%3A%20CWE-862%20Missing%20Authorization%20in%20Trane%20Tracer%20SC&amp;severity=medium&amp;id=69b2fb902f860ef943d10b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28253-cwe-789-memory-allocation-with-exce-81851637</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28253%3A%20CWE-789%20Memory%20allocation%20with%20excessive%20size%20value%20in%20Trane%20Tracer%20SC&amp;severity=high&amp;id=69b2fb902f860ef943d10b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3841-cwe-78-improper-neutralization-of-sp-c6a0b1e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3841%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20TL-MR6400%20v5.3&amp;severity=high&amp;id=69b2fb902f860ef943d10b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28252-cwe-327-use-of-a-broken-or-risky-cr-93113256</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28252%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Trane%20Tracer%20SC&amp;severity=critical&amp;id=69b2fb902f860ef943d10b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/handala-hack-unveiling-groups-modus-operandi-5e58407e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CHandala%20Hack%E2%80%9D%20%E2%80%93%20Unveiling%20Group%E2%80%99s%20Modus%20Operandi&amp;severity=medium&amp;id=69b2f83f2f860ef943cde4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31860-cwe-79-improper-neutralization-of-i-7fa3718b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31860%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unjs%20unhead&amp;severity=medium&amp;id=69b2fb902f860ef943d10b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21887-cwe-918-server-side-request-forgery-bfed939e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21887%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20OpenCTI-Platform%20opencti&amp;severity=high&amp;id=69b2ff142f860ef943d3c351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29066-cwe-552-files-or-directories-access-7742946f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29066%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20%40tinacms%20cli&amp;severity=medium&amp;id=69b30a4f2f860ef943dbd356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28793-cwe-22-improper-limitation-of-a-pat-139c4d03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28793%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40tinacms%20cli&amp;severity=high&amp;id=69b30a4f2f860ef943dbd353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28792-cwe-22-improper-limitation-of-a-pat-b7476262</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28792%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40tinacms%20cli&amp;severity=critical&amp;id=69b30a4d2f860ef943dbc486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28356-cwe-1333-inefficient-regular-expres-ea759df3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28356%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20defnull%20multipart&amp;severity=high&amp;id=69b30a4d2f860ef943dbc483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27940-cwe-122-heap-based-buffer-overflow--417912cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27940%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=69b30a4f2f860ef943dbd359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25529-cwe-79-improper-neutralization-of-i-c5291a63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25529%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20postalserver%20postal&amp;severity=high&amp;id=69b302c82f860ef943d65e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24125-cwe-22-improper-limitation-of-a-pat-167a257b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24125%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40tinacms%20graphql&amp;severity=medium&amp;id=69b302c82f860ef943d65dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21708-vulnerability-in-veeam-backup-and-r-a01c130d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21708%3A%20CWE-89%20SQL%20Injection%20in%20Veeam%20Backup%20and%20Replication&amp;severity=null&amp;id=69b2fb902f860ef943d10b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21672-vulnerability-in-veeam-backup-and-r-a938f0b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21672%3A%20CWE-538%20File%20and%20Directory%20Information%20Exposure%20in%20Veeam%20Backup%20and%20Replication&amp;severity=null&amp;id=69b2fb902f860ef943d10b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4045-observable-response-discrepancy-in-p-923f1212</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4045%3A%20Observable%20Response%20Discrepancy%20in%20projectsend&amp;severity=medium&amp;id=69b2e9fd2f860ef943be3537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amos-and-amatera-disguised-as-ai-agents-kaspersky--0fed8e97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AMOS%20and%20Amatera%20disguised%20as%20AI%20agents%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b329192f860ef943f5f8c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4044-path-traversal-in-projectsend-d26863f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4044%3A%20Path%20Traversal%20in%20projectsend&amp;severity=medium&amp;id=69b2df702f860ef943b15ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4043-stack-based-buffer-overflow-in-tenda-40bf116e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4043%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69b2df702f860ef943b15cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21668-vulnerability-in-veeam-backup-and-r-5ceecedd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21668%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=high&amp;id=69b2df702f860ef943b15cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21669-vulnerability-in-veeam-backup-and-r-0923d707</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21669%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=69b2df702f860ef943b15cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21671-vulnerability-in-veeam-software-app-8e791f48</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21671%3A%20Vulnerability%20in%20Veeam%20Software%20Appliance&amp;severity=critical&amp;id=69b2df702f860ef943b15ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21670-vulnerability-in-veeam-backup-and-r-75713f74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21670%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=high&amp;id=69b2df702f860ef943b15ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21666-vulnerability-in-veeam-backup-and-r-d782aaf9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21666%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=69b2df702f860ef943b15cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21667-vulnerability-in-veeam-backup-and-r-7dd414e0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21667%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=69b2df702f860ef943b15cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4042-stack-based-buffer-overflow-in-tenda-a49a83d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4042%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69b2df722f860ef943b15d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4041-stack-based-buffer-overflow-in-tenda-433ad76d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4041%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69b2df722f860ef943b15d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28384-cwe-78-improper-neutralization-of-s-d5f2b981</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28384%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69b30a4f2f860ef943dbd36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-updates-legacy-ios-versions-to-patch-coruna--74b61107</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Updates%20Legacy%20iOS%20Versions%20to%20Patch%20Coruna%20Exploits&amp;severity=medium&amp;id=69b2d12d2f860ef943a1d41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3099-reusing-a-nonce-key-pair-in-encrypti-33353641</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3099%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b2ca582f860ef943997cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meta-launches-new-protection-tools-as-it-helps-dis-4884c999</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meta%20Launches%20New%20Protection%20Tools%20as%20It%20Helps%20Disrupt%20Scam%20Centers&amp;severity=medium&amp;id=69b2bf982f860ef9438df518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0809-cwe-261-weak-encoding-for-password-i-5ddf5427</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0809%3A%20CWE-261%20Weak%20Encoding%20for%20Password%20in%20Streamsoft%20Streamsoft%20Presti%C5%BC&amp;severity=medium&amp;id=69b2ca582f860ef943997cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2514-cwe-79-improper-neutralization-of-in-5051e4f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2514%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon%20ADS&amp;severity=high&amp;id=69b2cde02f860ef9439e364c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2513-cwe-79-improper-neutralization-of-in-6c15055f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon%20ADS&amp;severity=high&amp;id=69b2cde02f860ef9439e3649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ally-wordpress-plugin-flaw-exposes-over-200000-web-d4e539a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ally%20WordPress%20Plugin%20Flaw%20Exposes%20Over%20200%2C000%20Websites%20to%20Attacks&amp;severity=low&amp;id=69b2b50f2f860ef94380e7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-human-ioc-why-security-professionals-struggle--46b836af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Human%20IOC%3A%20Why%20Security%20Professionals%20Struggle%20with%20Social%20Vetting&amp;severity=medium&amp;id=69b2b50f2f860ef94380e7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2987-cwe-79-improper-neutralization-of-in-5a2918fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Simple%20Ajax%20Chat%20%E2%80%93%20Add%20a%20Fast%2C%20Secure%20Chat%20Box&amp;severity=medium&amp;id=69b30a4f2f860ef943dbd377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/splunk-zoom-patch-severe-vulnerabilities-8e95386b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Splunk%2C%20Zoom%20Patch%20Severe%20Vulnerabilities&amp;severity=critical&amp;id=69b2ae042f860ef943779eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4040-information-exposure-through-discrep-0aaa5cb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4040%3A%20Information%20Exposure%20Through%20Discrepancy%20in%20OpenClaw&amp;severity=medium&amp;id=69b2ae4a2f860ef94378366e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4039-code-injection-in-openclaw-5c8684db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4039%3A%20Code%20Injection%20in%20OpenClaw&amp;severity=medium&amp;id=69b2ae4a2f860ef943783665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2366-authorization-bypass-through-user-co-8b18f55c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2366%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69b2c3542f860ef94391643f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3234-improper-neutralization-of-crlf-sequ-0b41120c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3234%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b2c3542f860ef943916446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-high-severity-ios-xr-vulnerabilities-0b099562</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20High-Severity%20IOS%20XR%20Vulnerabilities&amp;severity=high&amp;id=69b295692f860ef943608336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-vulnerabilities-allowed-server-takeov-0dad78f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20N8n%20Vulnerabilities%20Allowed%20Server%20Takeover&amp;severity=critical&amp;id=69b28e602f860ef9435aedf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polyfill-supply-chain-attack-impacting-100k-sites--0b7e80a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Polyfill%20Supply%20Chain%20Attack%20Impacting%20100k%20Sites%20Linked%20to%20North%20Korea&amp;severity=medium&amp;id=69b28adc2f860ef9435891b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4016-out-of-bounds-write-in-gpac-eec5a290</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4016%3A%20Out-of-bounds%20Write%20in%20GPAC&amp;severity=medium&amp;id=69b27d022f860ef9434f496c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4015-stack-based-buffer-overflow-in-gpac-e8ec27fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4015%3A%20Stack-based%20Buffer%20Overflow%20in%20GPAC&amp;severity=medium&amp;id=69b27d022f860ef9434f4962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4014-sql-injection-in-itsourcecode-cafe-r-fce405d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4014%3A%20SQL%20Injection%20in%20itsourcecode%20Cafe%20Reservation%20System&amp;severity=medium&amp;id=69b275fa2f860ef94349bd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4013-improper-authorization-in-sourcecode-f6c9bfe1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4013%3A%20Improper%20Authorization%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69b275fa2f860ef94349bd03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4012-out-of-bounds-read-in-rxi-fe-16bd524c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4012%3A%20Out-of-Bounds%20Read%20in%20rxi%20fe&amp;severity=medium&amp;id=69b26ef22f860ef94343bee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4010-memory-corruption-in-thakeenathees-p-393ae7ee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4010%3A%20Memory%20Corruption%20in%20ThakeeNathees%20pocketlang&amp;severity=medium&amp;id=69b26ef22f860ef94343bee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4009-out-of-bounds-read-in-jarikomppa-sol-d4f76128</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4009%3A%20Out-of-Bounds%20Read%20in%20jarikomppa%20soloud&amp;severity=medium&amp;id=69b26b6b2f860ef943412a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4008-stack-based-buffer-overflow-in-tenda-40f87be9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4008%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b264662f860ef9433c6315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4007-stack-based-buffer-overflow-in-tenda-fcb0a190</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4007%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b264662f860ef9433c630e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3994-heap-based-buffer-overflow-in-rui314-8b4917fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3994%3A%20Heap-based%20Buffer%20Overflow%20in%20rui314%20mold&amp;severity=medium&amp;id=69b2cde02f860ef9439e364f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3993-cross-site-scripting-in-itsourcecode-24b9c531</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3993%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2687-cwe-79-cross-site-scripting-xss-in-r-e7e711dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2687%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Reading%20progressbar&amp;severity=medium&amp;id=69b2c3542f860ef943916443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15473-cwe-862-missing-authorization-in-ti-8824c4ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15473%3A%20CWE-862%20Missing%20Authorization%20in%20Timetics&amp;severity=medium&amp;id=69b2ca582f860ef943997cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3992-injection-in-codegenieapp-serverless-4bc669e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3992%3A%20Injection%20in%20CodeGenieApp%20serverless-express&amp;severity=medium&amp;id=69b256532f860ef94332313d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3990-cross-site-scripting-in-cesiumgs-ces-3cc6e9c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3990%3A%20Cross%20Site%20Scripting%20in%20CesiumGS%20CesiumJS&amp;severity=medium&amp;id=69b256532f860ef943323137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3984-cross-site-scripting-in-campcodes-di-3bd8c22a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3984%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Division%20Regional%20Athletic%20Meet%20Game%20Result%20Matrix%20System&amp;severity=medium&amp;id=69b252cf2f860ef9432f8fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3983-cross-site-scripting-in-campcodes-di-d143b87a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3983%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Division%20Regional%20Athletic%20Meet%20Game%20Result%20Matrix%20System&amp;severity=medium&amp;id=69b252cf2f860ef9432f8fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3982-cross-site-scripting-in-itsourcecode-6ecf9062</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3982%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69b24bc72f860ef94329d5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3981-sql-injection-in-itsourcecode-online-3fe06655</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3981%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69b24bc72f860ef94329d59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3980-sql-injection-in-itsourcecode-online-6b588852</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3980%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69b241412f860ef94318ef80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3979-use-after-free-in-quickjs-ng-quickjs-4da86ea7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3979%3A%20Use%20After%20Free%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=69b236b22f860ef943fc88b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3978-stack-based-buffer-overflow-in-d-lin-18e3807e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3978%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69b236b22f860ef943fc88aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3977-missing-authorization-in-projectsend-aca59aed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3977%3A%20Missing%20Authorization%20in%20projectsend&amp;severity=medium&amp;id=69b236b22f860ef943fc88a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3976-stack-based-buffer-overflow-in-tenda-d46c36c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3976%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b22c262f860ef943edb6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3975-stack-based-buffer-overflow-in-tenda-d05d15a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3975%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b22c262f860ef943edb6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3226-cwe-862-missing-authorization-in-thi-acd09a45</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3226%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69b22c262f860ef943edb6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3657-cwe-89-improper-neutralization-of-sp-9aa62a75</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3657%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20premio%20My%20Sticky%20Bar%20%E2%80%93%20Floating%20Notification%20Bar%20%26%20Sticky%20Header%20(formerly%20myStickymenu)&amp;severity=high&amp;id=69b22c262f860ef943edb6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15038-cwe-125-out-of-bounds-read-in-asus--cbe1b081</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15038%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ASUS%20ASUS%20Business%20System%20Control%20Interface&amp;severity=medium&amp;id=69b22c262f860ef943edb6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1878-cwe-494-download-of-code-without-int-6c0c8aa1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1878%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ASUS%20Driver(%20Keyboard%20%26%20Mouse%20)&amp;severity=medium&amp;id=69b22c262f860ef943edb6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3974-stack-based-buffer-overflow-in-tenda-3ff86e73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3974%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b22c262f860ef943edb6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15037-cwe-732-incorrect-permission-assign-ede452fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15037%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ASUS%20ASUS%20Business%20System%20Control%20Interface&amp;severity=medium&amp;id=69b22c262f860ef943edb6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59388-cwe-259-in-qnap-systems-inc-hyper-d-f9d41b22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59388%3A%20CWE-259%20in%20QNAP%20Systems%20Inc.%20Hyper%20Data%20Protector&amp;severity=medium&amp;id=69b21e172f860ef943e393ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3973-stack-based-buffer-overflow-in-tenda-36404d80</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3973%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b21e172f860ef943e393b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3972-stack-based-buffer-overflow-in-tenda-c4bbbc78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3972%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b21e172f860ef943e393b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-iot-device-logs-in-as-admin-itx3fs-too-l-1ee7e685</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20your%20IoT%20Device%20Logs%20in%20as%20Admin%2C%20It%26%23x3f%3Bs%20too%20Late%26%23x21%3B%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Mar%2011th)&amp;severity=medium&amp;id=69b216d82f860ef943ce83a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3971-stack-based-buffer-overflow-in-tenda-6d3a9072</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3971%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69b30a4f2f860ef943dbd363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3970-stack-based-buffer-overflow-in-tenda-efc7e7df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3970%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69b30a4f2f860ef943dbd35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3969-sql-injection-in-feminer-wms-e9e28958</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3969%3A%20SQL%20Injection%20in%20FeMiner%20wms&amp;severity=medium&amp;id=69b2e9fd2f860ef943be353d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3968-code-injection-in-autohomecorp-frost-dc906d39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3968%3A%20Code%20Injection%20in%20AutohomeCorp%20frostmourne&amp;severity=medium&amp;id=69b2c3542f860ef943916465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3967-deserialization-in-alfresco-activiti-ec4438da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3967%3A%20Deserialization%20in%20Alfresco%20Activiti&amp;severity=medium&amp;id=69b205772f860ef9439c94a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3966-server-side-request-forgery-in-64854-7a9f914b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3966%3A%20Server-Side%20Request%20Forgery%20in%20648540858%20wvp-GB28181-pro&amp;severity=medium&amp;id=69b205772f860ef9439c949e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-12-12a19288</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-12&amp;severity=medium&amp;id=69b46b7a2f860ef94391c798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-12-d2659d35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-12&amp;severity=medium&amp;id=69b356c02f860ef9431a7669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25823-na-7fa89b66</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25823%3A%20n%2Fa&amp;severity=critical&amp;id=69b333cf2f860ef943fdd746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25819-na-a8d102e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25819%3A%20n%2Fa&amp;severity=high&amp;id=69b333cf2f860ef943fdd742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25818-na-3a1c622a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25818%3A%20n%2Fa&amp;severity=critical&amp;id=69b333cf2f860ef943fdd73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25817-na-cdf8c0ec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25817%3A%20n%2Fa&amp;severity=high&amp;id=69b333cf2f860ef943fdd73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70245-na-3e3c2378</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70245%3A%20n%2Fa&amp;severity=high&amp;id=69b3294c2f860ef943f62dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61154-na-7755ec0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61154%3A%20n%2Fa&amp;severity=medium&amp;id=69b3294c2f860ef943f62dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26793-na-885a662b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26793%3A%20n%2Fa&amp;severity=critical&amp;id=69b30d502f860ef943de4417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70873-na-d464299c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70873%3A%20n%2Fa&amp;severity=high&amp;id=69b30d502f860ef943de4412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66955-na-224e8433</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66955%3A%20n%2Fa&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26795-na-e936710e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26795%3A%20n%2Fa&amp;severity=critical&amp;id=69b302c82f860ef943d65df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26794-na-db8d7433</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26794%3A%20n%2Fa&amp;severity=high&amp;id=69b302c82f860ef943d65ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26792-na-4b0f503b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26792%3A%20n%2Fa&amp;severity=critical&amp;id=69b302c82f860ef943d65dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26791-na-72598ba6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26791%3A%20n%2Fa&amp;severity=critical&amp;id=69b302c82f860ef943d65de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-12-2a7a0014</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-12&amp;severity=low&amp;id=69b295652f860ef943607383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3965-protection-mechanism-failure-in-whyo-903268fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3965%3A%20Protection%20Mechanism%20Failure%20in%20whyour%20qinglong&amp;severity=medium&amp;id=69b2c3542f860ef94391645a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2808-cwe-59-improper-link-resolution-befo-54e69108</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2808%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(Link%20Following)%20in%20HashiCorp%20Consul&amp;severity=medium&amp;id=69b1faec2f860ef94395a3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3964-os-command-injection-in-openakita-4eebd5f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3964%3A%20OS%20Command%20Injection%20in%20OpenAkita&amp;severity=medium&amp;id=69b1f7682f860ef94392e99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3963-use-of-hard-coded-cryptographic-key--825e5a85</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3963%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20perfree%20go-fastdfs-web&amp;severity=medium&amp;id=69b1f7682f860ef94392e996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31988-off-by-one-error-in-thejoshwolfe-ya-91b12b49</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31988%3A%20Off-by-one%20Error%20in%20thejoshwolfe%20yauzl&amp;severity=medium&amp;id=69b1f7682f860ef94392e990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3962-cross-site-scripting-in-jcharis-mach-bab8dcf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3962%3A%20Cross%20Site%20Scripting%20in%20Jcharis%20Machine-Learning-Web-Apps&amp;severity=medium&amp;id=69b1f0632f860ef9438d4fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3942-incorrect-security-ui-in-google-chro-809449ba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3942%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3941-insufficient-policy-enforcement-in-g-31991683</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3941%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3940-insufficient-policy-enforcement-in-g-7e111baa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3940%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3939-insufficient-policy-enforcement-in-g-db3a4229</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3939%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3938-insufficient-policy-enforcement-in-g-a4258331</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3938%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3937-incorrect-security-ui-in-google-chro-63199e35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3937%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3936-use-after-free-in-google-chrome-687e409a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3936%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2df702f860ef943b15ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3935-incorrect-security-ui-in-google-chro-752742df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3935%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3934-insufficient-policy-enforcement-in-g-2c861307</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3934%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3932-insufficient-policy-enforcement-in-g-0a35e8cc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3932%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3931-heap-buffer-overflow-in-google-chrom-ef223c08</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3931%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2df702f860ef943b15ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3930-unsafe-navigation-in-google-chrome-e5c1e63d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3930%3A%20Unsafe%20navigation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a512f860ef943dbd440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62328-cwe-1021-improper-restriction-of-re-45a03379</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62328%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20HCLSoftware%20Nomad%20server%20on%20Domino&amp;severity=low&amp;id=69b2ff142f860ef943d3c34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3929-side-channel-information-leakage-in--267deba1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3929%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=low&amp;id=69b30a4f2f860ef943dbd373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3928-insufficient-policy-enforcement-in-g-8ec6a14c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3928%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a512f860ef943dbd43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3927-incorrect-security-ui-in-google-chro-791f6273</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3927%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a512f860ef943dbd438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3926-out-of-bounds-read-in-google-chrome-e2d2ad3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3926%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3925-incorrect-security-ui-in-google-chro-6b9c2f67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3925%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3924-use-after-free-in-google-chrome-aed7be91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3924%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef943916456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3923-use-after-free-in-google-chrome-50402a92</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3923%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef943916452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3922-use-after-free-in-google-chrome-b0d39043</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3922%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef94391644e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3921-use-after-free-in-google-chrome-62791b9d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3921%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef94391644a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3920-out-of-bounds-memory-access-in-googl-31d6b34c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3920%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3919-use-after-free-in-google-chrome-9af16b10</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3919%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3918-use-after-free-in-google-chrome-9ef1326e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3918%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3917-use-after-free-in-google-chrome-71a58bd0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3917%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3916-out-of-bounds-read-in-google-chrome-0673a67d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3916%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=critical&amp;id=69b30a512f860ef943dbd42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3915-heap-buffer-overflow-in-google-chrom-e216428c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3915%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3914-integer-overflow-in-google-chrome-950479b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3914%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a4f2f860ef943dbd37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3913-heap-buffer-overflow-in-google-chrom-8cf7ead7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3913%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a4f2f860ef943dbd37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3961-server-side-request-forgery-in-zyddn-d3b2c62a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3961%3A%20Server-Side%20Request%20Forgery%20in%20zyddnys%20manga-image-translator&amp;severity=medium&amp;id=69b30a522f860ef943dbd4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32133-cwe-918-server-side-request-forgery-6d76d5cb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32133%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Bubka%202FAuth&amp;severity=high&amp;id=69b1e5dd2f860ef94384a33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32136-cwe-287-improper-authentication-in--91bc9287</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32136%3A%20CWE-287%3A%20Improper%20Authentication%20in%20AdguardTeam%20AdGuardHome&amp;severity=critical&amp;id=69b1e5dd2f860ef94384a33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3959-os-command-injection-in-0xkoda-wirem-1d3e6508</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3959%3A%20OS%20Command%20Injection%20in%200xKoda%20WireMCP&amp;severity=medium&amp;id=69b1e5dd2f860ef94384a348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3958-server-side-request-forgery-in-woaha-1c324814</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3958%3A%20Server-Side%20Request%20Forgery%20in%20Woahai321%20ListSync&amp;severity=medium&amp;id=69b1e5dd2f860ef94384a341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32128-cwe-184-incomplete-list-of-disallow-46446d35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32128%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20labring%20FastGPT&amp;severity=medium&amp;id=69b1e24f2f860ef943814c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32117-cwe-79-improper-neutralization-of-i-425bdca8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32117%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ekacnet%20grafanacubism-panel&amp;severity=high&amp;id=69b1e24f2f860ef943814c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27591-cwe-284-improper-access-control-in--eac8002f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27591%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20wintercms%20winter&amp;severity=critical&amp;id=69b1e24f2f860ef943814c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3957-sql-injection-in-xierongwkhd-weimai--648696b2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3957%3A%20SQL%20Injection%20in%20xierongwkhd%20weimai-wetapp&amp;severity=medium&amp;id=69b1db482f860ef9437ae350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32112-cwe-79-improper-neutralization-of-i-e6caf05a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32112%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20homeassistant-ai%20ha-mcp&amp;severity=medium&amp;id=69b1d7c72f860ef94378fdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32111-cwe-918-server-side-request-forgery-65cc1f87</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32111%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20homeassistant-ai%20ha-mcp&amp;severity=medium&amp;id=69b1d7c72f860ef94378fdcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32110-cwe-918-server-side-request-forgery-60e05017</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32110%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69b1d7c72f860ef94378fdcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3956-sql-injection-in-xierongwkhd-weimai--fcc59d65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3956%3A%20SQL%20Injection%20in%20xierongwkhd%20weimai-wetapp&amp;severity=medium&amp;id=69b1d4422f860ef9437718ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3955-code-injection-in-elecv2p-8cd8ad16</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3955%3A%20Code%20Injection%20in%20elecV2P&amp;severity=medium&amp;id=69b1d4422f860ef9437718a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2640-cwe-269-improper-privilege-managemen-e95ab468</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2640%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Lenovo%20PC%20Manager&amp;severity=medium&amp;id=69b1d4422f860ef9437718a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1717-cwe-88-improper-neutralization-of-ar-cb1d4268</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1717%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=69b1d4402f860ef94377184b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1716-cwe-88-improper-neutralization-of-ar-14e492a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1716%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=69b1d4402f860ef943771847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1715-cwe-88-improper-neutralization-of-ar-b8774eec</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1715%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=69b1d4402f860ef943771843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1653-cwe-369-divide-by-zero-in-lenovo-sma-2246780a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1653%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20Lenovo%20Smart%20Connect&amp;severity=medium&amp;id=69b1d4402f860ef943771840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1652-cwe-122-heap-based-buffer-overflow-i-f6353da2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1652%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Lenovo%20Smart%20Connect&amp;severity=medium&amp;id=69b1d4402f860ef94377183d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0940-cwe-665-improper-initialization-in-l-1e8a6587</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0940%3A%20CWE-665%3A%20Improper%20Initialization%20in%20Lenovo%20ThinkPad%20T14%20Gen%205%20BIOS&amp;severity=high&amp;id=69b1d4402f860ef943771837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2368-cwe-295-improper-certificate-validat-34870dff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2368%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20FileZ&amp;severity=high&amp;id=69b1d4402f860ef94377184f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1068-cwe-295-improper-certificate-validat-9db0aa86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1068%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20FileZ&amp;severity=medium&amp;id=69b1d4402f860ef94377183a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0520-cwe-532-insertion-of-sensitive-infor-ef53dc0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0520%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Lenovo%20FileZ&amp;severity=low&amp;id=69b1d4402f860ef943771834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32109-cwe-79-improper-neutralization-of-i-b3c947c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32109%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=low&amp;id=69b1d0c22f860ef94375752b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32108-cwe-863-incorrect-authorization-in--b3b79436</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32108%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%209001%20copyparty&amp;severity=low&amp;id=69b1d0c22f860ef943757528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32104-cwe-639-authorization-bypass-throug-275920a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32104%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69b1d0c22f860ef943757522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32106-cwe-269-improper-privilege-manageme-b98c7a31</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32106%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69b1d0c22f860ef943757525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32103-cwe-639-authorization-bypass-throug-677e6d72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32103%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69b1d0c22f860ef94375751f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32101-cwe-863-incorrect-authorization-in--952207f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32101%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20%40studiocms%20s3-storage&amp;severity=high&amp;id=69b1d0c22f860ef94375751c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3954-path-traversal-in-openbmb-xagent-fb861de9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3954%3A%20Path%20Traversal%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=69b1cd382f860ef943720755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32234-cwe-89-improper-neutralization-of-s-dd3557bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32234%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1cd382f860ef943720750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32098-cwe-200-exposure-of-sensitive-infor-ba6a965b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32098%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1cd382f860ef94372074b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32097-cwe-639-authorization-bypass-throug-8831b524</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32097%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20comppolicylab%20pingpong&amp;severity=high&amp;id=69b1cd382f860ef943720748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32096-cwe-918-server-side-request-forgery-4e688d7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32096%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20useplunk%20plunk&amp;severity=critical&amp;id=69b1cd382f860ef943720744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32095-cwe-79-improper-neutralization-of-i-683938fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32095%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20useplunk%20plunk&amp;severity=medium&amp;id=69b1cd382f860ef943720741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32094-cwe-200-exposure-of-sensitive-infor-d09e40d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32094%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ericcornelissen%20shescape&amp;severity=medium&amp;id=69b1cd382f860ef94372073d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31979-cwe-59-improper-link-resolution-bef-4ecb1ff2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31979%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20himmelblau-idm%20himmelblau&amp;severity=high&amp;id=69b1c9b82f860ef9436f46ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31976-cwe-506-embedded-malicious-code-in--7bdbb65f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31976%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20xygeni%20xygeni-action&amp;severity=critical&amp;id=69b1c9b82f860ef9436f46e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31974-cwe-918-server-side-request-forgery-e24e73ea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31974%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opf%20openproject&amp;severity=low&amp;id=69b1c9b82f860ef9436f46e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27703-cwe-787-out-of-bounds-write-in-riot-9f9f0e2f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27703%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20RIOT-OS%20RIOT&amp;severity=high&amp;id=69b1c9b82f860ef9436f46e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31961-cwe-770-allocation-of-resources-wit-7b2d6a47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31961%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20anchore%20quill&amp;severity=medium&amp;id=69b1c6312f860ef9436c35f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3951-cross-site-scripting-in-lockerprojec-e61e3138</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3951%3A%20Cross%20Site%20Scripting%20in%20LockerProject%20Locker&amp;severity=medium&amp;id=69b1c6312f860ef9436c35fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31960-cwe-770-allocation-of-resources-wit-3b284858</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31960%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20anchore%20quill&amp;severity=medium&amp;id=69b1c6312f860ef9436c35f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31959-cwe-918-server-side-request-forgery-ed587800</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31959%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20anchore%20quill&amp;severity=medium&amp;id=69b1c6312f860ef9436c35f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31958-cwe-400-uncontrolled-resource-consu-93042686</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31958%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=69b1c6312f860ef9436c35eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31957-cwe-1188-insecure-default-initializ-e7809765</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31957%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20himmelblau-idm%20himmelblau&amp;severity=critical&amp;id=69b1c6312f860ef9436c35e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31901-cwe-204-observable-response-discrep-218df620</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31901%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1c6312f860ef9436c35e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31900-cwe-20-improper-input-validation-in-edbd8e2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31900%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20psf%20black&amp;severity=high&amp;id=69b1c6312f860ef9436c35dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31896-cwe-89-improper-neutralization-of-s-90bf525e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31896%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69b1c2ac2f860ef943697e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31895-cwe-89-improper-neutralization-of-s-8ec6b871</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31895%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69b1c2ac2f860ef943697e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31894-cwe-59-improper-link-resolution-bef-273e74f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31894%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69b1c2ac2f860ef943697e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3950-out-of-bounds-read-in-strukturag-lib-c710b92d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3950%3A%20Out-of-Bounds%20Read%20in%20strukturag%20libheif&amp;severity=medium&amp;id=69b1c2ac2f860ef943697e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24510-cwe-269-improper-privilege-manageme-c60c1a34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24510%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=medium&amp;id=69b1c2ac2f860ef943697e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31889-cwe-290-authentication-bypass-by-sp-9a902af4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31889%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20shopware%20core&amp;severity=high&amp;id=69b1c2ac2f860ef943697e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24508-cwe-295-improper-certificate-valida-35144bc2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24508%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=low&amp;id=69b1c2ac2f860ef943697e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31888-cwe-204-observable-response-discrep-3a60d5fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31888%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20shopware%20core&amp;severity=medium&amp;id=69b1bba82f860ef94362bfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24509-cwe-284-improper-access-control-in--f38b1b80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24509%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=low&amp;id=69b1bba82f860ef94362bfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31887-cwe-863-incorrect-authorization-in--092202e0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31887%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20shopware%20core&amp;severity=high&amp;id=69b1bba82f860ef94362bfad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3949-out-of-bounds-read-in-strukturag-lib-5bf25418</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3949%3A%20Out-of-Bounds%20Read%20in%20strukturag%20libheif&amp;severity=medium&amp;id=69b1b88a2f860ef943602144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31876-cwe-79-improper-neutralization-of-i-82d78847</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31876%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20notesnook&amp;severity=medium&amp;id=69b1b88a2f860ef943602140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31875-cwe-672-operation-on-a-resource-aft-92224a64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31875%3A%20CWE-672%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b1b88a2f860ef943602166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0231-cwe-497-exposure-of-sensitive-system-2d07855f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0231%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Broker%20VM&amp;severity=medium&amp;id=69b1b88a2f860ef943602151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31872-cwe-284-improper-access-control-in--6ddaf3fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31872%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b1b88a2f860ef943602161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0230-cwe-754-improper-check-for-unusual-o-1c766041</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0230%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Agent&amp;severity=medium&amp;id=69b1b88a2f860ef94360214e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31871-cwe-89-improper-neutralization-of-s-b26a259b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31871%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b1b88a2f860ef94360215c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31870-cwe-248-uncaught-exception-in-yhiro-528175cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31870%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69b1b88a2f860ef943602159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31868-cwe-79-improper-neutralization-of-i-07f6fa3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31868%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1b88a2f860ef943602154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31867-cwe-639-authorization-bypass-throug-c2789827</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31867%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69b1b88b2f860ef9436021cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31866-cwe-770-allocation-of-resources-wit-c8bbc737</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31866%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-feature%20flagd&amp;severity=high&amp;id=69b1b88b2f860ef9436021cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30226-cwe-1321-improperly-controlled-modi-8604fba8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30226%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20sveltejs%20devalue&amp;severity=medium&amp;id=69b1b88a2f860ef94360216b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31863-cwe-307-improper-restriction-of-exc-8cc9caca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31863%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20anyproto%20anytype-heart&amp;severity=low&amp;id=69b1b88b2f860ef9436021c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31859-cwe-79-improper-neutralization-of-i-e1757a3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31859%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69b1b88b2f860ef9436021c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31858-cwe-89-improper-neutralization-of-s-88a77bb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31858%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b1b88b2f860ef9436021c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31857-cwe-94-improper-control-of-generati-b827dfaa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31857%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b1aa112f860ef943525d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31975-cwe-78-improper-neutralization-of-s-a38c6f04</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31975%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20siteboon%20claudecodeui&amp;severity=high&amp;id=69b1aa112f860ef943525d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31861-cwe-94-improper-control-of-generati-57615f72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31861%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20siteboon%20claudecodeui&amp;severity=high&amp;id=69b1aa112f860ef943525d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31862-cwe-78-improper-neutralization-of-s-27a2b874</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31862%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20siteboon%20claudecodeui&amp;severity=critical&amp;id=69b1aa112f860ef943525d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31856-cwe-89-improper-neutralization-of-s-9159e344</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31856%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b1aa112f860ef943525d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31852-cwe-269-improper-privilege-manageme-1e9d6b5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31852%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20jellyfin%20code-quality.yml&amp;severity=critical&amp;id=69b1b88b2f860ef9436021d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31840-cwe-89-improper-neutralization-of-s-ae48a02e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31840%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b1b88b2f860ef9436021d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31839-cwe-354-improper-validation-of-inte-928c10e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31839%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20striae-org%20striae&amp;severity=high&amp;id=69b19f882f860ef9434a76cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31813-cwe-290-authentication-bypass-by-sp-c3c5f69f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31813%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20supabase%20auth&amp;severity=medium&amp;id=69b19f882f860ef9434a76cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30868-cwe-352-cross-site-request-forgery--7f200187</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30868%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20opnsense%20core&amp;severity=medium&amp;id=69b19f882f860ef9434a76c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20118-improper-cleanup-on-thrown-exceptio-decbeee1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20118%3A%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=69b19f882f860ef9434a76c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20117-improper-neutralization-of-input-du-1b81cde1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20117%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=69b19f882f860ef9434a76c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20116-improper-neutralization-of-input-du-5d1d53fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20116%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=69b19f882f860ef9434a76c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20046-permissions-privileges-and-access-c-8ac8ec84</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20046%3A%20Permissions%2C%20Privileges%2C%20and%20Access%20Control%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69b19f882f860ef9434a76ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20074-improper-validation-of-specified-ty-cb4cdc42</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20074%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69b19f882f860ef9434a76bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20040-improper-neutralization-of-special--28cef64a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20040%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69b19f882f860ef9434a76b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1471-cwe-863-incorrect-authorization-in-n-5b0adb08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1471%3A%20CWE-863%20Incorrect%20Authorization%20in%20Neo4j%20Enterprise%20edition&amp;severity=low&amp;id=69b19f882f860ef9434a76b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30239-cwe-863-incorrect-authorization-in--ed065581</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30239%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=69b198902f860ef9433d35f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30236-cwe-863-incorrect-authorization-in--4fd2e91c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30236%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=69b198902f860ef9433d35f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medtech-giant-stryker-crippled-by-iran-linked-hack-953234d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MedTech%20Giant%20Stryker%20Crippled%20by%20Iran-Linked%20Hacker%20Attack&amp;severity=medium&amp;id=69b198492f860ef9433c9548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20163-the-software-constructs-all-or-part-9c53cba7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20163%3A%20The%20software%20constructs%20all%20or%20part%20of%20a%20command%20using%20externally-influenced%20input%20from%20an%20upstream%20component%2C%20but%20it%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20special%20elements%20that%20could%20modify%20the%20intended%20command%20when%20it%20is%20sent%20to%20a%20downstream%20component.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69b198902f860ef9433d35e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20162-the-software-does-not-neutralize-or-5dd46d0f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20162%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20166-the-product-exposes-sensitive-infor-a841b7c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20166%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20164-the-product-exposes-sensitive-infor-98853a72</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20164%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20165-information-written-to-log-files-ca-f88941b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20165%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3429-improper-access-control-in-red-hat-r-689d9289</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3429%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69b198902f860ef9433d35fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1524-cwe-863-incorrect-authorization-in-n-a1518306</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1524%3A%20CWE-863%20Incorrect%20Authorization%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=69b1988f2f860ef9433d150f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30235-cwe-79-improper-neutralization-of-i-dd14d40c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30235%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opf%20openproject&amp;severity=medium&amp;id=69b198902f860ef9433d35f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30234-cwe-22-improper-limitation-of-a-pat-90813fd6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30234%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20opf%20openproject&amp;severity=medium&amp;id=69b194fa2f860ef943342469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28803-cwe-284-improper-access-control-in--4f7bbe07</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28803%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20open-formulieren%20open-forms&amp;severity=medium&amp;id=69b194fa2f860ef943342466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1497-cwe-863-incorrect-authorization-in-n-7ddf9448</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1497%3A%20CWE-863%20Incorrect%20Authorization%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=69b194fa2f860ef943342463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31892-cwe-863-incorrect-authorization-in--a88b5d70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31892%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=69b1917d2f860ef9432c8e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28229-cwe-863-incorrect-authorization-in--f1c60bd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28229%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20argoproj%20argo-workflows&amp;severity=critical&amp;id=69b1917d2f860ef9432c8e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12690-cwe-250-execution-with-unnecessary--e81ca7a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12690%3A%20CWE-250%20Execution%20with%20unnecessary%20privileges%20in%20Forcepoint%20NGFW%20Engine&amp;severity=high&amp;id=69b1917d2f860ef9432c8e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27897-cwe-22-improper-limitation-of-a-pat-e3daa46c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27897%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WanderingAstronomer%20Vociferous&amp;severity=critical&amp;id=69b1917d2f860ef9432c8e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22248-cwe-502-deserialization-of-untruste-1db54bf0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22248%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69b1917d2f860ef9432c8e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-conflict-drives-heightened-espionage-activity-8e0cdf7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20conflict%20drives%20heightened%20espionage%20activity%20against%20Middle%20East%20targets&amp;severity=medium&amp;id=69b7d24e9d4df45183475a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32229-cwe-290-in-jetbrains-hub-d8b40e32</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32229%3A%20CWE-290%20in%20JetBrains%20Hub&amp;severity=medium&amp;id=69b186eb2f860ef9431291d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3946-cross-site-scripting-in-phpems-703668cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3946%3A%20Cross%20Site%20Scripting%20in%20PHPEMS&amp;severity=medium&amp;id=69b186eb2f860ef9431291d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30903-cwe-73-external-control-of-file-nam-9bcbc0fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30903%3A%20CWE-73%20External%20control%20of%20file%20name%20or%20path%20in%20Zoom%20Communications%20Zoom%20Workplace&amp;severity=critical&amp;id=69b186eb2f860ef9431291cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30902-cwe-269-improper-privilege-manageme-b4150bc0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30902%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=high&amp;id=69b186eb2f860ef9431291ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30901-cwe-20-improper-input-validation-in-d71d0f92</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30901%3A%20CWE-20%20Improper%20input%20validation%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=high&amp;id=69b186eb2f860ef9431291c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30900-cwe-754-improper-check-for-unusual--7c59c0ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30900%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=high&amp;id=69b183692f860ef9430a87e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/238000-impacted-by-bell-ambulance-data-breach-8a14bb51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=238%2C000%20Impacted%20by%20Bell%20Ambulance%20Data%20Breach&amp;severity=medium&amp;id=69b1719c2f860ef943cd4ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3496-cwe-89-improper-neutralization-of-sp-f54d6727</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3496%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetBooking&amp;severity=high&amp;id=69b171e72f860ef943cd659c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3904-cwe-366-race-condition-within-a-thre-3c00b05d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3904%3A%20CWE-366%20Race%20condition%20within%20a%20thread%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=69b171e72f860ef943cd65a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3944-sql-injection-in-itsourcecode-univer-51d5eea3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3944%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69b163bf2f860ef943c23223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3943-command-injection-in-h3c-acg1000-ak2-385a93b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3943%3A%20Command%20Injection%20in%20H3C%20ACG1000-AK230&amp;severity=medium&amp;id=69b163bf2f860ef943c2321d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-ivanti-intel-patch-high-severity-vulnerab-6eed7f7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%2C%20Ivanti%2C%20Intel%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69b15c862f860ef943bdbb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-10x-your-vulnerability-management-program-i-9e653e42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%2010x%20Your%20Vulnerability%20Management%20Program%20in%20the%20Agentic%20Era&amp;severity=medium&amp;id=69b15c862f860ef943bdbb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/michelin-confirms-data-breach-linked-to-oracle-ebs-6db6f397</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Michelin%20Confirms%20Data%20Breach%20Linked%20to%20Oracle%20EBS%20Attack&amp;severity=medium&amp;id=69b151f92f860ef943b5520d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beatbanker-and-btmob-trojans-infection-techniques--c2f45e9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeatBanker%20and%20BTMOB%20trojans%3A%20infection%20techniques%20and%20how%20to%20stay%20safe%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b1d0172f860ef94375071d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/middle-east-crisis-exploited-by-fraudsters-governm-f86a46d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Middle%20East%20Crisis%20Exploited%20by%20Fraudsters%3A%20Government%20Impersonation%20and%20Evacuation%20Scam%20Infrastructure%20Identified&amp;severity=medium&amp;id=69b933a8771bdb17499de646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castlerat-attack-first-to-abuse-deno-javascript-ru-260b4856</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleRAT%20attack%20first%20to%20abuse%20Deno%20JavaScript%20runtime%20to%20evade%20enterprise%20security&amp;severity=medium&amp;id=69b7c7d69d4df451833e08e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3178-cwe-79-improper-neutralization-of-in-e5f2762b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeroenpeters1986%20Name%20Directory&amp;severity=high&amp;id=69b1523c2f860ef943b572b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kadnap-malware-turning-asus-routers-into-botnets-71871166</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KadNap%20Malware%20Turning%20Asus%20Routers%20Into%20Botnets&amp;severity=medium&amp;id=69b140632f860ef9439004e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-zombie-zip-files-cve-2026-0866-wed-mar-1-4a802635</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20%22Zombie%20Zip%22%20Files%20(CVE-2026-0866)%2C%20(Wed%2C%20Mar%2011th)&amp;severity=medium&amp;id=69b1d0472f860ef943751945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blacksanta-malware-activates-edr-and-av-killer-bef-26cabb98</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98BlackSanta%E2%80%99%20Malware%20Activates%20EDR%20and%20AV%20Killer%20Before%20Detonating%20Payload&amp;severity=medium&amp;id=69b1395c2f860ef94389f066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3231-cwe-79-improper-neutralization-of-in-46fc345a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehigh%20Checkout%20Field%20Editor%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=high&amp;id=69b139a22f860ef9438a0d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3906-cwe-862-missing-authorization-in-wor-9947b784</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3906%3A%20CWE-862%20Missing%20Authorization%20in%20WordPress%20Foundation%20WordPress&amp;severity=medium&amp;id=69b139a22f860ef9438a0d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1992-cwe-639-authorization-bypass-through-abde304f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1992%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=high&amp;id=69b139a22f860ef9438a0d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1993-cwe-269-improper-privilege-managemen-24b1c442</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1993%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=high&amp;id=69b139a22f860ef9438a0d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1454-cwe-79-improper-neutralization-of-in-c99aaf23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1454%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehunk%20Lead%20Form%20Builder%20%26%20Contact%20Form&amp;severity=high&amp;id=69b12b822f860ef94376110d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14026-cwe-78-in-qnap-systems-inc-qts-04698809</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14026%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=69b124772f860ef943643f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14025-cwe-89-in-qnap-systems-inc-video-st-dfdabf28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14025%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Video%20Station&amp;severity=low&amp;id=69b124772f860ef943643f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14024-cwe-295-in-qnap-systems-inc-video-s-51816644</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14024%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20Video%20Station&amp;severity=low&amp;id=69b124772f860ef943643f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-b89a8949</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Fixed%20by%20Siemens%2C%20Schneider%2C%20Moxa%2C%20Mitsubishi%20Electric&amp;severity=medium&amp;id=69b120c12f860ef9435b03c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2917-cwe-639-authorization-bypass-through-c3ec0b8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2917%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b121032f860ef9435ba546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3903-cwe-352-cross-site-request-forgery-c-73f3bf67</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3903%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20modulards%20Modular%20DS%3A%20Monitor%2C%20update%2C%20and%20backup%20multiple%20websites&amp;severity=medium&amp;id=69b121032f860ef9435ba556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1708-cwe-89-improper-neutralization-of-sp-91722cf8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1708%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69b121032f860ef9435ba53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2918-cwe-639-authorization-bypass-through-17a3f525</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2918%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b121032f860ef9435ba54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3534-cwe-79-improper-neutralization-of-in-83a4f3a9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3534%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Astra&amp;severity=medium&amp;id=69b112e52f860ef943422837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3826-cwe-98-improper-control-of-filename--e68c5a28</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3826%3A%20CWE-98%20Improper%20control%20of%20filename%20for%20Include%2FRequire%20statement%20in%20PHP%20program%20(&apos;PHP%20remote%20file%20inclusion&apos;)%20in%20WellChoose%20IFTOP&amp;severity=critical&amp;id=69b112e62f860ef943422847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3825-cwe-79-improper-neutralization-of-in-641f3f35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3825%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20WellChoose%20IFTOP&amp;severity=medium&amp;id=69b112e62f860ef943422843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31844-cwe-89-improper-neutralization-of-s-fae24db9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31844%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Koha%20Community%20Koha&amp;severity=high&amp;id=69b112e52f860ef943422834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3824-cwe-601-url-redirection-to-untrusted-e8697e70</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3824%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20WellChoose%20IFTOP&amp;severity=medium&amp;id=69b112e62f860ef94342283f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-oauth-device-code-phishing-5c00f553</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20OAuth%20Device%20Code%20Phishing&amp;severity=medium&amp;id=69b143e72f860ef94397fe66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2631-cwe-269-improper-privilege-managemen-beccaec0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2631%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Datalogics%20Ecommerce%20Delivery&amp;severity=critical&amp;id=69b108572f860ef94335d440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2626-cwe-502-deserialization-of-untrusted-6caf0aad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2626%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20divi-booster&amp;severity=high&amp;id=69b108572f860ef94335d43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2466-cwe-79-cross-site-scripting-xss-in-d-1e292536</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2466%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20DukaPress&amp;severity=high&amp;id=69b108572f860ef94335d43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1867-cwe-200-information-exposure-in-gues-73b4347e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1867%3A%20CWE-200%20Information%20Exposure%20in%20Guest%20posting%20%2F%20Frontend%20Posting%20%2F%20Front%20Editor&amp;severity=medium&amp;id=69b108572f860ef94335d437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1753-cwe-639-authorization-bypass-through-f27a895c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1753%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Gutena%20Forms&amp;severity=medium&amp;id=69b108572f860ef94335d434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3911-exposure-of-private-personal-informa-7285863b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3911%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69b104d42f860ef943326c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2707-cwe-79-improper-neutralization-of-in-1a1d8fa1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2707%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldgrid%20weForms%20%E2%80%93%20Easy%20Drag%20%26%20Drop%20Contact%20Form%20Builder%20For%20WordPress&amp;severity=medium&amp;id=69b0fdcf2f860ef9432e28e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3222-cwe-89-improper-neutralization-of-sp-3eef23b5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3222%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=high&amp;id=69b0fdcf2f860ef9432e28ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2358-cwe-79-improper-neutralization-of-in-aadc0e97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2358%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alimir%20WP%20ULike%20%E2%80%93%20Like%20%26%20Dislike%20Buttons%20for%20Engagement%20and%20Feedback&amp;severity=medium&amp;id=69b0fdcf2f860ef9432e28dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27842-authentication-bypass-using-an-alte-4a1f7ba8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27842%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Micro%20Research%20Ltd.%20MR-GM5L-S1&amp;severity=critical&amp;id=69b0fdcf2f860ef9432e28d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24448-use-of-hard-coded-credentials-in-mi-455b658d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24448%3A%20Use%20of%20hard-coded%20credentials%20in%20Micro%20Research%20Ltd.%20MR-GM5L-S1&amp;severity=critical&amp;id=69b0fdcf2f860ef9432e28d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20892-code-injection-in-micro-research-lt-9d6b477d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20892%3A%20Code%20injection%20in%20Micro%20Research%20Ltd.%20MR-GM5L-S1&amp;severity=high&amp;id=69b0fdcf2f860ef9432e28d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3884-cross-site-scripting-xss-in-spinjs-fd57032d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3884%3A%20Cross-site%20Scripting%20(XSS)%20in%20spin.js&amp;severity=medium&amp;id=69b0fdcf2f860ef9432e28fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13067-cwe-434-unrestricted-upload-of-file-9f3e7849</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13067%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=high&amp;id=69b0efc52f860ef943185a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2413-cwe-89-improper-neutralization-of-sp-3cc7e9f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2413%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20elemntor%20Ally%20%E2%80%93%20Web%20Accessibility%20%26%20Usability&amp;severity=high&amp;id=69b0efc52f860ef943185a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29515-cwe-303-incorrect-implementation-of-ff84fc0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29515%3A%20CWE-303%20Incorrect%20implementation%20of%20authentication%20algorithm%20in%20MiCode%20FileExplorer&amp;severity=critical&amp;id=69b0e8b62f860ef943102174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23817-vulnerability-in-hewlett-packard-en-5631bf85</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23817%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=medium&amp;id=69b0e8b62f860ef943102171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23816-vulnerability-in-hewlett-packard-en-f75f54e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23816%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=high&amp;id=69b0e8b62f860ef94310216e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23815-vulnerability-in-hewlett-packard-en-630530fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23815%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=high&amp;id=69b0e8b62f860ef94310216b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23814-vulnerability-in-hewlett-packard-en-e0f88dd5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23814%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=high&amp;id=69b0e8b62f860ef943102168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23813-vulnerability-in-hewlett-packard-en-bce16d68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23813%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=critical&amp;id=69b0e8b62f860ef943102165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3453-cwe-639-authorization-bypass-through-41f4f93e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3453%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=high&amp;id=69b0de292f860ef9430a0afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21291-cross-site-scripting-stored-xss-cwe-3d41cde9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21291%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21293-server-side-request-forgery-ssrf-cw-90c28adc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21293%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21282-improper-input-validation-cwe-20-in-a8641567</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21282%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21286-incorrect-authorization-cwe-863-in--83d31496</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21286%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21294-server-side-request-forgery-ssrf-cw-2145ce76</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21294%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21284-cross-site-scripting-stored-xss-cwe-91191b9f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21284%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de272f860ef9430a0aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21297-incorrect-authorization-cwe-863-in--5c202651</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21297%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21359-incorrect-authorization-cwe-863-in--f32386b9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21359%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21309-incorrect-authorization-cwe-863-in--80c62d9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21309%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de292f860ef9430a0aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21292-cross-site-scripting-stored-xss-cwe-734da7f2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21292%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21310-improper-input-validation-cwe-20-in-7fe81d1f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21310%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21285-incorrect-authorization-cwe-863-in--6bb8f61d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21285%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21290-cross-site-scripting-stored-xss-cwe-2715abb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21290%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de272f860ef9430a0ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21289-incorrect-authorization-cwe-863-in--83fd635f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21289%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de272f860ef9430a0ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21361-cross-site-scripting-stored-xss-cwe-be6d2519</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21361%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de292f860ef9430a0afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21360-improper-limitation-of-a-pathname-t-0f35b82f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21360%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21296-incorrect-authorization-cwe-863-in--71f95566</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21296%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21311-cross-site-scripting-stored-xss-cwe-8238eb6d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21311%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de292f860ef9430a0af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21295-url-redirection-to-untrusted-site-o-16a56e2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21295%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20(CWE-601)%20in%20Adobe%20Adobe%20Commerce&amp;severity=low&amp;id=69b0de292f860ef9430a0ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12473-cwe-79-improper-neutralization-of-i-2a6f769c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12473%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rometheme%20RTMKit&amp;severity=medium&amp;id=69b0cc972f860ef943fb1c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2324-cwe-352-cross-site-request-forgery-c-13e6dde4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2324%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69b0cc972f860ef943fb1c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1781-cwe-862-missing-authorization-in-dva-c640e5a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1781%3A%20CWE-862%20Missing%20Authorization%20in%20dvankooten%20MC4WP%3A%20Mailchimp%20for%20WordPress&amp;severity=medium&amp;id=69b0cc972f860ef943fb1c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27241-cross-site-scripting-stored-xss-cwe-e3d79025</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27241%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27255-cross-site-scripting-stored-xss-cwe-c7b3c2ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27255%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27244-cross-site-scripting-stored-xss-cwe-e47a6dc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27244%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27251-cross-site-scripting-stored-xss-cwe-73b1726e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27251%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27223-cross-site-scripting-stored-xss-cwe-bec05048</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27223%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27263-cross-site-scripting-stored-xss-cwe-10cfe83f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27263&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27262-cross-site-scripting-stored-xss-cwe-020c85ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27262%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8c2f860ef943f0dd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27261-cross-site-scripting-stored-xss-cwe-57935d09</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27261&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27232-cross-site-scripting-stored-xss-cwe-dbe9271e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27232%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27249-cross-site-scripting-stored-xss-cwe-3a157720</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27249%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27247-cross-site-scripting-dom-based-xss--dfb069c2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27247%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27242-cross-site-scripting-stored-xss-cwe-eb28f710</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27242%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27252-cross-site-scripting-stored-xss-cwe-27028954</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27252%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27235-cross-site-scripting-stored-xss-cwe-78c18807</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27235%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27225-cross-site-scripting-stored-xss-cwe-4fb82607</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27225%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27256-cross-site-scripting-stored-xss-cwe-c97af280</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27256%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27260-cross-site-scripting-stored-xss-cwe-ca7563dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27260&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27237-cross-site-scripting-stored-xss-cwe-26b46177</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27237%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27265-cross-site-scripting-stored-xss-cwe-17d23e90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27265%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8c2f860ef943f0dd9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27233-cross-site-scripting-stored-xss-cwe-de63556d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27233%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27236-cross-site-scripting-stored-xss-cwe-48c489ac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27236%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27240-cross-site-scripting-stored-xss-cwe-51fff64f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27240%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27239-cross-site-scripting-stored-xss-cwe-eaeb950d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27239%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27234-cross-site-scripting-stored-xss-cwe-d54737c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27234%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27259-cross-site-scripting-stored-xss-cwe-272afcac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27259&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27231-cross-site-scripting-stored-xss-cwe-840d33f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27231%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27264-cross-site-scripting-stored-xss-cwe-4cf95917</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27264&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27230-cross-site-scripting-stored-xss-cwe-2da5dfa8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27230%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27229-cross-site-scripting-stored-xss-cwe-6e8f5926</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27229%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27266-cross-site-scripting-stored-xss-cwe-1b2aa55d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27266%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8c2f860ef943f0dd9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27254-cross-site-scripting-stored-xss-cwe-ddda00f4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27254%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27228-cross-site-scripting-stored-xss-cwe-a86793cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27228%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27248-cross-site-scripting-stored-xss-cwe-1aa0d2cc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27248%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27257-cross-site-scripting-stored-xss-cwe-1a20c357</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27257%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27226-cross-site-scripting-stored-xss-cwe-20b5adcd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27226%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27253-cross-site-scripting-stored-xss-cwe-bf27f658</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27253%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27224-cross-site-scripting-stored-xss-cwe-369e2d82</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27224%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27250-cross-site-scripting-stored-xss-cwe-47871a60</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27250%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-11-38f0e8ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-11&amp;severity=medium&amp;id=69b205402f860ef9439bca45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70041-na-ac29e404</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70041%3A%20n%2Fa&amp;severity=critical&amp;id=69b1d7c72f860ef94378fdc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70024-na-0548f027</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70024%3A%20n%2Fa&amp;severity=critical&amp;id=69b1d4402f860ef94377182f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66956-na-361ffc2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66956%3A%20n%2Fa&amp;severity=critical&amp;id=69b1d0c22f860ef943757517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70082-na-40a1d15e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70082%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d150a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68623-na-988346cf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68623%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d1505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67041-na-6e95bb25</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67041%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d1500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67039-na-7e165db4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67039%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d14fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67038-na-642f82a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67038%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d14f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67037-na-ccafdfee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67037%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d14f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67036-na-a8c80856</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67036%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d14ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67035-na-376cd6ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67035%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d14e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67034-na-e3e1ba63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67034%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d14e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30741-na-35d95b25</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30741%3A%20n%2Fa&amp;severity=critical&amp;id=69b194fa2f860ef94334246c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67298-na-23778477</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67298%3A%20n%2Fa&amp;severity=high&amp;id=69b186eb2f860ef9431291c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70330-na-4afa6ce5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70330%3A%20n%2Fa&amp;severity=low&amp;id=69b183692f860ef9430a87de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70027-na-b6816533</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70027%3A%20n%2Fa&amp;severity=high&amp;id=69b17c642f860ef943f8b119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-11-3af3869f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-11&amp;severity=medium&amp;id=69b1751d2f860ef943cfc2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-11-66c38b04</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-11&amp;severity=low&amp;id=69b0e4f92f860ef9430e38ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2569-cwe-79-improper-neutralization-of-in-d80ea1e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2569%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dearhive%20Dear%20Flipbook%20%E2%80%93%20PDF%20Flipbook%2C%203D%20Flipbook%2C%20PDF%20embed%2C%20PDF%20viewer&amp;severity=medium&amp;id=69b0acf02f860ef943e36226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27270-out-of-bounds-read-cwe-125-in-adobe-f1de6725</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27270%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=69b0a5e82f860ef943dd6b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27271-heap-based-buffer-overflow-cwe-122--6508905d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27271%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21333-untrusted-search-path-cwe-426-in-ad-6ec6c0d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21333%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27268-out-of-bounds-read-cwe-125-in-adobe-2889ba56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27268%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=69b0a5e82f860ef943dd6b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21362-out-of-bounds-write-cwe-787-in-adob-d9ffb819</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21362%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27272-out-of-bounds-write-cwe-787-in-adob-b2062b24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27272%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27267-stack-based-buffer-overflow-cwe-121-b7b786ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27267%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22850-information-disclosure-in-intelr-re-bf19ed93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22850%3A%20Information%20Disclosure%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20information%20disclosure.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20exposure.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(none)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69b0a2672f860ef943daaa01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22444-information-disclosure-in-intelr-re-1a61e87f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22444%3A%20Information%20Disclosure%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20information%20disclosure.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20exposure.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(none)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69b0a2672f860ef943daa9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20105-escalation-of-privilege-in-intelr-r-d3541982</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20105%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20low%20complexity%20attack%20may%20enable%20local%20code%20execution.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20073-information-disclosure-in-intelr-re-8e917e6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20073%3A%20Information%20Disclosure%20in%20Intel(R)%20Reference%20Platforms&amp;severity=low&amp;id=69b0a2672f860ef943daa9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20068-escalation-of-privilege-in-intelr-r-a31dde9e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20068%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20064-escalation-of-privilege-in-intelr-r-b72354ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20064%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20local%20code%20execution.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20028-escalation-of-privilege-in-intelr-r-8b5df3e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20028%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20027-escalation-of-privilege-in-intelr-r-ac01f83a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20027%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20005-escalation-of-privilege-in-intelr-r-17136448</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20005%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20manipulation.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(none)%2C%20integrity%20(high)%20and%20availability%20(low)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69b0a2672f860ef943daa9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20096-escalation-of-privilege-in-intel-re-4e321b78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20096%3A%20Escalation%20of%20Privilege%20in%20Intel%20Reference%20Platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20manipulation.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20active%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(none)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(high)%20and%20availability%20(high)%20impacts.&amp;severity=medium&amp;id=69b09ee22f860ef943d62fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31834-cwe-269-improper-privilege-manageme-405c91d9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31834%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20umbraco%20Umbraco-CMS&amp;severity=high&amp;id=69b094562f860ef943cc190d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31833-cwe-79-improper-neutralization-of-i-bd0cf56c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31833%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=69b094562f860ef943cc190a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31832-cwe-639-authorization-bypass-throug-58061dc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31832%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=69b094562f860ef943cc1907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31830-cwe-252-unchecked-return-value-in-s-e783b2ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31830%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20sigstore%20sigstore-ruby&amp;severity=high&amp;id=69b094562f860ef943cc1904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31829-cwe-918-server-side-request-forgery-c90afb2e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31829%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69b18a712f860ef9431b626c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31828-cwe-90-improper-neutralization-of-s-a8a27177</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31828%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b194fa2f860ef943342479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27221-improper-certificate-validation-cwe-74d41f50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27221%3A%20Improper%20Certificate%20Validation%20(CWE-295)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69b0efc52f860ef943185a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27278-use-after-free-cwe-416-in-adobe-acr-65cc0110</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27278%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69b178e02f860ef943e659be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27220-use-after-free-cwe-416-in-adobe-acr-1606279c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27220%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69b0efc52f860ef943185a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31827-cwe-362-concurrent-execution-using--6da2171b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31827%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Blue-B%20Alienbin&amp;severity=high&amp;id=69b194fa2f860ef943342476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31826-cwe-770-allocation-of-resources-wit-6bab0c22</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31826%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69b194fa2f860ef943342471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28807-cwe-22-improper-limitation-of-a-pat-467caf6c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28807%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gleam-wisp%20wisp&amp;severity=high&amp;id=69b17c642f860ef943f8b121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28806-cwe-285-improper-authorization-in-n-d2ddfb8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28806%3A%20CWE-285%20Improper%20Authorization%20in%20nerves-hub%20nerves_hub_web&amp;severity=critical&amp;id=69b090d12f860ef943c885b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-mois-actors-the-cyber-crime-connection-45c626a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20MOIS%20Actors%20%26%20the%20Cyber%20Crime%20Connection&amp;severity=medium&amp;id=69b140632f860ef9439004ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31815-cwe-284-improper-access-control-in--f8afe07c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31815%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20django-commons%20django-unicorn&amp;severity=medium&amp;id=69b08d502f860ef943c51495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31812-cwe-248-uncaught-exception-in-quinn-8aa79227</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31812%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20quinn-rs%20quinn&amp;severity=high&amp;id=69b08d502f860ef943c51492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31808-cwe-835-loop-with-unreachable-exit--1b765dff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31808%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20sindresorhus%20file-type&amp;severity=medium&amp;id=69b089ca2f860ef943c11e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31809-cwe-79-improper-neutralization-of-i-e8f87427</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31809%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69b089ca2f860ef943c11e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31807-cwe-79-improper-neutralization-of-i-70d89aab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31807%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69b089ca2f860ef943c11e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31801-cwe-863-incorrect-authorization-in--2ed9c2cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31801%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20project-zot%20zot&amp;severity=high&amp;id=69b089ca2f860ef943c11e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31800-cwe-862-missing-authorization-in-pa-7b9d0f4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31800%3A%20CWE-862%3A%20Missing%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b0864c2f860ef943bbb075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30972-cwe-799-improper-control-of-interac-e73c2d7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30972%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b0864c2f860ef943bbb070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0124-elevation-of-privilege-in-google-and-bf0f89c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0124%3A%20Vulnerability%20in%20Google%20Android&amp;severity=critical&amp;id=69b0864a2f860ef943bb990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0123-elevation-of-privilege-in-google-and-3241f5ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0123%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb9909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0122-remote-code-execution-in-google-andr-6ef00366</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0122%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb9906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0121-information-disclosure-in-google-and-2990bd54</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0121%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=low&amp;id=69b0864a2f860ef943bb9903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0120-remote-code-execution-in-google-andr-8a23e39a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0120%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69b0864a2f860ef943bb9900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0119-elevation-of-privilege-in-google-and-8be81354</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0119%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=69b0864a2f860ef943bb98fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0118-elevation-of-privilege-in-google-and-7abd765c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0118%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb98fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0117-elevation-of-privilege-in-google-and-157fc49a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0117%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb98f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0116-remote-code-execution-in-google-andr-57041293</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0116%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69b0864a2f860ef943bb98f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0115-information-disclosure-in-google-and-f8bd7d43</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0115%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=low&amp;id=69b086492f860ef943bb98da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0114-remote-code-execution-in-google-andr-19803325</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0114%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0113-elevation-of-privilege-in-google-and-81569a06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0113%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0112-elevation-of-privilege-in-google-and-c9519c28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0112%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0111-elevation-of-privilege-in-google-and-aad93a86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0111%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30967-cwe-287-improper-authentication-in--fd3a9bf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30967%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b0864c2f860ef943bbb06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0110-elevation-of-privilege-in-google-and-40cc8cba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0110%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0109-denial-of-service-in-google-android-797e2891</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0109%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0108-information-disclosure-in-google-and-3a45f672</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0108%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69b086492f860ef943bb98c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0107-elevation-of-privilege-in-google-and-3e492b37</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0107%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36920-elevation-of-privilege-in-google-an-ca1cd87c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36920%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30966-cwe-284-improper-access-control-in--321de92a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30966%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b0864c2f860ef943bbb066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30965-cwe-863-incorrect-authorization-in--02172b99</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30965%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b0864c2f860ef943bbb061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30962-cwe-284-improper-access-control-in--f0f6f512</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30962%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b0864c2f860ef943bbb05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30954-cwe-639-authorization-bypass-throug-dbe3b488</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30954%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Kovah%20LinkAce&amp;severity=medium&amp;id=69b0864a2f860ef943bb990f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30953-cwe-918-server-side-request-forgery-8de6dba7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30953%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69b082c52f860ef943b7fd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66413-cwe-200-exposure-of-sensitive-infor-7dcd20ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66413%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20git-for-windows%20git&amp;severity=high&amp;id=69b082c52f860ef943b7fd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30952-cwe-22-improper-limitation-of-a-pat-4b891716</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30952%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69b082c52f860ef943b7fd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30949-cwe-287-improper-authentication-in--b219bd57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30949%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30948-cwe-79-improper-neutralization-of-i-9cf54941</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30948%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30947-cwe-863-incorrect-authorization-in--2701ab0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30947%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13213-cwe-644-improper-neutralization-of--ac5f008e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13213%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Aspera%20Orchestrator&amp;severity=medium&amp;id=69b07f3e2f860ef943b515a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30946-cwe-770-allocation-of-resources-wit-e2f098e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30946%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30837-cwe-1333-inefficient-regular-expres-f4457447</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30837%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20elysiajs%20elysia&amp;severity=high&amp;id=69b07f3e2f860ef943b515a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29793-cwe-943-improper-neutralization-of--35303311</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29793%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20%40feathersjs%20mongodb&amp;severity=critical&amp;id=69b17c642f860ef943f8b128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13219-cwe-598-use-of-get-request-method-w-dda311a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13219%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20IBM%20Aspera%20Orchestrator&amp;severity=medium&amp;id=69b17c642f860ef943f8b11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29792-cwe-287-improper-authentication-in--5aa27c8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29792%3A%20CWE-287%3A%20Improper%20Authentication%20in%20feathersjs%20feathers&amp;severity=critical&amp;id=69b17c642f860ef943f8b125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29177-cwe-79-improper-neutralization-of-i-6718bb6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29177%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=low&amp;id=69b07bba2f860ef943b24cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29176-cwe-79-improper-neutralization-of-i-11bbfb8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29176%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69b07bba2f860ef943b24cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36226-cwe-79-improper-neutralization-of-i-05c56705</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Aspera%20Faspex%205&amp;severity=medium&amp;id=69b07bba2f860ef943b24cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29175-cwe-79-improper-neutralization-of-i-64f01270</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29175%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69b07bba2f860ef943b24ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36227-cwe-644-improper-neutralization-of--a6241ec7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36227%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Aspera%20Faspex%205&amp;severity=medium&amp;id=69b07bba2f860ef943b24cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29174-cwe-89-improper-neutralization-of-s-a2c8e194</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29174%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69b07bba2f860ef943b24cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29173-cwe-79-improper-neutralization-of-i-4996e4fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29173%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=low&amp;id=69b07bba2f860ef943b24cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2713-cwe-427-uncontrolled-search-path-ele-2f1ac992</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2713%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20IBM%20Trusteer%20Rapport%20installer&amp;severity=high&amp;id=69b07bba2f860ef943b24cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29172-cwe-89-improper-neutralization-of-s-7609f4db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29172%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69b07bba2f860ef943b24cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29113-cwe-352-cross-site-request-forgery--e48c5eb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29113%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20craftcms%20cms&amp;severity=low&amp;id=69b078412f860ef943afd33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48611-vulnerability-in-google-pixel-609c67e3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48611%3A%20Vulnerability%20in%20Google%20Android&amp;severity=critical&amp;id=69b078412f860ef943afd332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26330-cwe-416-use-after-free-in-envoyprox-ddebfef5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26330%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26311-cwe-416-use-after-free-in-envoyprox-c65b8305</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26311%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-83-vulnerabilities-3d1aa61f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%2083%20Vulnerabilities&amp;severity=critical&amp;id=69b06d742f860ef9439f662e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26310-cwe-20-improper-input-validation-in-c47a1f4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26310%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26309-cwe-193-off-by-one-error-in-envoypr-008d28a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26309%3A%20CWE-193%3A%20Off-by-one%20Error%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26123-cwe-939-improper-authorization-in-h-19c71b84</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26123%3A%20CWE-939%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme%20in%20Microsoft%20Microsoft%20Authenticator%20for%20Android&amp;severity=medium&amp;id=69b071392f860ef943a5fd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26308-cwe-863-incorrect-authorization-in--f13a384a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26308%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20envoyproxy%20envoy&amp;severity=high&amp;id=69b071392f860ef943a5fd53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3582-cwe-862-missing-authorization-in-git-07d9b944</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3582%3A%20CWE-862%20Missing%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69b0713c2f860ef943a5fdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2266-cwe-79-improper-neutralization-of-in-30e812ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2266%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69b0713c2f860ef943a5fde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27825-cwe-22-improper-limitation-of-a-pat-2e969811</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27825%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sooperset%20mcp-atlassian&amp;severity=critical&amp;id=69b0713c2f860ef943a5fde4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27218-null-pointer-dereference-cwe-476-in-19a98ba3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27218%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27219-out-of-bounds-read-cwe-125-in-adobe-f5642f0d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27219%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2b2f860ef943991ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27214-null-pointer-dereference-cwe-476-in-86773ec4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27214%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21364-null-pointer-dereference-cwe-476-in-bf0c7224</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21364%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21365-out-of-bounds-read-cwe-125-in-adobe-ece1c6c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21365%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27217-null-pointer-dereference-cwe-476-in-425fdf98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27217%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27216-out-of-bounds-read-cwe-125-in-adobe-bab54d2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27216%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21363-null-pointer-dereference-cwe-476-in-925a5a83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21363%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27215-null-pointer-dereference-cwe-476-in-a150e4da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27215%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27826-cwe-918-server-side-request-forgery-590e7915</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27826%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sooperset%20mcp-atlassian&amp;severity=high&amp;id=69b06a2b2f860ef943991eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27274-out-of-bounds-write-cwe-787-in-adob-71522e22</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27274%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27277-use-after-free-cwe-416-in-adobe-sub-c30c0c73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27277%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27273-out-of-bounds-write-cwe-787-in-adob-702a87fe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27273%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27275-out-of-bounds-write-cwe-787-in-adob-a30a4fc1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27275%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27276-use-after-free-cwe-416-in-adobe-sub-a6f54503</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27276%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27279-out-of-bounds-write-cwe-787-in-adob-7f3c880f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27279%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28292-cwe-78-improper-neutralization-of-s-9307703c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28292%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20steveukx%20simple-git&amp;severity=critical&amp;id=69b06a2b2f860ef943991f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27269-out-of-bounds-read-cwe-125-in-adobe-ca3c9c57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27269%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Premiere%20Pro&amp;severity=high&amp;id=69b06a2b2f860ef943991ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27281-integer-overflow-or-wraparound-cwe--5911f44a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27281%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=69b063a09972381a98a3a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27280-out-of-bounds-write-cwe-787-in-adob-f9f72bc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27280%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=69b063a09972381a98a3a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-80-vulnerabilities-across-eight-prod-e4e45626</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%2080%20Vulnerabilities%20Across%20Eight%20Products&amp;severity=medium&amp;id=69b063599972381a98a2f608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30980-cwe-121-stack-based-buffer-overflow-016aa9e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30980%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31797-cwe-125-out-of-bounds-read-in-inter-11ca7acb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31797%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31796-cwe-122-heap-based-buffer-overflow--7bfcec69</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31796%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31795-cwe-120-buffer-copy-without-checkin-cd8b5822</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31795%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31794-cwe-125-out-of-bounds-read-in-inter-b68a5903</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31794%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f29e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31793-cwe-125-out-of-bounds-read-in-inter-aee63f1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31793%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31792-cwe-476-null-pointer-dereference-in-ebb64067</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31792%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30987-cwe-120-buffer-copy-without-checkin-e205f696</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30987%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30986-cwe-125-out-of-bounds-read-in-inter-f7bff699</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30986%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30985-cwe-120-buffer-copy-without-checkin-8671bbf3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30985%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30984-cwe-125-out-of-bounds-read-in-inter-a3bc80de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30984%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30983-cwe-120-buffer-copy-without-checkin-f33c4cb9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30983%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30982-cwe-122-heap-based-buffer-overflow--69aca4d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30982%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30981-cwe-120-buffer-copy-without-checkin-2e72aca3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30981%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30979-cwe-120-buffer-copy-without-checkin-ecd82a3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30979%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3306-cwe-639-authorization-bypass-through-20e33556</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3306%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69b060189972381a9898f2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30978-cwe-416-use-after-free-in-internati-63697589</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30978%3A%20CWE-416%3A%20Use%20After%20Free%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30977-cwe-79-improper-neutralization-of-i-ba88b63e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30977%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lihaohong6%20RenderBlocking&amp;severity=low&amp;id=69b059afea502d3aa8817508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3854-cwe-77-improper-neutralization-of-sp-75942f9f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3854%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69b059afea502d3aa881750d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30974-cwe-79-improper-neutralization-of-i-793c1d5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30974%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=medium&amp;id=69b059afea502d3aa8817503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-march-2026-tue-mar-10th-b60d64cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20March%202026%2C%20(Tue%2C%20Mar%2010th)&amp;severity=critical&amp;id=69b05966ea502d3aa880ea76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30973-cwe-22-improper-limitation-of-a-pat-71bf7da0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30973%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40appium%20support&amp;severity=medium&amp;id=69b059afea502d3aa88174ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30970-cwe-862-missing-authorization-in-co-8a757049</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30970%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Coral-Protocol%20coral-server&amp;severity=high&amp;id=69b059afea502d3aa88174fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30969-cwe-639-authorization-bypass-throug-371410d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30969%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Coral-Protocol%20coral-server&amp;severity=high&amp;id=69b059afea502d3aa88174f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30968-cwe-862-missing-authorization-in-co-37b3de3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30968%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Coral-Protocol%20coral-server&amp;severity=high&amp;id=69b05633ea502d3aa87d6b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2273-cwe-94-improper-control-of-generatio-f2295eba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2273%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Automation%20Expert&amp;severity=high&amp;id=69b05632ea502d3aa87d6b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30964-cwe-346-origin-validation-error-in--c1f14445</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30964%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20web-auth%20webauthn-framework&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30960-cwe-94-improper-control-of-generati-c9d430fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30960%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apich-Organization%20rssn&amp;severity=critical&amp;id=69b05633ea502d3aa87d6b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1286-cwe-502-deserialization-of-untrusted-87e64bf8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1286%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Foxboro%20DCS&amp;severity=high&amp;id=69b05626ea502d3aa87d6873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13902-cwe-79-improper-neutralization-of-i-03f84a2b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13902%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=medium&amp;id=69b05626ea502d3aa87d6870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26144-cwe-79-improper-neutralization-of-i-0ee52b3e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26144%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05632ea502d3aa87d6b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26141-cwe-287-improper-authentication-in--f569f664</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26141%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Azure%20Automation%20Hybrid%20Worker%20Windows%20Extension&amp;severity=high&amp;id=69b05632ea502d3aa87d6b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26130-cwe-770-allocation-of-resources-wit-049f3df0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26130%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Microsoft%20ASP.NET%20Core%2010.0&amp;severity=high&amp;id=69b05632ea502d3aa87d6b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26118-cwe-918-server-side-request-forgery-18ee2132</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26118%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20MCP%20Server%20Tools%201.0.0%20(npm)&amp;severity=high&amp;id=69b05631ea502d3aa87d6b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26117-cwe-288-authentication-bypass-using-54d513ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26117%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Microsoft%20Arc%20Enabled%20Servers%20-%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=69b05631ea502d3aa87d6b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26110-cwe-843-access-of-resource-using-in-9fa096e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26110%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05631ea502d3aa87d6b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26109-cwe-125-out-of-bounds-read-in-micro-6ab80f9c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26109%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b0562fea502d3aa87d6afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26108-cwe-122-heap-based-buffer-overflow--4da7b8eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26108%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b0562fea502d3aa87d6af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26107-cwe-416-use-after-free-in-microsoft-914827d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26107%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b0562fea502d3aa87d6af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26106-cwe-20-improper-input-validation-in-a3d910ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26106%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69b0562fea502d3aa87d6aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23665-cwe-122-heap-based-buffer-overflow--3678cfb4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23665%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Azure%20Linux%20Virtual%20Machines%20with%20Azure%20Diagnostics%20extension&amp;severity=high&amp;id=69b05628ea502d3aa87d68b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23662-cwe-306-missing-authentication-for--5df599e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23662%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05626ea502d3aa87d6888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23661-cwe-319-cleartext-transmission-of-s-c4879b4f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23661%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05626ea502d3aa87d6885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23654-cwe-1395-dependency-on-vulnerable-t-07048b44</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23654%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Microsoft%20GitHub%20Repo%3A%20Zero%20Shot%20scFoundation&amp;severity=high&amp;id=69b05626ea502d3aa87d687c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26148-cwe-454-external-initialization-of--fe77d030</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26148%3A%20CWE-454%3A%20External%20Initialization%20of%20Trusted%20Variables%20or%20Data%20Stores%20in%20Microsoft%20Microsoft%20Azure%20AD%20SSH%20Login%20extension%20for%20Linux&amp;severity=high&amp;id=69b05632ea502d3aa87d6b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23674-cwe-41-improper-resolution-of-path--d3a08b4a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23674%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26127-cwe-125-out-of-bounds-read-in-micro-f1ea3b1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26127%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69b05632ea502d3aa87d6b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26134-cwe-190-integer-overflow-or-wraparo-c5e3cb95</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26134%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=69b05632ea502d3aa87d6b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26132-cwe-416-use-after-free-in-microsoft-27e62c6f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26132%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69b05632ea502d3aa87d6b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26131-cwe-276-incorrect-default-permissio-0d188990</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26131%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69b05632ea502d3aa87d6b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26128-cwe-287-improper-authentication-in--762dc85c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26128%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05632ea502d3aa87d6b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26116-cwe-89-improper-neutralization-of-s-9cbccc2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26116%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202025%20(CU%202)&amp;severity=high&amp;id=69b05631ea502d3aa87d6b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26115-cwe-1287-improper-validation-of-spe-925c4ffb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26115%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=69b05631ea502d3aa87d6b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26121-cwe-918-server-side-request-forgery-e1a50dda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26121%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05631ea502d3aa87d6b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20967-cwe-20-improper-input-validation-in-1667a03a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20967%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20System%20Center%20Operations%20Manager%202019&amp;severity=high&amp;id=69b05626ea502d3aa87d6876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23656-cwe-345-insufficient-verification-o-ccd8afa7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23656%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Microsoft%20Windows%20App%20Client%20for%20Windows%20Desktop&amp;severity=medium&amp;id=69b05626ea502d3aa87d687f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26114-cwe-502-deserialization-of-untruste-89a579ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26114%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69b05631ea502d3aa87d6b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26113-cwe-822-untrusted-pointer-dereferen-7108a4bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26113%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05631ea502d3aa87d6b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26112-cwe-822-untrusted-pointer-dereferen-dbf4ec68</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26112%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05631ea502d3aa87d6b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26111-cwe-190-integer-overflow-or-wraparo-fdf81b93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26111%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05631ea502d3aa87d6b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26105-cwe-79-improper-neutralization-of-i-067b842a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26105%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69b0562fea502d3aa87d6ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25190-cwe-426-untrusted-search-path-in-mi-0a2f7d7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25190%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562fea502d3aa87d6ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25189-cwe-416-use-after-free-in-microsoft-ee491495</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25189%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562fea502d3aa87d6adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25188-cwe-122-heap-based-buffer-overflow--1a76e429</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25188%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562fea502d3aa87d6adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25187-cwe-59-improper-link-resolution-bef-a2a668e2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25187%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562fea502d3aa87d6ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25186-cwe-200-exposure-of-sensitive-infor-b990dd8e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25186%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562fea502d3aa87d6ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25185-cwe-200-exposure-of-sensitive-infor-5e59b27f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25185%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562dea502d3aa87d6a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25181-cwe-125-out-of-bounds-read-in-micro-2f71462d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25181%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25180-cwe-125-out-of-bounds-read-in-micro-aef172d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25180%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=medium&amp;id=69b0562dea502d3aa87d6a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25179-cwe-1287-improper-validation-of-spe-dcee60e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25179%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25178-cwe-416-use-after-free-in-microsoft-06ec56b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25178%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25177-cwe-641-improper-restriction-of-nam-3db83fdb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25177%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25176-cwe-284-improper-access-control-in--b0ef8b07</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25176%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25175-cwe-125-out-of-bounds-read-in-micro-754cc756</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25175%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25174-cwe-125-out-of-bounds-read-in-micro-381de664</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25174%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25173-cwe-190-integer-overflow-or-wraparo-6750b40e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25173%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25172-cwe-190-integer-overflow-or-wraparo-564389dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25172%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25171-cwe-416-use-after-free-in-microsoft-1aa3dedd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25171%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25170-cwe-416-use-after-free-in-microsoft-0b7d7ce2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25170%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69b0562cea502d3aa87d69ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25169-cwe-369-divide-by-zero-in-microsoft-97602fdc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25169%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562cea502d3aa87d69e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25168-cwe-476-null-pointer-dereference-in-b2e00811</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25168%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562cea502d3aa87d69e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25167-cwe-416-use-after-free-in-microsoft-032a21da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25167%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69b0562cea502d3aa87d69e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25166-cwe-502-deserialization-of-untruste-fce8ed91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25166%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Windows%20ADK%20for%20Windows%2010%2C%20version%202004&amp;severity=high&amp;id=69b0562cea502d3aa87d69dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25165-cwe-476-null-pointer-dereference-in-94d9aeef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25165%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24297-cwe-362-concurrent-execution-using--1709c15b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24297%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562cea502d3aa87d69d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24296-cwe-362-concurrent-execution-using--501626ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24296%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24295-cwe-362-concurrent-execution-using--d90aca44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24295%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d698d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24294-cwe-287-improper-authentication-in--8b581eb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24294%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d698a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24293-cwe-476-null-pointer-dereference-in-cfb69648</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24293%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69b0562aea502d3aa87d6987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24292-cwe-416-use-after-free-in-microsoft-f8ee5a46</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24292%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562aea502d3aa87d6984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24291-cwe-732-incorrect-permission-assign-e1d71316</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24291%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d6981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24290-cwe-284-improper-access-control-in--3d676351</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24290%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562aea502d3aa87d697e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24289-cwe-416-use-after-free-in-microsoft-e4cd306d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24289%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d697b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24288-cwe-122-heap-based-buffer-overflow--dad21d67</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24288%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69b0562aea502d3aa87d6978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24287-cwe-73-external-control-of-file-nam-ade8f025</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24287%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562aea502d3aa87d6975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24285-cwe-416-use-after-free-in-microsoft-1dca559e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24285%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=69b0562aea502d3aa87d6972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24283-cwe-122-heap-based-buffer-overflow--da8e4901</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24283%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69b05628ea502d3aa87d68cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24282-cwe-125-out-of-bounds-read-in-micro-4c1a43ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24282%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b05628ea502d3aa87d68ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23673-cwe-125-out-of-bounds-read-in-micro-a63954b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23673%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23672-cwe-125-out-of-bounds-read-in-micro-9d4bbc2c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23672%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23671-cwe-362-concurrent-execution-using--6af84697</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23671%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23669-cwe-416-use-after-free-in-microsoft-cee8b9e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23669%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23668-cwe-362-concurrent-execution-using--564d19e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23668%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23667-cwe-416-use-after-free-in-microsoft-2b98106e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23667%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b05628ea502d3aa87d68b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23664-cwe-923-improper-restriction-of-com-8cd21252</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23664%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05626ea502d3aa87d688b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23660-cwe-284-improper-access-control-in--b81a763b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23660%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Admin%20Center%20in%20Azure%20Portal&amp;severity=high&amp;id=69b05626ea502d3aa87d6882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21262-cwe-284-improper-access-control-in--4d900db9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21262%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=69b05626ea502d3aa87d6879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13901-cwe-404-improper-resource-shutdown--412f4c56</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13901%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Schneider%20Electric%20Modicon%20M241%2FM251&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-mois-actors-the-cyber-crime-connection-6b277061</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20MOIS%20Actors%20%26%20the%20Cyber%20Crime%20Connection&amp;severity=medium&amp;id=69b04f42ea502d3aa876704c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30945-cwe-639-authorization-bypass-throug-d61b6bdb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30945%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=high&amp;id=69b05635ea502d3aa87d7c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30944-cwe-639-authorization-bypass-throug-139adf1f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30944%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=high&amp;id=69b05635ea502d3aa87d7bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66178-execute-unauthorized-code-or-comman-3339db4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66178%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24641-denial-of-service-in-fortinet-forti-2e845127</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24641%3A%20Denial%20of%20service%20in%20Fortinet%20FortiWeb&amp;severity=low&amp;id=69b05635ea502d3aa87d7be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24640-execute-unauthorized-code-or-comman-efcffcfb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24640%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05635ea502d3aa87d7be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54659-information-disclosure-in-fortinet--39aea68d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54659%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20Agent%20Communication%20Bridge&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24017-improper-access-control-in-fortinet-216acf1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24017%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=high&amp;id=69b05634ea502d3aa87d6bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25972-execute-unauthorized-code-or-comman-719551c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25972%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22629-improper-access-control-in-fortinet-65b40607</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22629%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=low&amp;id=69b05634ea502d3aa87d6bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68482-information-disclosure-in-fortinet--37d779b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68482%3A%20Information%20disclosure%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48418-escalation-of-privilege-in-fortinet-a483513e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48418%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49784-execute-unauthorized-code-or-comman-5f6c4f4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49784%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiAnalyzer-BigData&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22572-improper-access-control-in-fortinet-73115578</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22572%3A%20Improper%20access%20control%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68648-escalation-of-privilege-in-fortinet-d0f91097</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68648%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiManager%20Cloud&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25689-execute-unauthorized-code-or-comman-1fe24b86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25689%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiDeceptor&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53608-execute-unauthorized-code-or-comman-8ca13482</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53608%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24018-escalation-of-privilege-in-fortinet-b9a9329c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24018%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientLinux&amp;severity=high&amp;id=69b05634ea502d3aa87d6bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48840-improper-access-control-in-fortinet-0c23b9b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48840%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22627-execute-unauthorized-code-or-comman-691b1205</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22627%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSwitchAXFixed&amp;severity=high&amp;id=69b05634ea502d3aa87d6bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54820-execute-unauthorized-code-or-comman-3da6e695</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54820%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=high&amp;id=69b05633ea502d3aa87d6ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30942-cwe-22-improper-limitation-of-a-pat-efb3b11a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30942%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FlintSH%20Flare&amp;severity=high&amp;id=69b05635ea502d3aa87d7bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55717-information-disclosure-in-fortinet--a4b92c31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55717%3A%20Information%20disclosure%20in%20Fortinet%20FortiVoice&amp;severity=low&amp;id=69b05634ea502d3aa87d6bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25836-execute-unauthorized-code-or-comman-0549df17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25836%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox%20Cloud&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30897-execute-unauthorized-code-or-comman-50b13368</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30897%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22628-execute-unauthorized-code-or-comman-3b1e4185</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22628%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSwitchAXFixed&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30941-cwe-943-improper-neutralization-of--450ddd4e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30941%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b04b8cea502d3aa873ba98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30939-cwe-1321-improperly-controlled-modi-cc76a7f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30939%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b04b8cea502d3aa873ba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30938-cwe-693-protection-mechanism-failur-9d8e25cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30938%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b04b8cea502d3aa873ba8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30930-cwe-89-improper-neutralization-of-s-7240df0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30930%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69b04b8dea502d3aa873bac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30928-cwe-200-exposure-of-sensitive-infor-341c875e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30928%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69b04b8dea502d3aa873bac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30934-cwe-79-improper-neutralization-of-i-24a65d33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30934%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gtsteffaniak%20filebrowser&amp;severity=high&amp;id=69b04b8dea502d3aa873bad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30933-cwe-200-exposure-of-sensitive-infor-d9a74993</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30933%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gtsteffaniak%20filebrowser&amp;severity=high&amp;id=69b04b8dea502d3aa873bacc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27661-cwe-1230-exposure-of-sensitive-info-ff4cf300</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27661%3A%20CWE-1230%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=medium&amp;id=69b04b8dea502d3aa873babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25605-cwe-73-external-control-of-file-nam-5ee32c1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25605%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=medium&amp;id=69b04b8dea502d3aa873babc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25573-cwe-73-external-control-of-file-nam-dafe948f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25573%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=high&amp;id=69b04b8cea502d3aa873baaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25572-cwe-130-improper-handling-of-length-0eb7b1d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25572%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=medium&amp;id=69b04b8cea502d3aa873baac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25571-cwe-130-improper-handling-of-length-dc53ba63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25571%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=medium&amp;id=69b04b8cea502d3aa873baa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25570-cwe-121-stack-based-buffer-overflow-98c21ede</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25570%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=high&amp;id=69b04b8cea502d3aa873baa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25569-cwe-787-out-of-bounds-write-in-siem-c2c91e7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25569%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=high&amp;id=69b04b8cea502d3aa873baa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40943-cwe-79-improper-neutralization-of-i-9fc302a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40943%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Siemens%20SIMATIC%20Drive%20Controller%20CPU%201504D%20TF&amp;severity=critical&amp;id=69b04b8cea502d3aa873baa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27769-cwe-923-improper-restriction-of-com-a4450901</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27769%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Siemens%20Heliox%20Flex%20180%20kW%20EV%20Charging%20Station&amp;severity=low&amp;id=69b04b8cea502d3aa873ba9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mental-health-apps-are-leaking-your-private-though-f3284dc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mental%20health%20apps%20are%20leaking%20your%20private%20thoughts.%20How%20do%20you%20protect%20yourself%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b05631ea502d3aa87d6b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-securing-fragile-ot-in-an-exposed-wo-3be6e649</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20Securing%20Fragile%20OT%20in%20an%20Exposed%20World&amp;severity=medium&amp;id=69b03641ea502d3aa8673936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3847-vulnerability-in-mozilla-firefox-93e6bf98</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3847%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69b03689ea502d3aa867a112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3846-vulnerability-in-mozilla-firefox-104c9947</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3846%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69b03689ea502d3aa867a10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3845-vulnerability-in-mozilla-firefox-81266191</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3845%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69b03689ea502d3aa867a10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3862-vulnerability-in-broadcom-siteminder-6245c414</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3862%3A%20Vulnerability%20in%20Broadcom%20SiteMinder&amp;severity=medium&amp;id=69b03689ea502d3aa867a116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-fs-quo-netweaver-vulnerabilit-a4a029a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20FS-QUO%2C%20NetWeaver%20Vulnerabilities&amp;severity=critical&amp;id=69b02bb5ea502d3aa85f6592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-affected-by-ericsson-data-breach-183bdf0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20Affected%20by%20Ericsson%20Data%20Breach&amp;severity=medium&amp;id=69b02bb5ea502d3aa85f6595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3483-cwe-749-exposed-dangerous-method-or--62639a97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3483%3A%20CWE-749%20Exposed%20dangerous%20method%20or%20function%20in%20Ivanti%20Desktop%20and%20Server%20Management&amp;severity=high&amp;id=69b02c18ea502d3aa85f8868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-rolls-out-codex-security-vulnerability-scan-222e753a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Rolls%20Out%20Codex%20Security%20Vulnerability%20Scanner&amp;severity=critical&amp;id=69b01da5ea502d3aa8574d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kevin-mandias-armadin-launches-with-190-million-in-5f25333b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kevin%20Mandia%E2%80%99s%20Armadin%20Launches%20With%20%24190%20Million%20in%20Funding&amp;severity=medium&amp;id=69b01da5ea502d3aa8574d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quiz-sites-trick-users-into-enabling-unwanted-brow-23554c48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quiz%20sites%20trick%20users%20into%20enabling%20unwanted%20browser%20notifications&amp;severity=medium&amp;id=69b01a1eea502d3aa8553b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2339-cwe-306-missing-authentication-for-c-bfc86a8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2339%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Liderahenk&amp;severity=high&amp;id=69b0215bea502d3aa859162a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-salesforce-customers-allegedly-targete-d347d683</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20Salesforce%20Customers%20Allegedly%20Targeted%20in%20New%20Data%20Theft%20Campaign&amp;severity=medium&amp;id=69b01318ea502d3aa850c00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beatbanker-both-banker-and-miner-for-android-65d627b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeatBanker%3A%20both%20banker%20and%20miner%20for%20Android&amp;severity=medium&amp;id=69b0169cea502d3aa852b221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11739-cwe-502-deserialization-of-untruste-7716261a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11739%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=high&amp;id=69b01357ea502d3aa8512703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13957-cwe-798-use-of-hard-coded-credentia-50d57493</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13957%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert%20(Formerly%20known%20as%20StruxureWare%20Data%20Center%20Expert)&amp;severity=high&amp;id=69b00fcaea502d3aa84f717e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2741-cwe-22-improper-limitation-of-a-path-48a18612</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2741%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vaadin%20flow&amp;severity=low&amp;id=69b00fcaea502d3aa84f7181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-ivanti-endpoint-manager-flaw-exploited-in-a-da7247af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Ivanti%20Endpoint%20Manager%20Flaw%20Exploited%20in%20Attacks&amp;severity=high&amp;id=69b0088eea502d3aa84bf7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3843-cwe-89-improper-neutralization-of-sp-db749180</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3843%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nefteprodukttekhnika%20LLC%20BUK%20TS-G%20Gas%20Station%20Automation%20System&amp;severity=critical&amp;id=69b0215bea502d3aa859162d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sim-swaps-expose-a-critical-flaw-in-identity-secur-b61e9db7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SIM%20Swaps%20Expose%20a%20Critical%20Flaw%20in%20Identity%20Security&amp;severity=critical&amp;id=69affa7bea502d3aa840daea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22614-cwe-257-storing-passwords-in-a-reco-75e6ae65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22614%3A%20CWE-257%20Storing%20passwords%20in%20a%20recoverable%20format%20in%20Eaton%20EasySoft&amp;severity=medium&amp;id=69aff72aea502d3aa83f35d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21791-cwe-532-insertion-of-sensitive-info-c766ae5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21791%3A%20CWE-532%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20HCL%20Sametime&amp;severity=low&amp;id=69aff3a6ea502d3aa83c665c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3228-cwe-79-improper-neutralization-of-in-07e7a8d3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3228%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextscripts%20NextScripts%3A%20Social%20Networks%20Auto-Poster&amp;severity=medium&amp;id=69b044ddea502d3aa870234e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2724-cwe-79-improper-neutralization-of-in-6aed2920</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2724%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=high&amp;id=69b044ddea502d3aa8702346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23907-cwe-22-improper-limitation-of-a-pat-f06ac661</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23907%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20PDFBox%20Examples&amp;severity=medium&amp;id=69b0215bea502d3aa8591625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3315-cwe-276-incorrect-default-permission-cadef1a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3315%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20ASSA%20ABLOY%20Visionline&amp;severity=medium&amp;id=69afe91aea502d3aa834a958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1261-cwe-79-improper-neutralization-of-in-3b7ad624</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wpmet%20MetForm%20Pro&amp;severity=high&amp;id=69afe91aea502d3aa834a951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41712-cwe-732-incorrect-permission-assign-d864906a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41712%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=medium&amp;id=69afd786ea502d3aa827b17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41711-cwe-327-use-of-a-broken-or-risky-cr-3f06a07f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41711%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=medium&amp;id=69afd786ea502d3aa827b177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41710-cwe-798-use-of-hard-coded-credentia-86ec016a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41710%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=medium&amp;id=69afd786ea502d3aa827b171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41709-cwe-78-improper-neutralization-of-s-7863621d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41709%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=critical&amp;id=69afd786ea502d3aa827b16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2364-cwe-367-time-of-check-time-of-use-to-5eb858d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2364%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20CODESYS%20CODESYS%20Installer&amp;severity=high&amp;id=69afc976ea502d3aa81f019e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1508-cwe-352-cross-site-request-forgery-c-cd03c8c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1508%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Court%20Reservation&amp;severity=medium&amp;id=69afbb66ea502d3aa81236ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0953-cwe-287-improper-authentication-in-t-965fa126</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0953%3A%20CWE-287%20Improper%20Authentication%20in%20themeum%20Tutor%20LMS%20Pro&amp;severity=critical&amp;id=69afb0daea502d3aa80ce240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2399-cwe-1285-improper-validation-of-spec-1fc878cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2399%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20Mitsubishi%20Electric%20CNC%20M800V%20Series%20M800VW&amp;severity=medium&amp;id=69afa64eea502d3aa8064f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3585-cwe-22-improper-limitation-of-a-path-57fec669</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3585%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=high&amp;id=69af94baea502d3aa8fe3e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1919-cwe-306-missing-authentication-for-c-b7d963b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1919%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20arraytics%20Booktics%20%E2%80%93%20Booking%20Calendar%20for%20Appointments%20and%20Service%20Businesses&amp;severity=medium&amp;id=69af86aaea502d3aa8f4fe7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1920-cwe-306-missing-authentication-for-c-3db6a0a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1920%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20arraytics%20Booktics%20%E2%80%93%20Booking%20Calendar%20for%20Appointments%20and%20Service%20Businesses&amp;severity=medium&amp;id=69af86aaea502d3aa8f4fe84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36173-cwe-79-improper-neutralization-of-i-f97282af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36173%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20InfoSphere%20Data%20Architect&amp;severity=medium&amp;id=69af789aea502d3aa8ed4d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36105-cwe-526-cleartext-storage-of-sensit-e80db9d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36105%3A%20CWE-526%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20IBM%20Planning%20Analytics%20Advanced%20Certified%20Containers&amp;severity=medium&amp;id=69af7192ea502d3aa8ea5c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27689-cwe-606-unchecked-input-for-loop-co-d8b8d892</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27689%3A%20CWE-606%3A%20Unchecked%20Input%20for%20Loop%20Condition%20in%20SAP_SE%20SAP%20Supply%20Chain%20Management&amp;severity=high&amp;id=69af6a8cea502d3aa8e719dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27688-cwe-862-missing-authorization-in-sa-62bd5477</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27688%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=69af6a8cea502d3aa8e719d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27687-cwe-862-missing-authorization-in-sa-bb7713f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27687%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20HCM%20Portugal%20and%20SAP%20ERP%20HCM%20Portugal&amp;severity=medium&amp;id=69af6a8cea502d3aa8e719d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27686-cwe-862-missing-authorization-in-sa-83adb224</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27686%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Warehouse%20(Service%20API)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27685-cwe-502-deserialization-of-untruste-36704129</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27685%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal%20Administration&amp;severity=critical&amp;id=69af6a8bea502d3aa8e719b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27684-cwe-89-improper-neutralization-of-s-c68052d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27684%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20NetWeaver%20(Feedback%20Notification)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24317-cwe-427-uncontrolled-search-path-el-9d366f48</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24317%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20SAP_SE%20SAP%20GUI%20for%20Windows%20with%20active%20GuiXT&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24316-cwe-918-server-side-request-forgery-f88090d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24316%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24313-cwe-862-missing-authorization-in-sa-66d5a26c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24313%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Solution%20Tools%20Plug-In%20(ST-PI)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24311-cwe-312-cleartext-storage-of-sensit-e84d825d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24311%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20SAP_SE%20SAP%20Customer%20Checkout%202.0&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24310-cwe-862-missing-authorization-in-sa-7999f018</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24310%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=low&amp;id=69af6a8bea502d3aa8e719a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24309-cwe-862-missing-authorization-in-sa-f005d646</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24309%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=69af6a8bea502d3aa8e7199c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0489-cwe-79-improper-neutralization-of-in-cbf68665</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0489%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Business%20One%20(Job%20Service)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e71998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70242-na-c6411a74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70242%3A%20n%2Fa&amp;severity=high&amp;id=69b0864c2f860ef943bbb07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70802-na-3e020311</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70802%3A%20n%2Fa&amp;severity=high&amp;id=69b082c52f860ef943b7fd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70798-na-508a12b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70798%3A%20n%2Fa&amp;severity=high&amp;id=69b082c52f860ef943b7fd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70244-na-e28317c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70244%3A%20n%2Fa&amp;severity=high&amp;id=69b07f3e2f860ef943b515a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70227-na-cbb81ab6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70227%3A%20n%2Fa&amp;severity=high&amp;id=69b07bba2f860ef943b24cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70251-na-669447d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70251%3A%20n%2Fa&amp;severity=high&amp;id=69b078412f860ef943afd33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70247-na-d44926cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70247%3A%20n%2Fa&amp;severity=high&amp;id=69b078412f860ef943afd335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70249-na-f5902c4c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70249%3A%20n%2Fa&amp;severity=high&amp;id=69b071392f860ef943a5fd4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70246-na-89dc65ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70246%3A%20n%2Fa&amp;severity=high&amp;id=69b071392f860ef943a5fd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70129-na-ab3fe0cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70129%3A%20n%2Fa&amp;severity=medium&amp;id=69b071392f860ef943a5fd42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70128-na-5b2105a8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70128%3A%20n%2Fa&amp;severity=medium&amp;id=69b071392f860ef943a5fd3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26742-na-e679e983</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26742%3A%20n%2Fa&amp;severity=high&amp;id=69b06a2a2f860ef943991ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26741-na-af97790d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26741%3A%20n%2Fa&amp;severity=high&amp;id=69b06a2a2f860ef943991eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26801-na-507b5071</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26801%3A%20n%2Fa&amp;severity=high&amp;id=69b063a09972381a98a3a04a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56422-na-e0fce763</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56422%3A%20n%2Fa&amp;severity=critical&amp;id=69b060169972381a9898e680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56421-na-d4e6f7b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56421%3A%20n%2Fa&amp;severity=high&amp;id=69b060159972381a9898e67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69615-na-b9f6729e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69615%3A%20n%2Fa&amp;severity=critical&amp;id=69b059afea502d3aa88174f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69614-na-f8e99074</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69614%3A%20n%2Fa&amp;severity=critical&amp;id=69b059afea502d3aa88174ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-10-d294a46c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-10&amp;severity=medium&amp;id=69b05598ea502d3aa87bd071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26738-na-e655b58c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26738%3A%20n%2Fa&amp;severity=high&amp;id=69b040ffea502d3aa86ddc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70025-na-0b47dd0a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70025%3A%20n%2Fa&amp;severity=medium&amp;id=69b040ffea502d3aa86ddc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-10-26d06c7c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-10&amp;severity=low&amp;id=69afc5bcea502d3aa81b3a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30925-cwe-1333-inefficient-regular-expres-7c8115f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30925%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69af5576ea502d3aa8d50d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30917-cwe-79-improper-neutralization-of-i-374fc6af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30917%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weirdgloop%20mediawiki-extensions-Bucket&amp;severity=high&amp;id=69af51f2ea502d3aa8d1f2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30916-cwe-200-exposure-of-sensitive-infor-ceee8999</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30916&amp;severity=null&amp;id=69af51f2ea502d3aa8d1f2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30913-cwe-79-improper-neutralization-of-i-61bde380</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30913%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flarum%20nicknames&amp;severity=medium&amp;id=69af51f2ea502d3aa8d1f2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30885-cwe-306-missing-authentication-for--c52692c2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30885%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30870-cwe-285-improper-authorization-in-p-1df0986b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30870%3A%20CWE-285%3A%20Improper%20Authorization%20in%20powersync-ja%20powersync-service&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28267-incorrect-default-permissions-in-di-18abd493</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28267%3A%20Incorrect%20default%20permissions%20in%20Digital%20Arts%20Inc.%20i-%E3%83%95%E3%82%A3%E3%83%AB%E3%82%BF%E3%83%BC%2010%20(Windows%20version%20only)&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30869-cwe-22-improper-limitation-of-a-pat-98459c9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30869%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69af4e6aea502d3aa8cf7cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30862-cwe-79-improper-neutralization-of-i-d918c60a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30862%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appsmithorg%20appsmith&amp;severity=critical&amp;id=69af4e6aea502d3aa8cf7cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29773-cwe-863-incorrect-authorization-in--70ff5380</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29773%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20kubewarden%20kubewarden-controller&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28281-cwe-352-cross-site-request-forgery--582e209f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28281%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20instantsoft%20icms2&amp;severity=high&amp;id=69af4ae9ea502d3aa8cd9889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11158-cwe-862-missing-authorization-in-hi-7c52de59</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11158%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Hitachi%20Vantara%20Pentaho%20Data%20Integration%20and%20Analytics&amp;severity=critical&amp;id=69af4ae9ea502d3aa8cd9886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28433-cwe-639-authorization-bypass-throug-5743eba7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28433%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20misskey-dev%20misskey&amp;severity=low&amp;id=69af3cdaea502d3aa8c6d38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28432-cwe-347-improper-verification-of-cr-d72cfb17</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28432%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20misskey-dev%20misskey&amp;severity=high&amp;id=69af3cdaea502d3aa8c6d38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28431-cwe-285-improper-authorization-in-m-e4688f7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28431%3A%20CWE-285%3A%20Improper%20Authorization%20in%20misskey-dev%20misskey&amp;severity=critical&amp;id=69af3cdaea502d3aa8c6d389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26982-cwe-78-improper-neutralization-of-s-dd6a54d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26982%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ghostty-org%20ghostty&amp;severity=medium&amp;id=69af3955ea502d3aa8c59c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31802-cwe-22-improper-limitation-of-a-pat-247231a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31802%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=69af3955ea502d3aa8c59c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1776-cwe-22-improper-limitation-of-a-path-96ab7479</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1776%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20owen2345%20Camaleon%20CMS&amp;severity=medium&amp;id=69af3955ea502d3aa8c59c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30926-cwe-284-improper-access-control-in--1175aec5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30926%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69af3955ea502d3aa8c59c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25960-cwe-918-server-side-request-forgery-c3fc1a91</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25960%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=69b03689ea502d3aa867a119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3288-cwe-20-improper-input-validation-in--b7359678</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3288%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69af3955ea502d3aa8c59c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15603-insufficiently-random-values-in-ope-2f25b3d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15603%3A%20Insufficiently%20Random%20Values%20in%20open-webui&amp;severity=medium&amp;id=69b044ddea502d3aa8702354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0846-cwe-36-absolute-path-traversal-in-nl-799595df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0846%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20nltk%20nltk%2Fnltk&amp;severity=high&amp;id=69af20b9ea502d3aa8b98ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3638-cwe-862-missing-authorization-in-dev-87162fbb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3638%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69af19aeea502d3aa8b3c468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29023-cwe-798-use-of-hard-coded-credentia-e510eadc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29023%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20KeygraphHQ%20Shannon&amp;severity=medium&amp;id=69af0b9eea502d3aa8af25bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/9th-march-threat-intelligence-report-3ef7c2ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=9th%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69aefa3eea502d3aa88a9e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15568-cwe-78-improper-neutralization-of-s-b5d6b74a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15568%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20AXE75%20v1.6%2Fv1.0&amp;severity=high&amp;id=69aef68aea502d3aa8861a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3588-cwe-918-server-side-request-forgery--d3eb8845</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3588%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ikea%20dirigera&amp;severity=high&amp;id=69aef0552904315ca31e4b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25866-cwe-428-unquoted-search-path-or-ele-0dfb2877</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25866%3A%20CWE-428%20Unquoted%20search%20path%20or%20element%20in%20Mobatek%20MobaXterm&amp;severity=high&amp;id=69aeeccc2904315ca31bf399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/encrypted-client-hello-ready-for-prime-timex3f-mon-75a90978</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Encrypted%20Client%20Hello%3A%20Ready%20for%20Prime%20Time%26%23x3f%3B%2C%20(Mon%2C%20Mar%209th)&amp;severity=medium&amp;id=69aede872904315ca3143bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3089-cwe-22-improper-limitation-of-a-path-c51e0410</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3089%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Actual%20Actual%20Sync%20Server&amp;severity=medium&amp;id=69aed7b62904315ca3115bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2919-vulnerability-in-mozilla-focus-for-i-08c2d971</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2919%3A%20Vulnerability%20in%20Mozilla%20Focus%20for%20iOS&amp;severity=medium&amp;id=69aed0ab2904315ca30d0a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attack-uses-windows-terminal-to-evade-det-2d22d0e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attack%20Uses%20Windows%20Terminal%20to%20Evade%20Detection&amp;severity=medium&amp;id=69aec2682904315ca3069adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3819-cross-site-scripting-in-sourcecodest-aaa44b39</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3819%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69aec2a82904315ca306c3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21736-cwe-280-improper-handling-of-insuff-b649a84a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21736%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=69aebf172904315ca3052918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/internet-infrastructure-tld-arpa-abused-in-phishin-e2d522ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Internet%20Infrastructure%20TLD%20.arpa%20Abused%20in%20Phishing%20Attacks&amp;severity=medium&amp;id=69aeb7db2904315ca3023076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3818-sql-injection-in-tiandy-easy7-cms-wi-a4db1eb0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3818%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20CMS%20Windows&amp;severity=medium&amp;id=69aeb8222904315ca3023bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloned-ai-tool-sites-distribute-malware-in-install-a9978540</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloned%20AI%20Tool%20Sites%20Distribute%20Malware%20in%20%E2%80%98InstallFix%E2%80%99%20Campaign&amp;severity=medium&amp;id=69aeb4572904315ca30031af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3817-improper-authorization-in-sourcecode-267ac504</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3817%3A%20Improper%20Authorization%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69aeb4982904315ca3004502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3816-denial-of-service-in-owasp-defectdoj-a15580d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3816%3A%20Denial%20of%20Service%20in%20OWASP%20DefectDojo&amp;severity=medium&amp;id=69aef497ea502d3aa883cff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25604-cwe-346-origin-validation-error-in--5a7b7808</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25604%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Amazon&amp;severity=medium&amp;id=69aea67e2904315ca3fb12d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3815-buffer-overflow-in-utt-hiper-810g-4cb171a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3815%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69aea67e2904315ca3fb12dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69219-cwe-913-improper-control-of-dynamic-c55c74a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69219%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Http&amp;severity=high&amp;id=69aea2f72904315ca3f9c786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-cleanmymac-site-installs-shub-stealer-and-bac-cb0be810</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20CleanMyMac%20site%20installs%20SHub%20Stealer%20and%20backdoors%20crypto%20wallets&amp;severity=medium&amp;id=69aea2c22904315ca3f9aacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3814-buffer-overflow-in-utt-hiper-810g-7866271a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3814%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69ae9f732904315ca3f8057d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/installfix-how-attackers-are-weaponizing-malvertiz-3ceb237b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=InstallFix%3A%20How%20attackers%20are%20weaponizing%20malvertized%20install%20guides&amp;severity=medium&amp;id=69ae9bba2904315ca3f470fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3813-injection-in-opencc-jflow-c61de85b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3813%3A%20Injection%20in%20opencc%20JFlow&amp;severity=medium&amp;id=69ae986d2904315ca3f1764a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69279-cwe-20-improper-input-validation-in-fe83ee3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69279%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69278-cwe-20-improper-input-validation-in-b08709bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69278%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61616-cwe-20-improper-input-validation-in-6d0031ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61616%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61615-cwe-20-improper-input-validation-in-e5a517e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61615%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61614-cwe-20-improper-input-validation-in-0a7e31c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61614%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61613-cwe-20-improper-input-validation-in-a7f83b60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61613%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61612-cwe-20-improper-input-validation-in-4f34411f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61612%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9cffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61611-cwe-20-improper-input-validation-in-32e99f23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61611%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20UDX710&amp;severity=high&amp;id=69ae8de22904315ca3e9cffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3812-cross-site-scripting-in-itsourcecode-7ee28ec9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3812%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69ae8de42904315ca3e9d026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24713-cwe-20-improper-input-validation-in-78e1759b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24713%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=critical&amp;id=69ae8de22904315ca3e9d015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24015-cwe-1327-binding-to-an-unrestricted-99fd9b26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24015%3A%20CWE-1327%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=critical&amp;id=69ae8de22904315ca3e9d012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3811-stack-based-buffer-overflow-in-tenda-076e8a7e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3811%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae8a5a2904315ca3e7e074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41772-cwe-598-use-of-get-request-method-w-ba0a22f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41772%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d82904315ca3e5dc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41767-cwe-347-improper-verification-of-cr-d117e184</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41767%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d82904315ca3e5dc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41766-cwe-787-out-of-bounds-write-in-mbs--5533adda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41766%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d82904315ca3e5dc3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41765-cwe-862-missing-authorization-in-mb-57e75f2c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41765%3A%20CWE-862%20Missing%20Authorization%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=critical&amp;id=69ae86d82904315ca3e5dc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41764-cwe-862-missing-authorization-in-mb-a3e3d2de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41764%3A%20CWE-862%20Missing%20Authorization%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=critical&amp;id=69ae86d82904315ca3e5dc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41763-cwe-497-exposure-of-sensitive-syste-5ae93f0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41763%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41762-cwe-328-use-of-weak-hash-in-mbs-ubr-f7ff21d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41762%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41761-cwe-88-improper-neutralization-of-a-c2ea65ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41761%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41760-cwe-636-not-failing-securely-failin-96960f60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41760%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41759-cwe-636-not-failing-securely-failin-b5660774</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41759%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41758-cwe-22-improper-limitation-of-a-pat-2e4cf25e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41758%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41757-cwe-22-improper-limitation-of-a-pat-d23dc345</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41757%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41756-cwe-1242-inclusion-of-undocumented--2432140c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41756%3A%20CWE-1242%20Inclusion%20of%20Undocumented%20Features%20or%20Chicken%20Bits%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41755-cwe-22-improper-limitation-of-a-pat-cd09f553</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41755%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41754-cwe-1242-inclusion-of-undocumented--5310c8c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41754%3A%20CWE-1242%20Inclusion%20of%20Undocumented%20Features%20or%20Chicken%20Bits%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3810-stack-based-buffer-overflow-in-tenda-96d51f9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3810%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae7fd12904315ca3e0a268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3809-stack-based-buffer-overflow-in-tenda-cd7509e0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3809%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae7c4e2904315ca3de0ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3808-stack-based-buffer-overflow-in-tenda-47c2dc78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3808%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae78c72904315ca3dac14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3807-stack-based-buffer-overflow-in-tenda-57a28f57</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3807%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae6ab82904315ca3cb955f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3823-cwe-121-stack-based-buffer-overflow--68d582bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3823%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20Atop%20Technologies%20EHG2408&amp;severity=critical&amp;id=69ae6ab82904315ca3cb9567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3806-sql-injection-in-sourcecodester-reso-2611b6c4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3806%3A%20SQL%20Injection%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69aef497ea502d3aa883d003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3804-stack-based-buffer-overflow-in-tenda-c824133f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3804%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae602a2904315ca3bfed68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3803-stack-based-buffer-overflow-in-tenda-d8d8363c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3803%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae59252904315ca3ba53b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30896-uncontrolled-search-path-element-in-2c04514c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30896%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Qsee%20Qsee%20Client&amp;severity=high&amp;id=69ae59252904315ca3ba53ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3802-stack-based-buffer-overflow-in-tenda-e2e310a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3802%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae521a2904315ca3b4fb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3801-stack-based-buffer-overflow-in-tenda-c8df084e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3801%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae47912904315ca3972de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3822-cwe-295-improper-certificate-validat-93f8590c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3822%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Taipower%20Taipower%20APP&amp;severity=high&amp;id=69ae47912904315ca3972df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3800-unrestricted-upload-in-sourcecodeste-535e7ac6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3800%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69ae47912904315ca3972de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3799-stack-based-buffer-overflow-in-tenda-8e3e46d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3799%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae47912904315ca3972dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3798-command-injection-in-comfast-cf-ac10-eb1c1917</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3798%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69ae3d052904315ca386c4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3631-cwe-125-out-of-bounds-read-in-deltaw-56dcbeb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3631%3A%20CWE-125%20Out-of-bounds%20Read%20in%20DeltaWW%20COMMGR2&amp;severity=high&amp;id=69ae3d052904315ca386c491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3630-cwe-121-stack-based-buffer-overflow--c00e7f15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3630%3A%20cwe-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20COMMGR2&amp;severity=critical&amp;id=69ae3d052904315ca386c48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3797-unrestricted-upload-in-tiandy-video--748bd466</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3797%3A%20Unrestricted%20Upload%20in%20Tiandy%20Video%20Surveillance%20System%20%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=69ae3d052904315ca386c49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3796-improper-access-controls-in-qi-anxin-5a415393</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3796%3A%20Improper%20Access%20Controls%20in%20Qi-ANXIN%20QAX%20Virus%20Removal&amp;severity=medium&amp;id=69ae3d052904315ca386c494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3795-path-traversal-in-doramart-doracms-2b1ce532</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3795%3A%20Path%20Traversal%20in%20doramart%20DoraCMS&amp;severity=medium&amp;id=69ae2ef52904315ca3454d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3794-improper-authentication-in-doramart--485a5a33</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3794%3A%20Improper%20Authentication%20in%20doramart%20DoraCMS&amp;severity=medium&amp;id=69ae2ef52904315ca3454d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3793-sql-injection-in-sourcecodester-sale-e809dfe3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3793%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae2ef52904315ca3454d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3792-sql-injection-in-sourcecodester-sale-24b11dc7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3792%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae24662904315ca31e22a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3791-sql-injection-in-sourcecodester-sale-ce9829f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3791%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae1d5f2904315ca314c85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3790-sql-injection-in-sourcecodester-sale-5f985483</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3790%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae12d72904315ca30ac9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70030-na-d0975b30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70030%3A%20n%2Fa&amp;severity=high&amp;id=69b044ddea502d3aa8702362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70973-na-54f51c5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70973%3A%20n%2Fa&amp;severity=medium&amp;id=69b044ddea502d3aa870235f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70028-na-3a07e508</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70028%3A%20n%2Fa&amp;severity=high&amp;id=69b044ddea502d3aa870235a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-09-57701da0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-09&amp;severity=medium&amp;id=69af634bea502d3aa8dad08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-09-79bfea9f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-09&amp;severity=medium&amp;id=69af3598ea502d3aa8c0dbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70031-na-8a203d21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70031%3A%20n%2Fa&amp;severity=high&amp;id=69af20b9ea502d3aa8b98ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70032-na-37d1a9c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70032%3A%20n%2Fa&amp;severity=medium&amp;id=69af1d36ea502d3aa8b51a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30140-na-bdcbb2e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30140%3A%20n%2Fa&amp;severity=high&amp;id=69af12acea502d3aa8b1aeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70033-na-99291bb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70033%3A%20n%2Fa&amp;severity=medium&amp;id=69af081bea502d3aa8ad8b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70039-na-d5e0ae2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70039%3A%20n%2Fa&amp;severity=critical&amp;id=69af0116ea502d3aa8929a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70038-na-403c97f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70038%3A%20n%2Fa&amp;severity=high&amp;id=69af0116ea502d3aa8929a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70034-na-f2a4579f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70034%3A%20n%2Fa&amp;severity=high&amp;id=69af0116ea502d3aa8929a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70037-na-d58dc3af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70037%3A%20n%2Fa&amp;severity=medium&amp;id=69aefd8fea502d3aa88d43ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70060-na-ff9fb2d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70060%3A%20n%2Fa&amp;severity=medium&amp;id=69aef0552904315ca31e4b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70040-na-5b2fc2fc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70040%3A%20n%2Fa&amp;severity=medium&amp;id=69aef0552904315ca31e4b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70050-na-e5092a6d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70050%3A%20n%2Fa&amp;severity=medium&amp;id=69aeeccc2904315ca31bf394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70046-na-320037a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70046%3A%20n%2Fa&amp;severity=critical&amp;id=69aeeccc2904315ca31bf38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70042-na-712777a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70042%3A%20n%2Fa&amp;severity=critical&amp;id=69aeeccc2904315ca31bf38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70048-na-ea9aa573</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70048%3A%20n%2Fa&amp;severity=high&amp;id=69aee5c82904315ca318c679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70047-na-78041731</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70047%3A%20n%2Fa&amp;severity=high&amp;id=69aee5c82904315ca318c666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70238-na-86922b37</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70238%3A%20n%2Fa&amp;severity=high&amp;id=69aee2432904315ca316f538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70059-na-d54d5feb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70059%3A%20n%2Fa&amp;severity=high&amp;id=69aee2432904315ca316f533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70250-na-e9579a40</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70250%3A%20n%2Fa&amp;severity=high&amp;id=69aedb362904315ca312a949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70243-na-87101f93</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70243%3A%20n%2Fa&amp;severity=high&amp;id=69aedb362904315ca312a944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69648-na-ca1b875d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69648%3A%20n%2Fa&amp;severity=medium&amp;id=69aedb362904315ca312a940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69647-na-99770e2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69647%3A%20n%2Fa&amp;severity=medium&amp;id=69aedb362904315ca312a93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-09-dff51750</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-09&amp;severity=low&amp;id=69aea6442904315ca3faf7d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3789-server-side-request-forgery-in-byted-4bd85a81</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3789%3A%20Server-Side%20Request%20Forgery%20in%20Bytedesk&amp;severity=medium&amp;id=69ae0bcb2904315ca302ed63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3788-server-side-request-forgery-in-byted-a581b462</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3788%3A%20Server-Side%20Request%20Forgery%20in%20Bytedesk&amp;severity=medium&amp;id=69ae0bcb2904315ca302ed58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3787-uncontrolled-search-path-in-ultravnc-8f16fda8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3787%3A%20Uncontrolled%20Search%20Path%20in%20UltraVNC&amp;severity=high&amp;id=69ae01432904315ca3febb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3786-sql-injection-in-easycms-316a8934</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3786%3A%20SQL%20Injection%20in%20EasyCMS&amp;severity=medium&amp;id=69ae16ab2904315ca310d422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3785-sql-injection-in-easycms-2d45fde4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3785%3A%20SQL%20Injection%20in%20EasyCMS&amp;severity=medium&amp;id=69ae16ab2904315ca310d41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3771-sql-injection-in-sourcecodester-reso-7816bc70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3771%3A%20SQL%20Injection%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69ae16ab2904315ca310d428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3770-cross-site-request-forgery-in-source-6bf6f3bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3770%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Computer%20Laboratory%20Management%20System&amp;severity=medium&amp;id=69ade5242904315ca3f04df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3769-stack-based-buffer-overflow-in-tenda-7dc11ff5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3769%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ade5242904315ca3f04de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3768-stack-based-buffer-overflow-in-tenda-9b634f69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3768%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ae16ab2904315ca310d435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3767-sql-injection-in-itsourcecode-saniti-52abf55a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3767%3A%20SQL%20Injection%20in%20itsourcecode%20sanitize%20or%20validate%20this%20input&amp;severity=medium&amp;id=69ae16ab2904315ca310d42e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3766-cross-site-scripting-in-sourcecodest-10437615</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3766%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69adda962904315ca3ea0ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3765-sql-injection-in-itsourcecode-univer-6d84a21e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3765%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69adda962904315ca3ea0ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3764-improper-authorization-in-sourcecode-be8ab318</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3764%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69ae16ab2904315ca310d43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3763-cross-site-scripting-in-code-project-57718c26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3763%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69adcc862904315ca3df3a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3762-improper-authorization-in-sourcecode-8f58b49a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3762%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69adc57d2904315ca3dae050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3761-improper-authorization-in-sourcecode-685647db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3761%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69adc57d2904315ca3dae049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3760-sql-injection-in-itsourcecode-univer-96d4785b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3760%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69adc57d2904315ca3dae042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3759-sql-injection-in-projectworlds-onlin-d5105e31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3759%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69adbe762904315ca3d63bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3758-sql-injection-in-projectworlds-onlin-0a0c709d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3758%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69adbe762904315ca3d63bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3757-sql-injection-in-projectworlds-onlin-02ba6ae8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3757%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69adbe762904315ca3d63be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3756-sql-injection-in-sourcecodester-sale-64acb6bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3756%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb3e72904315ca3cfbc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3755-sql-injection-in-sourcecodester-sale-f37a46a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3755%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb3e72904315ca3cfbc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3754-sql-injection-in-sourcecodester-sale-ac14f663</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3754%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb3e72904315ca3cfbc16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3753-sql-injection-in-sourcecodester-sale-71e9fdb7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3753%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb0662904315ca3cdf014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3752-sql-injection-in-sourcecodester-empl-d7f036bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3752%3A%20SQL%20Injection%20in%20SourceCodester%20Employee%20Task%20Management%20System&amp;severity=medium&amp;id=69adb0662904315ca3cdf00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3751-sql-injection-in-sourcecodester-empl-1af4f1f5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3751%3A%20SQL%20Injection%20in%20SourceCodester%20Employee%20Task%20Management%20System&amp;severity=medium&amp;id=69ada5d72904315ca3c7b46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3750-server-side-request-forgery-in-conti-21a73a4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3750%3A%20Server-Side%20Request%20Forgery%20in%20ContiNew%20Admin&amp;severity=medium&amp;id=69ada5d72904315ca3c7b465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3749-unrestricted-upload-in-bytedesk-bcf82151</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3749%3A%20Unrestricted%20Upload%20in%20Bytedesk&amp;severity=medium&amp;id=69ada2562904315ca3c51412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3748-unrestricted-upload-in-bytedesk-51fa3d63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3748%3A%20Unrestricted%20Upload%20in%20Bytedesk&amp;severity=medium&amp;id=69ada2562904315ca3c51407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3747-sql-injection-in-itsourcecode-univer-fc6e6a87</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3747%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69ada2562904315ca3c51400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3746-sql-injection-in-sourcecodester-simp-eee390ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3746%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=69ad9b4b2904315ca3c0f6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3745-sql-injection-in-code-projects-stude-dcc91ae0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3745%3A%20SQL%20Injection%20in%20code-projects%20Student%20Web%20Portal&amp;severity=medium&amp;id=69ad9b4b2904315ca3c0f6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3744-sql-injection-in-code-projects-stude-a7dcbf08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3744%3A%20SQL%20Injection%20in%20code-projects%20Student%20Web%20Portal&amp;severity=medium&amp;id=69ad90c22904315ca3ba6b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3743-cross-site-scripting-in-yifang-cms-e1484fe7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3743%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=69ad90c22904315ca3ba6b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3742-cross-site-scripting-in-yifang-cms-a944e116</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3742%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=69ad90c22904315ca3ba6b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3741-cross-site-scripting-in-yifang-cms-b83d28be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3741%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=69ad8d3b2904315ca3b727ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3740-sql-injection-in-itsourcecode-univer-6e5ebad9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3740%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69ad8d3b2904315ca3b727a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3739-improper-authentication-in-suitenume-86af1c13</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3739%3A%20Improper%20Authentication%20in%20suitenumerique%20messages&amp;severity=medium&amp;id=69ad86362904315ca3b03eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3738-improper-authorization-in-sourcecode-56a01e02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3738%3A%20Improper%20Authorization%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=69ad7f2d2904315ca3ab3a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3737-improper-authorization-in-sourcecode-73c2f948</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3737%3A%20Improper%20Authorization%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=69ad7f2d2904315ca3ab3a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3736-sql-injection-in-code-projects-simpl-6228c35e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3736%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad78262904315ca3a7ddf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3735-sql-injection-in-code-projects-simpl-8c229f7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3735%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad78262904315ca3a7ddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3734-improper-authorization-in-sourcecode-cc058dff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3734%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69ad78262904315ca3a7dde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-cisco-catalyst-sd-wan-vulnerability-now-wid-d8c5b10c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Cisco%20Catalyst%20SD-WAN%20Vulnerability%20Now%20Widely%20Exploited&amp;severity=medium&amp;id=69ad69e02904315ca39f0717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3733-server-side-request-forgery-in-xuxue-10d35591</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3733%3A%20Server-Side%20Request%20Forgery%20in%20xuxueli%20xxl-job&amp;severity=medium&amp;id=69ad58832904315ca3977d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3732-stack-based-buffer-overflow-in-tenda-41443da2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3732%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad58832904315ca3977d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3731-out-of-bounds-read-in-libssh-21070aa6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3731%3A%20Out-of-Bounds%20Read%20in%20libssh&amp;severity=medium&amp;id=69ae16ab2904315ca310d453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3730-sql-injection-in-itsourcecode-free-h-8dceb15e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3730%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69ae16ab2904315ca310d44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3729-stack-based-buffer-overflow-in-tenda-c32f2d10</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3729%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ae16ab2904315ca310d443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3728-stack-based-buffer-overflow-in-tenda-9cd01aff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3728%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad4df52904315ca3903934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3727-stack-based-buffer-overflow-in-tenda-b75939cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3727%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad4df52904315ca390392d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3726-stack-based-buffer-overflow-in-tenda-6f0be4bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3726%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad3fe72904315ca3895d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3725-improper-neutralization-of-special-e-4c8ec9b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3725%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%201024-lab%20SmartAdmin&amp;severity=medium&amp;id=69ad3fe72904315ca3895d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3724-improper-authorization-in-sourcecode-be7325e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3724%3A%20Improper%20Authorization%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69ad38dd2904315ca3862bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3723-sql-injection-in-code-projects-simpl-ef519ae6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3723%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad38dd2904315ca3862bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3721-cross-site-scripting-in-1024-lab-sma-8d474ce7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3721%3A%20Cross%20Site%20Scripting%20in%201024-lab%20SmartAdmin&amp;severity=medium&amp;id=69ad27472904315ca37a8baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3720-cross-site-scripting-in-1024-lab-sma-42f1e756</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3720%3A%20Cross%20Site%20Scripting%20in%201024-lab%20SmartAdmin&amp;severity=medium&amp;id=69ad23c92904315ca3793831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3719-path-traversal-in-tsinghua-unigroup--0b08a3de</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3719%3A%20Path%20Traversal%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=69ad23c92904315ca379382b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3716-cross-site-scripting-in-wavlink-wl-w-15d23a27</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3716%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-WN579X3-C&amp;severity=medium&amp;id=69ad23c92904315ca3793824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3715-stack-based-buffer-overflow-in-wavli-504a0f36</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3715%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-WN579X3-C&amp;severity=high&amp;id=69ad1cbb2904315ca37532d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3714-improper-neutralization-of-special-e-239b3f2e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3714%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20OpenCart&amp;severity=medium&amp;id=69ad1cbb2904315ca37532ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3713-heap-based-buffer-overflow-in-pnggro-c90393c3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3713%3A%20Heap-based%20Buffer%20Overflow%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69ad12452904315ca36fe687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3711-sql-injection-in-code-projects-simpl-69490cf7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3711%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad12452904315ca36fe67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3710-sql-injection-in-code-projects-simpl-0646e9b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3710%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad0ead2904315ca36e8d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3709-sql-injection-in-code-projects-simpl-f8a1e203</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3709%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad0ead2904315ca36e8d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3708-sql-injection-in-code-projects-simpl-120c2473</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3708%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad04212904315ca3691e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3707-integer-overflow-in-mrnanko-webp4j-0a183bd2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3707%3A%20Integer%20Overflow%20in%20MrNanko%20webp4j&amp;severity=medium&amp;id=69ad04212904315ca3691e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3706-improper-verification-of-cryptograph-71eb7d25</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3706%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20mkj%20Dropbear&amp;severity=medium&amp;id=69ad04212904315ca3691e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3705-sql-injection-in-code-projects-simpl-e3e4254b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3705%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad009b2904315ca367a3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3703-out-of-bounds-write-in-wavlink-nu516-a93ca55c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3703%3A%20Out-of-bounds%20Write%20in%20Wavlink%20NU516U1&amp;severity=critical&amp;id=69ad009b2904315ca367a3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3702-cross-site-scripting-in-sourcecodest-360d788f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3702%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Loan%20Management%20System&amp;severity=medium&amp;id=69ad009b2904315ca367a3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3701-buffer-overflow-in-h3c-magic-b1-5792aaae</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3701%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69ad009b2904315ca367a3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3704-command-injection-in-wavlink-nu516u1-3d720bfc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3704%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=69acf60f2904315ca36302db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3700-buffer-overflow-in-utt-hiper-810g-be0d9392</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3700%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69aceb852904315ca3579219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3699-buffer-overflow-in-utt-hiper-810g-3f47767c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3699%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69aceb852904315ca3579212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3698-buffer-overflow-in-utt-hiper-810g-dd29f05a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3698%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69acdd752904315ca34c9894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3697-stack-based-buffer-overflow-in-plane-de3b04dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3697%3A%20Stack-based%20Buffer%20Overflow%20in%20Planet%20ICG-2510&amp;severity=medium&amp;id=69acdd752904315ca34c988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30910-cwe-190-integer-overflow-or-wraparo-164ed431</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30910%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20IAMB%20Crypt%3A%3ASodium%3A%3AXS&amp;severity=high&amp;id=69acd2e62904315ca32e173c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30909-cwe-190-integer-overflow-or-wraparo-d5f24069</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30909%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20TIMLEGGE%20Crypt%3A%3ANaCl%3A%3ASodium&amp;severity=critical&amp;id=69acc85d2904315ca3180bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3696-os-command-injection-in-totolink-n30-86f6a631</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3696%3A%20OS%20Command%20Injection%20in%20Totolink%20N300RH&amp;severity=medium&amp;id=69acc85d2904315ca3180bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3695-path-traversal-in-sourcecodester-mod-24d0e278</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3695%3A%20Path%20Traversal%20in%20SourceCodester%20Modern%20Image%20Gallery%20App&amp;severity=medium&amp;id=69acc85d2904315ca3180bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3693-improper-control-of-resource-identif-100ce1bd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3693%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Shy2593666979%20AgentChat&amp;severity=medium&amp;id=69acc85d2904315ca3180bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-08-0080f7fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-08&amp;severity=medium&amp;id=69ae0f182904315ca3048175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-08-d9635b91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-08&amp;severity=medium&amp;id=69ad89812904315ca3b2115c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-08-224dde41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-08&amp;severity=low&amp;id=69acf95d2904315ca364a157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3683-server-side-request-forgery-in-bufan-eb980839</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3683%3A%20Server-Side%20Request%20Forgery%20in%20bufanyun%20HotGo&amp;severity=medium&amp;id=69acb8bfc48b3f10ffdd173d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3682-argument-injection-in-welovemedia-ff-2290a593</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3682%3A%20Argument%20Injection%20in%20welovemedia%20FFmate&amp;severity=medium&amp;id=69acb8bfc48b3f10ffdd1737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3681-server-side-request-forgery-in-welov-532d42e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3681%3A%20Server-Side%20Request%20Forgery%20in%20welovemedia%20FFmate&amp;severity=medium&amp;id=69acb1b4c48b3f10ffd9cf2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3680-command-injection-in-ryuzakishinji-b-5a8fcafe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3680%3A%20Command%20Injection%20in%20RyuzakiShinji%20biome-mcp-server&amp;severity=medium&amp;id=69acb1b4c48b3f10ffd9cf25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3679-stack-based-buffer-overflow-in-tenda-c7db2235</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3679%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69acaaaec48b3f10ffd665e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3678-stack-based-buffer-overflow-in-tenda-bf7fd6b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3678%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69acaaaec48b3f10ffd665e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3677-stack-based-buffer-overflow-in-tenda-8899ba38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3677%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69aca3a8c48b3f10ffd2f1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3675-improper-authorization-in-freedom-fa-54da6cfe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3675%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69aca3a8c48b3f10ffd2f1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3674-improper-authorization-in-freedom-fa-1ab10793</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3674%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac9ca0c48b3f10ffcff62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3672-sql-injection-in-jeecgboot-020abedc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3672%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=69ac9ca0c48b3f10ffcff626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3671-improper-authorization-in-freedom-fa-0abbfa01</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3671%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac9ca0c48b3f10ffcff620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3670-improper-authorization-in-freedom-fa-eb9496f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3670%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac726ec48b3f10ffbca736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3669-improper-authorization-in-freedom-fa-a267bda9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3669%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac726ec48b3f10ffbca730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2671-cleartext-transmission-of-sensitive--c642213e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2671%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Mendi%20Neurofeedback%20Headset&amp;severity=low&amp;id=69ac6b6ac48b3f10ffb9ec7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30861-cwe-78-improper-neutralization-of-s-94bf2228</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30861%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=critical&amp;id=69ac564fc48b3f10ffb12c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30860-cwe-89-improper-neutralization-of-s-90c4d0a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30860%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=critical&amp;id=69ac564fc48b3f10ffb12c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30859-cwe-284-improper-access-control-in--fdab631b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30859%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30858-cwe-918-server-side-request-forgery-e3e1ce15</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30858%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30857-cwe-639-authorization-bypass-throug-61a41dfc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30857%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30856-cwe-706-use-of-incorrectly-resolved-a9bc30d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30856%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30855-cwe-284-improper-access-control-in--d6ea3179</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30855%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Tencent%20WeKnora&amp;severity=high&amp;id=69ac564fc48b3f10ffb12c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30851-cwe-287-improper-authentication-in--2fdd0c26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30851%3A%20CWE-287%3A%20Improper%20Authentication%20in%20caddyserver%20caddy&amp;severity=high&amp;id=69ac564fc48b3f10ffb12c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30852-cwe-200-exposure-of-sensitive-infor-f99038f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30852%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20caddyserver%20caddy&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30854-cwe-863-incorrect-authorization-in--2544594e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30854%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30850-cwe-862-missing-authorization-in-pa-5dc8b12f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30850%3A%20CWE-862%3A%20Missing%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30848-cwe-22-improper-limitation-of-a-pat-2ee1ac73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30848%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30863-cwe-287-improper-authentication-in--0b463399</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30863%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69ac52cfc48b3f10ffafee99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29196-cwe-863-incorrect-authorization-in--29d97e27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29196%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitl%20netmaker&amp;severity=high&amp;id=69ac52cfc48b3f10ffafee8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29195-cwe-863-incorrect-authorization-in--310d1238</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29195%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitl%20netmaker&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29194-cwe-863-incorrect-authorization-in--74a77e13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29194%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitl%20netmaker&amp;severity=high&amp;id=69ac4f4bc48b3f10ffae7abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29076-cwe-674-uncontrolled-recursion-in-y-995a29f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29076%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=69ac4f4bc48b3f10ffae7aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28678-cwe-311-missing-encryption-of-sensi-3ca6a072</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28678%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20toxicbishop%20DSA-with-tsx&amp;severity=high&amp;id=69ac4f4bc48b3f10ffae7ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3668-improper-access-controls-in-freedom--df3a8b4f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3668%3A%20Improper%20Access%20Controls%20in%20Freedom%20Factory%20dGEN1&amp;severity=low&amp;id=69ac4f4bc48b3f10ffae7ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30838-cwe-79-improper-neutralization-of-i-a2d9b480</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30838%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thephpleague%20commonmark&amp;severity=medium&amp;id=69ac4f4bc48b3f10ffae7ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30832-cwe-918-server-side-request-forgery-01aea4d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30832%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20charmbracelet%20soft-serve&amp;severity=critical&amp;id=69ac4f4bc48b3f10ffae7ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29787-cwe-200-exposure-of-sensitive-infor-ef5ed21c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29787%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20doobidoo%20mcp-memory-service&amp;severity=medium&amp;id=69ac4840c48b3f10ffa9ddde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29786-cwe-22-improper-limitation-of-a-pat-81e9e2a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29786%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=69ac4840c48b3f10ffa9ddda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3667-improper-authorization-in-freedom-fa-7c9f8837</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3667%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac4840c48b3f10ffa9ddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3665-null-pointer-dereference-in-xlnt-com-e02eb063</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3665%3A%20NULL%20Pointer%20Dereference%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69ac4840c48b3f10ffa9dde2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29784-cwe-352-cross-site-request-forgery--d730ba6f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29784%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=69ac4840c48b3f10ffa9ddd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29781-cwe-476-null-pointer-dereference-in-1c68375a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29781%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20BishopFox%20sliver&amp;severity=low&amp;id=69ac44bec48b3f10ffa88859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29780-cwe-22-improper-limitation-of-a-pat-329b8ba7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29780%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GOVCERT-LU%20eml_parser&amp;severity=medium&amp;id=69ac44bec48b3f10ffa88854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29779-cwe-200-exposure-of-sensitive-infor-4843f8bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29779%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20lyc8503%20UptimeFlare&amp;severity=high&amp;id=69ac44bec48b3f10ffa8884f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29190-cwe-22-improper-limitation-of-a-pat-2d7fa3a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29190%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Aiven-Open%20karapace&amp;severity=medium&amp;id=69ac44bec48b3f10ffa88848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29771-cwe-404-improper-resource-shutdown--049544f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29771%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20gravitl%20netmaker&amp;severity=high&amp;id=69ac44bec48b3f10ffa8884c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3664-out-of-bounds-read-in-xlnt-community-ddf35f6f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3664%3A%20Out-of-Bounds%20Read%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69ac3a2fc48b3f10ffa2ea03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3663-out-of-bounds-read-in-xlnt-community-f71a6234</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3663%3A%20Out-of-Bounds%20Read%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69ac3a2fc48b3f10ffa2e9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3662-command-injection-in-wavlink-wl-nu51-4098a232</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3662%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=69ac2c1ec48b3f10ff9be98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3661-command-injection-in-wavlink-wl-nu51-5db35d81</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3661%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=69ac2c1ec48b3f10ff9be988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-100-github-repositories-distributing-boryptgr-3297ebaf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20100%20GitHub%20Repositories%20Distributing%20BoryptGrab%20Stealer&amp;severity=medium&amp;id=69ac1dd9c48b3f10ff94aae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pentagons-chief-tech-officer-says-he-clashed-with--14b6744b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pentagon%E2%80%99s%20Chief%20Tech%20Officer%20Says%20He%20Clashed%20With%20AI%20Company%20Anthropic%20Over%20Autonomous%20Warfare&amp;severity=medium&amp;id=69ac1353c48b3f10ff8eac20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-a0backdoor-linked-to-teams-impersonation-and-q-a3cec5d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20A0Backdoor%20Linked%20to%20Teams%20Impersonation%20and%20Quick%20Assist%20Social%20Engineering&amp;severity=medium&amp;id=69aea6472904315ca3faf832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-an-attack-chain-of-muddywater-37bdf022</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20an%20Attack%20Chain%20of%20MuddyWater&amp;severity=medium&amp;id=69aea6472904315ca3faf837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24308-cwe-532-insertion-of-sensitive-info-090ca1fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24308%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20ZooKeeper&amp;severity=medium&amp;id=69abe957c48b3f10ff7477fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24281-cwe-350-reliance-on-reverse-dns-res-ea5e3a9a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24281%3A%20CWE-350%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20Apache%20Software%20Foundation%20Apache%20ZooKeeper&amp;severity=medium&amp;id=69abe957c48b3f10ff7477f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2219-vulnerability-in-debian-dpkg-8c8e482a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2219%3A%20Vulnerability%20in%20Debian%20dpkg&amp;severity=high&amp;id=69abdec8c48b3f10ff6e4439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1087-cwe-352-cross-site-request-forgery-c-e80bb5b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1087%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20openplatform%20The%20Guardian%20News%20Feed&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1086-cwe-352-cross-site-request-forgery-c-73cb4e8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1086%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpsolutions%20Font%20Pairing%20Preview%20For%20Landing%20Pages&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1085-cwe-352-cross-site-request-forgery-c-9eb582a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1085%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20optimizza%20True%20Ranker&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1825-cwe-79-improper-neutralization-of-in-2d3f4daa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1825%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minor%20Show%20YouTube%20video&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1824-cwe-79-improper-neutralization-of-in-99ce8457</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leopoldinfomaniak%20Infomaniak%20Connect%20for%20OpenID&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1823-cwe-79-improper-neutralization-of-in-a33c42c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20consensusintegrations%20Consensus%20Embed&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1074-cwe-79-improper-neutralization-of-in-ed135d09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1074%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ryscript%20WP%20App%20Bar&amp;severity=high&amp;id=69abd7bec48b3f10ff68539f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1073-cwe-352-cross-site-request-forgery-c-6dff961d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1073%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themepul%20Purchase%20Button%20For%20Affiliate%20Link&amp;severity=medium&amp;id=69abd7bec48b3f10ff68539a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1820-cwe-79-improper-neutralization-of-in-c6432016</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainvireinfo%20Media%20Library%20Alt%20Text%20Editor&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1574-cwe-79-improper-neutralization-of-in-b377fdbc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgamoni%20MyQtip%20%E2%80%93%20easy%20qTip2&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1805-cwe-79-improper-neutralization-of-in-290380ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20damedialimited%20DA%20Media%20GigList&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1569-cwe-79-improper-neutralization-of-in-4cac7f8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1569%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nabeghe%20Wueen&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2433-cwe-79-improper-neutralization-of-in-09b1d445</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1071-cwe-79-improper-neutralization-of-in-fd15de10</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1071%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cartaonline%20Carta%20Online&amp;severity=medium&amp;id=69abd7bec48b3f10ff685395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2420-cwe-79-improper-neutralization-of-in-850f4448</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lotekmedia%20LotekMedia%20Popup%20Form&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14675-cwe-22-improper-limitation-of-a-pat-b9e91655</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14675%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20metabox%20Meta%20Box&amp;severity=high&amp;id=69abd7bec48b3f10ff68538e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27796-cwe-200-exposure-of-sensitive-infor-d2299f63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27796%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=69abbf1fc48b3f10ff5c73a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27797-cwe-918-server-side-request-forgery-33b30167</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27797%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=69abbf1fc48b3f10ff5c73ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30830-cwe-79-improper-neutralization-of-i-f74109a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30830%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kepano%20defuddle&amp;severity=low&amp;id=69abbf1fc48b3f10ff5c73b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8899-cwe-269-improper-privilege-managemen-76efe6d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8899%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20videowhisper%20Paid%20Videochat%20Turnkey%20Site%20%E2%80%93%20HTML5%20PPV%20Live%20Webcams&amp;severity=high&amp;id=69abbf1fc48b3f10ff5c73a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30829-cwe-200-exposure-of-sensitive-infor-2b9f639a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30829%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bluewave-labs%20Checkmate&amp;severity=medium&amp;id=69abbf1fc48b3f10ff5c73b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30842-cwe-862-missing-authorization-in-el-a8b951aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30842%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69abbb9ec48b3f10ff5a0875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30841-cwe-79-improper-neutralization-of-i-2b6679ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30841%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69abbb9ec48b3f10ff5a0870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30840-cwe-918-server-side-request-forgery-b545860c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30840%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69abbb9ec48b3f10ff5a086b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30839-cwe-918-server-side-request-forgery-3e3c4cf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30839%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69abbb9ec48b3f10ff5a0866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30828-cwe-29-path-traversal-filename-in-e-986f32fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30828%3A%20CWE-29%3A%20Path%20Traversal%3A%20&apos;..filename&apos;%20in%20ellite%20Wallos&amp;severity=high&amp;id=69abbb9ec48b3f10ff5a0861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30824-cwe-306-missing-authentication-for--a4a97f75</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30824%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb819c48b3f10ff5861e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30823-cwe-639-authorization-bypass-throug-0f7787b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30823%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb819c48b3f10ff5861df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30822-cwe-915-improperly-controlled-modif-4eb54742</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30822%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb493c48b3f10ff564c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30821-cwe-434-unrestricted-upload-of-file-598fed66</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30821%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb493c48b3f10ff564c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30820-cwe-863-incorrect-authorization-in--33ff046d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30820%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb493c48b3f10ff564c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30247-cwe-918-server-side-request-forgery-7ae2f848</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30247%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69aba2fec48b3f10ff3494bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3352-cwe-94-improper-control-of-generatio-066362fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3352%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20shahadul878%20Easy%20PHP%20Settings&amp;severity=high&amp;id=69ac8b62c48b3f10ffc6f6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2431-cwe-79-improper-neutralization-of-in-d9bab0c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2431%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20Custom%20Reports%20%E2%80%93%20Flexible%20reporting%20to%20track%20what%20matters%20most&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2722-cwe-79-improper-neutralization-of-in-4431a517</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2722%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20urkekg%20Stock%20Ticker&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2721-cwe-79-improper-neutralization-of-in-e9cc98a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pierrelannoy%20MailArchiver&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1650-cwe-862-missing-authorization-in-mdj-399bf7dc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1650%3A%20CWE-862%20Missing%20Authorization%20in%20mdjm%20MDJM%20Event%20Management&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2429-cwe-89-improper-neutralization-of-sp-70e4bad1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2429%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2020-cwe-502-deserialization-of-untrusted-67fe1cb9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2020%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20skatox%20JS%20Archive%20List&amp;severity=high&amp;id=69ac8b60c48b3f10ffc6f673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14353-cwe-89-improper-neutralization-of-s-6ded6a41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14353%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20presstigers%20ZIP%20Code%20Based%20Content%20Protection&amp;severity=high&amp;id=69ac8b60c48b3f10ffc6f661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2494-cwe-352-cross-site-request-forgery-c-58a3a384</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2494%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2488-cwe-862-missing-authorization-in-met-30ced25f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2488%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1902-cwe-79-improper-neutralization-of-in-ac9ae56e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20innovaatik%20Hammas%20Calendar&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-investigating-suspicious-cyber-activity-on-sys-78683f1a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Investigating%20%E2%80%98Suspicious%E2%80%99%20Cyber%20Activity%20on%20System%20Holding%20Sensitive%20Surveillance%20Information&amp;severity=medium&amp;id=69ab7c1fc48b3f10ff111f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25073-cwe-79-improper-neutralization-of-i-e9f11af1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=medium&amp;id=69ab78cec48b3f10ff0845b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25072-cwe-330-use-of-insufficiently-rando-9bc8c17a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25072%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=high&amp;id=69ab78cec48b3f10ff0845b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25071-cwe-306-missing-authentication-for--d084643f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25071%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=high&amp;id=69ab78cec48b3f10ff0845b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25070-cwe-78-improper-neutralization-of-s-f0039eef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25070%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=critical&amp;id=69ab78cec48b3f10ff0845ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-07-fcc8041b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-07&amp;severity=medium&amp;id=69ae222d2904315ca3174075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-07-fc5fac0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-07&amp;severity=medium&amp;id=69acbf8cc48b3f10ffe29281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-07-ceef406f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-07&amp;severity=low&amp;id=69abdb09c48b3f10ff6b424e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1981-cwe-862-missing-authorization-in-win-2496c681</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1981%3A%20CWE-862%20Missing%20Authorization%20in%20winstonai%20HUMN-1%20AI%20Website%20Scanner%20%26%20Human%20Certification%20by%20Winston%20AI&amp;severity=medium&amp;id=69ab63bbc48b3f10ffeac18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1644-cwe-352-cross-site-request-forgery-c-36f8a669</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1644%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20glowlogix%20WP%20Frontend%20Profile&amp;severity=medium&amp;id=69ab63bbc48b3f10ffeac187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2371-cwe-862-missing-authorization-in-wps-7a4b5cc1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2371%3A%20CWE-862%20Missing%20Authorization%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69ab63bbc48b3f10ffeac195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27142-cwe-79-improper-neutralization-of-i-c8bbfb70</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27142%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Go%20standard%20library%20html%2Ftemplate&amp;severity=medium&amp;id=69ab4b1fc48b3f10ffddeb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27139-cwe-363-race-condition-enabling-lin-098c68bb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27139%3A%20CWE-363%3A%20Race%20Condition%20Enabling%20Link%20Following%20in%20Go%20standard%20library%20os&amp;severity=low&amp;id=69ab4b1fc48b3f10ffddeb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25679-cwe-1286-improper-validation-of-syn-ebb73155</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25679%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Go%20standard%20library%20net%2Furl&amp;severity=high&amp;id=69ab4b1fc48b3f10ffddeb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27138-cwe-1285-improper-validation-of-spe-62986369</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27138%3A%20CWE-1285%3A%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=medium&amp;id=69ab4b1fc48b3f10ffddeb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27137-cwe-295-improper-certificate-valida-8118560e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27137%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69ab4b1fc48b3f10ffddeb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30242-cwe-918-server-side-request-forgery-c687a2bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30242%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20makeplane%20plane&amp;severity=high&amp;id=69ab479ac48b3f10ffdbff8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30244-cwe-284-improper-access-control-in--1105edaa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30244%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20makeplane%20plane&amp;severity=high&amp;id=69ab479ac48b3f10ffdbff93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30241-cwe-863-incorrect-authorization-in--54440e88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30241%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20mercurius-js%20mercurius&amp;severity=low&amp;id=69ab479ac48b3f10ffdbff8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30238-cwe-79-improper-neutralization-of-i-f7d87f56</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30238%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=69ab479ac48b3f10ffdbff88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30237-cwe-79-improper-neutralization-of-i-80bb9838</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30237%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=low&amp;id=69ab479ac48b3f10ffdbff85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30231-cwe-639-authorization-bypass-throug-a04ad200</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30231%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlintSH%20Flare&amp;severity=medium&amp;id=69ab4414c48b3f10ffd8fc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30230-cwe-639-authorization-bypass-throug-5dd7aff8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30230%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlintSH%20Flare&amp;severity=high&amp;id=69ab4414c48b3f10ffd8fc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30227-cwe-93-improper-neutralization-of-c-730af536</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30227%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20jstedfast%20MimeKit&amp;severity=medium&amp;id=69ab4414c48b3f10ffd8fc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29795-cwe-770-allocation-of-resources-wit-b46dbb2b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29795%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20stellar%20rs-stellar-xdr&amp;severity=medium&amp;id=69ab4093c48b3f10ffd6ce0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29790-cwe-22-improper-limitation-of-a-pat-495da025</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29790%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dbt-labs%20dbt-common&amp;severity=low&amp;id=69ab4093c48b3f10ffd6ce06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29789-cwe-862-missing-authorization-in-vi-a7e2f21c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29789%3A%20CWE-862%3A%20Missing%20Authorization%20in%20vitodeploy%20vito&amp;severity=critical&amp;id=69ab4093c48b3f10ffd6ce00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29788-cwe-283-unverified-ownership-in-mir-00a7d89c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29788%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20miraheze%20TSPortal&amp;severity=high&amp;id=69ab4093c48b3f10ffd6cdfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30835-cwe-209-generation-of-error-message-2f619d80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30835%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ab3d0ec48b3f10ffd4f2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30229-cwe-863-incorrect-authorization-in--3025edc1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30229%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69ab3d0ec48b3f10ffd4f2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30228-cwe-863-incorrect-authorization-in--6cc83cac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30228%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ab3d0ec48b3f10ffd4f2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29182-cwe-863-incorrect-authorization-in--5263b108</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29182%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69ab3d0ec48b3f10ffd4f2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/middle-east-conflict-fuels-opportunistic-cyber-att-352466d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Middle%20East%20Conflict%20Fuels%20Opportunistic%20Cyber%20Attacks&amp;severity=medium&amp;id=69aea2c22904315ca3f9aaa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29178-cwe-918-server-side-request-forgery-7d393c2d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29178%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LemmyNet%20lemmy&amp;severity=high&amp;id=69ab19e8c48b3f10ffbbf2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29091-cwe-95-improper-neutralization-of-d-c92d8a83</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29091%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20locutusjs%20locutus&amp;severity=high&amp;id=69ab1661c48b3f10ffba181e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30833-cwe-943-improper-neutralization-of--2e34817a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30833%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20RocketChat%20Rocket.Chat&amp;severity=medium&amp;id=69ab1661c48b3f10ffba1825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30831-cwe-287-improper-authentication-in--d6e13010</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30831%3A%20CWE-287%3A%20Improper%20Authentication%20in%20RocketChat%20Rocket.Chat&amp;severity=high&amp;id=69ab1661c48b3f10ffba1822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28514-cwe-287-improper-authentication-in--bf7998c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28514%3A%20CWE-287%3A%20Improper%20Authentication%20in%20RocketChat%20Rocket.Chat&amp;severity=critical&amp;id=69ab1661c48b3f10ffba1819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attacks-on-schools-and-colleges-kaspers-ad8615d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20attacks%20on%20schools%20and%20colleges%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ac9a40c48b3f10ffceb05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29089-cwe-426-untrusted-search-path-in-ti-e44a8f1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29089%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20timescale%20timescaledb&amp;severity=high&amp;id=69ab0f59c48b3f10ffb6232f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29087-cwe-863-incorrect-authorization-in--d805d9f9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29087%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20honojs%20node-server&amp;severity=high&amp;id=69ab0f59c48b3f10ffb6232b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29783-cwe-78-improper-neutralization-of-s-97c9fcf6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29783%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20github%20copilot-cli&amp;severity=high&amp;id=69ab0852c48b3f10ffb0e5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29082-cwe-79-improper-neutralization-of-i-06108f67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29082%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kestra-io%20kestra&amp;severity=high&amp;id=69ab04d0c48b3f10ffaee2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15602-cwe-915-improperly-controlled-modif-0fbe3594</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15602%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Grokability%2C%20Inc.%20Snipe-IT&amp;severity=high&amp;id=69ab014fc48b3f10ffac9b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29064-cwe-22-improper-limitation-of-a-pat-4981ec09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29064%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zarf-dev%20zarf&amp;severity=high&amp;id=69ab014fc48b3f10ffac9b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-fbi-hacked-us-security-pro-killed-in-337e5e98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20FBI%20Hacked%2C%20US%20Security%20Pro%20Killed%20in%20Iran%20War%2C%20Hijacked%20Cameras%20Used%20in%20Khamenei%20Strike&amp;severity=medium&amp;id=69aaf688c48b3f10ffa45df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-access-delivered-through-fake-zoom-and-goog-47bded52</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Access%20Delivered%20Through%20Fake%20Zoom%20and%20Google%20Meet%20Calls&amp;severity=medium&amp;id=69ae9bba2904315ca3f470df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-spyware-campaign-impersonates-israels-red-a-e5ebab35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20spyware%20campaign%20impersonates%20Israel&apos;s%20Red%20Alert%20rocket%20warning%20system&amp;severity=medium&amp;id=69ae9f3e2904315ca3f7e27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27027-cwe-522-in-everon-apieveronio-2ab7f513</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27027%3A%20CWE-522%20in%20Everon%20api.everon.io&amp;severity=medium&amp;id=69aaf339c48b3f10ffa20e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20748-cwe-613-in-everon-apieveronio-677f7800</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20748%3A%20CWE-613%20in%20Everon%20api.everon.io&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24696-cwe-307-in-everon-apieveronio-7062e309</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24696%3A%20CWE-307%20in%20Everon%20api.everon.io&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26288-cwe-306-in-everon-apieveronio-4db274ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26288%3A%20CWE-306%20in%20Everon%20api.everon.io&amp;severity=critical&amp;id=69aaf339c48b3f10ffa20e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27777-cwe-522-in-mobiliti-e-mobihu-e1f11063</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27777%3A%20CWE-522%20in%20Mobiliti%20e-mobi.hu&amp;severity=medium&amp;id=69aaf339c48b3f10ffa20e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27764-cwe-613-in-mobiliti-e-mobihu-3d2562c2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27764%3A%20CWE-613%20in%20Mobiliti%20e-mobi.hu&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20882-cwe-307-in-mobiliti-e-mobihu-3abeebf9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20882%3A%20CWE-307%20in%20Mobiliti%20e-mobi.hu&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2754-cwe-306-missing-authentication-for-c-7691b6a5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2754%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Navtor%20NavBox&amp;severity=high&amp;id=69aaefb7c48b3f10ff9de731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2753-cwe-36-absolute-path-traversal-in-na-977a9330</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2753%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Navtor%20NavBox&amp;severity=high&amp;id=69aaefb7c48b3f10ff9de72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2752-cwe-209-generation-of-error-message--8ebaaf0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2752%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Navtor%20NavBox&amp;severity=medium&amp;id=69aaefb7c48b3f10ff9de72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26051-cwe-306-in-mobiliti-e-mobihu-70ec4ea6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26051%3A%20CWE-306%20in%20Mobiliti%20e-mobi.hu&amp;severity=critical&amp;id=69aaefb7c48b3f10ff9de726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-ios-flaws-from-coruna-exploit-kit-to-kev-c376b915</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20iOS%20Flaws%20From%20Coruna%20Exploit%20Kit%20to%20KEV%20List&amp;severity=medium&amp;id=69aad6e5c48b3f10ff88b243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rockwell-vulnerability-allowing-remote-ics-hacking-56518a14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rockwell%20Vulnerability%20Allowing%20Remote%20ICS%20Hacking%20Exploited%20in%20Attacks&amp;severity=low&amp;id=69aacc59c48b3f10ff7e39bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28080-cwe-862-missing-authorization-in-ra-08d670cd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28080%3A%20CWE-862%20Missing%20Authorization%20in%20Rank%20Math%20Rank%20Math%20SEO%20PRO&amp;severity=medium&amp;id=69aac58dc48b3f10ff75bf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28106-cwe-601-url-redirection-to-untruste-6f7aab75</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28106%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Kings%20Plugins%20B2BKing%20Premium&amp;severity=medium&amp;id=69aac20ac48b3f10ff714a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35644-cwe-79-improper-neutralization-of-i-384a621c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Pascal%20Birchler%20Preferred%20Languages&amp;severity=medium&amp;id=69aac20ac48b3f10ff714a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-hacked-us-airport-bank-software-compan-620d8441</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20Hacked%20US%20Airport%2C%20Bank%2C%20Software%20Company&amp;severity=medium&amp;id=69aabe4dc48b3f10ff637826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1468-cwe-352-cross-site-request-forgery-c-3fa2a3bf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1468%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=69aab775c48b3f10ff51325c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3589-cwe-352-cross-site-request-forgery-c-929d5a57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3589%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Automattic%20WooCommerce&amp;severity=high&amp;id=69aa9ed9c48b3f10ff40a463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2331-cwe-552-files-or-directories-accessi-5e67b9ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2331%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20SICK%20AG%20SICK%20Lector85x&amp;severity=critical&amp;id=69aa89c1c48b3f10ff2e8a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2330-cwe-552-files-or-directories-accessi-493bd9c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2330%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20SICK%20AG%20SICK%20Lector85x&amp;severity=critical&amp;id=69aa89c1c48b3f10ff2e8a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29074-cwe-776-improper-restriction-of-rec-bc543408</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29074%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20svg%20svgo&amp;severity=high&amp;id=69aa82b7c48b3f10ff296e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2830-cwe-94-improper-control-of-generatio-0bb50253</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2830%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpallimport%20WP%20All%20Import%20%E2%80%93%20Drag%20%26%20Drop%20Import%20for%20CSV%2C%20XML%2C%20Excel%20%26%20Google%20Sheets&amp;severity=medium&amp;id=69aa82b7c48b3f10ff296e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29183-cwe-79-improper-neutralization-of-i-768fb7e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29183%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69aa82b7c48b3f10ff296e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29073-cwe-862-missing-authorization-in-si-b68dce41</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29073%3A%20CWE-862%3A%20Missing%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69aa82b7c48b3f10ff296e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29062-cwe-770-allocation-of-resources-wit-840ac63f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29062%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20FasterXML%20jackson-core&amp;severity=high&amp;id=69aa82b7c48b3f10ff296e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29059-cwe-22-improper-limitation-of-a-pat-9b177476</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29059%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20windmill-labs%20windmill&amp;severity=medium&amp;id=69aa82b7c48b3f10ff296e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29058-cwe-78-improper-neutralization-of-s-6e5bf915</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29058%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo-Encoder&amp;severity=critical&amp;id=69aa7f36c48b3f10ff26b932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29049-cwe-400-uncontrolled-resource-consu-caf9817c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29049%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=69aa7f36c48b3f10ff26b92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29065-cwe-22-improper-limitation-of-a-pat-9b12e55d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29065%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=69aa7f36c48b3f10ff26b935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29039-cwe-94-improper-control-of-generati-a252bc8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29039%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=69aa7f36c48b3f10ff26b92a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29038-cwe-79-improper-neutralization-of-i-56be0ce4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29038%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=medium&amp;id=69aa7f36c48b3f10ff26b925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28804-cwe-407-inefficient-algorithmic-com-33d7baa9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28804%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff245871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28801-cwe-94-improper-control-of-generati-c0fc0149</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28801%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NatroTeam%20NatroMacro&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff24586e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28800-cwe-22-improper-limitation-of-a-pat-dfca6612</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28800%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NatroTeam%20NatroMacro&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff24586b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28438-cwe-89-improper-neutralization-of-s-5b163019</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28438%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cocoindex-io%20cocoindex&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff245863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28799-cwe-416-use-after-free-in-pjsip-pjp-3427c3c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28799%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69aa7bb0c48b3f10ff245867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29068-cwe-121-stack-based-buffer-overflow-0e1924ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29068%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69aa7bb0c48b3f10ff245877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28795-cwe-22-improper-limitation-of-a-pat-b24598ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28795%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zhongyu09%20openchatbi&amp;severity=high&amp;id=69aa74abc48b3f10ff21035b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2446-cwe-862-missing-authorization-in-pow-801544ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2446%3A%20CWE-862%20Missing%20Authorization%20in%20PowerPack%20for%20LearnDash&amp;severity=critical&amp;id=69aa7125c48b3f10ff1eaaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1128-cwe-352-cross-site-request-forgery-c-9d4324d3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1128%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20eCommerce&amp;severity=medium&amp;id=69aa7125c48b3f10ff1eaaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28794-cwe-1321-improperly-controlled-modi-427da505</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28794%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20middleapi%20orpc&amp;severity=critical&amp;id=69aa6319c48b3f10ff135409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29084-cwe-352-cross-site-request-forgery--2e66f130</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29084%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff135415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29061-cwe-284-improper-access-control-in--f342cb98</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29061%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff135411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29060-cwe-284-improper-access-control-in--8b2784da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29060%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff13540d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28683-cwe-79-improper-neutralization-of-i-3dead106</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28683%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Forceu%20Gokapi&amp;severity=high&amp;id=69aa6319c48b3f10ff135405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28682-cwe-284-improper-access-control-in--00bddf4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28682%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff135401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28681-cwe-601-url-redirection-to-untruste-b554b77b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28681%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20irrdnet%20irrd&amp;severity=high&amp;id=69aa5c10c48b3f10ff0d74c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28679-cwe-22-improper-limitation-of-a-pat-2d04a517</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28679%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20xemle%20home-gallery&amp;severity=high&amp;id=69aa5c10c48b3f10ff0d74be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28509-cwe-79-improper-neutralization-of-i-e0679ca6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28509%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langbot-app%20LangBot&amp;severity=medium&amp;id=69aa5c10c48b3f10ff0d74b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29041-cwe-434-unrestricted-upload-of-file-e999d757</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29041%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69aa5508c48b3f10fff1d3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59544-cwe-862-missing-authorization-in-ch-f37bb7fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59544%3A%20CWE-862%3A%20Missing%20Authorization%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69aa5508c48b3f10fff1d3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59543-cwe-79-improper-neutralization-of-i-0eef53dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59543%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69aa5508c48b3f10fff1d3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59542-cwe-79-improper-neutralization-of-i-47c12102</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59542%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69aa5508c48b3f10fff1d3c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59541-cwe-352-cross-site-request-forgery--e2b1d14f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59541%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69aa5508c48b3f10fff1d3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59540-cwe-80-improper-neutralization-of-s-9a418eac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59540%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69aa5508c48b3f10fff1d3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55289-cwe-79-improper-neutralization-of-i-190f2e91</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55289%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69aa5508c48b3f10fff1d3b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28501-cwe-89-improper-neutralization-of-s-36e0dbd6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28501%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28502-cwe-434-unrestricted-upload-of-file-779981cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28502%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29093-cwe-287-improper-authentication-in--b06804e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29093%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69aa4a7bc48b3f10ffe32f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29046-cwe-114-process-control-in-maximmas-416b5cf1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29046%3A%20CWE-114%3A%20Process%20Control%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28497-cwe-190-integer-overflow-or-wraparo-aa98a920</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28497%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25962-cwe-409-improper-handling-of-highly-de5d7f5a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25962%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20MarkUsProject%20Markus&amp;severity=medium&amp;id=69aa4a7bc48b3f10ffe32f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27807-cwe-776-improper-restriction-of-rec-2352478b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27807%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20MarkUsProject%20Markus&amp;severity=medium&amp;id=69aa4a7bc48b3f10ffe32f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3616-sql-injection-in-defaultfuction-jeso-12cc9586</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3616%3A%20SQL%20Injection%20in%20DefaultFuction%20Jeson%20Customer%20Relationship%20Management%20System&amp;severity=medium&amp;id=69aa3c78c48b3f10ffcfb821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3613-stack-based-buffer-overflow-in-wavli-e7d59b95</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3613%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=69aa2e5ac48b3f10ffc36e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3612-command-injection-in-wavlink-wl-nu51-a43ad7d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3612%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=69aa274ec48b3f10ffabbad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3610-cross-site-scripting-in-hsc-cybersec-5db7259d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3610%3A%20Cross%20Site%20Scripting%20in%20HSC%20Cybersecurity%20Mailinspector&amp;severity=medium&amp;id=69aa274ec48b3f10ffabbacc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-06-866cbd09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-06&amp;severity=medium&amp;id=69ab6e0cc48b3f10fff05506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69654-na-44cf2543</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69654%3A%20n%2Fa&amp;severity=high&amp;id=69ab3283c48b3f10ffcc6477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69653-na-661f7105</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69653%3A%20n%2Fa&amp;severity=medium&amp;id=69ab20f4c48b3f10ffc04698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69652-na-89a022c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69652%3A%20n%2Fa&amp;severity=medium&amp;id=69ab20f4c48b3f10ffc04694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69650-na-8107a9f6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69650%3A%20n%2Fa&amp;severity=high&amp;id=69ab1d6dc48b3f10ffbeb7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69649-na-a1749c93</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69649%3A%20n%2Fa&amp;severity=medium&amp;id=69ab1d6dc48b3f10ffbeb7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69651-na-6ed8e52a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69651%3A%20n%2Fa&amp;severity=medium&amp;id=69ab19e8c48b3f10ffbbf2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69646-na-8ed65ffb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69646%3A%20n%2Fa&amp;severity=medium&amp;id=69ab0f59c48b3f10ffb62327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69645-na-356b454c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69645%3A%20n%2Fa&amp;severity=medium&amp;id=69ab0f59c48b3f10ffb62323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69644-na-e8df8165</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69644%3A%20n%2Fa&amp;severity=medium&amp;id=69ab0f59c48b3f10ffb6231f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70363-na-917512e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70363%3A%20n%2Fa&amp;severity=high&amp;id=69ab014fc48b3f10ffac9b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-06-394941b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-06&amp;severity=medium&amp;id=69aabac0c48b3f10ff54eb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-06-b3d61573</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-06&amp;severity=low&amp;id=69aabac0c48b3f10ff54eade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28726-cwe-863-in-acronis-acronis-cyber-pr-ae9468f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28726%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1cc6c48b3f10ff8f955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28725-cwe-732-in-acronis-acronis-cyber-pr-5efe8500</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28725%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1cc6c48b3f10ff8f9558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30413-cwe-732-in-acronis-acronis-cyber-pr-ecf57f6e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30413%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28724-cwe-863-in-acronis-acronis-cyber-pr-c4198fcb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28724%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1965c48b3f10ff8d2b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28723-cwe-863-in-acronis-acronis-cyber-pr-5f3e63ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28723%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1965c48b3f10ff8d2b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28722-cwe-610-in-acronis-acronis-cyber-pr-2402ead0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28722%3A%20CWE-610%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1963c48b3f10ff8d2b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28721-cwe-610-in-acronis-acronis-cyber-pr-8b4a5c71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28721%3A%20CWE-610%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1963c48b3f10ff8d2b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28720-cwe-863-in-acronis-acronis-cyber-pr-41955de7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28720%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28719-cwe-863-in-acronis-acronis-cyber-pr-6d5e2241</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28719%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28718-cwe-779-in-acronis-acronis-cyber-pr-a9dbceaf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28718%3A%20CWE-779%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28717-cwe-276-in-acronis-acronis-cyber-pr-83a858f6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28717%3A%20CWE-276%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28716-cwe-863-in-acronis-acronis-cyber-pr-1699ecb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28716%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28715-cwe-863-in-acronis-acronis-cyber-pr-cb280302</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28715%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28714-cwe-522-in-acronis-acronis-cyber-pr-b7b480ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28714%3A%20CWE-522%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28713-cwe-1392-in-acronis-acronis-cyber-p-ae137381</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28713%3A%20CWE-1392%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=69aa1963c48b3f10ff8d2b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28712-cwe-427-in-acronis-acronis-cyber-pr-05ca5ab4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28712%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28711-cwe-427-in-acronis-acronis-cyber-pr-9c33e230</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28711%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28710-cwe-1390-in-acronis-acronis-cyber-p-29d27d91</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28710%3A%20CWE-1390%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1962c48b3f10ff8d2b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28709-cwe-863-in-acronis-acronis-cyber-pr-9d9af414</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28709%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11790-cwe-732-in-acronis-acronis-cyber-pr-d26c0fd9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11790%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11791-cwe-862-in-acronis-acronis-cyber-pr-95aaee43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11791%3A%20CWE-862%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11792-cwe-427-in-acronis-acronis-cyber-pr-d49c2cc9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11792%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=69aa1962c48b3f10ff8d2afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28727-cwe-276-in-acronis-acronis-cyber-pr-1f5f5b7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28727%3A%20CWE-276%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1965c48b3f10ff8d2b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27770-cwe-522-in-epower-epowerie-76cf915c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27770%3A%20CWE-522%20in%20ePower%20epower.ie&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24912-cwe-613-in-epower-epowerie-3fcc469f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24912%3A%20CWE-613%20in%20ePower%20epower.ie&amp;severity=high&amp;id=69aa1962c48b3f10ff8d2b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27778-cwe-307-in-epower-epowerie-3015e8f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27778%3A%20CWE-307%20in%20ePower%20epower.ie&amp;severity=high&amp;id=69aa15bec48b3f10ff8a0fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2589-cwe-200-exposure-of-sensitive-inform-2dc93144</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2589%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69aa15bec48b3f10ff8a0fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22552-cwe-306-in-epower-epowerie-1e2e527e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22552%3A%20CWE-306%20in%20ePower%20epower.ie&amp;severity=critical&amp;id=69aa15bec48b3f10ff8a0fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26122-information-disclosure-in-microsoft-09c389e3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26122%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=69aa042dc48b3f10ff7dd2a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26125-cwe-306-missing-authentication-for--ae4455f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26125%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Payment%20Orchestrator%20Service&amp;severity=high&amp;id=69aa042dc48b3f10ff7dd2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26124-cwe-35-path-traversal-in-microsoft--129daa24</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26124%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=69aa042dc48b3f10ff7dd2a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21536-cwe-434-unrestricted-upload-of-file-3dbf1775</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21536%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Microsoft%20Microsoft%20Devices%20Pricing%20Program&amp;severity=critical&amp;id=69aa042dc48b3f10ff7dd29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23651-cwe-625-permissive-regular-expressi-1f6596b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23651%3A%20CWE-625%3A%20Permissive%20Regular%20Expression%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=69aa042dc48b3f10ff7dd2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3606-out-of-bounds-read-in-ettercap-c4751691</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3606%3A%20Out-of-Bounds%20Read%20in%20Ettercap&amp;severity=medium&amp;id=69aa00a5c48b3f10ff7ae786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28484-fde8f0db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28484&amp;severity=null&amp;id=69ab0852c48b3f10ffb0e5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28474-incorrect-authorization-in-openclaw-da9baab9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28474%3A%20Incorrect%20Authorization%20in%20OpenClaw%20nextcloud-talk&amp;severity=critical&amp;id=69aa00a5c48b3f10ff7ae781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28465-insufficient-verification-of-data-a-efea20a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28465%3A%20CWE-290%20Authentication%20bypass%20by%20spoofing%20in%20OpenClaw%20voice-call&amp;severity=high&amp;id=69aa00a5c48b3f10ff7ae77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2593-cwe-79-improper-neutralization-of-in-8c16f488</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2593%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69a9f99ec48b3f10ff5cf16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55208-cwe-79-improper-neutralization-of-i-f54629d8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55208%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69a9f294c48b3f10ff5116be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0848-cwe-20-improper-input-validation-in--af71c4ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0848%3A%20CWE-20%20Improper%20Input%20Validation%20in%20nltk%20nltk%2Fnltk&amp;severity=critical&amp;id=69a9ef11c48b3f10ff4d0658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22723-vulnerability-in-cloudfoundry-found-a9411f93</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22723%3A%20Vulnerability%20in%20Cloudfoundry%20Foundation%20UAA&amp;severity=medium&amp;id=69a9ef11c48b3f10ff4d065b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28442-cwe-73-external-control-of-file-nam-66c91287</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28442%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20IceWhaleTech%20ZimaOS&amp;severity=high&amp;id=69a9ef11c48b3f10ff4d065e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28413-cwe-601-url-redirection-to-untruste-64093f53</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28413%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20plone%20Products.isurlinportal&amp;severity=medium&amp;id=69a9e67761e8e69ef5f7009c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-ai-assistant-extensions-harvest-llm-chat-644bc76e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20AI%20Assistant%20Extensions%20Harvest%20LLM%20Chat%20Histories&amp;severity=medium&amp;id=69aabacfc48b3f10ff5537f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/south-american-telecommunication-providers-targete-e1d2d261</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=South%20American%20telecommunication%20providers%20targeted%20with%20three%20new%20malware%20implants&amp;severity=medium&amp;id=69aabacfc48b3f10ff55379c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28410-cwe-284-improper-access-control-in--77618731</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28410%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20graphprotocol%20contracts&amp;severity=medium&amp;id=69a9e67761e8e69ef5f70098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28405-cwe-79-improper-neutralization-of-i-f136d9aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28405%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MarkUsProject%20Markus&amp;severity=high&amp;id=69a9e67761e8e69ef5f70093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28353-cwe-506-embedded-malicious-code-in--facddd89</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28353%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20aquasecurity%20trivy-vscode-extension&amp;severity=critical&amp;id=69a9e2f561e8e69ef5e92416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28350-cwe-116-improper-encoding-or-escapi-f2a1a98e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28350%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20fedora-python%20lxml_html_clean&amp;severity=medium&amp;id=69a9e2f561e8e69ef5e92412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28348-cwe-116-improper-encoding-or-escapi-f0e49774</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28348%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20fedora-python%20lxml_html_clean&amp;severity=medium&amp;id=69a9e2f561e8e69ef5e9240e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28343-cwe-79-improper-neutralization-of-i-9756676b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28343%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ckeditor%20ckeditor5&amp;severity=medium&amp;id=69a9df7061e8e69ef5e51b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28277-cwe-502-deserialization-of-untruste-405e3490</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28277%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langgraph&amp;severity=medium&amp;id=69a9e2f561e8e69ef5e9241d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13350-cwe-416-use-after-free-in-canonical-d0ad2719</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13350%3A%20CWE-416%20Use%20After%20Free%20in%20Canonical%20Ubuntu%20Linux&amp;severity=high&amp;id=69a9e2f561e8e69ef5e92419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3047-authentication-bypass-by-primary-wea-c4898340</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3047%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3009-improper-authorization-in-red-hat-re-a8b6d3ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3009%3A%20Incorrect%20Authorization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28287-cwe-78-improper-neutralization-of-s-f3029c62</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28287%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d1248c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3459-cwe-434-unrestricted-upload-of-file--0bb23ab9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3459%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69a9d16b61e8e69ef5d1249b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28284-cwe-89-improper-neutralization-of-s-1d52e754</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28284%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28210-cwe-89-improper-neutralization-of-s-40dd310e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28210%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28209-cwe-78-improper-neutralization-of-s-a0f9d9d4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28209%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7375-cwe-20-improper-input-validation-in--8934f0d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7375%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20EAP610%20v3&amp;severity=medium&amp;id=69a9c994460e1c85df139338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13476-cwe-327-use-of-a-broken-or-risky-cr-5cab70df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13476%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Rakuten%20Viber%20Rakuten%20Viber%20Cloak%20-%20Android&amp;severity=critical&amp;id=69a9c994460e1c85df139316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27944-cwe-311-missing-encryption-of-sensi-409464ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27944%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69a9c996460e1c85df139361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24457-cwe-22-improper-limitation-of-a-pat-5ef15632</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24457%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Eclipse%20Foundation%20Eclipse%20OpenMQ&amp;severity=critical&amp;id=69a9c994460e1c85df13933d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27723-cwe-284-improper-access-control-in--932e3277</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27723%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20opf%20openproject&amp;severity=medium&amp;id=69a9c996460e1c85df13935c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27023-cwe-918-server-side-request-forgery-94391960</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27023%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20twentyhq%20twenty&amp;severity=medium&amp;id=69a9c996460e1c85df139358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30785-cwe-257-in-rustdesk-client-rustdesk-476aaa7e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30785%3A%20CWE-257%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9ad6c460e1c85dfe74263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30784-cwe-862-missing-authorization-in-ru-97b16d4b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30784%3A%20CWE-862%20Missing%20Authorization%20in%20rustdesk-server%20RustDesk%20Server&amp;severity=high&amp;id=69a9ad6c460e1c85dfe74260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30783-cwe-602-in-rustdesk-client-rustdesk-6f13408a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30783%3A%20CWE-602%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9ad6c460e1c85dfe7425d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30790-cwe-307-improper-restriction-of-exc-765a4f40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30790%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20rustdesk-server-pro%20RustDesk%20Server%20Pro&amp;severity=critical&amp;id=69a9c05f460e1c85df0c5c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30789-cwe-294-authentication-bypass-by-ca-ea65bd02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30789%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9c05f460e1c85df0c5c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30798-cwe-345-insufficient-verification-o-6936b5e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30798%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9c05f460e1c85df0c5c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30797-cwe-862-missing-authorization-in-ru-9b5e712b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30797%3A%20CWE-862%20Missing%20Authorization%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9c05f460e1c85df0c5c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25048-cwe-674-uncontrolled-recursion-in-m-d4dc88f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25048%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20mlc-ai%20xgrammar&amp;severity=high&amp;id=69a9c05f460e1c85df0c5c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64166-cwe-352-cross-site-request-forgery--1601b4e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64166%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mercurius-js%20mercurius&amp;severity=medium&amp;id=69a9c05f460e1c85df0c5c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30796-cwe-319-cleartext-transmission-of-s-4a9cfc73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30796%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20rustdesk-server-pro%20RustDesk%20Server%20Pro&amp;severity=high&amp;id=69a9c05f460e1c85df0c5c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30795-cwe-319-cleartext-transmission-of-s-73da2f1f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30795%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9a2e4460e1c85dfd8771d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30794-cwe-295-improper-certificate-valida-d480f40a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30794%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9a2e4460e1c85dfd8771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30793-cwe-285-in-rustdesk-client-rustdesk-991b7094</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30793%3A%20CWE-285%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9a2e4460e1c85dfd87716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30792-cwe-657-in-rustdesk-client-rustdesk-c970abe3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30792%3A%20CWE-657%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9a2e4460e1c85dfd87713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-half-of-2025s-90-exploited-zero-days-aimed--f4c73b61</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%3A%20Half%20of%202025%E2%80%99s%2090%20Exploited%20Zero-Days%20Aimed%20at%20Enterprises&amp;severity=medium&amp;id=69a99b5f224272a26dae95de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30791-cwe-327-use-of-a-broken-or-risky-cr-357ade28</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30791%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a99d83d9f976b5b5c65c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27748-cwe-59-improper-link-resolution-bef-b9c573ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27748%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Gen%20Digital%20Inc.%20Avira%20Internet%20Security&amp;severity=high&amp;id=69a993803bbe47dd19a9529b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27749-cwe-502-deserialization-of-untruste-356af843</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27749%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Gen%20Digital%20Inc.%20Avira%20Internet%20Security&amp;severity=high&amp;id=69a993803bbe47dd19a952a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27750-cwe-367-time-of-check-time-of-use-t-22539585</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27750%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Gen%20Digital%20Inc.%20Avira%20Internet%20Security&amp;severity=high&amp;id=69a993803bbe47dd19a952a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3598-cwe-327-use-of-a-broken-or-risky-cry-b5be621d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3598%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20rustdesk-server-pro%20RustDesk%20Server%20Pro&amp;severity=high&amp;id=69a993803bbe47dd19a952ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1720-cwe-862-missing-authorization-in-wpx-95778eab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1720%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20WowOptin%3A%20Next-Gen%20Popup%20Maker%20%E2%80%93%20Create%20Stunning%20Popups%20and%20Optins%20for%20Lead%20Generation&amp;severity=high&amp;id=69a988fd3bbe47dd199708fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-ransomware-operator-pleads-guilty-in-us-e493b9c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Ransomware%20Operator%20Pleads%20Guilty%20in%20US&amp;severity=medium&amp;id=69a97ca30e5bba37cadb2726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-tech-support-delivers-havoc-command-control-59a90ba0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Tech%20Support%20Delivers%20Havoc%20Command%20%26%20Control&amp;severity=medium&amp;id=69a99d4dd9f976b5b5c444b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2599-cwe-502-deserialization-of-untrusted-8a4a84f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2599%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=critical&amp;id=69a97ce30e5bba37cadb5ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-disable-unwanted-ai-assistants-and-features-54c29a8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20disable%20unwanted%20AI%20assistants%20and%20features%20on%20your%20PC%20and%20smartphone%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a9798c0e5bba37cad8d7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-more-catalyst-sd-wan-flaws-exploite-f4918229</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Warns%20of%20More%20Catalyst%20SD-WAN%20Flaws%20Exploited%20in%20the%20Wild&amp;severity=medium&amp;id=69a9759b0e5bba37cad5da4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leakbase-cybercrime-forum-shut-down-suspects-arres-184a6f89</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeakBase%20Cybercrime%20Forum%20Shut%20Down%2C%20Suspects%20Arrested&amp;severity=medium&amp;id=69a960820e5bba37cabba3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3236-cwe-863-incorrect-authorization-in-o-bc126ace</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3236%3A%20CWE-863%20Incorrect%20Authorization%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=low&amp;id=69a96ed40e5bba37cacf0189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1605-cwe-400-uncontrolled-resource-consum-0a9505ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1605%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=69a9562d0e5bba37ca990db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11143-cwe-20-improper-input-validation-in-5b9ca7d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11143%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=low&amp;id=69a952a60e5bba37ca8f75ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21628-cwe-434-unrestricted-upload-of-file-fb005d26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21628%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20astroidframe.work%20Astroid%20Template%20Framework&amp;severity=critical&amp;id=69a952a60e5bba37ca8f75b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-vulnerabilities-in-enterpri-60dcf18f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20Vulnerabilities%20in%20Enterprise%20Networking%20Products&amp;severity=critical&amp;id=69a944620e5bba37ca7a0a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28542-cwe-755-improper-handling-of-except-aeb52e45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28542%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69a9437a0e5bba37ca78f119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28548-cwe-269-improper-privilege-manageme-c0b6d666</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28548%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69a9437a0e5bba37ca78f11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28551-cwe-362-concurrent-execution-using--6580cf78</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28551%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a9437a0e5bba37ca78f120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28549-cwe-362-concurrent-execution-using--acd96308</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28549%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93fcdd1a09e29cbfadc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28547-cwe-824-access-of-uninitialized-poi-08c4edcc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28547%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93fcdd1a09e29cbfadbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28546-cwe-122-heap-based-buffer-overflow--31312413</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28546%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93fcdd1a09e29cbfadbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28543-cwe-362-concurrent-execution-using--6fe78fe7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28543%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28541-cwe-264-permissions-privileges-and--8d92a643</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28541%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28540-cwe-158-improper-neutralization-of--82bd380c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28540%3A%20CWE-158%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28539-cwe-19-data-processing-errors-in-hu-36035c5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28539%3A%20CWE-19%20Data%20Processing%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28538-cwe-24-path-traversal-filedir-in-hu-aedb987e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28538%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66319-cwe-264-permissions-privileges-and--48be1dfd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66319%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69a938c5d1a09e29cbf5d4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28552-cwe-19-data-processing-errors-in-hu-1393e410</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28552%3A%20CWE-19%20Data%20Processing%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28550-cwe-840-business-logic-errors-in-hu-428a1b72</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28550%3A%20CWE-840%20Business%20Logic%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28545-cwe-362-concurrent-execution-using--c73349bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28545%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28544-cwe-362-concurrent-execution-using--e438641a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28544%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1321-cwe-862-missing-authorization-in-ste-01ad73de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1321%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=high&amp;id=69a931c0d1a09e29cbf198c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2893-cwe-89-improper-neutralization-of-sp-0b8faf55</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2893%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20carlosfazenda%20Fast%20Page%20%26%20Post%20Duplicator&amp;severity=medium&amp;id=69a931c0d1a09e29cbf198d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21786-cwe-532-insertion-of-sensitive-info-45210306</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21786%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20HCLSoftware%20Sametime%20for%20iOS&amp;severity=low&amp;id=69a931c0d1a09e29cbf198ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28537-cwe-415-double-free-in-huawei-harmo-e37f161c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28537%3A%20CWE-415%20Double%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a931c0d1a09e29cbf198cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28536-cwe-305-authentication-bypass-by-pr-3e5ae728</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28536%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=69a92e3cd1a09e29cbef609e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25702-cwe-284-improper-access-control-in--2f29ac3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25702%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20SUSE%20SUSE%20Linux%20Enterprise%20Server&amp;severity=high&amp;id=69a92e3cd1a09e29cbef609b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1678-out-of-bounds-write-in-zephyrproject-aa51fbaa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1678%3A%20Out-of-bounds%20Write%20in%20zephyrproject-rtos%20Zephyr&amp;severity=critical&amp;id=69a92731d1a09e29cbeaae24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2418-cwe-287-improper-authentication-in-l-1b2dce9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2418%3A%20CWE-287%20Improper%20Authentication%20in%20Login%20with%20Salesforce&amp;severity=critical&amp;id=69a9206cd1a09e29cbe6d01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28137-improper-neutralization-of-input-du-c941043d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28137%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuanticaLabs%20MediCenter%20-%20Health%20Medical%20Clinic&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28135-inclusion-of-functionality-from-unt-81d65bc1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28135%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28134-improper-control-of-generation-of-c-67944697</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28134%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28133-unrestricted-upload-of-file-with-da-4d93fbb8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28133%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WP%20Chill%20Filr&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28130-improper-neutralization-of-input-du-e3bed1ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28130%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AndonDesign%20UDesign&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28129-improper-control-of-filename-for-in-ee00e000</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28129%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Little%20Birdies&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28128-improper-control-of-filename-for-in-1923616c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28128%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Verse&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28127-improper-neutralization-of-input-du-b3564c0d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28127%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28126-improper-neutralization-of-input-du-65d31539</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28126%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sizam%20RH%20Frontend%20Publishing%20Pro&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28125-improper-control-of-filename-for-in-e2c0f645</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28125%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Midi&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28124-improper-control-of-filename-for-in-00784f3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28124%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Notarius&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28123-improper-control-of-filename-for-in-8adfb831</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28123%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Veil&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28122-improper-neutralization-of-input-du-6f368f41</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28122%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28121-improper-control-of-filename-for-in-d1180c26</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28121%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Anderson&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28120-improper-control-of-filename-for-in-fc28c46c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28120%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Dr.Patterson&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28119-improper-control-of-filename-for-in-aabd1146</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28119%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Nirvana&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cf9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28118-improper-control-of-filename-for-in-4860a768</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28118%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Welldone&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28117-improper-control-of-filename-for-in-9a4c50a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28117%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20smart%20SEO&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28115-improper-neutralization-of-special--1eebab36</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28115%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20loopus%20WP%20Attractive%20Donations%20System%20-%20Easy%20Stripe%20%26%20Paypal%20donations&amp;severity=critical&amp;id=69a92069d1a09e29cbe6cf64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28114-unrestricted-upload-of-file-with-da-5f3102b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28114%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20firassaidi%20WooCommerce%20License%20Manager&amp;severity=critical&amp;id=69a92069d1a09e29cbe6cf61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28113-improper-neutralization-of-input-du-21672d39</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28113%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azzaroco%20Ultimate%20Learning%20Pro&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28112-improper-neutralization-of-input-du-ded4c6e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28112%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20AllInOne%20-%20Banner%20Rotator&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28110-improper-neutralization-of-input-du-d21f4df5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28110%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Banner%20with%20Playlist&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28109-improper-neutralization-of-input-du-c0f8a99d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28109%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Content%20Slider&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28108-improper-neutralization-of-input-du-82eab159</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28108%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Banner%20with%20Thumbnails&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28107-improper-control-of-filename-for-in-510fedd4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28107%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Muzicon&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28105-deserialization-of-untrusted-data-i-4b189c04</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28105%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Good%20Energy&amp;severity=critical&amp;id=69a92067d1a09e29cbe6cf42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28104-missing-authorization-in-aryan-shir-cfa838ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28104%3A%20Missing%20Authorization%20in%20Aryan%20Shirani%20Bid%20Abadi%20Site%20Suggest&amp;severity=medium&amp;id=69a92067d1a09e29cbe6cf3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28103-improper-neutralization-of-input-du-af39aa6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28103%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LBG%20Zoominoutslider&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28102-improper-neutralization-of-input-du-97c5699a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20Classic&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28101-improper-neutralization-of-input-du-0b6e4bbe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28101%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20MouseInteraction&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28100-improper-neutralization-of-input-du-34e884d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28100%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20PerpetuumMobile&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28099-improper-neutralization-of-input-du-19629351</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28099%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20Ultra&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28098-improper-control-of-filename-for-in-0ec6c859</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28098%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Save%20Life&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28097-improper-control-of-filename-for-in-8bdc49fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28097%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Artrium&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28096-improper-control-of-filename-for-in-c8db7c35</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28096%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20WealthCo&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28095-improper-control-of-filename-for-in-b03c4d5d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28095%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Marcell&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28094-improper-control-of-filename-for-in-955abaa1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28094%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20RexCoin&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28093-improper-control-of-filename-for-in-999684bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28093%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Ozisti&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28092-improper-control-of-filename-for-in-bbc94959</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28092%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Sounder&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28091-improper-control-of-filename-for-in-f64daafe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28091%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Coleo&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28090-improper-control-of-filename-for-in-53cfd3ce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28090%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Gamezone&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28089-improper-control-of-filename-for-in-6b4eda05</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28089%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Daiquiri&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28088-improper-control-of-filename-for-in-ec3099b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28088%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Aqualots&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28087-improper-control-of-filename-for-in-87269b7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28087%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Filmax&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28086-improper-control-of-filename-for-in-f835154b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28086%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Run%20Gran&amp;severity=high&amp;id=69a92066d1a09e29cbe6ceff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28085-improper-control-of-filename-for-in-765ce10f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28085%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Mahogany&amp;severity=high&amp;id=69a92064d1a09e29cbe6cebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28084-improper-control-of-filename-for-in-75aa4cf8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28084%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Bazinga&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28081-improper-control-of-filename-for-in-6619b6bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28081%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Windsor&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28079-improper-control-of-filename-for-in-e5dd1b45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28079%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Conquerors&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28078-improper-limitation-of-a-pathname-t-8d7dc3a8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28078%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Stylemix%20uListing&amp;severity=medium&amp;id=69a92064d1a09e29cbe6ceb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28077-improper-control-of-filename-for-in-7af042b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28077%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Vapester&amp;severity=high&amp;id=69a92064d1a09e29cbe6cead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28076-missing-authorization-in-frenify-gu-8487132d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28076%3A%20Missing%20Authorization%20in%20Frenify%20Guff&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28075-improper-neutralization-of-input-du-ca12a7f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28075%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20p-themes%20Porto&amp;severity=high&amp;id=69a92064d1a09e29cbe6cea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28074-deserialization-of-untrusted-data-i-0ac23ece</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28074%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Pizza%20House&amp;severity=critical&amp;id=69a92064d1a09e29cbe6cea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28072-improper-neutralization-of-input-du-e920df06</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PixFort%20pixfort%20Core&amp;severity=high&amp;id=69a92064d1a09e29cbe6cea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28071-missing-authorization-in-pixfort-pi-5081bcec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28071%3A%20Missing%20Authorization%20in%20PixFort%20pixfort%20Core&amp;severity=medium&amp;id=69a92061d1a09e29cbe6ce57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28069-improper-control-of-filename-for-in-60094f69</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28069%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Le%20Truffe&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28068-improper-control-of-filename-for-in-b4e10189</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28068%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Rhythmo&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28067-improper-control-of-filename-for-in-26745f1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Bassein&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28066-improper-control-of-filename-for-in-bdb29538</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Legrand&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28065-improper-control-of-filename-for-in-2ad80c72</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Eject&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28064-improper-control-of-filename-for-in-b97d1b8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28064%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Edge%20Decor&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28063-improper-control-of-filename-for-in-f8decddf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28063%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Asia%20Garden&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28062-improper-control-of-filename-for-in-ff932e87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Happy%20Baby&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28061-improper-control-of-filename-for-in-26df6673</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tiger%20Claw&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28060-improper-control-of-filename-for-in-0c15d442</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28060%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20S.King&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28059-improper-control-of-filename-for-in-236499f5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28059%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Dermatology%20Clinic&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28058-improper-control-of-filename-for-in-cf407b28</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28058%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Dixon&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28057-improper-control-of-filename-for-in-ec1b273e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28057%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Mandala&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28056-improper-control-of-filename-for-in-373db8c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28056%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20MCKinney&apos;s%20Politics&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28055-improper-control-of-filename-for-in-024d6f86</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28055%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20M.Williamson&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28054-improper-control-of-filename-for-in-ade08240</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28054%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Legal%20Stone&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28053-improper-control-of-filename-for-in-ba94b1aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28053%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Miller&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28052-improper-control-of-filename-for-in-5210e6d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28052%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Peter%20Mason&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28051-improper-control-of-filename-for-in-26a00534</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28051%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yacht%20Rental&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28050-improper-control-of-filename-for-in-11ea84ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28050%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Beacon&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28049-improper-control-of-filename-for-in-8faec466</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28049%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Police%20Department&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28048-improper-control-of-filename-for-in-ef6a6283</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28048%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20FlashMart&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28047-improper-control-of-filename-for-in-826236d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20Victo&amp;severity=high&amp;id=69a9205dd1a09e29cbe69baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28046-improper-control-of-filename-for-in-51cbc58c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28046%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Law%20Office&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28045-improper-control-of-filename-for-in-2fdee9df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28045%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20N7%20%7C%20Golf%20Club%20Sports%20%26%20Events&amp;severity=high&amp;id=69a9205dd1a09e29cbe69ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28043-improper-control-of-filename-for-in-d9ece99f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28043%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Healer%20-%20Doctor%2C%20Clinic%20%26%20Medical%20WordPress%20Theme&amp;severity=critical&amp;id=69a9205dd1a09e29cbe69ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28042-improper-neutralization-of-input-du-ff3eb323</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20Listify&amp;severity=high&amp;id=69a9205dd1a09e29cbe69ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28041-improper-control-of-filename-for-in-b50b73c4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28041%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Grit&amp;severity=high&amp;id=69a9205dd1a09e29cbe69ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28038-missing-authorization-in-brainstorm-d0becb86</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28038%3A%20Missing%20Authorization%20in%20Brainstorm_Force%20Ultimate%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=69a9205dd1a09e29cbe69b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28037-improper-neutralization-of-input-du-e9083dcf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ashanjay%20EventON&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28036-server-side-request-forgery-ssrf-in-3609b380</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28036%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SkatDesign%20Ratatouille&amp;severity=medium&amp;id=69a9205bd1a09e29cbe69b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28035-improper-control-of-filename-for-in-0b6138fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28035%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Printy&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28034-improper-control-of-filename-for-in-1efa764b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28034%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Progress&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28033-improper-control-of-filename-for-in-6042504f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28033%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Edifice&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28032-improper-control-of-filename-for-in-00e05904</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28032%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tuning&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28031-improper-control-of-filename-for-in-2dd9c45a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28031%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Invetex&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28030-improper-control-of-filename-for-in-2aab436d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28030%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Bonbon&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28029-improper-control-of-filename-for-in-59d71a4a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28029%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20EmojiNation&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28028-improper-control-of-filename-for-in-685d0513</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28028%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20MoneyFlow&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28027-improper-control-of-filename-for-in-7d3878a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28027%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Kayon&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28026-improper-control-of-filename-for-in-0e5767c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28026%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Motorix&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28025-improper-control-of-filename-for-in-038c8f04</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28025%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Stargaze&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28024-improper-control-of-filename-for-in-35450740</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28024%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Helion&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28023-improper-control-of-filename-for-in-80e0d822</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28023%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Nuts&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28022-improper-control-of-filename-for-in-b838d177</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28022%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Foodie&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28021-improper-control-of-filename-for-in-27adebf3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28021%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Craftis&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28020-improper-control-of-filename-for-in-6406328a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28020%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Chroma&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28019-improper-control-of-filename-for-in-e5d0049e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28019%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Manoir&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28018-improper-control-of-filename-for-in-ccd68ec7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28018%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Global%20Logistics&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28017-improper-control-of-filename-for-in-2390eba3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Green%20Thumb&amp;severity=high&amp;id=69a92058d1a09e29cbe69b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28016-improper-control-of-filename-for-in-7a1e7f00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28016%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Luxury%20Wine&amp;severity=high&amp;id=69a92058d1a09e29cbe69b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28015-improper-control-of-filename-for-in-5b68c2a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28015%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ShiftCV&amp;severity=high&amp;id=69a92058d1a09e29cbe69b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28014-improper-control-of-filename-for-in-757c6072</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28014%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Translogic&amp;severity=high&amp;id=69a92058d1a09e29cbe69b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28013-improper-control-of-filename-for-in-a1601827</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28013%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Kratz&amp;severity=high&amp;id=69a92058d1a09e29cbe69aff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28012-improper-control-of-filename-for-in-aafc03f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28012%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Gridiron&amp;severity=high&amp;id=69a92058d1a09e29cbe69afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28011-improper-control-of-filename-for-in-a5fc4a54</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28011%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yottis&amp;severity=high&amp;id=69a92058d1a09e29cbe69af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28010-improper-control-of-filename-for-in-a162a3c4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28010%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Scientia&amp;severity=high&amp;id=69a92058d1a09e29cbe69af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28009-improper-control-of-filename-for-in-dc66f9f3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28009%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20DroneX&amp;severity=high&amp;id=69a92058d1a09e29cbe69af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28007-improper-control-of-filename-for-in-99021ba4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28007%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Coinpress&amp;severity=high&amp;id=69a92058d1a09e29cbe69af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28006-improper-control-of-filename-for-in-a4ecdcbe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28006%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yungen&amp;severity=high&amp;id=69a92057d1a09e29cbe69ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27998-improper-control-of-filename-for-in-12ca101c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27998%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Vixus&amp;severity=high&amp;id=69a92057d1a09e29cbe69aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27997-improper-control-of-filename-for-in-77e50207</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27997%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Maxify&amp;severity=high&amp;id=69a92057d1a09e29cbe69aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27996-improper-control-of-filename-for-in-62aafe73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27996%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Lingvico&amp;severity=high&amp;id=69a92057d1a09e29cbe69aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27995-improper-control-of-filename-for-in-aa24d396</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27995%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Justitia&amp;severity=high&amp;id=69a92057d1a09e29cbe69aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27994-improper-control-of-filename-for-in-a1fd84c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27994%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tediss&amp;severity=high&amp;id=69a92057d1a09e29cbe69aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27993-improper-control-of-filename-for-in-041f00ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27993%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Aldo&amp;severity=high&amp;id=69a92057d1a09e29cbe69a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27992-improper-control-of-filename-for-in-da0000f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27992%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Meals%20%26%20Wheels&amp;severity=high&amp;id=69a92057d1a09e29cbe69a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27991-improper-control-of-filename-for-in-e256ab83</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27991%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Avventure&amp;severity=high&amp;id=69a92057d1a09e29cbe69a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27990-improper-control-of-filename-for-in-a9f96a05</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27990%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ConFix&amp;severity=high&amp;id=69a92057d1a09e29cbe69a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27989-improper-control-of-filename-for-in-f028553d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27989%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Quanzo&amp;severity=high&amp;id=69a92055d1a09e29cbe69a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27988-improper-control-of-filename-for-in-7f90503a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27988%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Equadio&amp;severity=high&amp;id=69a92055d1a09e29cbe69a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27987-improper-control-of-filename-for-in-0025b225</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27987%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20The%20Qlean&amp;severity=high&amp;id=69a92055d1a09e29cbe69a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27986-improper-control-of-filename-for-in-f2123586</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27986%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20OsTende&amp;severity=high&amp;id=69a92055d1a09e29cbe69a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27985-improper-control-of-filename-for-in-d33935f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27985%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Humanum&amp;severity=high&amp;id=69a92055d1a09e29cbe69a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27984-improper-control-of-generation-of-c-d48e285a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27984%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Marketing%20Fire%20Widget%20Options&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27983-incorrect-privilege-assignment-in-d-cf32648b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27983%3A%20Incorrect%20Privilege%20Assignment%20in%20designthemes%20LMS%20Elementor%20Pro&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27541-incorrect-privilege-assignment-in-j-9a7e8fac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27541%3A%20Incorrect%20Privilege%20Assignment%20in%20Josh%20Kohlbach%20Wholesale%20Suite&amp;severity=high&amp;id=69a92055d1a09e29cbe69a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27439-deserialization-of-untrusted-data-i-63eba95d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27439%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Dentario&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27438-deserialization-of-untrusted-data-i-b424714d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27438%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Kingler&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27437-deserialization-of-untrusted-data-i-403814d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27437%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Tennis%20Club&amp;severity=critical&amp;id=69a92053d1a09e29cbe69a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27428-improper-neutralization-of-special--bfd793a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27428%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Eagle-Themes%20Eagle%20Booking&amp;severity=high&amp;id=69a92053d1a09e29cbe69a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27417-deserialization-of-untrusted-data-i-f4ac8888</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27417%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SeventhQueen%20Sweet%20Date&amp;severity=critical&amp;id=69a92053d1a09e29cbe69a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27411-guessable-captcha-in-jp-secure-site-7081f6e0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27411%3A%20Guessable%20CAPTCHA%20in%20jp-secure%20SiteGuard%20WP%20Plugin&amp;severity=medium&amp;id=69a92053d1a09e29cbe69a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27406-insertion-of-sensitive-information--c759245d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27406%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=high&amp;id=69a92053d1a09e29cbe69a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27396-missing-authorization-in-e-plugins--7a7a7e71</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27396%3A%20Missing%20Authorization%20in%20e-plugins%20Directory%20Pro&amp;severity=high&amp;id=69a92053d1a09e29cbe69a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27390-authentication-bypass-using-an-alte-41148b94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27390%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20designthemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=high&amp;id=69a92053d1a09e29cbe69a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27389-authentication-bypass-using-an-alte-aec8b6d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27389%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20designthemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=critical&amp;id=69a92053d1a09e29cbe69a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27388-missing-authorization-in-designthem-4eb7163c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27388%3A%20Missing%20Authorization%20in%20designthemes%20DesignThemes%20Booking%20Manager&amp;severity=high&amp;id=69a92053d1a09e29cbe69a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27386-missing-authorization-in-designthem-e450ed01</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27386%3A%20Missing%20Authorization%20in%20designthemes%20DesignThemes%20Directory%20Addon&amp;severity=high&amp;id=69a92053d1a09e29cbe69a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27385-improper-neutralization-of-input-du-d65b28b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27385%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Portfolio&amp;severity=high&amp;id=69a92052d1a09e29cbe69995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27384-improper-validation-of-specified-qu-541ac9e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27384%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20BoldGrid%20W3%20Total%20Cache&amp;severity=critical&amp;id=69a92052d1a09e29cbe69992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27383-improper-control-of-filename-for-in-a0717a1e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27383%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Metro&amp;severity=high&amp;id=69a92052d1a09e29cbe6998f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27382-improper-neutralization-of-input-du-af6905cd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27382%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RadiusTheme%20Metro&amp;severity=high&amp;id=69a92052d1a09e29cbe6998c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27381-improper-control-of-filename-for-in-d7e4f02a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Aora&amp;severity=high&amp;id=69a92052d1a09e29cbe69989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27376-improper-neutralization-of-input-du-d7b9308c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27376%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JanStudio%20Claue%20-%20Clean%2C%20Minimal%20Elementor%20WooCommerce%20Theme&amp;severity=high&amp;id=69a92052d1a09e29cbe69986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27375-improper-neutralization-of-input-du-0a641b64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27375%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JanStudio%20Gecko&amp;severity=high&amp;id=69a92052d1a09e29cbe69983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27374-missing-authorization-in-vanquish-w-68390e32</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27374%3A%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Order%20Details&amp;severity=high&amp;id=69a92051d1a09e29cbe69980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27373-improper-neutralization-of-special--971d812f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27373%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Essekia%20Tablesome&amp;severity=high&amp;id=69a92051d1a09e29cbe6997d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27370-insertion-of-sensitive-information--279a6a34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27370%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Premio%20Chaty&amp;severity=high&amp;id=69a92051d1a09e29cbe6997a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27369-deserialization-of-untrusted-data-i-760b76dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27369%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Celeste&amp;severity=high&amp;id=69a92050d1a09e29cbe6996d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27367-improper-neutralization-of-input-du-061da31a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27367%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Musico&amp;severity=high&amp;id=69a92050d1a09e29cbe6996a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27363-improper-neutralization-of-input-du-2181ae7d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27363%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kamleshyadav%20WP%20Bakery%20Autoresponder%20Addon&amp;severity=high&amp;id=69a92050d1a09e29cbe69967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27362-missing-authorization-in-kamleshyad-456b5eb3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27362%3A%20Missing%20Authorization%20in%20kamleshyadav%20WP%20Bakery%20Autoresponder%20Addon&amp;severity=medium&amp;id=69a92050d1a09e29cbe69964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27361-missing-authorization-in-webcodingp-a42d6412</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27361%3A%20Missing%20Authorization%20in%20WebCodingPlace%20Responsive%20Posts%20Carousel%20Pro&amp;severity=high&amp;id=69a92050d1a09e29cbe69961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27359-improper-neutralization-of-input-du-dd7a632d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27359%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Awa%20Plugins&amp;severity=high&amp;id=69a92050d1a09e29cbe6995e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27358-improper-neutralization-of-input-du-9ef29754</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Architecturer&amp;severity=high&amp;id=69a92050d1a09e29cbe6995b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27354-improper-neutralization-of-input-du-9dc82acf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebCodingPlace%20WooCommerce%20Coming%20Soon%20Product%20with%20Countdown&amp;severity=medium&amp;id=69a92050d1a09e29cbe69958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27353-improper-neutralization-of-input-du-6033291d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20News&amp;severity=high&amp;id=69a92050d1a09e29cbe69955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27352-improper-neutralization-of-input-du-48680ff1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Starto&amp;severity=high&amp;id=69a92050d1a09e29cbe69952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27348-improper-neutralization-of-input-du-916d628b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27348%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=69a9204fd1a09e29cbe6993a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27344-missing-authorization-in-inseriswis-acb5351c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27344%3A%20Missing%20Authorization%20in%20inseriswiss%20inseri%20core&amp;severity=medium&amp;id=69a9204fd1a09e29cbe69937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27342-improper-control-of-filename-for-in-b223740e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27342%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20TopFit%20-%20Fitness%20and%20Gym%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27341-improper-control-of-filename-for-in-07040eac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27341%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20TopScorer%20-%20Sports%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27340-improper-control-of-filename-for-in-649037d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27340%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Apollo%20%7C%20Night%20Club%2C%20DJ%20Event%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe6992e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27339-improper-control-of-filename-for-in-0d751dca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27339%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Buzz%20Stone%20%7C%20Magazine%20%26%20Viral%20Blog%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe6992b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27338-deserialization-of-untrusted-data-i-c9ca4dcb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27338%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AivahThemes%20Car%20Zone&amp;severity=high&amp;id=69a9204fd1a09e29cbe69928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27337-improper-control-of-filename-for-in-c7e0865a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27337%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Chronicle%20-%20Lifestyle%20Magazine%20%26%20Blog%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27336-improper-control-of-filename-for-in-14ec8c54</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27336%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Consultor%20%7C%20Consulting%2C%20Accounting%20%26%20Legal%20Counsel%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27335-improper-control-of-filename-for-in-81980ea3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27335%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Ekoterra%20-%20NonProfit%2C%20Green%20Energy%20%26%20Ecology%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe6991f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27334-improper-control-of-filename-for-in-b3419336</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27334%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dan_fisher%20Alchemists&amp;severity=high&amp;id=69a9204dd1a09e29cbe69912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27332-improper-neutralization-of-input-du-e06e212b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27332%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Agrofood&amp;severity=high&amp;id=69a9204dd1a09e29cbe6990f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27326-improper-control-of-filename-for-in-5f8d2dda</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20AC%20Services%20%7C%20HVAC%2C%20Air%20Conditioning%20%26%20Heating%20Company%20WordPress%20Theme&amp;severity=high&amp;id=69a9204dd1a09e29cbe6990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27098-deserialization-of-untrusted-data-i-11591bf0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27098%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Au%20Pair%20Agency%20-%20Babysitting%20%26%20Nanny%20Theme&amp;severity=high&amp;id=69a9204dd1a09e29cbe69909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27097-improper-control-of-filename-for-in-03e1caa9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27097%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20CasaMia%20%7C%20Property%20Rental%20Real%20Estate%20WordPress%20Theme&amp;severity=high&amp;id=69a9204dd1a09e29cbe69906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24963-incorrect-privilege-assignment-in-a-797c6fe9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24963%3A%20Incorrect%20Privilege%20Assignment%20in%20ameliabooking%20Amelia&amp;severity=high&amp;id=69a9204dd1a09e29cbe69903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24960-unrestricted-upload-of-file-with-da-2d924f8c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24960%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Charety&amp;severity=critical&amp;id=69a9204dd1a09e29cbe69900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24385-deserialization-of-untrusted-data-i-63919416</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24385%3A%20Deserialization%20of%20Untrusted%20Data%20in%20gerritvanaaken%20Podlove%20Web%20Player&amp;severity=high&amp;id=69a9204dd1a09e29cbe698fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23802-unrestricted-upload-of-file-with-da-19d38ea8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23802%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Jordy%20Meow%20AI%20Engine&amp;severity=critical&amp;id=69a9204dd1a09e29cbe698fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23801-improper-control-of-filename-for-in-4391710d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23801%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20The%20Issue&amp;severity=high&amp;id=69a9204dd1a09e29cbe698f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23799-missing-authorization-in-themeum-tu-99e647be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23799%3A%20Missing%20Authorization%20in%20Themeum%20Tutor%20LMS&amp;severity=medium&amp;id=69a9204cd1a09e29cbe698dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23798-deserialization-of-untrusted-data-i-1df0e723</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23798%3A%20Deserialization%20of%20Untrusted%20Data%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=high&amp;id=69a9204cd1a09e29cbe698d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23546-insertion-of-sensitive-information--e32c6a86</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23546%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20RadiusTheme%20Classified%20Listing&amp;severity=medium&amp;id=69a9204cd1a09e29cbe698d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22501-deserialization-of-untrusted-data-i-99d52e1a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22501%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Mounthood&amp;severity=critical&amp;id=69a9204cd1a09e29cbe698d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22497-deserialization-of-untrusted-data-i-30f5a2c9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22497%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Jardi&amp;severity=critical&amp;id=69a9204cd1a09e29cbe698d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22479-missing-authorization-in-themeruby--966dbed0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22479%3A%20Missing%20Authorization%20in%20ThemeRuby%20Easy%20Post%20Submission&amp;severity=high&amp;id=69a9204cd1a09e29cbe698cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22478-improper-control-of-filename-for-in-85bc5149</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22478%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20FindAll&amp;severity=high&amp;id=69a9204cd1a09e29cbe698ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22477-improper-control-of-filename-for-in-e68163d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22477%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Felizia&amp;severity=high&amp;id=69a9204cd1a09e29cbe698c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22476-improper-control-of-filename-for-in-8b3dac27</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22476%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Etchy&amp;severity=high&amp;id=69a9204cd1a09e29cbe698c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22475-deserialization-of-untrusted-data-i-fdb7016e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22475%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Estate&amp;severity=critical&amp;id=69a9204cd1a09e29cbe698c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22474-deserialization-of-untrusted-data-i-3cd33ca2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22474%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Equestrian%20Centre&amp;severity=critical&amp;id=69a9204ad1a09e29cbe698a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22473-deserialization-of-untrusted-data-i-73086e9e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22473%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Dental%20Clinic&amp;severity=high&amp;id=69a9204ad1a09e29cbe698a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22471-deserialization-of-untrusted-data-i-5a025546</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22471%3A%20Deserialization%20of%20Untrusted%20Data%20in%20maximsecudeal%20Secudeal%20Payments%20for%20Ecommerce&amp;severity=high&amp;id=69a9204ad1a09e29cbe698a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22467-improper-neutralization-of-input-du-f26411c1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22467%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mwtemplates%20DeepDigital&amp;severity=high&amp;id=69a9204ad1a09e29cbe698a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22465-improper-neutralization-of-input-du-bdb628c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SeventhQueen%20BuddyApp&amp;severity=high&amp;id=69a9204ad1a09e29cbe6989d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22460-improper-limitation-of-a-pathname-t-fd2b1f28</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22460%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpWax%20FormGent&amp;severity=high&amp;id=69a9204ad1a09e29cbe6989a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22459-missing-authorization-in-blend-medi-92549eee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22459%3A%20Missing%20Authorization%20in%20Blend%20Media%20WordPress%20CTA&amp;severity=medium&amp;id=69a9204ad1a09e29cbe69897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22457-improper-control-of-filename-for-in-868a0150</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22457%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Wanderland&amp;severity=high&amp;id=69a9204ad1a09e29cbe69894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22456-improper-control-of-filename-for-in-ae786313</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22456%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Askka&amp;severity=high&amp;id=69a9204ad1a09e29cbe69891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22455-improper-neutralization-of-input-du-4ccc05ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20Thebe&amp;severity=high&amp;id=69a9204ad1a09e29cbe6988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22454-deserialization-of-untrusted-data-i-877aac02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22454%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Solaris&amp;severity=critical&amp;id=69a92049d1a09e29cbe69841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22453-deserialization-of-untrusted-data-i-d455e2c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22453%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Pets%20Club&amp;severity=critical&amp;id=69a92049d1a09e29cbe6983e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22452-improper-control-of-filename-for-in-300b3ba9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22452%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Hoverex&amp;severity=high&amp;id=69a92049d1a09e29cbe6983b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22451-deserialization-of-untrusted-data-i-bc4a2c4f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22451%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Handyman&amp;severity=critical&amp;id=69a92049d1a09e29cbe69838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22449-improper-control-of-filename-for-in-92a5942f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22449%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Don%20Peppe&amp;severity=high&amp;id=69a92049d1a09e29cbe69835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22446-improper-control-of-filename-for-in-d1d7804b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22446%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Prowess&amp;severity=high&amp;id=69a92049d1a09e29cbe69832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22443-improper-control-of-filename-for-in-37f6a4c1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22443%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Alliance&amp;severity=high&amp;id=69a92049d1a09e29cbe6982f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22442-improper-control-of-filename-for-in-2b886240</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22442%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LaunchandSell%20Tribe&amp;severity=high&amp;id=69a92049d1a09e29cbe6982c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22441-improper-control-of-filename-for-in-8462f283</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22441%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Zentrum&amp;severity=high&amp;id=69a92049d1a09e29cbe69829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22440-improper-neutralization-of-input-du-6a9ec730</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22440%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20Thecs&amp;severity=high&amp;id=69a92049d1a09e29cbe69826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22439-improper-control-of-filename-for-in-92017b3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22439%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Green%20Planet&amp;severity=high&amp;id=69a92047d1a09e29cbe69805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22438-improper-neutralization-of-input-du-cd3f5d58</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20TheBi&amp;severity=high&amp;id=69a92047d1a09e29cbe69802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22437-improper-control-of-filename-for-in-c8697122</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22437%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Playa&amp;severity=high&amp;id=69a92047d1a09e29cbe697ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22436-improper-control-of-filename-for-in-d8253faf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22436%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Helvig&amp;severity=high&amp;id=69a92047d1a09e29cbe697fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22435-improper-control-of-filename-for-in-b7bce220</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22435%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20ElectroServ&amp;severity=high&amp;id=69a92047d1a09e29cbe697f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22434-improper-control-of-filename-for-in-d5cb92d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22434%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Crown%20Art&amp;severity=high&amp;id=69a92047d1a09e29cbe697f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22433-improper-control-of-filename-for-in-fb1443bd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22433%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20CloudMe&amp;severity=high&amp;id=69a92047d1a09e29cbe697f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22432-improper-control-of-filename-for-in-13d73b2c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22432%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Woopy&amp;severity=high&amp;id=69a92047d1a09e29cbe697f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22431-improper-control-of-filename-for-in-bfe90a6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22431%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Wabi-Sabi&amp;severity=high&amp;id=69a92047d1a09e29cbe697ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22429-improper-control-of-filename-for-in-08e3884d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22429%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Verdure&amp;severity=high&amp;id=69a92047d1a09e29cbe697ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22428-improper-control-of-filename-for-in-543d64d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22428%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tooth%20Fairy&amp;severity=high&amp;id=69a92045d1a09e29cbe697a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22427-improper-control-of-filename-for-in-14d5f2b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22427%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20GoTravel&amp;severity=high&amp;id=69a92045d1a09e29cbe697a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22425-improper-control-of-filename-for-in-f35c03aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22425%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Sweet%20Jane&amp;severity=high&amp;id=69a92045d1a09e29cbe697a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22424-improper-control-of-filename-for-in-ca180096</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22424%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Shaha&amp;severity=high&amp;id=69a92045d1a09e29cbe6979d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22423-improper-control-of-filename-for-in-ef3a1c6c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22423%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20SetSail&amp;severity=high&amp;id=69a92045d1a09e29cbe6979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22421-improper-control-of-filename-for-in-bb63cc46</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22421%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Quantum&amp;severity=high&amp;id=69a92045d1a09e29cbe69797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22420-improper-control-of-filename-for-in-503c4017</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22420%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Horizon&amp;severity=high&amp;id=69a92045d1a09e29cbe69794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22419-improper-control-of-filename-for-in-61a3c05c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22419%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Honor&amp;severity=high&amp;id=69a92045d1a09e29cbe69791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22418-improper-control-of-filename-for-in-6486ba9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22418%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Great%20Lotus&amp;severity=high&amp;id=69a92045d1a09e29cbe6978e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22417-deserialization-of-untrusted-data-i-623bd60f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22417%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Wedding&amp;severity=critical&amp;id=69a92045d1a09e29cbe6978b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22416-improper-control-of-filename-for-in-a2d7893e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22416%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20FixTeam&amp;severity=high&amp;id=69a92043d1a09e29cbe6976b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22415-improper-control-of-filename-for-in-5cb350fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22415%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20The%20Mounty&amp;severity=high&amp;id=69a92043d1a09e29cbe69768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22414-improper-control-of-filename-for-in-aa35a28f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22414%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Marra&amp;severity=high&amp;id=69a92043d1a09e29cbe69765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22413-improper-control-of-filename-for-in-ac890de3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22413%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Malgr%C3%A9&amp;severity=high&amp;id=69a92043d1a09e29cbe69762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22412-improper-control-of-filename-for-in-d10b6e07</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22412%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Eona&amp;severity=high&amp;id=69a92043d1a09e29cbe6975f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22410-improper-control-of-filename-for-in-0e344228</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22410%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Dolcino&amp;severity=high&amp;id=69a92043d1a09e29cbe6975c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22408-improper-control-of-filename-for-in-2599dfe1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22408%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Justicia&amp;severity=high&amp;id=69a92043d1a09e29cbe69759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22405-improper-control-of-filename-for-in-309c37ce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22405%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Overton&amp;severity=high&amp;id=69a92043d1a09e29cbe69756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22403-improper-control-of-filename-for-in-37688ae6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22403%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Innovio&amp;severity=high&amp;id=69a92043d1a09e29cbe69753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22399-improper-control-of-filename-for-in-9c204200</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22399%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Holmes&amp;severity=high&amp;id=69a92043d1a09e29cbe69750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22397-improper-control-of-filename-for-in-a2cedb55</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22397%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Fleur&amp;severity=high&amp;id=69a92041d1a09e29cbe696f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22395-improper-control-of-filename-for-in-2eececbe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22395%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Fiorello&amp;severity=high&amp;id=69a92041d1a09e29cbe696f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22394-improper-control-of-filename-for-in-35a399ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22394%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Evently&amp;severity=high&amp;id=69a92041d1a09e29cbe696ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22392-improper-control-of-filename-for-in-563f1427</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22392%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Cortex&amp;severity=high&amp;id=69a92041d1a09e29cbe696eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22390-improper-control-of-generation-of-c-c30abc34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22390%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Builderall%20Builderall%20Builder%20for%20WordPress&amp;severity=critical&amp;id=69a92041d1a09e29cbe696e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22389-improper-control-of-filename-for-in-8194ceac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22389%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Cocco&amp;severity=high&amp;id=69a92041d1a09e29cbe696e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22387-improper-control-of-filename-for-in-142b7be4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22387%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Aviana&amp;severity=high&amp;id=69a92041d1a09e29cbe696e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22385-improper-control-of-filename-for-in-02aa55fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22385%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20don-themes%20Wolmart&amp;severity=high&amp;id=69a92041d1a09e29cbe696df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69411-improper-limitation-of-a-pathname-t-2cfd9ad8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69411%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Robert%20Seyfriedsberger%20ionCube%20tester%20plus&amp;severity=high&amp;id=69a92041d1a09e29cbe696dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69343-improper-neutralization-of-input-du-0837cb58</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=medium&amp;id=69a92041d1a09e29cbe696d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69340-missing-authorization-in-buddhathem-02241919</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69340%3A%20Missing%20Authorization%20in%20BuddhaThemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=high&amp;id=69a9203fd1a09e29cbe696bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69339-improper-control-of-filename-for-in-5f15ca00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69339%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20don-themes%20Molla&amp;severity=high&amp;id=69a9203fd1a09e29cbe696ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69338-improper-neutralization-of-special--1af8d4c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69338%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20don-themes%20Riode%20Core&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69090-improper-control-of-filename-for-in-f710c44c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69090%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Remons&amp;severity=high&amp;id=69a9203fd1a09e29cbe696b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68555-unrestricted-upload-of-file-with-da-5ac31c3e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68555%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Nutrie&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68554-unrestricted-upload-of-file-with-da-a493cdbe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68554%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Keenarch&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68553-unrestricted-upload-of-file-with-da-cd37dfb8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68553%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Lendiz&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68515-insertion-of-sensitive-information--62331a0f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68515%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Roland%20Murg%20WP%20Booking%20System&amp;severity=medium&amp;id=69a9203fd1a09e29cbe696a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54001-deserialization-of-untrusted-data-i-e9d6138e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54001%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Classter&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53335-improper-control-of-filename-for-in-9d2967e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53335%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Berger&amp;severity=high&amp;id=69a9203fd1a09e29cbe696a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29053-cwe-74-improper-neutralization-of-s-51d11c69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29053%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=69a91cb5d1a09e29cbe4c25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29052-cwe-79-improper-neutralization-of-i-43c74935</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29052%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20humhub%20calendar&amp;severity=medium&amp;id=69a91cb5d1a09e29cbe4c257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23767-missing-authentication-for-critical-37ea4536</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23767%3A%20Missing%20authentication%20for%20critical%20function%20in%20Seiko%20Epson%20Corporation%20ESC%2FPOS&amp;severity=critical&amp;id=69a91cb5d1a09e29cbe4c252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30777-authentication-bypass-using-an-alte-e04cf396</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30777%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20EC-CUBE%20CO.%2CLTD.%20EC-CUBE%204.1%20series&amp;severity=medium&amp;id=69a915a0d1a09e29cbe15ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27982-url-redirection-to-untrusted-site-o-049b9d08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27982%3A%20URL%20redirection%20to%20untrusted%20site%20(&apos;Open%20Redirect&apos;)%20in%20allauth%20django-allauth&amp;severity=medium&amp;id=69a915a0d1a09e29cbe15aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3072-cwe-862-missing-authorization-in-dgl-1e291b23</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3072%3A%20CWE-862%20Missing%20Authorization%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=69a915a0d1a09e29cbe15ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29128-cwe-522-insufficiently-protected-cr-67a32621</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29128%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a915a0d1a09e29cbe15aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3523-cwe-89-improper-neutralization-of-sp-c5526c0e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3523%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20blobfolio%20Apocalypse%20Meow&amp;severity=medium&amp;id=69a90b11d1a09e29cbdaab81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-ios-exploit-kit-coruna-found-powering-b64cff88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20iOS%20Exploit%20Kit%20%E2%80%98Coruna%E2%80%99%20Found%20Powering%20Global%20Attacks&amp;severity=medium&amp;id=69a903d6d1a09e29cbbe0e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2899-cwe-862-missing-authorization-in-tec-1e943f40</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2899%3A%20CWE-862%20Missing%20Authorization%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=medium&amp;id=69a90085d1a09e29cbba97b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3034-cwe-79-improper-neutralization-of-in-49065add</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3034%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sagarpatel124%20OoohBoi%20Steroids%20for%20Elementor&amp;severity=medium&amp;id=69a90085d1a09e29cbba97b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2365-cwe-79-improper-neutralization-of-in-e1b09f37</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2365%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=high&amp;id=69a90085d1a09e29cbba97ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29127-cwe-269-improper-privilege-manageme-e5c7745e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29127%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=critical&amp;id=69a8f5fbd1a09e29cbacc596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26034-incorrect-default-permissions-in-de-ce6196d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26034%3A%20Incorrect%20default%20permissions%20in%20Dell%20Inc.%20UPS%20Multi-UPS%20Management%20Console%20(MUMC)&amp;severity=high&amp;id=69a8f5fbd1a09e29cbacc592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26033-unquoted-search-path-or-element-in--dd92d150</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26033%3A%20Unquoted%20search%20path%20or%20element%20in%20Dell%20Inc.%20UPS%20Multi-UPS%20Management%20Console%20(MUMC)&amp;severity=medium&amp;id=69a8f5fbd1a09e29cbacc58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/differentiating-between-a-targeted-intrusion-and-a-40c30509</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Differentiating%20Between%20a%20Targeted%20Intrusion%20and%20an%20Automated%20Opportunistic%20Scanning%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Mar%204th)&amp;severity=medium&amp;id=69a8eb3ad1a09e29cba41920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57854-cwe-338-use-of-cryptographically-we-ad4e767f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57854%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20DOUGDUDE%20Net%3A%3ANSCA%3A%3AClient&amp;severity=critical&amp;id=69a8f5fbd1a09e29cbacc58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29126-cwe-732-incorrect-permission-assign-601890c3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29126%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8e7f5d1a09e29cba26c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40931-cwe-340-generation-of-predictable-n-2e8b6bd2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40931%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20CHORNY%20Apache%3A%3ASession%3A%3AGenerate%3A%3AMD5&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29125-cwe-732-incorrect-permission-assign-edae591f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29125%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8e7f5d1a09e29cba26c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3257-cwe-1395-dependency-on-vulnerable-th-51180545</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3257%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20TOKUHIROM%20UnQLite&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3381-cwe-1395-dependency-on-vulnerable-th-477a2de6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3381%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20PMQS%20Compress%3A%3ARaw%3A%3AZlib&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40926-cwe-340-generation-of-predictable-n-bc6c4282</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40926%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20KAZEBURO%20Plack%3A%3AMiddleware%3A%3ASession%3A%3ASimple&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29124-cwe-269-improper-privilege-manageme-bd7d8889</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29124%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8e7f5d1a09e29cba26c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29123-cwe-269-improper-privilege-manageme-a521f86f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29123%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8dd5dd1a09e29cb9d46b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29122-cwe-269-improper-privilege-manageme-f4a310aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29122%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8dd5dd1a09e29cb9d46ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29121-cwe-269-improper-privilege-manageme-59cf4f7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29121%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8d655d1a09e29cb94528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-05-ac68c866</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-05&amp;severity=medium&amp;id=69aa1c8cc48b3f10ff8ed5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70995-na-8ec01cad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70995%3A%20n%2Fa&amp;severity=high&amp;id=69a9f294c48b3f10ff5116cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70949-na-4f28d6ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70949%3A%20n%2Fa&amp;severity=high&amp;id=69a9f294c48b3f10ff5116c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70948-na-00703f46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70948%3A%20n%2Fa&amp;severity=critical&amp;id=69a9f294c48b3f10ff5116c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70614-na-ea052519</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70614%3A%20n%2Fa&amp;severity=high&amp;id=69a9e67761e8e69ef5f70090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29165-na-53b6caed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29165%3A%20n%2Fa&amp;severity=critical&amp;id=69a9e2f561e8e69ef5e92409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70616-na-996c656a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70616%3A%20n%2Fa&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26418-na-62db3068</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26418%3A%20n%2Fa&amp;severity=high&amp;id=69a9c996460e1c85df139353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26417-na-8d4849de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26417%3A%20n%2Fa&amp;severity=high&amp;id=69a9c996460e1c85df13934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26416-na-edaf16a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26416%3A%20n%2Fa&amp;severity=high&amp;id=69a9c994460e1c85df139340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70233-na-c8f3916e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70233%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df139333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70232-na-2519a946</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70232%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df13932e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70231-na-dfe379a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70231%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df139329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70230-na-1652c7b5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70230%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df139324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70229-na-248a175b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70229%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df13931f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45691-na-928afead</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45691%3A%20n%2Fa&amp;severity=high&amp;id=69a9c994460e1c85df139319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26377-na-1652a603</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26377%3A%20n%2Fa&amp;severity=medium&amp;id=69a9a2e4460e1c85dfd8770e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69534-na-6020ab11</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69534%3A%20n%2Fa&amp;severity=high&amp;id=69a99d83d9f976b5b5c65c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-05-130e5843</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-05&amp;severity=medium&amp;id=69a99b5b224272a26dae5f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-05-3423470b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-05&amp;severity=low&amp;id=69a99b5b224272a26dae5f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2836-vulnerability-in-cloudflare-httpsgit-c71c61fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2836%3A%20Vulnerability%20in%20Cloudflare%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Fpingora&amp;severity=high&amp;id=69a8c847d1a09e29cb860502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2835-cwe-444-inconsistent-interpretation--a3f6db67</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2835%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Cloudflare%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Fpingora&amp;severity=critical&amp;id=69a8c4c1d1a09e29cb83c419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22052-209-in-netapp-ontap-9-6c596002</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22052%3A%20209%20in%20NETAPP%20ONTAP%209&amp;severity=medium&amp;id=69a8c142d1a09e29cb82aab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2833-cwe-444-inconsistent-interpretation--c3ebdcf0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2833%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Cloudflare%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Fpingora&amp;severity=critical&amp;id=69a8c142d1a09e29cb82aab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41257-cwe-20-improper-input-validation-in-7d1c9b29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41257%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Suprema%20BioStar%202&amp;severity=medium&amp;id=69a8cbd6d1a09e29cb893ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2297-vulnerability-in-python-software-fou-a603ade6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2297%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29085-cwe-74-improper-neutralization-of-s-f874f2fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29085%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29045-cwe-177-improper-handling-of-url-en-89e68b18</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29045%3A%20CWE-177%3A%20Improper%20Handling%20of%20URL%20Encoding%20(Hex%20Encoding)%20in%20honojs%20hono&amp;severity=high&amp;id=69a8afacd1a09e29cb7ac71d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29086-cwe-1113-inappropriate-comment-styl-b5935525</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29086%3A%20CWE-1113%3A%20Inappropriate%20Comment%20Style%20in%20honojs%20hono&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26002-cwe-74-improper-neutralization-of-s-04c291ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26002%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20OSC%20ondemand&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25750-cwe-74-improper-neutralization-of-s-2b0c1429</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25750%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20langchain-ai%20helm&amp;severity=high&amp;id=69a8cbd6d1a09e29cb893bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29000-cwe-347-improper-verification-of-cr-c33a53b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29000%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20pac4j%20pac4j-jwt&amp;severity=critical&amp;id=69a8ac26d1a09e29cb796104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66024-cwe-79-improper-neutralization-of-i-78d8568e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66024%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki-contrib%20application-blog-ui&amp;severity=high&amp;id=69a8ac26d1a09e29cb7960f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27898-cwe-639-authorization-bypass-throug-bcfc5722</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27898%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=69a8ac26d1a09e29cb796101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27803-cwe-269-improper-privilege-manageme-445e7709</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27803%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20dani-garcia%20vaultwarden&amp;severity=high&amp;id=69a8ac26d1a09e29cb7960fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27802-cwe-269-improper-privilege-manageme-b8681d39</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27802%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20dani-garcia%20vaultwarden&amp;severity=high&amp;id=69a8ac26d1a09e29cb7960fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27801-cwe-307-improper-restriction-of-exc-ca82586a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27801%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=69a8a8a2d1a09e29cb7830cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-tycoon2fa-how-a-leading-aitm-phishing-kit-o-304fb781</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20Tycoon2FA%3A%20How%20a%20leading%20AiTM%20phishing%20kit%20operated%20at%20scale&amp;severity=medium&amp;id=69a94eed0e5bba37ca88cea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-infrastructure-in-focus-mapping-state--e1c5a95a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20Infrastructure%20in%20Focus%3A%20Mapping%20State-Aligned%20Clusters%20During%20Geopolitical%20Escalation&amp;severity=medium&amp;id=69a94eed0e5bba37ca88ce8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-ssl-certificates-and-graph-theory-to-uncover-fac7451c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20SSL%20Certificates%20and%20Graph%20Theory%20to%20Uncover%20Threat%20Actors&amp;severity=medium&amp;id=69a952710e5bba37ca8f2edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28435-cwe-400-uncontrolled-resource-consu-a7a1b56e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28435%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69a88c81d1a09e29cb6b4cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28434-cwe-200-exposure-of-sensitive-infor-53bb8ea6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28434%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=69a88c81d1a09e29cb6b4cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28427-cwe-22-improper-limitation-of-a-pat-1d9c15cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28427%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nekename%20OpenDeck&amp;severity=medium&amp;id=69a88c81d1a09e29cb6b4cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3545-insufficient-data-validation-in-goog-72f3544b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3545%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=critical&amp;id=69a88902d1a09e29cb6a246a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3544-heap-buffer-overflow-in-google-chrom-fc3d6571</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3544%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3543-inappropriate-implementation-in-goog-9824fbf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3543%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3542-inappropriate-implementation-in-goog-a5d2125e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3542%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a245e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3541-inappropriate-implementation-in-goog-eb2f2edf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3541%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a245a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3540-inappropriate-implementation-in-goog-75231b89</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3540%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3539-object-lifecycle-issue-in-google-chr-f63ab81a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3539%3A%20Object%20lifecycle%20issue%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3538-integer-overflow-in-google-chrome-0397ca92</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3538%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a244e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3537-object-lifecycle-issue-in-google-chr-f7411df0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3537%3A%20Object%20lifecycle%20issue%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a244a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3536-integer-overflow-in-google-chrome-bf0554c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3536%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tycoon-2fa-phishing-platform-dismantled-in-global--237fbcd2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tycoon%202FA%20Phishing%20Platform%20Dismantled%20in%20Global%20Takedown&amp;severity=medium&amp;id=69a87e3ed1a09e29cb5e7591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20064-null-pointer-dereference-in-cisco-c-b5c944c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20064%3A%20NULL%20Pointer%20Dereference%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67597f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20025-integer-overflow-or-wraparound-in-c-fc9799cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20025%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67597c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20024-improper-restriction-of-operations--d2ad4715</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20024%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20023-out-of-bounds-write-in-cisco-cisco--9399b4a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20023%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20022-use-of-out-of-range-pointer-offset--13763524</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20022%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20021-missing-release-of-memory-after-eff-9fbf8fbb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20021%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20020-improper-input-validation-in-cisco--701d124c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20020%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67596d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20016-improper-neutralization-of-argument-f7993022</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20016%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67596a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0847-cwe-22-improper-limitation-of-a-path-c024e0ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0847%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nltk%20nltk%2Fnltk&amp;severity=high&amp;id=69a87af1d1a09e29cb563d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3125-cwe-918-server-side-request-forgery--e34410dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3125%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opennextjs%20%40opennextjs%2Fcloudflare&amp;severity=high&amp;id=69a87af1d1a09e29cb563d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20073-improper-access-control-in-cisco-ci-042a5698</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20073%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20102-improper-neutralization-of-input-du-903da884</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20070-improper-neutralization-of-script-r-ad534a20</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20070%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20069-inconsistent-interpretation-of-http-b9c2ece6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20069%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20068-uncaught-exception-in-cisco-cisco-c-e719f1cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20068%3A%20Uncaught%20Exception%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20067-out-of-bounds-write-in-cisco-cisco--054c9a9c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20067%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20066-uncontrolled-resource-consumption-i-8c53c7b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20066%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20065-improper-locking-in-cisco-cisco-sec-f70efa5e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20065%3A%20Improper%20Locking%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20063-improper-neutralization-of-argument-93cf348b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20063%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20058-access-of-memory-location-before-st-b82bac04</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20058%3A%20Access%20of%20Memory%20Location%20Before%20Start%20of%20Buffer%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20057-divide-by-zero-in-cisco-cisco-cyber-ef2d4a2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20057%3A%20Divide%20By%20Zero%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a87779d1a09e29cb54d338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20054-loop-with-unreachable-exit-conditio-15e8c0bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20054%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a87779d1a09e29cb54d332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20053-heap-based-buffer-overflow-in-cisco-9c77fb8d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20053%3A%20Heap-based%20Buffer%20Overflow%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a87779d1a09e29cb54d326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20052-access-of-memory-location-after-end-f524f4da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20052%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20050-improper-resource-shutdown-or-relea-7f79f018</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20050%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-lexisnexis-data-breach-confirmed-after-hackers-8edd7e0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20LexisNexis%20Data%20Breach%20Confirmed%20After%20Hackers%20Leak%20Files&amp;severity=medium&amp;id=69a8702ed1a09e29cb5049be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20017-execution-with-unnecessary-privileg-f18e1fea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20017%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20018-path-traversal-dirfilename-in-cisco-e91f7016</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20018%3A%20Path%20Traversal%3A%20&apos;dir%2F..%2F..%2Ffilename&apos;%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a87779d1a09e29cb54d2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20007-improper-access-control-in-cisco-ci-6e2cb5b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20007%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87078d1a09e29cb506b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20006-error-handling-in-cisco-cisco-secur-055f6d78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20006%3A%20Error%20Handling%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87078d1a09e29cb506b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20149-improper-neutralization-of-input-du-f3875916</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20149%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=69a87078d1a09e29cb506b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20082-missing-release-of-resource-after-e-84837444</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20082%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a87078d1a09e29cb506b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20062-incorrect-execution-assigned-permis-46e51a53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20062%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20049-incorrect-calculation-of-buffer-siz-37ef86ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20049%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20015-missing-release-of-memory-after-eff-d89d440f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20015%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20014-missing-release-of-memory-after-eff-1c5c9b32</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20014%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86cded1a09e29cb4f151d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20013-missing-release-of-memory-after-eff-d21a0470</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20013%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f151a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20106-missing-release-of-memory-after-eff-bbf2d623</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20106%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86ce0d1a09e29cb4f1568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20105-missing-release-of-memory-after-eff-0d6ecaf2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20105%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20103-allocation-of-resources-without-lim-32655776</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20103%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20101-use-of-insufficiently-random-values-b5449b43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20101%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f155f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20100-buffer-copy-without-checking-size-o-1555caf4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20100%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f155c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20003-improper-neutralization-of-special--469e2eb9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20003%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20002-improper-neutralization-of-special--ff656b71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20002%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=high&amp;id=69a86cded1a09e29cb4f150e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20131-deserialization-of-untrusted-data-i-460d28f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20131%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=critical&amp;id=69a86ce0d1a09e29cb4f156b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20039-improper-clearing-of-heap-memory-be-eea5d267</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20039%3A%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86cded1a09e29cb4f1526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20044-improper-privilege-management-in-ci-07510da0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20044%3A%20Improper%20Privilege%20Management%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a86ce0d1a09e29cb4f1550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20079-authentication-bypass-using-an-alte-6aa92e25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20079%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=critical&amp;id=69a86ce0d1a09e29cb4f1559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20031-uncaught-exception-in-cisco-cisco-s-63948540</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20031%3A%20Uncaught%20Exception%20in%20Cisco%20Cisco%20Secure%20Endpoint&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20008-improper-neutralization-of-special--36bd7983</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20008%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20009-improper-neutralization-of-special--6d7f9f80</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20009%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26949-cwe-863-incorrect-authorization-in--6d18db81</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26949%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Dell%20Device%20Management%20Agent%20(DDMA)&amp;severity=medium&amp;id=69a86ce2d1a09e29cb4f15a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20001-improper-neutralization-of-special--26b5bf7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20001%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a86cded1a09e29cb4f150b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20005-missing-report-of-error-condition-i-a73a7227</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20005%3A%20Missing%20Report%20of%20Error%20Condition%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a8695ad1a09e29cb4e1dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22760-cwe-754-improper-check-for-unusual--d65624cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22760%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Dell%20Device%20Management%20Agent%20(DDMA)&amp;severity=low&amp;id=69a8695ad1a09e29cb4e1dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29069-cwe-639-authorization-bypass-throug-7de34f87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29069%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=medium&amp;id=69a8695ad1a09e29cb4e1dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28784-cwe-1336-improper-neutralization-of-6d4747ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28784%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=high&amp;id=69a8695ad1a09e29cb4e1dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28783-cwe-94-improper-control-of-generati-7ec769f0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28783%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=critical&amp;id=69a8695ad1a09e29cb4e1dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28782-cwe-639-authorization-bypass-throug-1f0840cb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28782%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=medium&amp;id=69a86252d1a09e29cb4c0647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28781-cwe-639-authorization-bypass-throug-af2be907</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28781%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=high&amp;id=69a86252d1a09e29cb4c0642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28697-cwe-1336-improper-neutralization-of-86895bc1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28697%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=critical&amp;id=69a86252d1a09e29cb4c063c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28696-cwe-639-authorization-bypass-throug-f6975608</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28696%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=high&amp;id=69a85ed1d1a09e29cb4aedf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3520-cwe-674-uncontrolled-recursion-in-ex-e7bd9e89</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3520%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20expressjs%20multer&amp;severity=high&amp;id=69a85ed2d1a09e29cb4aee03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28695-cwe-1336-improper-neutralization-of-2d24d5c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28695%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=high&amp;id=69a85ed1d1a09e29cb4aedf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15558-cwe-427-uncontrolled-search-path-el-4142348f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15558%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Docker%20Docker%20CLI&amp;severity=high&amp;id=69a85ed0d1a09e29cb4aedd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23812-vulnerability-in-hewlett-packard-en-fc1f0311</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23812%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20Systems%20(AOS-8%20%26%20AOS-10)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aedee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23811-vulnerability-in-hewlett-packard-en-53c9b810</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23811%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20Systems%20(AOS-8%20%26%20AOS-10)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aedeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23810-vulnerability-in-hewlett-packard-en-adecc1e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23810%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20Systems%20(AOS-8%20%26%20AOS-10)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aede8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23809-vulnerability-in-hewlett-packard-en-471585d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23809%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20System%20(AOS-10%20%26%20AOS-8)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aede5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23808-vulnerability-in-hewlett-packard-en-d30f105d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23808%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20System%20(AOS-10%20%26%20AOS-8)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aede2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23601-vulnerability-in-hewlett-packard-en-1539a793</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23601%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20System%20(AOS-10%20%26%20AOS-8)&amp;severity=medium&amp;id=69a85ed0d1a09e29cb4aeddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22285-cwe-256-plaintext-storage-of-a-pass-5adf26e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22285%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Dell%20Device%20Management%20Agent%20(DDMA)&amp;severity=medium&amp;id=69a85b4ad1a09e29cb49b9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59787-cwe-703-improper-check-or-handling--6afd3d95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59787%3A%20CWE-703%20%E2%80%93%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a857c5d1a09e29cb48ad3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59786-cwe-613-insufficient-session-expira-e20f0d55</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59786%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59785-cwe-1286-improper-validation-of-syn-fc0665bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59785%3A%20CWE-1286%20%E2%80%93%20Improper%20Validation%20of%20Syntactic%20Correctness%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59784-cwe-117-improper-output-neutralizat-b29a7020</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59784%3A%20CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12801-incorrect-execution-assigned-permis-f3da6224</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12801%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59783-cwe-78-improper-neutralization-of-s-43df8c67</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59783%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=high&amp;id=69a850c1d1a09e29cb458b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62879-cwe-532-insertion-of-sensitive-info-83298e10</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62879%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20SUSE%20Rancher&amp;severity=medium&amp;id=69a84d3dd1a09e29cb445d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-a-browser-in-the-browser-attack-is-and-how-to-37ccdfd0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20a%20browser-in-the-browser%20attack%20is%2C%20and%20how%20to%20spot%20a%20fake%20login%20window%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a83f64d1a09e29cb4001d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40896-cwe-295-improper-certificate-valida-e039e616</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40896%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Nozomi%20Networks%20Arc&amp;severity=medium&amp;id=69a83ba8d1a09e29cb3ef915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40895-cwe-79-improper-neutralization-of-i-9666fc7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20CMC&amp;severity=low&amp;id=69a83ba8d1a09e29cb3ef912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40894-cwe-79-improper-neutralization-of-i-3bb0f271</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=low&amp;id=69a83ba8d1a09e29cb3ef90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3103-cwe-863-incorrect-authorization-in-c-37ac62bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3103%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69a83824d1a09e29cb3d0c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25907-cwe-645-overly-restrictive-account--85d43e55</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25907%3A%20CWE-645%3A%20Overly%20Restrictive%20Account%20Lockout%20Mechanism%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8311cd1a09e29cb391c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21422-cwe-15-external-control-of-system-o-d4521675</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21422%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Dell%20PowerScale%20OneFS&amp;severity=low&amp;id=69a8311cd1a09e29cb391c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21424-cwe-250-execution-with-unnecessary--85c5dbe8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21424%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8311cd1a09e29cb391c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-pirated-software-turns-helpful-employees-into--e143ab30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Pirated%20Software%20Turns%20Helpful%20Employees%20Into%20Malware%20Delivery%20Agents&amp;severity=medium&amp;id=69a82d61d1a09e29cb385855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21421-cwe-250-execution-with-unnecessary--dc94552d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21421%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8311cd1a09e29cb391bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21426-cwe-250-execution-with-unnecessary--f2a3a244</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21426%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a82a17d1a09e29cb37418b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21423-cwe-276-incorrect-default-permissio-16f56bc8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21423%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a82a17d1a09e29cb374188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22270-cwe-427-uncontrolled-search-path-el-faa8a16a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22270%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20PowerScale%20OneFS%2C&amp;severity=medium&amp;id=69a8268fd1a09e29cb360760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21425-cwe-266-incorrect-privilege-assignm-7c2392aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21425%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8268fd1a09e29cb36075d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24732-cwe-552-files-or-directories-access-875d70e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24732%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=medium&amp;id=69a8268fd1a09e29cb360763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-warns-of-new-phishing-campaign-68f9fe7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Warns%20of%20New%20Phishing%20Campaign&amp;severity=medium&amp;id=69a822ddd1a09e29cb33b6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-plans-two-week-release-schedule-for-chrome-e83c4767</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Plans%20Two-Week%20Release%20Schedule%20for%20Chrome&amp;severity=medium&amp;id=69a81f54d1a09e29cb327b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3058-cwe-200-exposure-of-sensitive-inform-df9403c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3058%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20seraphinitesoft%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=69a81880d1a09e29cb2f531b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3056-cwe-862-missing-authorization-in-ser-1a9ff84b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3056%3A%20CWE-862%20Missing%20Authorization%20in%20seraphinitesoft%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=69a81880d1a09e29cb2f5315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1674-cwe-862-missing-authorization-in-saa-d553536a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1674%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Gutena%20Forms%20%E2%80%93%20Contact%20Form%2C%20Survey%20Form%2C%20Feedback%20Form%2C%20Booking%20Form%2C%20and%20Custom%20Form%20Builder&amp;severity=medium&amp;id=69a81880d1a09e29cb2f5309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2355-cwe-79-improper-neutralization-of-in-a026c4a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joedolson%20My%20Calendar%20%E2%80%93%20Accessible%20Event%20Manager&amp;severity=medium&amp;id=69a81880d1a09e29cb2f530d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-coalition-publishes-6g-security-and-resilie-388a8ce5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Coalition%20Publishes%206G%20Security%20and%20Resilience%20Principles&amp;severity=medium&amp;id=69a81142d1a09e29cb2bb85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-packagist-packages-disguised-as-laravel--5cae3aaa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Packagist%20Packages%20Disguised%20as%20Laravel%20Utilities%20Deploy%20Encrypted%20RAT&amp;severity=medium&amp;id=69a81150d1a09e29cb2bba0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/want-more-xwormx3f-wed-mar-4th-7c048a3b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Want%20More%20XWorm%26%23x3f%3B%2C%20(Wed%2C%20Mar%204th)&amp;severity=medium&amp;id=69a80331d1a09e29cb253e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1706-cwe-79-improper-neutralization-of-in-b105f9ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=medium&amp;id=69a7ffe4d1a09e29cb23bf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3439-cwe-121-stack-based-buffer-overflow--c2c70c41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3439%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=69a7fc60d1a09e29cb22b3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-freescout-vulnerability-leads-to-full-ser-b01b887c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20FreeScout%20Vulnerability%20Leads%20to%20Full%20Server%20Compromise&amp;severity=critical&amp;id=69a7f8a6d1a09e29cb211a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27441-cwe-78-improper-neutralization-of-s-6ebb3f5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27441%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=critical&amp;id=69a7f558d1a09e29cb1e3721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2748-cwe-295-improper-certificate-validat-38d0817d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2748%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69a7f558d1a09e29cb1e3739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27446-cwe-306-missing-authentication-for--ed42be89</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27446%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Apache%20Software%20Foundation%20Apache%20Artemis&amp;severity=critical&amp;id=69a7f558d1a09e29cb1e3730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27442-cwe-22-improper-limitation-of-a-pat-0a99510b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27442%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=critical&amp;id=69a7f558d1a09e29cb1e3724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27445-cwe-347-improper-verification-of-cr-b3b62ae0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27445%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e372d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27444-cwe-436-interpretation-conflict-in--c2527164</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27444%3A%20CWE-436%20Interpretation%20Conflict%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69a7f558d1a09e29cb1e372a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2747-cwe-200-exposure-of-sensitive-inform-4ebc278d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2747%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e3736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27443-cwe-20-improper-input-validation-in-69377cc9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27443%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69a7f558d1a09e29cb1e3727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66168-cwe-190-integer-overflow-or-wraparo-89bd59bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66168%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e371e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2746-cwe-347-improper-verification-of-cry-abd6ee7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2746%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e3733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3094-cwe-787-out-of-bounds-write-in-delta-cd2be670</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3094%3A%20CWE-787%20Out-of-bounds%20Write%20in%20deltaww%20CNCSoft-G2&amp;severity=high&amp;id=69a7f1d4d1a09e29cb1c93fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1236-cwe-79-improper-neutralization-of-in-f48799b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Envira%20Gallery%20%E2%80%93%20Image%20Photo%20Gallery%2C%20Albums%2C%20Video%20Gallery%2C%20Slideshows%20%26%20More&amp;severity=medium&amp;id=69a7ee50d1a09e29cb1a949b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29120-cwe-798-use-of-hard-coded-credentia-587f7886</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29120%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20IDC%20SFX2100%20SuperFlex%20Satellite%20Receiver&amp;severity=critical&amp;id=69a7eacbd1a09e29cb189c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29119-cwe-798-use-of-hard-coded-credentia-f3e1ee95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29119%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX2100%20Series%20SuperFlex%20SatelliteReceiver&amp;severity=high&amp;id=69a7eacbd1a09e29cb189c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28778-cwe-798-use-of-hard-coded-credentia-1fca65f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28778%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20IDC%20SFX2100%20SuperFlex%20Satellite%20Receiver&amp;severity=high&amp;id=69a7e744d1a09e29cb1613f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28777-cwe-798-use-of-hard-coded-credentia-95918f9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28777%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX2100%20Satellite%20Receiver&amp;severity=critical&amp;id=69a7ee50d1a09e29cb1a94a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28776-cwe-798-use-of-hard-coded-credentia-194a6e0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28776%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20IDC%20SFX2100%20SuperFlex%20Satellite%20Receiver&amp;severity=high&amp;id=69a7ee50d1a09e29cb1a94a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28775-cwe-1188-insecure-default-initializ-ec9ac65b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28775%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX2100%20Series%20SuperFlex%20SatelliteReceiver&amp;severity=critical&amp;id=69a7e053d1a09e29cb12bc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmware-aria-operations-vulnerability-exploited-in--b3fcfdae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMware%20Aria%20Operations%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=69a7e009d1a09e29cb127e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28774-cwe-78-improper-neutralization-of-s-9d1f2b51</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28774%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20SatelliteReceiver%20Web%20Management%20Interface&amp;severity=critical&amp;id=69a7e053d1a09e29cb12bc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28773-cwe-78-improper-neutralization-of-s-2d1431d7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28773%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20SatelliteReceiver%20Web%20Management%20Interface&amp;severity=critical&amp;id=69a7e053d1a09e29cb12bc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28772-cwe-79-improper-neutralization-of-i-28c11935</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28772%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20SatelliteReceiver%20Web%20Management%20Interface&amp;severity=medium&amp;id=69a7e053d1a09e29cb12bc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28771-cwe-79-improper-neutralization-of-i-de558893</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28771%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20Satellite%20Receiver%20Web%20Management%20Interface&amp;severity=medium&amp;id=69a7e053d1a09e29cb12bc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28770-cwe-91-xml-injection-aka-blind-xpat-60625725</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28770%3A%20CWE-91%3A%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20Satellite%20Receiver%20Web%20management%20interface&amp;severity=medium&amp;id=69a7dcb8d1a09e29cb1037d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28769-cwe-22-improper-limitation-of-a-pat-0b859350</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28769%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20Satellite%20Receiver%20Web%20management%20interface&amp;severity=medium&amp;id=69a7dcb8d1a09e29cb1037d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2732-cwe-862-missing-authorization-in-sho-b873a3d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2732%3A%20CWE-862%20Missing%20Authorization%20in%20shortpixel%20Enable%20Media%20Replace&amp;severity=medium&amp;id=69a7d22fd1a09e29cb0618c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2363-cwe-89-improper-neutralization-of-sp-58ca4161</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2363%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=69a7d22fd1a09e29cb0618c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2025-cwe-200-information-exposure-in-mail-212f0a08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2025%3A%20CWE-200%20Information%20Exposure%20in%20Mail%20Mint&amp;severity=high&amp;id=69a7ceacd1a09e29cb03bd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interplay-between-iranian-targeting-of-ip-cameras--12391dc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interplay%20between%20Iranian%20Targeting%20of%20IP%20Cameras%20and%20Physical%20Warfare%20in%20the%20Middle%20East&amp;severity=high&amp;id=69a8ca74d1a09e29cb878a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1651-cwe-89-improper-neutralization-of-sp-a775ea66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1651%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20icegram%20Email%20Subscribers%20%26%20Newsletters%20%E2%80%93%20Email%20Marketing%2C%20Post%20Notifications%20%26%20Newsletter%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69a79342d1a09e29cbc204c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2292-cwe-79-improper-neutralization-of-in-f50ba6f3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2292%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bandido%20Morkva%20UA%20Shipping&amp;severity=medium&amp;id=69a79342d1a09e29cbc204e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1273-cwe-918-server-side-request-forgery--e1f87754</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1273%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20for%20News%2C%20Magazines%2C%20Blog%20Websites%20%E2%80%93%20PostX&amp;severity=high&amp;id=69a79342d1a09e29cbc204c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1980-cwe-200-exposure-of-sensitive-inform-b43a0148</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1980%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20iqonicdesign%20WPBookit&amp;severity=medium&amp;id=69a79342d1a09e29cbc204d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2289-cwe-79-improper-neutralization-of-in-b360cfc0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2289%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20Project%20Management%20%26%20Task%20Management%20Tool%20With%20Kanban%20Board&amp;severity=medium&amp;id=69a79342d1a09e29cbc204dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1945-cwe-79-improper-neutralization-of-in-6840e229</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1945%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20WPBookit&amp;severity=high&amp;id=69a79342d1a09e29cbc204d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/signed-malware-impersonating-workplace-apps-deploy-d90a7c2b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Signed%20malware%20impersonating%20workplace%20apps%20deploys%20RMM%20backdoors&amp;severity=medium&amp;id=69a814c4d1a09e29cb2cff34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-04-f30e740f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-04&amp;severity=medium&amp;id=69a8ca08d1a09e29cb86d4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70222-na-75b37c96</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70222%3A%20n%2Fa&amp;severity=critical&amp;id=69a8a51ed1a09e29cb769eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70225-na-bb06acd6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70225%3A%20n%2Fa&amp;severity=critical&amp;id=69a89a91d1a09e29cb719abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70221-na-01c26696</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70221%3A%20n%2Fa&amp;severity=critical&amp;id=69a89710d1a09e29cb6fec01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46108-na-f9f47e59</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46108%3A%20n%2Fa&amp;severity=critical&amp;id=69a89710d1a09e29cb6febfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70219-na-7e103d52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70219%3A%20n%2Fa&amp;severity=critical&amp;id=69a89005d1a09e29cb6c63ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70226-na-82054904</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70226%3A%20n%2Fa&amp;severity=critical&amp;id=69a8857dd1a09e29cb68bd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70223-na-9cba1f25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70223%3A%20n%2Fa&amp;severity=critical&amp;id=69a881f6d1a09e29cb675965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-04-89d845b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-04&amp;severity=medium&amp;id=69a87ab7d1a09e29cb55b54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70220-na-363a1ddd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70220%3A%20n%2Fa&amp;severity=critical&amp;id=69a87779d1a09e29cb54d2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70218-na-dce67160</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70218%3A%20n%2Fa&amp;severity=critical&amp;id=69a87078d1a09e29cb506b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66944-na-8319490b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66944%3A%20n%2Fa&amp;severity=critical&amp;id=69a8695ad1a09e29cb4e1db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66678-na-dc18e3f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66678%3A%20n%2Fa&amp;severity=critical&amp;id=69a8695ad1a09e29cb4e1db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69969-na-e74f3aeb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69969%3A%20n%2Fa&amp;severity=critical&amp;id=69a85ed0d1a09e29cb4aeddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26478-na-4a7e88a8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26478%3A%20n%2Fa&amp;severity=critical&amp;id=69a85b4ad1a09e29cb49b9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26673-na-e8c6ae05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26673%3A%20n%2Fa&amp;severity=high&amp;id=69a857c5d1a09e29cb48ad42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26514-na-4630cd19</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26514%3A%20n%2Fa&amp;severity=high&amp;id=69a84d3dd1a09e29cb445d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70342-na-9e196b94</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70342%3A%20n%2Fa&amp;severity=medium&amp;id=69a849bdd1a09e29cb42f6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70341-na-aebf9e80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70341%3A%20n%2Fa&amp;severity=high&amp;id=69a849bdd1a09e29cb42f6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-04-2321d5d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-04&amp;severity=low&amp;id=69a7ee16d1a09e29cb1a6587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28289-cwe-434-unrestricted-upload-of-file-e2a6fd58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28289%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69a79342d1a09e29cbc204ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27971-cwe-502-deserialization-of-untruste-b59de789</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27971%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20QwikDev%20qwik&amp;severity=critical&amp;id=69a79342d1a09e29cbc204eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27932-cwe-770-allocation-of-resources-wit-c0c8d6c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27932%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20authlib%20joserfc&amp;severity=high&amp;id=69a768b5d1a09e29cb82cc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27622-cwe-787-out-of-bounds-write-in-acad-a42f61d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27622%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69a76534d1a09e29cb81f9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27601-cwe-770-allocation-of-resources-wit-ae5cd70d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27601%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20jashkenas%20underscore&amp;severity=high&amp;id=69a76534d1a09e29cb81f9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3266-cwe-862-missing-authorization-in-ope-7599e051</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3266%3A%20CWE-862%20Missing%20Authorization%20in%20OpenText%E2%84%A2%20Filr&amp;severity=high&amp;id=69a76534d1a09e29cb81f9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27981-cwe-307-improper-restriction-of-exc-f8c6fc4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27981%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20sysadminsmedia%20homebox&amp;severity=high&amp;id=69a76534d1a09e29cb81f9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27600-cwe-918-server-side-request-forgery-b5ba57bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27600%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sysadminsmedia%20homebox&amp;severity=medium&amp;id=69a761b1d1a09e29cb80d3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26272-cwe-79-improper-neutralization-of-i-52fa5733</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26272%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sysadminsmedia%20homebox&amp;severity=medium&amp;id=69a761b1d1a09e29cb80d3fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25590-cwe-79-improper-neutralization-of-i-13ff0ec3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25590%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=medium&amp;id=69a761b1d1a09e29cb80d3f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27012-cwe-306-missing-authentication-for--435d22b5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27012%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20devcode-it%20openstamanager&amp;severity=critical&amp;id=69a79342d1a09e29cbc204f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24415-cwe-79-improper-neutralization-of-i-caa3b439</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24415%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devcode-it%20openstamanager&amp;severity=medium&amp;id=69a75aa5d1a09e29cb7e0992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21866-cwe-79-improper-neutralization-of-i-2499aded</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21866%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=medium&amp;id=69a75aa5d1a09e29cb7e098d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3487-sql-injection-in-itsourcecode-colleg-91aac2aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3487%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69a75724d1a09e29cb7c9d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3130-cwe-841-improper-enforcement-of-beha-bdd93806</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3130%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Devolutions%20Server&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3204-cwe-20-improper-input-validation-in--25dfb824</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3204%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Devolutions%20Server&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2590-vulnerability-in-devolutions-remote--692ec7bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2590%3A%20Vulnerability%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3224-cwe-287-improper-authentication-cwe--6697497e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3224%3A%20CWE-287%20Improper%20Authentication%2C%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Devolutions%20Server&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1775-cwe-306-missing-authentication-for-c-0d6416a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1775%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Labkotec%20LID-3300IP&amp;severity=high&amp;id=69a75724d1a09e29cb7c9d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3486-sql-injection-in-itsourcecode-colleg-d8a60b02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3486%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69a7501dd1a09e29cb7a3ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3485-os-command-injection-in-d-link-dir-8-905d15ee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3485%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-868L&amp;severity=critical&amp;id=69a7501dd1a09e29cb7a3feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25906-cwe-59-improper-link-resolution-bef-44e1a0d6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25906%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Optimizer&amp;severity=high&amp;id=69a7501dd1a09e29cb7a3fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13686-cwe-78-improper-neutralization-of-s-0ca7a52d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13686%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13687-cwe-78-improper-neutralization-of-s-48c22113</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13687%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13688-cwe-78-improper-neutralization-of-s-1fd1738a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13688%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24502-cwe-427-uncontrolled-search-path-el-f6578229</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24502%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20Dell%20Command%20%7C%20Intel%20vPro%20Out%20of%20Band&amp;severity=high&amp;id=69a74c95d1a09e29cb79af24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14456-cwe-327-use-of-a-broken-or-risky-cr-a1a22bf8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14456%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20MQ%20Appliance&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14480-cwe-327-use-of-a-broken-or-risky-cr-3f20f205</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14480%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Aspera%20faspio%20Gateway&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1567-cwe-611-improper-restriction-of-xml--a1c9e77f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1567%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=69a74916d1a09e29cb78e8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1713-cwe-305-authentication-bypass-by-pri-f8f08c4c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1713%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20IBM%20MQ&amp;severity=medium&amp;id=69a74916d1a09e29cb78e8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-dragon-targets-organizations-in-southeast-a-3eb9b653</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Dragon%20Targets%20Organizations%20in%20Southeast%20Asia%20and%20Europe&amp;severity=medium&amp;id=69a814c4d1a09e29cb2cff01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0869-cwe-305-authentication-bypass-by-pri-f26fec73</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0869%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Brocade%20ASCG&amp;severity=high&amp;id=69a7420dd1a09e29cb75a987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13490-vulnerability-in-ibm-app-connect-op-a38ba731</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13490%3A%20Vulnerability%20in%20IBM%20App%20Connect%20Operator&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-strikes-on-amazon-data-centers-highlight-i-daf77fd0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Strikes%20on%20Amazon%20Data%20Centers%20Highlight%20Industry%E2%80%99s%20Vulnerability%20to%20Physical%20Disasters&amp;severity=high&amp;id=69a73e52d1a09e29cb7481dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13616-cwe-497-exposure-of-sensitive-syste-f677746c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13616%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13734-cwe-862-missing-authorization-in-ib-55112373</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13734%3A%20CWE-862%20Missing%20Authorization%20in%20IBM%20Engineering%20Requirements%20Management%20DOORS%20Next&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29022-cwe-122-heap-based-buffer-overflow--f0fcfc02</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29022%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20mackron%20dr_libs%20dr_wav.h&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14604-cwe-732-incorrect-permission-assign-6b2bd9ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14604%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Storage%20Scale&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14923-cwe-321-use-of-hard-coded-cryptogra-94170a5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14923%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36363-cwe-307-improper-restriction-of-exc-6d356cfa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36363%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20IBM%20DevOps%20Plan&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36364-cwe-525-use-of-web-browser-cache-co-182fb3f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36364%3A%20CWE-525%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20IBM%20DevOps%20Plan&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1265-cwe-532-insertion-of-sensitive-infor-f251bfd5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1265%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2606-cwe-22-improper-limitation-of-a-path-d0fb6498</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2606%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20webMethods%20API%20Gateway%20(on-prem)&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3484-command-injection-in-phialsbasement--113d49cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3484%3A%20Command%20Injection%20in%20PhialsBasement%20nmap-mcp-server&amp;severity=medium&amp;id=69a73e9cd1a09e29cb748a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2915-hp-system-event-utility-denial-of-se-f0d4d0bf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2915%3A%20HP%20System%20Event%20Utility%20%E2%80%93%20Denial%20of%20Service%20in%20HP%20Inc%20HP%20System%20Event%20Utility&amp;severity=medium&amp;id=69a73782d1a09e29cb722154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3494-cwe-778-insufficient-logging-in-mari-263ef839</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3494%3A%20CWE-778%20(Insufficient%20Logging)%20in%20MariaDB%20Foundation%20MariaDB%20Server&amp;severity=medium&amp;id=69a72971d1a09e29cb6b58e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3437-cwe-119-improper-restriction-of-oper-291f400a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3437%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Portwell%20Portwell%20Engineering%20Toolkits&amp;severity=critical&amp;id=69a71f08d1a09e29cb64f6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0540-improper-neutralization-of-input-dur-fcf39a86</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69a71bdad1a09e29cb636912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15599-improper-neutralization-of-input-du-fc0586ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69a71bdad1a09e29cb63690d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3136-cwe-863-incorrect-authorization-perm-64a726f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3136%3A%20CWE-863%20Incorrect%20Authorization%20(Permission%20Bypass)%20in%20Google%20Cloud%20Cloud%20Build&amp;severity=high&amp;id=69a70d52d1a09e29cb5a67e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-assistant-in-kaspersky-container-security-ab3f1b7b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20assistant%20in%20Kaspersky%20Container%20Security&amp;severity=medium&amp;id=69a70a03d1a09e29cb58b507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-dragon-targets-organizations-in-southeast-a-f6a8d11c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Dragon%20Targets%20Organizations%20in%20Southeast%20Asia%20and%20Europe&amp;severity=medium&amp;id=69a7067dd1a09e29cb571fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-ai-powered-bot-actively-exploiting-github-actio-7268fc31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20AI-Powered%20Bot%20Actively%20Exploiting%20GitHub%20Actions%20-%20Microsoft%2C%20DataDog%2C%20and%20CNCF%20Projects%20Hit%20So%20Far&amp;severity=medium&amp;id=69a7109dd1a09e29cb5bd47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/web-based-indirect-prompt-injection-observed-in-th-e7ae89ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Web-Based%20Indirect%20Prompt%20Injection%20Observed%20in%20the%20Wild%3A%20Fooling%20AI%20Agents&amp;severity=medium&amp;id=69a7109dd1a09e29cb5bd468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redalert-trojan-campaign-fake-emergency-alert-app--4ce3c6ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RedAlert%20Trojan%20Campaign%3A%20Fake%20Emergency%20Alert%20App%20Spread%20via%20SMS%20Spoofing%20Israeli%20Home%20Front%20Command&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeywell-researcher-clash-over-impact-of-building-ce2dff31</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Honeywell%2C%20Researcher%20Clash%20Over%20Impact%20of%20Building%20Controller%20Vulnerability&amp;severity=medium&amp;id=69a6ff0ad1a09e29cb536182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3465-denial-of-service-in-tuya-app-58df3c71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3465%3A%20Denial%20of%20Service%20in%20Tuya%20App&amp;severity=low&amp;id=69a6fbbdd1a09e29cb5117be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bruteforce-scans-for-crushftp-tue-mar-3rd-cfb37f98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bruteforce%20Scans%20for%20CrushFTP%20%2C%20(Tue%2C%20Mar%203rd)&amp;severity=medium&amp;id=69a79367d1a09e29cbc29e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28518-cwe-22-improper-limitation-of-a-pat-ac4b7555</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Volcengine%20OpenViking&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64736-cwe-125-out-of-bounds-read-in-the-b-2ca06079</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64736%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=medium&amp;id=69a6f4b6d1a09e29cb4db068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22891-cwe-122-heap-based-buffer-overflow--50121360</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22891%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=69a6f4b6d1a09e29cb4db072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20777-cwe-122-heap-based-buffer-overflow--3231c396</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20777%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db06f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25674-cwe-362-concurrent-execution-using--1957efe8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25674%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20djangoproject%20Django&amp;severity=low&amp;id=69a6f4b6d1a09e29cb4db07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25673-cwe-400-uncontrolled-resource-consu-2c418a56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25673%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20djangoproject%20Django&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2637-cwe-732-incorrect-permission-assignm-a25e0e26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2637%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20iBoysoft%20iBoysoft%20NTFS&amp;severity=high&amp;id=69a6f130d1a09e29cb4be7a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quantum-decryption-of-rsa-is-much-closer-than-expe-e9305bca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quantum%20Decryption%20of%20RSA%20is%20Much%20Closer%20than%20Expected&amp;severity=medium&amp;id=69a79331d1a09e29cbc1fa65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-airsnitch-attack-shows-wi-fi-client-isolation--2c13ae0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98AirSnitch%E2%80%99%20Attack%20Shows%20Wi-Fi%20Client%20Isolation%20Could%20Be%20a%20False%20Sense%20of%20Security&amp;severity=low&amp;id=69a6e9f3d1a09e29cb4846fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/12-million-affected-by-university-of-hawaii-cancer-29e7f1e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1.2%20Million%20Affected%20by%20University%20of%20Hawaii%20Cancer%20Center%20Data%20Breach&amp;severity=medium&amp;id=69a6e66ed1a09e29cb45c03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3344-cwe-440-expected-behavior-violation--1a487772</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3344%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=69a6e6b4d1a09e29cb46e4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3343-cwe-79-improper-neutralization-of-in-593abd20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=69a6e6b4d1a09e29cb46e4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3342-cwe-787-out-of-bounds-write-in-watch-9d2fb839</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3342%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69a6e6b4d1a09e29cb46e4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3351-cwe-862-missing-authorization-in-can-6fb176f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3351%3A%20CWE-862%20Missing%20Authorization%20in%20Canonical%20lxd&amp;severity=low&amp;id=69a9c996460e1c85df139364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-update-patches-exploited-qualcomm-zero-day-0500373e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Update%20Patches%20Exploited%20Qualcomm%20Zero-Day&amp;severity=low&amp;id=69a6d85ed1a09e29cb229150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-cyber-front-hacktivist-activity-rises-but-sta-4523c09d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Cyber%20Front%3A%20Hacktivist%20Activity%20Rises%2C%20but%20State-Sponsored%20Attacks%20Stay%20Low&amp;severity=low&amp;id=69a6d4dad1a09e29cb19b432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3463-heap-based-buffer-overflow-in-xlnt-c-54baebc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3463%3A%20Heap-based%20Buffer%20Overflow%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69a6d18cd1a09e29cb1024e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sloppylemming-deploys-burrowshell-and-rust-based-r-fe380f33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SloppyLemming%20Deploys%20BurrowShell%20and%20Rust-Based%20RAT%20to%20Target%20Pakistan%20and%20Bangladesh&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59060-cwe-297-improper-validation-of-cert-9be8c153</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59060%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Ranger&amp;severity=medium&amp;id=69a6bff6d1a09e29cbfe3b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59059-cwe-94-improper-control-of-generati-43809e3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59059%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Ranger&amp;severity=critical&amp;id=69a6bff6d1a09e29cbfe3b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-ms-agent-ai-framework-can-allow-f-d035faeb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20MS-Agent%20AI%20Framework%20Can%20Allow%20Full%20System%20Compromise&amp;severity=low&amp;id=69a6bc3dd1a09e29cbfca855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-method-to-track-cars-via-tire--dd7b05ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20Method%20to%20Track%20Cars%20via%20Tire%20Sensors&amp;severity=low&amp;id=69a6ae2dd1a09e29cbf5c440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15598-improper-verification-of-cryptograp-d643f0bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15598%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Dataease%20SQLBot&amp;severity=medium&amp;id=69a6ae74d1a09e29cbf6065d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2568-cwe-79-improper-neutralization-of-in-6840f089</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2568%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crmperks%20WP%20Zendesk%20for%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%20and%20Ninja%20Forms&amp;severity=high&amp;id=69a6ae74d1a09e29cbf60663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22886-cwe-1392-use-of-default-credentials-68ab8e2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22886%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Eclipse%20Foundation%20Eclipse%20OpenMQ&amp;severity=critical&amp;id=69a6aadfd1a09e29cbf4c05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1876-cwe-404-improper-resource-shutdown-o-b1e51223</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1876%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-ENET%2FIP%20Ethernet%20Module%20FX5-ENET%2FIP&amp;severity=high&amp;id=69a6fbbdd1a09e29cb5117c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1875-cwe-404-improper-resource-shutdown-o-290a0193</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1875%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-EIP%20EtherNet%2FIP%20Module%20FX5-EIP&amp;severity=high&amp;id=69a687b5d1a09e29cbe1300a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1874-cwe-670-always-incorrect-control-flo-ab07aefb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1874%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-ENET%2FIP%20Ethernet%20Module%20FX5-ENET%2FIP&amp;severity=high&amp;id=69a687b5d1a09e29cbe13006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-brief-march-2026-escalation-of-cyber-risk-r-965c4d14</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Brief%3A%20March%202026%20Escalation%20of%20Cyber%20Risk%20Related%20to%20Iran&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12345-buffer-overflow-in-llm-claw-ea370fec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12345%3A%20Buffer%20Overflow%20in%20LLM-Claw&amp;severity=high&amp;id=69a68433d1a09e29cbdf37a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15595-cwe-1390-weak-authentication-in-mls-f8e093b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15595%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20mlsoft%20Inno%20Setup&amp;severity=medium&amp;id=69a67d2dd1a09e29cbdc2f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3455-cross-site-scripting-xss-in-mailpars-8034f691</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3455%3A%20Cross-site%20Scripting%20(XSS)%20in%20mailparser&amp;severity=medium&amp;id=69a66f1fd1a09e29cbd3d46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3449-incorrect-control-flow-scoping-in-to-763d30d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3449%3A%20Incorrect%20Control%20Flow%20Scoping%20in%20%40tootallnate%2Fonce&amp;severity=medium&amp;id=69a66f1fd1a09e29cbd3d467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1492-cwe-269-improper-privilege-managemen-edd7f3b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1492%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=critical&amp;id=69a66813d1a09e29cbd10aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20801-cwe-319-cleartext-transmission-of-s-9442dc8e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20801%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Gallagher%20NxWitness%20VMS%20and%20Hanwha%20VMS%20Integrations&amp;severity=medium&amp;id=69a652fcd1a09e29cba9d61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20757-cwe-667-improper-locking-in-gallagh-92af19ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20757%3A%20CWE-667%20Improper%20Locking%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=low&amp;id=69a652fcd1a09e29cba9d619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47147-cwe-312-cleartext-storage-of-sensit-da3da127</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47147%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Gallagher%20Command%20Centre%20Mobile%20Client&amp;severity=medium&amp;id=69a652fcd1a09e29cba9d616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1487-cwe-89-improper-neutralization-of-sp-8e8ecf27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1487%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69a644edd1a09e29cb9ed2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2448-cwe-22-improper-limitation-of-a-path-365740f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2448%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gpriday%20Page%20Builder%20by%20SiteOrigin&amp;severity=high&amp;id=69a644edd1a09e29cb9ed2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2269-cwe-434-unrestricted-upload-of-file--aa73faba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2269%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=high&amp;id=69a644edd1a09e29cb9ed2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2628-cwe-288-authentication-bypass-using--3ce6682b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2628%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20cyberlord92%20All-in-One%20Microsoft%20365%20%26%20Entra%20ID%20%2F%20Azure%20AD%20SSO%20Login&amp;severity=critical&amp;id=69a644edd1a09e29cb9ed2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0754-cwe-321-in-hp-inc-vvx-cff5c471</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0754%3A%20CWE-321%20in%20HP%20Inc%20VVX&amp;severity=high&amp;id=69a63a5fd1a09e29cb891967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/boss-mini-v140-local-file-inclusion-lfi-5031ed92</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Boss%20Mini%20v1.4.0%20-%20Local%20File%20Inclusion%20(LFI)&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wegia-350-sql-injection-e53976a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WeGIA%203.5.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/easy-file-sharing-web-server-v72-buffer-overflow-0b6ea038</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Easy%20File%20Sharing%20Web%20Server%20v7.2%20-%20Buffer%20Overflow&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mailcow-2025-01a-host-header-password-reset-poison-0f65742b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=mailcow%202025-01a%20-%20Host%20Header%20Password%20Reset%20Poisoning&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-backup-migration-137-remote-command-exec-1e4d134b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Backup%20Migration%201.3.7%20-%20Remote%20Command%20Execution&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-03-c1c93c7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-03&amp;severity=medium&amp;id=69a77a12d1a09e29cb894e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70239-na-bcdf699f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70239%3A%20n%2Fa&amp;severity=high&amp;id=69a7501dd1a09e29cb7a3fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70234-na-e1524ae3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70234%3A%20n%2Fa&amp;severity=high&amp;id=69a74916d1a09e29cb78e8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70240-na-50a4c245</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70240%3A%20n%2Fa&amp;severity=high&amp;id=69a74590d1a09e29cb76d1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70241-na-6c90335a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70241%3A%20n%2Fa&amp;severity=high&amp;id=69a7420dd1a09e29cb75a982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70237-na-d3da279e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70237%3A%20n%2Fa&amp;severity=high&amp;id=69a7420dd1a09e29cb75a97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70236-na-3a6cfb2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70236%3A%20n%2Fa&amp;severity=medium&amp;id=69a733fdd1a09e29cb7091b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55027-na-950573eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55027%3A%20n%2Fa&amp;severity=high&amp;id=69a733fdd1a09e29cb7091b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55026-na-960f708a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55026%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e26ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55025-na-3e6b6400</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55025%3A%20n%2Fa&amp;severity=medium&amp;id=69a72cf6d1a09e29cb6e26a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55024-na-e8f2b8bb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55024%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e26a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55023-na-424244fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55023%3A%20n%2Fa&amp;severity=medium&amp;id=69a72cf6d1a09e29cb6e26a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55022-na-988739b7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55022%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e269d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55021-na-4783609f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55021%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e2699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55020-na-475e8194</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55020%3A%20n%2Fa&amp;severity=critical&amp;id=69a72cf6d1a09e29cb6e2695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55019-na-0e0331e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55019%3A%20n%2Fa&amp;severity=medium&amp;id=69a72cf6d1a09e29cb6e2691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67840-na-9c79dfe6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67840%3A%20n%2Fa&amp;severity=high&amp;id=69a72973d1a09e29cb6b58fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63912-na-c669e470</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63912%3A%20n%2Fa&amp;severity=null&amp;id=69a72973d1a09e29cb6b58fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63911-na-5ae6ed65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63911%3A%20n%2Fa&amp;severity=high&amp;id=69a72971d1a09e29cb6b58ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63910-na-af3aa22f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63910%3A%20n%2Fa&amp;severity=high&amp;id=69a72971d1a09e29cb6b58e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63909-na-432945e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63909%3A%20n%2Fa&amp;severity=high&amp;id=69a72971d1a09e29cb6b58e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26892-na-d839fbc2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26892%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26891-na-06626ce8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26891%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26889-na-5be92f85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26889%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26888-na-39cc2ebd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26888%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26887-na-40a87163</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26887%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66945-na-f1fe5e8f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66945%3A%20n%2Fa&amp;severity=critical&amp;id=69a72971d1a09e29cb6b58cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26890-na-be65dbb2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26890%3A%20n%2Fa&amp;severity=low&amp;id=69a71f08d1a09e29cb64f6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69765-na-f2b1b26e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69765%3A%20n%2Fa&amp;severity=high&amp;id=69a71f08d1a09e29cb64f6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62817-na-f6cd3503</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62817%3A%20n%2Fa&amp;severity=high&amp;id=69a717ddd1a09e29cb604239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62816-na-a64776a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62816%3A%20n%2Fa&amp;severity=medium&amp;id=69a717ddd1a09e29cb604235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26886-na-455c504f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26886%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26885-na-cd64dccd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26885%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26884-na-b2057dd2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26884%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26883-na-2f92fcad</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26883%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66363-na-17acbebe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66363%3A%20n%2Fa&amp;severity=high&amp;id=69a709cdd1a09e29cb586e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62815-na-479affcd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62815%3A%20n%2Fa&amp;severity=medium&amp;id=69a709cdd1a09e29cb586e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62814-na-f81aae41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62814%3A%20n%2Fa&amp;severity=high&amp;id=69a709cdd1a09e29cb586e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66680-na-5c7c12b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66680%3A%20n%2Fa&amp;severity=high&amp;id=69a702c6d1a09e29cb555065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24103-na-193bbf7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24103%3A%20n%2Fa&amp;severity=critical&amp;id=69a6fbbdd1a09e29cb5117ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70821-na-2b04e81e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70821%3A%20n%2Fa&amp;severity=critical&amp;id=69a6f4b6d1a09e29cb4db06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57622-na-a66bcb69</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57622%3A%20n%2Fa&amp;severity=critical&amp;id=69a6f4b6d1a09e29cb4db064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52365-na-4d2fce57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52365%3A%20n%2Fa&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-03-5919e9d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-03&amp;severity=medium&amp;id=69a6cdd0d1a09e29cb03ee1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-03-e9f917ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-03&amp;severity=low&amp;id=69a6cdcfd1a09e29cb03edd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1566-cwe-269-improper-privilege-managemen-02d5d7d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1566%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=69a61e3fd1a09e29cb5e40e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1336-cwe-862-missing-authorization-in-ays-22761aa4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1336%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=69a61e3fd1a09e29cb5e40e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2583-cwe-79-improper-neutralization-of-in-8a361860</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2583%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy&amp;severity=medium&amp;id=69a61033d1a09e29cb5548b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oauth-redirection-abuse-enables-phishing-and-malwa-79407cf1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OAuth%20redirection%20abuse%20enables%20phishing%20and%20malware%20delivery&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3338-cwe-347-improper-verification-of-cry-5dba1e3f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3338%3A%20CWE-347%20(Improper%20Verification%20of%20Cryptographic%20Signature)%20in%20AWS%20AWS-LC&amp;severity=high&amp;id=69a605a4d1a09e29cb50c698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3337-cwe-208-observable-timing-discrepanc-002f7127</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3337%3A%20CWE-208%20(Observable%20Timing%20Discrepancy)%20in%20AWS%20AWS-LC&amp;severity=medium&amp;id=69a605a4d1a09e29cb50c694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3336-cwe-295-improper-certificate-validat-82b96840</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3336%3A%20CWE-295%20(Improper%20Certificate%20Validation)%20in%20AWS%20AWS-LC&amp;severity=high&amp;id=69a60221d1a09e29cb4eac7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2256-cwe-94-improper-control-of-generatio-97245d82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2256%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ModelScope%20ms-agent&amp;severity=medium&amp;id=69a5f410d1a09e29cb4859d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21882-cwe-273-improper-check-for-dropped--74c9d20e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21882%3A%20CWE-273%3A%20Improper%20Check%20for%20Dropped%20Privileges%20in%20AsfhtgkDavid%20theshit&amp;severity=high&amp;id=69a5e601d1a09e29cb3f7137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25477-cwe-601-url-redirection-to-untruste-6451e338</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25477%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20toeverything%20AFFiNE&amp;severity=medium&amp;id=69a5e601d1a09e29cb3f713b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48636-elevation-of-privilege-in-google-an-b192bfbd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48636%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5e27dd1a09e29cb26d64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31328-elevation-of-privilege-in-google-an-fe323a94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31328%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5e27dd1a09e29cb26d64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21853-cwe-94-improper-control-of-generati-d73fe22a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21853%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20toeverything%20AFFiNE&amp;severity=high&amp;id=69a5e27dd1a09e29cb26d651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0047-elevation-of-privilege-in-google-and-04b2cabf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0047%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0038-elevation-of-privilege-in-google-and-14616300</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0038%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0037-elevation-of-privilege-in-google-and-0e2ff1a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0037%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0035-elevation-of-privilege-in-google-and-f24ee122</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0035%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0034-elevation-of-privilege-in-google-and-69a10312</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0034%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0032-elevation-of-privilege-in-google-and-c7533730</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0032%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0031-elevation-of-privilege-in-google-and-4ddd3481</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0031%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0030-elevation-of-privilege-in-google-and-a9413c8f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0030%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0029-elevation-of-privilege-in-google-and-6f20c44d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0029%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0028-elevation-of-privilege-in-google-and-b3d2b6b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0028%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0027-elevation-of-privilege-in-google-and-740034f5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0027%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db82d1a09e29cb1cf021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0026-elevation-of-privilege-in-google-and-79b503be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0026%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0025-information-disclosure-in-google-and-3961b952</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0025%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0024-information-disclosure-in-google-and-775cabbf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0024%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db82d1a09e29cb1cf018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0023-elevation-of-privilege-in-google-and-d9d12d55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0023%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0021-elevation-of-privilege-in-google-and-9579343b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0021%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0020-elevation-of-privilege-in-google-and-05bc707d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0020%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0017-elevation-of-privilege-in-google-and-18b4b83e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0017%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0015-denial-of-service-in-google-android-16844ccf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0015%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db80d1a09e29cb1cb9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0014-denial-of-service-in-google-android-501e5c3d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0014%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db80d1a09e29cb1cb9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0013-elevation-of-privilege-in-google-and-3a77d566</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0013%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0012-information-disclosure-in-google-and-a8d58aff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0012%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db80d1a09e29cb1cb9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0011-elevation-of-privilege-in-google-and-410c9f78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0011%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0010-elevation-of-privilege-in-google-and-7fdb3b3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0010%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0008-elevation-of-privilege-in-google-and-1785e1d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0008%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0007-elevation-of-privilege-in-google-and-58f6e174</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0007%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0006-remote-code-execution-in-google-andr-79236030</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0006%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69a5db7ed1a09e29cb1cb97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0005-information-disclosure-in-google-and-ed74d6c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0005%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7ed1a09e29cb1cb97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48654-elevation-of-privilege-in-google-an-568e7f98</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48654%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48653-elevation-of-privilege-in-google-an-f693d7f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48653%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48650-elevation-of-privilege-in-google-an-25ed2fac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48650%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48646-elevation-of-privilege-in-google-an-ab9c8f05</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48646%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48645-elevation-of-privilege-in-google-an-505c2e59</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48645%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69a5db7ed1a09e29cb1cb96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48644-denial-of-service-in-google-android-1bb8488f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48644%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7ed1a09e29cb1cb96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48642-information-disclosure-in-google-an-da2f0b4c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48642%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7ed1a09e29cb1cb967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48641-elevation-of-privilege-in-google-an-24d420bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48641%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48635-elevation-of-privilege-in-google-an-9a208ff4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48635%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48634-elevation-of-privilege-in-google-an-0d0d6816</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48634%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48630-information-disclosure-in-google-an-fa70f5ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48630%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48619-elevation-of-privilege-in-google-an-ef2f931c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48619%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1caddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48613-unknown-in-google-android-902667f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48613%3A%20Unknown%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cadda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48609-denial-of-service-in-google-android-ba7218a0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48609%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=critical&amp;id=69a5db7cd1a09e29cb1cadd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48605-elevation-of-privilege-in-google-an-583c11dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48605%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cadd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48602-elevation-of-privilege-in-google-an-8d7bfe7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48602%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cadd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48587-denial-of-service-in-google-android-0feec96e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48587%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7cd1a09e29cb1cadc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48585-denial-of-service-in-google-android-73d035df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48585%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db79d1a09e29cb1c9aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48582-elevation-of-privilege-in-google-an-2b3a2c37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48582%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48579-elevation-of-privilege-in-google-an-9e39edc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48579%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48578-elevation-of-privilege-in-google-an-1a2b535e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48578%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48577-elevation-of-privilege-in-google-an-f2946dae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48577%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48574-elevation-of-privilege-in-google-an-6f67eeda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48574%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48568-elevation-of-privilege-in-google-an-701b0b4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48568%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48567-elevation-of-privilege-in-google-an-ccaedf6d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48567%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32313-elevation-of-privilege-in-google-an-c7ea5cd5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32313%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43766-information-disclosure-in-google-an-4a2fe7e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43766%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db79d1a09e29cb1c9acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dust-specter-apt-targets-government-officials-in-i-87553f50</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dust%20Specter%20APT%20Targets%20Government%20Officials%20in%20Iraq&amp;severity=medium&amp;id=69a717a5d1a09e29cb601ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0654-cwe-78-improper-neutralization-of-sp-6feb9749</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0654%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Deco%20BE25%20v1.0&amp;severity=high&amp;id=69a5d050b6c0d8506fbcb7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/funnull-resurfaces-exposing-ringh23-arsenal-and-ma-172367c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Funnull%20Resurfaces%3A%20Exposing%20RingH23%20Arsenal%20and%20MacCMS%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=69a717a5d1a09e29cb601e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0655-cwe-22-improper-limitation-of-a-path-0f110460</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0655%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TP-Link%20Systems%20Inc.%20Deco%20BE25%20v1.0&amp;severity=medium&amp;id=69a5d050b6c0d8506fbcb7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3180-cwe-89-improper-neutralization-of-sp-98c584af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3180%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=high&amp;id=69a5ccceb6c0d8506fb7921b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3132-cwe-94-improper-control-of-generatio-60f29397</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3132%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jewel%20Theme%20Master%20Addons%20for%20Elementor%20Premium&amp;severity=high&amp;id=69a5ccceb6c0d8506fb79216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/novel-dprk-stager-using-pastebin-and-text-steganog-700c0da3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Novel%20DPRK%20stager%20using%20Pastebin%20and%20text%20steganography&amp;severity=medium&amp;id=69a6056dd1a09e29cb500441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21385-cwe-190-integer-overflow-or-wraparo-b6c506df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21385%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa297e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59603-cwe-787-out-of-bounds-write-in-qual-4c38cf97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59603%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa297b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59600-cwe-126-buffer-over-read-in-qualcom-c7eb4244</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59600%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47386-cwe-416-use-after-free-in-qualcomm--ce0f17d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47386%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47385-cwe-1262-improper-access-control-fo-d2e4d6d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47385%3A%20CWE-1262%3A%20Improper%20Access%20Control%20for%20Register%20Interface%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47384-cwe-617-reachable-assertion-in-qual-817ade50</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47384%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69a5c5cab6c0d8506faa2cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47383-cwe-325-missing-cryptographic-step--582b986b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47383%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47381-cwe-416-use-after-free-in-qualcomm--a1d53b23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47381%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47379-cwe-416-use-after-free-in-qualcomm--34172ec0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47379%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47378-cwe-497-exposure-of-sensitive-syste-00d19e62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47378%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47377-cwe-416-use-after-free-in-qualcomm--ea0d7bb3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47377%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa298d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47376-cwe-416-use-after-free-in-qualcomm--24bbb384</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47376%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa298a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47375-cwe-416-use-after-free-in-qualcomm--f83573a6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47375%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47373-cwe-787-out-of-bounds-write-in-qual-dafd73bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47373%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47371-cwe-617-reachable-assertion-in-qual-add108d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47371%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69a5c5c8b6c0d8506faa2981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2nd-march-threat-intelligence-report-b9e4863c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2nd%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=low&amp;id=69a5bddb32ffcdb8a2768b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64427-cwe-918-server-side-request-forgery-938d592d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64427%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IceWhaleTech%20ZimaOS&amp;severity=high&amp;id=69a5bdaa32ffcdb8a2762eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28286-cwe-73-external-control-of-file-nam-7cb314e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28286%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20IceWhaleTech%20ZimaOS&amp;severity=high&amp;id=69a5bdaa32ffcdb8a2762eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52564-cwe-80-improper-neutralization-of-s-45e6f918</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52564%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a2520668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52998-cwe-502-deserialization-of-untruste-bdb241bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52998%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a252066e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50199-cwe-918-server-side-request-forgery-087d001b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50199%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a2520647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52563-cwe-79-improper-neutralization-of-i-5645040f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52563%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a2520664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52475-cwe-79-improper-neutralization-of-i-8242ec9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52475%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a252065a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52476-cwe-79-improper-neutralization-of-i-065db084</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52476%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a252065f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52470-cwe-79-improper-neutralization-of-i-07562d58</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52470%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a2520655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52469-cwe-841-improper-enforcement-of-beh-d8af2236</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52469%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a2520650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52468-cwe-79-improper-neutralization-of-i-af315191</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52468%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a252064b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28412-cwe-400-uncontrolled-resource-consu-ee59b501</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28412%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20textream&amp;severity=medium&amp;id=69a5b6a132ffcdb8a25206aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50198-cwe-502-deserialization-of-untruste-f2b04235</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50198%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a2520640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28403-cwe-346-origin-validation-error-in--510c10f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28403%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20textream&amp;severity=high&amp;id=69a5b6a132ffcdb8a25206a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-allowed-hijacking-chromes-gemini-liv-b93c9281</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20Allowed%20Hijacking%20Chrome%E2%80%99s%20Gemini%20Live%20AI%20Assistant&amp;severity=low&amp;id=69a5af6132ffcdb8a2437a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50197-cwe-78-improper-neutralization-of-s-930b378b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50197%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50196-cwe-78-improper-neutralization-of-s-c384cdc9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50196%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3102-macos-exiftool-image-processing-vuln-b769fd1f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3102%3A%20macOS%20ExifTool%20image-processing%20vulnerability%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a63f7bd1a09e29cb92fd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50195-cwe-78-improper-neutralization-of-s-04fa43e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50195%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0689-cwe-522-insufficiently-protected-cre-f23e5b11</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0689%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Extreme%20Networks%20ExtremeCloud%20IQ%20-%20Site%20Engine&amp;severity=medium&amp;id=69a5ac1332ffcdb8a23ff40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50194-cwe-78-improper-neutralization-of-s-98ee3848</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50194%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50193-cwe-78-improper-neutralization-of-s-b5f5a81f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50193%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50192-cwe-89-improper-neutralization-of-s-c4433473</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50192%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50191-cwe-89-improper-neutralization-of-s-962362cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50191%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50190-cwe-89-improper-neutralization-of-s-ba698467</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50190%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0995-cwe-362-concurrent-execution-using-s-15e51ab8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0995%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Arm%20C1%20Pro&amp;severity=low&amp;id=69a5a89032ffcdb8a23d2f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50189-cwe-89-improper-neutralization-of-s-ddcfb698</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50189%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50188-cwe-89-improper-neutralization-of-s-36e03404</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50188%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52482-cwe-79-improper-neutralization-of-i-52a860bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52482%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a50b32ffcdb8a23b6e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50187-cwe-95-improper-neutralization-of-d-2855170f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50187%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69a5a50b32ffcdb8a23b6e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50186-cwe-79-improper-neutralization-of-i-6bc2aea3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50186%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5a50b32ffcdb8a23b6e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50337-cwe-918-server-side-request-forgery-13c8b2e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50337%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5a50b32ffcdb8a23b6e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-vulnerability-allowed-websites-to-hijack--4d33e471</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Vulnerability%20Allowed%20Websites%20to%20Hijack%20AI%20Agents&amp;severity=low&amp;id=69a5a15132ffcdb8a2372e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47886-cwe-502-deserialization-of-untruste-fc9008b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47886%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5c4fdb6c0d8506fa86d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23600-vulnerability-in-hewlett-packard-en-a5e8a398</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23600%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20AutoPass%20License%20Server%20(APLS)&amp;severity=critical&amp;id=69a5a89232ffcdb8a23d2f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/madison-square-garden-data-breach-confirmed-months-e72fb31f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Madison%20Square%20Garden%20Data%20Breach%20Confirmed%20Months%20After%20Hacker%20Attack&amp;severity=medium&amp;id=69a596c532ffcdb8a22d0c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3432-cwe-862-missing-authorization-in-sim-04668d1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3432%3A%20CWE-862%20Missing%20Authorization%20in%20SimStudioAI%20sim&amp;severity=critical&amp;id=69a5937832ffcdb8a228be36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3431-cwe-862-missing-authorization-in-sim-98ba3f10</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3431%3A%20CWE-862%20Missing%20Authorization%20in%20SimStudioAI%20sim&amp;severity=critical&amp;id=69a5937832ffcdb8a228be33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14532-cwe-434-unrestricted-upload-of-file-a08baa22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14532%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=critical&amp;id=69a5937832ffcdb8a228be30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12462-cwe-89-improper-neutralization-of-s-e4bc6af2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12462%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=critical&amp;id=69a5937832ffcdb8a228be2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-apt-targets-air-gapped-systems-in-rec-01a77ed4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20APT%20Targets%20Air-Gapped%20Systems%20in%20Recent%20Campaign&amp;severity=medium&amp;id=69a57aa532ffcdb8a20f84b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-working-towards-quantum-safe-chrome-https-c-51a02371</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Working%20Towards%20Quantum-Safe%20Chrome%20HTTPS%20Certificates&amp;severity=medium&amp;id=69a5772032ffcdb8a208e196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58406-cwe-693-protection-mechanism-failur-90e01dfe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58406%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=69a573fd32ffcdb8a20705f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58405-cwe-1021-improper-restriction-of-re-3693e469</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58405%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=69a573fd32ffcdb8a20705ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58402-cwe-639-authorization-bypass-throug-e811e431</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58402%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CGM%20CGM%20CLININET&amp;severity=high&amp;id=69a573fd32ffcdb8a20705ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30062-cwe-89-improper-neutralization-of-s-406cf469</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30062%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=69a573fd32ffcdb8a20705e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30044-cwe-78-improper-neutralization-of-s-2f406f65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30044%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20CommandInjection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=69a573fd32ffcdb8a20705e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30042-cwe-603-use-of-client-side-authenti-9e79f8b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30042%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=69a573fd32ffcdb8a20705de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30035-cwe-306-missing-authentication-for--80df036f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30035%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=69a573fd32ffcdb8a20705da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-howto-zip-files-inside-rtf-mon-mar-2nd-0c33c52b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20Howto%3A%20ZIP%20Files%20Inside%20RTF%2C%20(Mon%2C%20Mar%202nd)&amp;severity=medium&amp;id=69a5739d32ffcdb8a206dff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-464-released-mon-mar-2nd-1c22c94e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.6.4%20Released%2C%20(Mon%2C%20Mar%202nd)&amp;severity=medium&amp;id=69a5739d32ffcdb8a206dff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10350-cwe-89-improper-neutralization-of-s-d1330e4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10350%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20NETRAAD&amp;severity=high&amp;id=69a573fd32ffcdb8a20705d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-israel-and-iran-trade-cyberattacks-pro-west-hac-ac7cd7b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US-Israel%20and%20Iran%20Trade%20Cyberattacks%3A%20Pro-West%20Hacks%20Cause%20Disruption%20as%20Tehran%20Retaliates&amp;severity=critical&amp;id=69a5701932ffcdb8a20320c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2584-cwe-89-improper-neutralization-of-sp-3951e11b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2584%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ciser%20System%20SL%20CSIP%20firmware&amp;severity=critical&amp;id=69a5542f32ffcdb8a2ddad39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20416-cwe-787-out-of-bounds-write-in-medi-250df18d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20416%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20445-cwe-367-time-of-check-time-of-use-t-1aacf4d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20445%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550b032ffcdb8a2d8ad3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20429-cwe-125-out-of-bounds-read-in-media-47f3aa2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20429%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20424-cwe-125-out-of-bounds-read-in-media-a029e3f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20424%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20444-cwe-787-out-of-bounds-write-in-medi-7a1940a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20444%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8aceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20443-cwe-416-use-after-free-in-mediatek--5d941cf9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20443%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8ace8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20442-cwe-416-use-after-free-in-mediatek--fadd9fca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20442%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8ace5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20441-cwe-787-out-of-bounds-write-in-medi-009447e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20441%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8ace2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20440-cwe-1285-specified-index-position-o-c6257827</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20440%3A%20CWE-1285%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20439-cwe-416-use-after-free-in-mediatek--27fbcc84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20439%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20438-cwe-367-time-of-check-time-of-use-t-14669464</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20438%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20437-cwe-416-use-after-free-in-mediatek--12a7a5b8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20437%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20436-cwe-120-classic-buffer-overflow-in--1dd491fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20436%3A%20CWE-120%20Classic%20Buffer%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20435-cwe-522-insufficiently-protected-cr-c10cbe25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20435%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20434-cwe-787-out-of-bounds-write-in-medi-48a3728c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20434%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20430-cwe-787-out-of-bounds-write-in-medi-388e7108</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20430%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20428-cwe-787-out-of-bounds-write-in-medi-870c8926</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20428%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20427-cwe-787-out-of-bounds-write-in-medi-d3e944a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20427%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20426-cwe-787-out-of-bounds-write-in-medi-97a580b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20426%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20425-cwe-787-out-of-bounds-write-in-medi-4edb3ff4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20425%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20423-cwe-749-exposed-dangerous-method-or-377e62dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20423%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3422-cwe-502-deserialization-of-untrusted-c53bebca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3422%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20e-Excellence%20U-Office%20Force&amp;severity=critical&amp;id=69a52d8232ffcdb8a2a6ad05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15597-improper-access-controls-in-dataeas-ce1dc337</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15597%3A%20Improper%20Access%20Controls%20in%20Dataease%20SQLBot&amp;severity=medium&amp;id=69a52d8232ffcdb8a2a6ace1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3000-cwe-494-download-of-code-without-int-6f96a540</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3000%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Changing%20IDExpert%20Windows%20Logon%20Agent&amp;severity=critical&amp;id=69a52d8232ffcdb8a2a6acf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3413-sql-injection-in-itsourcecode-univer-983c6ee5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3413%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69a52d8232ffcdb8a2a6acfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2999-cwe-494-download-of-code-without-int-5d28b8bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2999%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Changing%20IDExpert%20Windows%20Logon%20Agent&amp;severity=critical&amp;id=69a52d8232ffcdb8a2a6acf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3412-cross-site-scripting-in-itsourcecode-e5baf82a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3412%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69a522f732ffcdb8a29725e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3411-sql-injection-in-itsourcecode-univer-e960a20a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3411%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69a51bef32ffcdb8a28abb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3410-sql-injection-in-itsourcecode-societ-8229ef18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3410%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=69a5186a32ffcdb8a2864e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3409-code-injection-in-eosphoros-ai-db-gp-fe6781c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3409%3A%20Code%20Injection%20in%20eosphoros-ai%20db-gpt&amp;severity=medium&amp;id=69a5186a32ffcdb8a2864dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3408-null-pointer-dereference-in-open-bab-da0da361</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3408%3A%20NULL%20Pointer%20Dereference%20in%20Open%20Babel&amp;severity=medium&amp;id=69a50ddf32ffcdb8a25b4131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3407-heap-based-buffer-overflow-in-yosysh-dca42c3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3407%3A%20Heap-based%20Buffer%20Overflow%20in%20YosysHQ%20yosys&amp;severity=medium&amp;id=69a5348c32ffcdb8a2af2b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3406-sql-injection-in-projectworlds-onlin-9eac0e99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3406%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69a5348c32ffcdb8a2af2b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3405-path-traversal-in-thinkgem-jeesite-5196bf01</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3405%3A%20Path%20Traversal%20in%20thinkgem%20JeeSite&amp;severity=low&amp;id=69a4f1c732ffcdb8a223af3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3404-xml-external-entity-reference-in-thi-51b249e5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3404%3A%20XML%20External%20Entity%20Reference%20in%20thinkgem%20JeeSite&amp;severity=low&amp;id=69a4f1c732ffcdb8a223af35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3403-cross-site-scripting-in-phpgurukul-s-17adf644</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3403%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Student%20Record%20Management%20System&amp;severity=medium&amp;id=69a4e73232ffcdb8a20beade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3402-cross-site-scripting-in-phpgurukul-s-3b0afb5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3402%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Student%20Record%20Management%20System&amp;severity=medium&amp;id=69a4e02a32ffcdb8a2fae9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3401-session-expiration-in-sourcecodester-da3b4f23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3401%3A%20Session%20Expiration%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=low&amp;id=69a4e02a32ffcdb8a2fae9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-02-63e7627a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-02&amp;severity=medium&amp;id=69a62892d1a09e29cb62b7a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26713-na-7bedeb27</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26713%3A%20n%2Fa&amp;severity=critical&amp;id=69a5e601d1a09e29cb3f7141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26712-na-24d0bc2c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26712%3A%20n%2Fa&amp;severity=critical&amp;id=69a5e601d1a09e29cb3f713e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26711-na-6f7b1ca4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26711%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d7f0d1a09e29cb15f964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26710-na-b38411d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26710%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d7f0d1a09e29cb15f961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26709-na-883f5184</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26709%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d7f0d1a09e29cb15f95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26706-na-5cbb336a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26706%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d050b6c0d8506fbcb7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26705-na-a9848195</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26705%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d050b6c0d8506fbcb7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26704-na-28680e8c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26704%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d050b6c0d8506fbcb7c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26707-na-6e668b1d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26707%3A%20n%2Fa&amp;severity=critical&amp;id=69a5ccceb6c0d8506fb79213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26708-na-9d3ae846</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26708%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c5cab6c0d8506faa2d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26700-na-7f4834e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26700%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c5cab6c0d8506faa2d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24105-na-2160bf38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24105%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c5cab6c0d8506faa2d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24115-na-134d08de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24115%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c4fdb6c0d8506fa86d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24108-na-e5dd6352</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24108%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c4fdb6c0d8506fa86d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24107-na-70a14196</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24107%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c4fdb6c0d8506fa86d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65465-na-fdf17c91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65465%3A%20n%2Fa&amp;severity=medium&amp;id=69a5c4fdb6c0d8506fa86d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58107-na-d7a73217</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58107%3A%20n%2Fa&amp;severity=high&amp;id=69a5c4fdb6c0d8506fa86d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70252-na-41578cab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70252%3A%20n%2Fa&amp;severity=high&amp;id=69a5ba2232ffcdb8a272b11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26699-na-e2fc148c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26699%3A%20n%2Fa&amp;severity=high&amp;id=69a5b31c32ffcdb8a247ea24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24110-na-365c0423</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24110%3A%20n%2Fa&amp;severity=critical&amp;id=69a5b31c32ffcdb8a247ea20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24101-na-d4673fac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24101%3A%20n%2Fa&amp;severity=critical&amp;id=69a5b31c32ffcdb8a247ea1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-02-9a2afa6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-02&amp;severity=medium&amp;id=69a5af5e32ffcdb8a243307b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26720-na-2ff82cfc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26720%3A%20n%2Fa&amp;severity=critical&amp;id=69a5ac1332ffcdb8a23ff415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26701-na-f7f6a089</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26701%3A%20n%2Fa&amp;severity=critical&amp;id=69a5ac1332ffcdb8a23ff412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24112-na-7748f962</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24112%3A%20n%2Fa&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff40e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66880-na-5a19d613</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66880%3A%20n%2Fa&amp;severity=medium&amp;id=69a5ac1332ffcdb8a23ff407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26703-na-12ee013e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26703%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89232ffcdb8a23d2f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26702-na-04c047b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26702%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89232ffcdb8a23d2f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26696-na-579f0a76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26696%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26695-na-2c54b368</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26695%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26694-na-9ad189bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26694%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24111-na-6172e3d9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24111%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24114-na-ff78d00a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24114%3A%20n%2Fa&amp;severity=high&amp;id=69a5a50b32ffcdb8a23b6e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24113-na-9be2e8f0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24113%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a50b32ffcdb8a23b6e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24109-na-d78e78dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24109%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a50b32ffcdb8a23b6e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26698-na-2e1f1f94</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26698%3A%20n%2Fa&amp;severity=medium&amp;id=69a59a7f32ffcdb8a231556f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26697-na-0f327e0e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26697%3A%20n%2Fa&amp;severity=medium&amp;id=69a59a7f32ffcdb8a231556c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-02-646a39fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-02&amp;severity=low&amp;id=69a51f3932ffcdb8a2918c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3400-stack-based-buffer-overflow-in-tenda-c665b93a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3400%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=69a4ce9732ffcdb8a239391b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3399-buffer-overflow-in-tenda-f453-2372f90c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3399%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a4c78f32ffcdb8a20b0e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3398-buffer-overflow-in-tenda-f453-735bc013</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3398%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a4b98032ffcdb8a289904f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3395-code-injection-in-maxsite-cms-3bfdaf81</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3395%3A%20Code%20Injection%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69a44c8232ffcdb8a22bcf2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3394-memory-corruption-in-jarikomppa-solo-211ba7f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3394%3A%20Memory%20Corruption%20in%20jarikomppa%20soloud&amp;severity=medium&amp;id=69a4343532ffcdb8a2227d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-claude-code-in-mexican-governmen-ba878574</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Weaponize%20Claude%20Code%20in%20Mexican%20Government%20Cyberattack&amp;severity=medium&amp;id=69a433f132ffcdb8a2227866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3393-heap-based-buffer-overflow-in-jariko-5c5d7c47</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3393%3A%20Heap-based%20Buffer%20Overflow%20in%20jarikomppa%20soloud&amp;severity=medium&amp;id=69a4306332ffcdb8a22142d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3392-null-pointer-dereference-in-fascinat-e8321564</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3392%3A%20NULL%20Pointer%20Dereference%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=69a425d832ffcdb8a21d5292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3391-out-of-bounds-read-in-fascinatedbox--9a203fbf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3391%3A%20Out-of-Bounds%20Read%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=69a425d832ffcdb8a21d528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3390-out-of-bounds-read-in-fascinatedbox--3e1232d9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3390%3A%20Out-of-Bounds%20Read%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=69a410be32ffcdb8a216f793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3389-null-pointer-dereference-in-squirrel-0cdfbe54</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3389%3A%20NULL%20Pointer%20Dereference%20in%20Squirrel&amp;severity=medium&amp;id=69a410be32ffcdb8a216f78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3388-uncontrolled-recursion-in-squirrel-9607a98f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3388%3A%20Uncontrolled%20Recursion%20in%20Squirrel&amp;severity=medium&amp;id=69a40d3b32ffcdb8a215b143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3387-null-pointer-dereference-in-wren-lan-d9c45b90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3387%3A%20NULL%20Pointer%20Dereference%20in%20wren-lang%20wren&amp;severity=medium&amp;id=69a40d3b32ffcdb8a215b13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3386-out-of-bounds-read-in-wren-lang-wren-34b2743d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3386%3A%20Out-of-Bounds%20Read%20in%20wren-lang%20wren&amp;severity=medium&amp;id=69a3ff2a32ffcdb8a20f9a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3385-uncontrolled-recursion-in-wren-lang--328bcef5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3385%3A%20Uncontrolled%20Recursion%20in%20wren-lang%20wren&amp;severity=medium&amp;id=69a3ff2a32ffcdb8a20f9a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3384-uncontrolled-recursion-in-chaiscript-987eeee8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3384%3A%20Uncontrolled%20Recursion%20in%20ChaiScript&amp;severity=medium&amp;id=69a3f82232ffcdb8a20b78ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3383-divide-by-zero-in-chaiscript-a72de4d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3383%3A%20Divide%20By%20Zero%20in%20ChaiScript&amp;severity=medium&amp;id=69a3e31832ffcdb8a2033ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3382-memory-corruption-in-chaiscript-4e28e43c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3382%3A%20Memory%20Corruption%20in%20ChaiScript&amp;severity=medium&amp;id=69a3d17732ffcdb8a2ed6d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-zoom-meeting-update-silently-installs-unautho-4e0297d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Zoom%20meeting%20&apos;update&apos;%20silently%20installs%20unauthorized%20version%20of%20monitoring%20tool%20abused%20by%20cybercriminals%20to%20spy%20on%20victims&amp;severity=medium&amp;id=69a57ab332ffcdb8a20f8734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/plugx-meeting-invitation-via-msbuild-and-gdata-6eb1b765</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlugX%20Meeting%20Invitation%20via%20MSBuild%20and%20GDATA&amp;severity=medium&amp;id=69a57ab332ffcdb8a20f871d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-windows-file-explorer-and-webdav-for-malwa-66456dc7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20Windows%20File%20Explorer%20and%20WebDAV%20for%20Malware%20Delivery&amp;severity=medium&amp;id=69a57ab332ffcdb8a20f870b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3380-buffer-overflow-in-tenda-f453-54481f34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3380%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3b55632ffcdb8a2b4b44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3379-buffer-overflow-in-tenda-f453-63a79945</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3379%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3a74732ffcdb8a2a0f4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3378-buffer-overflow-in-tenda-f453-0b5023a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3378%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3a74732ffcdb8a2a0f4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-01-27955616</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-01&amp;severity=medium&amp;id=69a4d56532ffcdb8a278469f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-01-5c769887</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-01&amp;severity=medium&amp;id=69a48f1632ffcdb8a2432fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-01-665b3e85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-01&amp;severity=low&amp;id=69a3fef132ffcdb8a20f79ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3377-buffer-overflow-in-tenda-f453-c140c206</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3377%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a37d1832ffcdb8a2775af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3376-buffer-overflow-in-tenda-f453-d5150655</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3376%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3760f32ffcdb8a2754357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28562-improper-neutralization-of-special--22c35314</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28562%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=high&amp;id=69a3647b32ffcdb8a26ae37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28561-improper-neutralization-of-input-du-2ab57de1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28561%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28560-improper-neutralization-of-input-du-8faa806d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28560%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28559-exposure-of-sensitive-information-t-63f9c324</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28559%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28558-improper-neutralization-of-input-du-ef0d4882</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28557-missing-authorization-in-gvectors-t-52ac189f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28557%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=high&amp;id=69a3647b32ffcdb8a26ae361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28556-missing-authorization-in-gvectors-t-7c48eb32</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28556%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28555-missing-authorization-in-gvectors-t-0d98cbfc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28555%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28554-missing-authorization-in-gvectors-t-03297c73</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28554%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canadian-tire-data-breach-impacts-38-million-accou-c239d541</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canadian%20Tire%20Data%20Breach%20Impacts%2038%20Million%20Accounts&amp;severity=medium&amp;id=69a2d7a532ffcdb8a23552b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3010-cwe-79-improper-neutralization-of-in-f593f595</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3010%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microchip%20TimePictra&amp;severity=critical&amp;id=69a2d7ea32ffcdb8a2355e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2844-cwe-306-missing-authentication-for-c-aa868998</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2844%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microchip%20TimePictra&amp;severity=critical&amp;id=69a2d7ea32ffcdb8a2355e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13673-cwe-89-improper-neutralization-of-s-d43b2ec0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13673%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=69a29c1732ffcdb8a21a67e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2471-cwe-502-deserialization-of-untrusted-d6318999</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2471%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20smub%20WP%20Mail%20Logging&amp;severity=high&amp;id=69a2918b32ffcdb8a20eaa4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1542-cwe-502-deserialization-of-untrusted-59f81670</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1542%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Super%20Stage%20WP&amp;severity=medium&amp;id=69a2bbbc32ffcdb8a227e261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-28-bf794239</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-28&amp;severity=medium&amp;id=69a383e532ffcdb8a279ce9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-28-cdec1619</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-28&amp;severity=low&amp;id=69a2520932ffcdb8a2a9c846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-28-c6fb4a83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-28&amp;severity=medium&amp;id=69a2520932ffcdb8a2a9c83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28426-cwe-79-improper-neutralization-of-i-60e5cc52</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28426%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69a2210832ffcdb8a2802147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28425-cwe-94-improper-control-of-generati-a87384ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28425%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69a21f2232ffcdb8a27f4a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27759-cwe-918-server-side-request-forgery-7b0812f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27759%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Dhrumil%20Kumbhani%20Featured%20Image%20from%20Content&amp;severity=medium&amp;id=69a21f2232ffcdb8a27f4a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28424-cwe-862-missing-authorization-in-st-0c75739a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28424%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69a21f2232ffcdb8a27f4a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28423-cwe-918-server-side-request-forgery-eabbe53b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28423%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20statamic%20cms&amp;severity=medium&amp;id=69a21f2232ffcdb8a27f4a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28411-cwe-288-authentication-bypass-using-7167a2c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28411%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69a212fb32ffcdb8a2777760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28409-cwe-78-improper-neutralization-of-s-258821fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28409%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69a212fb32ffcdb8a277775c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28408-cwe-862-missing-authorization-in-la-ddacfcff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28408%3A%20CWE-862%3A%20Missing%20Authorization%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69a212fb32ffcdb8a2777758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28416-cwe-918-server-side-request-forgery-7592cbef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28416%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gradio-app%20gradio&amp;severity=high&amp;id=69a212fb32ffcdb8a2777772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28415-cwe-200-exposure-of-sensitive-infor-dbcfee5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28415%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gradio-app%20gradio&amp;severity=medium&amp;id=69a212fb32ffcdb8a277776d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28414-cwe-36-absolute-path-traversal-in-g-feb1c031</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28414%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20gradio-app%20gradio&amp;severity=high&amp;id=69a212fb32ffcdb8a277777c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27939-cwe-287-improper-authentication-in--447d0594</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27939%3A%20CWE-287%3A%20Improper%20Authentication%20in%20statamic%20cms&amp;severity=high&amp;id=69a212fb32ffcdb8a2777778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trump-orders-all-federal-agencies-to-phase-out-use-baea88a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trump%20Orders%20All%20Federal%20Agencies%20to%20Phase%20Out%20Use%20of%20Anthropic%20Technology&amp;severity=medium&amp;id=69a20f4132ffcdb8a275b2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28407-cwe-703-improper-check-or-handling--2f677404</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28407%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20chainguard-dev%20malcontent&amp;severity=medium&amp;id=69a20f8732ffcdb8a275da20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28406-cwe-22-improper-limitation-of-a-pat-c28b7a73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28406%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-forks%20kaniko&amp;severity=high&amp;id=69a20f8732ffcdb8a275da1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28402-cwe-354-improper-validation-of-inte-be34d944</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28402%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69a20bf332ffcdb8a2748336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28400-cwe-749-exposed-dangerous-method-or-da335de5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28400%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20docker%20model-runner&amp;severity=high&amp;id=69a20bf332ffcdb8a2748332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28355-cwe-79-improper-neutralization-of-i-7d738047</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28355%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkst%20canarytokens&amp;severity=low&amp;id=69a2087132ffcdb8a2724a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28351-cwe-400-uncontrolled-resource-consu-1ca949cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28351%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69a2087132ffcdb8a2724a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28288-cwe-204-observable-response-discrep-609a4992</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28288%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20langgenius%20dify&amp;severity=medium&amp;id=69a2016632ffcdb8a26f324d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28272-cwe-79-improper-neutralization-of-i-47808143</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28272%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kiteworks%20security-advisories&amp;severity=high&amp;id=69a2016632ffcdb8a26f324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28271-cwe-350-reliance-on-reverse-dns-res-d5eb1b08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28271%3A%20CWE-350%3A%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=69a2016632ffcdb8a26f3247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28270-cwe-434-unrestricted-upload-of-file-06e3aca0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28270%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=69a2016632ffcdb8a26f3244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28268-cwe-459-incomplete-cleanup-in-go-vi-0517b158</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28268%3A%20CWE-459%3A%20Incomplete%20Cleanup%20in%20go-vikunja%20vikunja&amp;severity=critical&amp;id=69a2016632ffcdb8a26f323f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28231-cwe-125-out-of-bounds-read-in-bigca-c6bc910b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28231%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bigcat88%20pillow_heif&amp;severity=medium&amp;id=69a1fde732ffcdb8a26e412b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3255-cwe-340-generation-of-predictable-nu-990287a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3255%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20TOKUHIROM%20HTTP%3A%3ASession2&amp;severity=medium&amp;id=69a1fde732ffcdb8a26e4130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27836-cwe-862-missing-authorization-in-th-18400afc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27836%3A%20CWE-862%3A%20Missing%20Authorization%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=69a1fa6032ffcdb8a26d1c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27947-cwe-88-improper-neutralization-of-a-24402a59</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27947%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=69a1fa6032ffcdb8a26d1c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27832-cwe-89-improper-neutralization-of-s-6c490a3a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27832%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=high&amp;id=69a1f6db32ffcdb8a26bc2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27824-cwe-307-improper-restriction-of-exc-39b00782</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27824%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27810-cwe-113-improper-neutralization-of--a1ce14fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27810%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27734-cwe-22-improper-limitation-of-a-pat-4f122212</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27734%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20henrygd%20beszel&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27793-cwe-639-authorization-bypass-throug-84a88cae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27793%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20seerr-team%20seerr&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27792-cwe-862-missing-authorization-in-se-260eb1fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27792%3A%20CWE-862%3A%20Missing%20Authorization%20in%20seerr-team%20seerr&amp;severity=medium&amp;id=69a1f35732ffcdb8a26a7753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27707-cwe-288-authentication-bypass-using-d68532fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27707%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20seerr-team%20seerr&amp;severity=high&amp;id=69a1f35732ffcdb8a26a774e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28354-cwe-639-authorization-bypass-throug-2e337172</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28354%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=69a1efd532ffcdb8a269c95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26997-cwe-79-improper-neutralization-of-i-1ccfba73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26997%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=low&amp;id=69a1efd332ffcdb8a269c8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22717-cwe-125-out-of-bounds-read-in-vmwar-9dea0b38</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22717%3A%20CWE-125%20Out-of-bounds%20Read%20in%20VMware%20Workstation&amp;severity=low&amp;id=69a1efd332ffcdb8a269c8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22716-cwe-125-out-of-bounds-read-in-vmwar-8d78d628</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22716%3A%20CWE-787%20Out-of-bounds%20Write%20in%20VMware%20Workstation&amp;severity=medium&amp;id=69a1ec5132ffcdb8a267e1ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27758-cwe-352-cross-site-request-forgery--f8983b9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27758%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1e1c432ffcdb8a2634783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27757-cwe-620-unverified-password-change--836b6108</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27757%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=high&amp;id=69a1e1c432ffcdb8a263477f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27756-cwe-79-improper-neutralization-of-i-56dffe32</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1e1c432ffcdb8a263477b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27755-cwe-330-use-of-insufficiently-rando-27c7bdab</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27755%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=critical&amp;id=69a1e1c432ffcdb8a2634777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27754-cwe-328-use-of-weak-hash-in-shenzhe-a0a4ca86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27754%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1e1c432ffcdb8a2634773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27753-cwe-307-improper-restriction-of-exc-f450d076</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27753%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1de4132ffcdb8a26144d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27752-cwe-319-cleartext-transmission-of-s-f729bb7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27752%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=high&amp;id=69a1de4132ffcdb8a26144d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27751-cwe-1392-use-of-default-credentials-706a3fb0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27751%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=critical&amp;id=69a1de4132ffcdb8a26144d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21619-cwe-400-uncontrolled-resource-consu-f28b2248</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21619%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20hexpm%20hex_core&amp;severity=low&amp;id=69a1de4132ffcdb8a26144c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/local-ktae-and-the-ida-pro-plugin-kaspersky-offici-3a13a807</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Local%20KTAE%20and%20the%20IDA%20Pro%20plugin%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a1ccf432ffcdb8a24a1deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3304-cwe-459-in-expressjs-multer-22a5e3c2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3304%3A%20CWE-459%20in%20expressjs%20multer&amp;severity=high&amp;id=69a1be9b32ffcdb8a23e705d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2359-cwe-772-in-expressjs-multer-b3f304cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2359%3A%20CWE-772%20in%20expressjs%20multer&amp;severity=high&amp;id=69a1be9b32ffcdb8a23e7057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-attck-advisory-council-russian-cyber-536a6441</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20ATT%26CK%20Advisory%20Council%2C%20Russian%20Cyberattacks%20Aid%20Missile%20Strikes%2C%20Predator%20Bypasses%20iOS%20Indicators&amp;severity=medium&amp;id=69a1b75d32ffcdb8a23cc5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3277-cwe-312-cleartext-storage-of-sensiti-cd3f3fd4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3277%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Devolutions%20PowerShell%20Universal&amp;severity=medium&amp;id=69a1b7a632ffcdb8a23ccfc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2749-e23f9297</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2749&amp;severity=critical&amp;id=69a1b7a632ffcdb8a23ccfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2750-cwe-20-improper-input-validation-in--d73d2c78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2750%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Centreon%20Centreon%20Open%20Tickets%20on%20Central%20Server&amp;severity=critical&amp;id=69a1b7a632ffcdb8a23ccfc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3327-cwe-79-improper-neutralization-of-in-970903af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3327%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20DatoCMS%20Web%20Previews&amp;severity=medium&amp;id=69a1a98332ffcdb8a2378ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15498-cwe-89-improper-neutralization-of-s-0a597b74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15498%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Pro3W%20Pro3W%20CMS&amp;severity=critical&amp;id=69a1a5fe32ffcdb8a235f6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/38-million-allegedly-impacted-by-manomano-data-bre-81de6c83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=38%20Million%20Allegedly%20Impacted%20by%20ManoMano%20Data%20Breach&amp;severity=medium&amp;id=69a1a24532ffcdb8a2343cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2751-blind-sql-injection-via-unsanitized--3cc96648</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2751%3A%20Blind%20SQL%20Injection%20via%20unsanitized%20array%20keys%20in%20Service%20Dependencies%20deletion.%20in%20Centreon%20Centreon%20Web%20on%20Central%20Server&amp;severity=high&amp;id=69a19ef732ffcdb8a232d2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10990-inefficient-regular-expression-comp-66f11e14</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10990%3A%20Inefficient%20Regular%20Expression%20Complexity&amp;severity=high&amp;id=69a19ef732ffcdb8a232d2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/900-sangoma-freepbx-instances-infected-with-web-sh-4c7fa87f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=900%20Sangoma%20FreePBX%20Instances%20Infected%20With%20Web%20Shells&amp;severity=medium&amp;id=69a19b3e32ffcdb8a231cb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3223-cwe-22-improper-limitation-of-a-path-65bbd039</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3223%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Google%20Web%20Designer&amp;severity=high&amp;id=69a19ef732ffcdb8a232d2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11950-cwe-79-improper-neutralization-of-i-394c2718</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11950%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20KNOWHY%20Advanced%20Technology%20Trading%20Ltd.%20Co.%20EduAsist&amp;severity=medium&amp;id=69a197f132ffcdb8a2305706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chilean-carding-shop-operator-extradited-to-us-ff61a7f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chilean%20Carding%20Shop%20Operator%20Extradited%20to%20US&amp;severity=medium&amp;id=69a190b232ffcdb8a22da550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-refuses-to-bend-to-pentagon-on-ai-safegu-724d3d36</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20Refuses%20to%20Bend%20to%20Pentagon%20on%20AI%20Safeguards%20as%20Dispute%20Nears%20Deadline&amp;severity=medium&amp;id=69a190b232ffcdb8a22da553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11252-cwe-89-improper-neutralization-of-s-229dc350</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11252%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Signum%20Technology%20Promotion%20and%20Training%20Inc.%20windesk.fm&amp;severity=critical&amp;id=69a21f2232ffcdb8a27f4aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-fedex-email-delivers-donutsx21-fri-feb-27th-a42d059d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Fedex%20Email%20Delivers%20Donuts%26%23x21%3B%2C%20(Fri%2C%20Feb%2027th)&amp;severity=medium&amp;id=69a18d2c32ffcdb8a22c9d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aeternum-botnet-loader-employs-polygon-blockchain--89cf856e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aeternum%20Botnet%20Loader%20Employs%20Polygon%20Blockchain%20C%26C%20to%20Boost%20Resilience&amp;severity=medium&amp;id=69a189a832ffcdb8a22adfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11251-cwe-89-improper-neutralization-of-s-0669f2cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11251%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dayneks%20Software%20Industry%20and%20Trade%20Inc.%20E-Commerce%20Platform&amp;severity=critical&amp;id=69a189f332ffcdb8a22b00e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24352-cwe-384-session-fixation-in-pluxml--87293653</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24352%3A%20CWE-384%20Session%20Fixation%20in%20PluXml%20PluXml%20CMS&amp;severity=medium&amp;id=69a182d732ffcdb8a2282727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24351-cwe-79-improper-neutralization-of-i-5535a71d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24351%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PluXml%20PluXml%20CMS&amp;severity=medium&amp;id=69a182d732ffcdb8a2282723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24350-cwe-79-improper-neutralization-of-i-ca539a49</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PluXml%20PluXml%20CMS&amp;severity=medium&amp;id=69a182d732ffcdb8a228271f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2831-cwe-89-improper-neutralization-of-sp-79154bf9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2831%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pierrelannoy%20MailArchiver&amp;severity=medium&amp;id=69a182d732ffcdb8a228272b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-networks-ptx-routers-affected-by-critical--b59873d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20Networks%20PTX%20Routers%20Affected%20by%20Critical%20Vulnerability&amp;severity=critical&amp;id=69a1749132ffcdb8a21d7bf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1434-cwe-79-improper-neutralization-of-in-4ad955e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Politechnika%20Warszawska%20Omega-PSIR&amp;severity=medium&amp;id=69a1784b32ffcdb8a21fae63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-dohdoor-malware-campaign-targets-education-and-d356513f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Dohdoor%20malware%20campaign%20targets%20education%20and%20health%20care&amp;severity=medium&amp;id=69a16d8732ffcdb8a2195d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-interview-evolution-of-vs-code-and-curs-6afe0a1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Interview%3A%20Evolution%20of%20VS%20Code%20and%20Cursor%20Tasks%20Infection%20Chains%20-%20Part%201&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/botnet-trojan-delivered-through-clickfix-and-ether-d3b38f2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Botnet%20Trojan%20delivered%20through%20ClickFix%20and%20EtherHiding&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-arpa-the-tld-that-isnt-supposed-to-host-an-36609fd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20.arpa%3A%20The%20TLD%20That%20Isn&apos;t%20Supposed%20to%20Host%20Anything&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1305-cwe-287-improper-authentication-in-s-96cc64c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1305%3A%20CWE-287%20Improper%20Authentication%20in%20shoheitanaka%20Japanized%20for%20WooCommerce&amp;severity=medium&amp;id=69a166b732ffcdb8a2157df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14142-cwe-79-improper-neutralization-of-i-049f904d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20electriccode%20Electric%20Enquiries&amp;severity=medium&amp;id=69a166b732ffcdb8a2157deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10938-cwe-506-embedded-malicious-code-in--4a12daaf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10938%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20moneytigo%20OVRI%20Payment&amp;severity=medium&amp;id=69a166b732ffcdb8a2157de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21660-cwe-256-plaintext-storage-of-a-pass-aad934b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21660%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=medium&amp;id=69a1633532ffcdb8a2131e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malicious-npm-package-ambar-src-targets-develo-1c59a0c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20malicious%20npm%20package%20&apos;ambar-src&apos;%20targets%20developers%20with%20open%20source%20malware&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21659-cwe-22-improper-limitation-of-a-pat-3400c9c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21659%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a1633532ffcdb8a2131e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21658-cwe-94-improper-control-of-generati-f2d5d005</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21658%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a15faf32ffcdb8a2106787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21657-cwe-94-improper-control-of-generati-ac9104a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21657%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a15faf32ffcdb8a2106783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21656-cwe-94-improper-control-of-generati-591cf794</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21656%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a15faf32ffcdb8a210677f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1627-cwe-327-use-of-a-broken-or-risky-cry-3510b538</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1627%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20SICK%20AG%20SICK%20LMS1000&amp;severity=medium&amp;id=69a15faf32ffcdb8a2106777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1626-cwe-327-use-of-a-broken-or-risky-cry-6e2a50f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1626%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20SICK%20AG%20SICK%20LMS1000&amp;severity=medium&amp;id=69a15faf32ffcdb8a210676f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21654-cwe-78-improper-neutralization-of-s-fee4b2ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21654%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a158a732ffcdb8a20b09cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2362-cwe-79-improper-neutralization-of-in-7f8990ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joedolson%20WP%20Accessibility&amp;severity=medium&amp;id=69a158a732ffcdb8a20b09cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2383-cwe-79-improper-neutralization-of-in-34b3f279</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Download%20Monitor&amp;severity=medium&amp;id=69a158a732ffcdb8a20b09d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2252-cwe-611-improper-restriction-of-xml--6b6b1047</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2252%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Xerox%20FreeFlow%20Core&amp;severity=high&amp;id=69a1552332ffcdb8a208e3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2251-cwe-22-improper-limitation-of-a-path-309f50e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2251%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Xerox%20FreeFlow%20Core&amp;severity=critical&amp;id=69a1552332ffcdb8a208e3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27776-deserialization-of-untrusted-data-i-dbd89a5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27776%3A%20Deserialization%20of%20untrusted%20data%20in%20NTT%20DATA%20INTRAMART%20Corporation%20intra-mart%20Accel%20Platform&amp;severity=high&amp;id=69a1519e32ffcdb8a205ced7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaws-exposed-gardyn-smart-gardens-to-rem-6afe633e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaws%20Exposed%20Gardyn%20Smart%20Gardens%20to%20Remote%20Hacking&amp;severity=critical&amp;id=69a14a6132ffcdb8a2012a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0980-improper-neutralization-of-special-e-8f324e87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0980%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69a14e1a32ffcdb8a203afe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0871-incorrect-privilege-assignment-in-re-d9362869</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0871%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13327-improper-validation-of-syntactic-co-5f074485</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13327%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20astral-sh%20uv&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9909-use-of-non-canonical-url-paths-for-a-ff141764</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9909%3A%20Use%20of%20Non-Canonical%20URL%20Paths%20for%20Authorization%20Decisions%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9908-exposure-of-sensitive-information-to-01a50cc7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9908%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9907-exposure-of-sensitive-information-to-cc86b7aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9907%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9572-exposure-of-sensitive-information-to-9f64e32c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9572%3A%20Incorrect%20Authorization%20in%20The%20Foreman%20Foreman&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15567-cwe-306-missing-authentication-for--6aaaa9dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15567%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20vivo%20Health&amp;severity=medium&amp;id=69a1438e32ffcdb8a2fbeb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15509-cwe-306-missing-authentication-for--e81e4acc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15509%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20vivo%20SmartRemote&amp;severity=high&amp;id=69a1438e32ffcdb8a2fbeb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12981-cwe-269-improper-privilege-manageme-e6893456</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12981%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dreamstechnologies%20Listee&amp;severity=critical&amp;id=69a1438e32ffcdb8a2fbeaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14149-cwe-79-improper-neutralization-of-i-23af593b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14149%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69a1438e32ffcdb8a2fbeb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14040-cwe-79-improper-neutralization-of-i-7f5c8007</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14040%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesuite%20Automotive%20Car%20Dealership%20Business%20WordPress%20Theme&amp;severity=medium&amp;id=69a1438e32ffcdb8a2fbeafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3302-cross-site-scripting-in-sourcecodest-7e2a663c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3302%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69a1390232ffcdb8a2f493bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27653-incorrect-default-permissions-in-so-72204038</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27653%3A%20Incorrect%20default%20permissions%20in%20Soliton%20Systems%20K.K.%20Soliton%20SecureBrowser%20for%20OneGate&amp;severity=medium&amp;id=69a1357f32ffcdb8a2f19b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3301-os-command-injection-in-totolink-n30-8ab5e0b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3301%3A%20OS%20Command%20Injection%20in%20Totolink%20N300RH&amp;severity=critical&amp;id=69a12e7632ffcdb8a2ebeaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3293-inefficient-regular-expression-compl-fdcbf38b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3293%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20snowflakedb%20snowflake-jdbc&amp;severity=medium&amp;id=69a12e7632ffcdb8a2ebeaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28372-cwe-829-inclusion-of-functionality--04030f82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28372%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20GNU%20inetutils&amp;severity=high&amp;id=69a12e7632ffcdb8a2ebeaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-go-crypto-module-steals-passwords-and-de-5a9ea1a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Go%20&apos;crypto&apos;%20Module%20Steals%20Passwords%20and%20Deploys%20Rekoobe%20Backdoor&amp;severity=medium&amp;id=69a15f7732ffcdb8a2102f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3292-sql-injection-in-jizhicms-d8105f3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3292%3A%20SQL%20Injection%20in%20jizhiCMS&amp;severity=medium&amp;id=69a1276f32ffcdb8a2e563fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28370-cwe-95-improper-neutralization-of-d-e403f347</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28370%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20OpenStack%20Vitrage&amp;severity=critical&amp;id=69a1276f32ffcdb8a2e563fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1558-cwe-639-authorization-bypass-through-08601960</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1558%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=69a1be9b32ffcdb8a23e7063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3289-path-traversal-in-sanluan-publiccms-7a278269</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3289%3A%20Path%20Traversal%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69a1ec5132ffcdb8a267e1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1442-cwe-321-use-of-hard-coded-cryptograp-3990dc00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1442%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Unitree%20UPK&amp;severity=high&amp;id=69a1c21f32ffcdb8a23fb748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3287-sql-injection-in-youlaitech-youlai-m-f54637dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3287%3A%20SQL%20Injection%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=69a1ec5132ffcdb8a267e1ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3286-server-side-request-forgery-in-itwan-92eaf84b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3286%3A%20Server-Side%20Request%20Forgery%20in%20itwanger%20paicoding&amp;severity=medium&amp;id=69a1195f32ffcdb8a2c64269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2428-cwe-345-insufficient-verification-of-33fd59e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2428%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=high&amp;id=69a1195f32ffcdb8a2c64265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3285-out-of-bounds-read-in-berry-lang-ber-d0a248e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3285%3A%20Out-of-Bounds%20Read%20in%20berry-lang%20berry&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3284-integer-overflow-in-libvips-1f40665b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3284%3A%20Integer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3283-out-of-bounds-read-in-libvips-2cba54fa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3283%3A%20Out-of-Bounds%20Read%20in%20libvips&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3282-out-of-bounds-read-in-libvips-63ed8a34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3282%3A%20Out-of-Bounds%20Read%20in%20libvips&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3281-heap-based-buffer-overflow-in-libvip-f2781821</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3281%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=69a100c232ffcdb8a2a64fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24498-cwe-200-exposure-of-sensitive-infor-4726610a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24498%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20EFM-Networks%2C%20Inc.%20ipTIME%20T5008&amp;severity=medium&amp;id=69a100c232ffcdb8a2a64f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24497-cwe-121-stack-based-buffer-overflow-0433973b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24497%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SimTech%20Systems%2C%20Inc.%20ThinkWise&amp;severity=high&amp;id=69a100c232ffcdb8a2a64f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3275-buffer-overflow-in-tenda-f453-d6d6eb24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3275%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a100c232ffcdb8a2a64f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3037-cwe-78-in-copeland-copeland-xweb-300-4ecbd821</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3037%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20797-we-121-in-copeland-copeland-xweb-30-b49b097a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20797%3A%20WE-121%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=medium&amp;id=69a0f2b332ffcdb8a2981608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3274-buffer-overflow-in-tenda-f453-d6a76b12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3274%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0f2b532ffcdb8a2981649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22877-cwe-22-in-copeland-copeland-xweb-30-79b6e451</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22877%3A%20CWE-22%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=low&amp;id=69a0f2b332ffcdb8a298160d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25037-cwe-78-in-copeland-copeland-xweb-30-b7a79975</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25037%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a298161c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25196-cwe-78-in-copeland-copeland-xweb-30-2b443476</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25196%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20764-cwe-78-in-copeland-copeland-xweb-30-48ae0445</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20764%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25721-cwe-78-in-copeland-copeland-xweb-30-ba83d670</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25721%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a298162b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23702-cwe-78-in-copeland-copeland-xweb-30-ce9fc762</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23702%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24452-cwe-78-in-copeland-copeland-xweb-30-a7dbfe59</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24452%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25105-cwe-78-in-copeland-copeland-xweb-30-8d544ce0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25105%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24695-cwe-78-in-copeland-copeland-xweb-30-3fd00bbd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24695%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20902-cwe-78-in-copeland-copeland-xweb-30-17710e48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20902%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25109-cwe-78-in-copeland-copeland-xweb-30-a3a48ca5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25109%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24689-cwe-78-in-copeland-copeland-xweb-30-b9bf45c6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24689%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20910-cwe-78-in-copeland-copeland-xweb-30-0f4f16cc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20910%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25195-cwe-78-in-copeland-copeland-xweb-30-5749903d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25195%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24517-cwe-78-in-copeland-copeland-xweb-30-4bcf5b64</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24517%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20742-cwe-78-in-copeland-copeland-xweb-30-03607d5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20742%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25111-cwe-78-in-copeland-copeland-xweb-30-30ddd8b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25111%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21389-cwe-78-in-copeland-copeland-xweb-30-ce8a90ae</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21389%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24663-cwe-78-in-copeland-copeland-xweb-30-1c773deb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24663%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=critical&amp;id=69a0ebad32ffcdb8a293f2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21718-cwe-327-in-copeland-copeland-xweb-3-124474ba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21718%3A%20CWE-327%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=critical&amp;id=69a0ebad32ffcdb8a293f2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25085-cwe-394-in-copeland-copeland-xweb-3-48dec72e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25085%3A%20CWE-394%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3273-buffer-overflow-in-tenda-f453-f5bf905b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3273%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0ebb032ffcdb8a293f38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22878-cwe-522-in-mobility46-mobility46se-77fe6773</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22878%3A%20CWE-522%20in%20Mobility46%20mobility46.se&amp;severity=medium&amp;id=69a0ebad32ffcdb8a293f2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27647-cwe-613-in-mobility46-mobility46se-cccd2724</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27647%3A%20CWE-613%20in%20Mobility46%20mobility46.se&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26305-cwe-307-in-mobility46-mobility46se-6a9fcc57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26305%3A%20CWE-307%20in%20Mobility46%20mobility46.se&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27028-cwe-306-in-mobility46-mobility46se-f694ef80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27028%3A%20CWE-306%20in%20Mobility46%20mobility46.se&amp;severity=critical&amp;id=69a0ebae32ffcdb8a293f331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25774-cwe-522-in-ev-energy-evenergy-ed954fdd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25774%3A%20CWE-522%20in%20EV%20Energy%20ev.energy&amp;severity=medium&amp;id=69a0ebae32ffcdb8a293f322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26290-cwe-613-in-ev-energy-evenergy-314e9523</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26290%3A%20CWE-613%20in%20EV%20Energy%20ev.energy&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24445-cwe-307-in-ev-energy-evenergy-00628f02</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24445%3A%20CWE-307%20in%20EV%20Energy%20ev.energy&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27772-cwe-306-in-ev-energy-evenergy-c0de6f7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27772%3A%20CWE-306%20in%20EV%20Energy%20ev.energy&amp;severity=critical&amp;id=69a0e11f32ffcdb8a28c26e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27773-cwe-522-in-switch-ev-swtchenergycom-bfd87103</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27773%3A%20CWE-522%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=medium&amp;id=69a0e11f32ffcdb8a28c26ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25778-cwe-613-insufficient-session-expira-d088f686</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25778%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3272-buffer-overflow-in-tenda-f453-6c03efcb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3272%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3271-buffer-overflow-in-tenda-f453-18d7b3b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3271%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-27-1b73d646</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-27&amp;severity=medium&amp;id=69a2326532ffcdb8a287db63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69437-na-b96d7eab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69437%3A%20n%2Fa&amp;severity=high&amp;id=69a1f6db32ffcdb8a26bc2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26862-na-a9be2f89</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26862%3A%20n%2Fa&amp;severity=high&amp;id=69a1de4132ffcdb8a26144cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26861-na-9b5ca2ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26861%3A%20n%2Fa&amp;severity=high&amp;id=69a1d3b432ffcdb8a252c3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-27-571218db</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-27&amp;severity=medium&amp;id=69a1c1e632ffcdb8a23f4ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-27-8182491f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-27&amp;severity=low&amp;id=69a131c132ffcdb8a2ee864c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25113-cwe-307-improper-restriction-of-exc-c7aaebdb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25113%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27767-cwe-306-missing-authentication-for--085d946c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27767%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=critical&amp;id=69a0e11f32ffcdb8a28c26e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22890-cwe-522-in-ev2go-ev2goio-f788729f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22890%3A%20CWE-522%20in%20EV2GO%20ev2go.io&amp;severity=medium&amp;id=69a0e11f32ffcdb8a28c2705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20895-cwe-613-in-ev2go-ev2goio-b11f74c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20895%3A%20CWE-613%20in%20EV2GO%20ev2go.io&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c2700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25945-cwe-307-improper-restriction-of-exc-27342830</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25945%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20EV2GO%20ev2go.io&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c270a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24731-cwe-306-in-ev2go-ev2goio-e42cb5b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24731%3A%20CWE-306%20in%20EV2GO%20ev2go.io&amp;severity=critical&amp;id=69a0dd9b32ffcdb8a288c769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1585-cwe-428-unquoted-search-path-or-elem-2e6b8a09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1585%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Canon%20Inc.%20IJ%20Scan%20Utility&amp;severity=high&amp;id=69a0dd9b32ffcdb8a288c75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20733-cwe-522-insufficiently-protected-cr-046de446</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20733%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20CloudCharge%20cloudcharge.se&amp;severity=medium&amp;id=69a0dd9b32ffcdb8a288c764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27652-cwe-613-in-cloudcharge-cloudcharges-a9fdd39d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27652%3A%20CWE-613%20in%20CloudCharge%20cloudcharge.se&amp;severity=high&amp;id=69a0dd9b32ffcdb8a288c76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40932-cwe-340-generation-of-predictable-n-34a891cb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40932%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20GRICHTER%20Apache%3A%3ASessionX&amp;severity=high&amp;id=69a0dd9b32ffcdb8a288c75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3270-server-side-request-forgery-in-psi-p-4de13069</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3270%3A%20Server-Side%20Request%20Forgery%20in%20psi-probe%20PSI%20Probe&amp;severity=medium&amp;id=69a0dd9b32ffcdb8a288c779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3269-denial-of-service-in-psi-probe-psi-p-a71eeb31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3269%3A%20Denial%20of%20Service%20in%20psi-probe%20PSI%20Probe&amp;severity=medium&amp;id=69a0dd9b32ffcdb8a288c773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2597-cwe-122-heap-based-buffer-overflow-i-3a4a94eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2597%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20LEONT%20Crypt%3A%3ASysRandom%3A%3AXS&amp;severity=high&amp;id=69a0da1732ffcdb8a272349d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25114-cwe-307-in-cloudcharge-cloudcharges-c78f10eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25114%3A%20CWE-307%20in%20CloudCharge%20cloudcharge.se&amp;severity=high&amp;id=69a0da1732ffcdb8a2723497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20781-cwe-306-missing-authentication-for--5f002d44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20781%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CloudCharge%20cloudcharge.se&amp;severity=critical&amp;id=69a0da1732ffcdb8a2723492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20791-cwe-522-insufficiently-protected-cr-a6313152</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20791%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Chargemap%20chargemap.com&amp;severity=medium&amp;id=69a0d69332ffcdb8a26c7035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25711-cwe-613-in-chargemap-chargemapcom-86410309</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25711%3A%20CWE-613%20in%20Chargemap%20chargemap.com&amp;severity=high&amp;id=69a0d69332ffcdb8a26c703f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20792-cwe-307-in-chargemap-chargemapcom-e8eb6a77</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20792%3A%20CWE-307%20in%20Chargemap%20chargemap.com&amp;severity=high&amp;id=69a0d69332ffcdb8a26c703a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25851-cwe-306-in-chargemap-chargemapcom-07488433</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25851%3A%20CWE-306%20in%20Chargemap%20chargemap.com&amp;severity=critical&amp;id=69a0d69332ffcdb8a26c7044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3268-improper-access-controls-in-psi-prob-37c8b51d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3268%3A%20Improper%20Access%20Controls%20in%20psi-probe%20PSI%20Probe&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28280-cwe-79-improper-neutralization-of-i-a42fca44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28280%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jmpsec%20osctrl&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28279-cwe-78-improper-neutralization-of-s-292cda7c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28279%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jmpsec%20osctrl&amp;severity=high&amp;id=69a0d31032ffcdb8a2667dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28276-cwe-200-exposure-of-sensitive-infor-80ecf535</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28276%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Morelitea%20initiative&amp;severity=high&amp;id=69a0d31032ffcdb8a2667dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28275-cwe-613-insufficient-session-expira-233ae79c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28275%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Morelitea%20initiative&amp;severity=high&amp;id=69a0d31032ffcdb8a2667df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28274-cwe-79-improper-neutralization-of-i-f245f683</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28274%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Morelitea%20initiative&amp;severity=high&amp;id=69a0d31032ffcdb8a2667df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28269-cwe-78-improper-neutralization-of-s-9e79a839</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28269%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28230-cwe-284-improper-access-control-in--646c9b77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28230%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20steve-community%20steve&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28225-cwe-639-authorization-bypass-throug-5e6738cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28225%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20manyfold3d%20manyfold&amp;severity=medium&amp;id=69a0cf8b32ffcdb8a25ff602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3265-improper-authorization-in-go2ismail--e27a9de6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3265%3A%20Improper%20Authorization%20in%20go2ismail%20Free-CRM&amp;severity=medium&amp;id=69a0cf8b32ffcdb8a25ff606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28213-cwe-200-exposure-of-sensitive-infor-f157ccc0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28213%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20evershopcommerce%20evershop&amp;severity=critical&amp;id=69a0cf8b32ffcdb8a25ff5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28211-cwe-943-improper-neutralization-of--f8f2771b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28211%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20CyrilleB79%20NVDA-Dev-Test-Toolbox&amp;severity=high&amp;id=69a0cf8b32ffcdb8a25ff60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28207-cwe-78-improper-neutralization-of-s-41bc76f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28207%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20z-libs%20Zen-C&amp;severity=medium&amp;id=69a0cf8b32ffcdb8a25ff60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27638-cwe-862-missing-authorization-in-ac-cb832dee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27638%3A%20CWE-862%3A%20Missing%20Authorization%20in%20actualbudget%20actual&amp;severity=medium&amp;id=69a0c89232ffcdb8a25244f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27839-cwe-639-authorization-bypass-throug-b27f012f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27839%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wger-project%20wger&amp;severity=medium&amp;id=69a0c89232ffcdb8a2524560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27838-cwe-639-authorization-bypass-throug-bca4d59d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27838%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wger-project%20wger&amp;severity=low&amp;id=69a0c89232ffcdb8a2524530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3264-execution-after-redirect-in-go2ismai-6072652e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3264%3A%20Execution%20After%20Redirect%20in%20go2ismail%20Free-CRM&amp;severity=medium&amp;id=69a0c89232ffcdb8a2524567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27835-cwe-639-authorization-bypass-throug-ba34a038</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27835%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wger-project%20wger&amp;severity=medium&amp;id=69a0c5b685912abc710cd5d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27457-cwe-862-missing-authorization-in-we-94c4aebe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27457%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69a0c5b685912abc710cd5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27449-cwe-284-improper-access-control-in--fadf6848</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27449%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20umbraco%20Umbraco.Engage.Forms&amp;severity=high&amp;id=69a0c5b685912abc710cd5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3263-improper-authorization-in-go2ismail--ff0dc732</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3263%3A%20Improper%20Authorization%20in%20go2ismail%20Asp.Net-Core-Inventory-Order-Management-System&amp;severity=medium&amp;id=69a0beae85912abc7105bcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3262-execution-after-redirect-in-go2ismai-85012419</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3262%3A%20Execution%20After%20Redirect%20in%20go2ismail%20Asp.Net-Core-Inventory-Order-Management-System&amp;severity=medium&amp;id=69a0cebb32ffcdb8a25eeab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3261-sql-injection-in-itsourcecode-school-f3a6a27d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3261%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=69a0cebb32ffcdb8a25eeaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22207-cwe-306-missing-authentication-for--eb53d5ff</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22207%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Volcengine%20OpenViking&amp;severity=critical&amp;id=69a0cebb32ffcdb8a25eeabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1565-cwe-434-unrestricted-upload-of-file--1dad0f30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1565%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wedevs%20User%20Frontend%3A%20AI%20Powered%20Frontend%20Posting%2C%20User%20Directory%2C%20Profile%2C%20Membership%20%26%20User%20Registration&amp;severity=high&amp;id=69a0a61285912abc71d87503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1241-cwe-288-authentication-bypass-using--e922bfa1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1241%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Pelco%2C%20Inc.%20Sarix%20Professional%20IMP%203%20Series&amp;severity=high&amp;id=69a0a61285912abc71d87500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27510-cwe-345-insufficient-verification-o-de32c7cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27510%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20UnitreeRobotics%20Unitree%20Go2&amp;severity=medium&amp;id=69a0a43885912abc71d61abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27509-cwe-306-missing-authentication-for--3f85db2e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27509%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20UnitreeRobotics%20Unitree%20Go2&amp;severity=high&amp;id=69a0a43885912abc71d61ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27141-cwe-476-null-pointer-dereference-in-ff058581</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27141%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhttp2&amp;severity=high&amp;id=69a0a43885912abc71d61ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22722-cwe-476-null-pointer-dereference-in-830c2dae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22722%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20VMware%20Workstation&amp;severity=medium&amp;id=69a0a1b885912abc71d0a0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22715-vulnerability-in-vmware-workstation-760959ba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22715%3A%20Vulnerability%20in%20VMware%20Workstation&amp;severity=medium&amp;id=69a0a1b885912abc71d0a0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-iphone-and-ipad-cleared-for-classified-nato--f1bb26b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20iPhone%20and%20iPad%20Cleared%20for%20Classified%20NATO%20Use&amp;severity=medium&amp;id=69a08c9eb7ef31ef0b9c5689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26938-cwe-1336-improper-neutralization-of-1437c993</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26938%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69a0a1ca85912abc71d0bb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26937-cwe-400-uncontrolled-resource-consu-7b66a2f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26937%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26227-cwe-307-improper-restriction-of-exc-57ef4910</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26227%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20VideoLAN%20VLC%20for%20Android&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23750-cwe-122-heap-based-buffer-overflow--7501864a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23750%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Golioth%20Pouch&amp;severity=high&amp;id=69a0a1ca85912abc71d0bb54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23749-cwe-170-improper-null-termination-i-19f097f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23749%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20Golioth%20Firmware%20SDK&amp;severity=low&amp;id=69a0a1ca85912abc71d0bb4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23748-cwe-191-integer-underflow-wrap-or-w-ee9ee329</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23748%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Golioth%20Firmware%20SDK&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23747-cwe-121-stack-based-buffer-overflow-cac35f20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23747%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Golioth%20Firmware%20SDK&amp;severity=medium&amp;id=69a0a1c885912abc71d0baa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-risks-boards-cannot-treat-as-background-noise-939afcf9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Risks%20Boards%20Cannot%20Treat%20as%20Background%20Noise&amp;severity=medium&amp;id=69a0861fb7ef31ef0b964ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26936-cwe-1333-inefficient-regular-expres-bf9eee54</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26936%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26935-cwe-20-improper-input-validation-in-2ab6f3da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26935%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26934-cwe-1284-improper-validation-of-spe-425cff70</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26934%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26932-cwe-129-improper-validation-of-arra-b827d994</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26932%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt37-adds-new-capabilities-for-air-gapped-network-5692440f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT37%20Adds%20New%20Capabilities%20for%20Air-Gapped%20Networks&amp;severity=medium&amp;id=69a0ace185912abc71e473ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28295-server-side-request-forgery-ssrf-in-187eca66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28295%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26228-cwe-22-improper-limitation-of-a-pat-e609e7ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26228%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20VideoLAN%20VLC%20for%20Android&amp;severity=low&amp;id=69a0a1ca85912abc71d0bb64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28296-improper-neutralization-of-crlf-seq-7df1d4b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28296%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69a06645b7ef31ef0b73ce1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2244-cwe-200-exposure-of-sensitive-inform-77100ce1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2244%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Google%20Cloud%20Vertex%20AI%20Workbench&amp;severity=high&amp;id=69a05b9eb7ef31ef0b68a5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-code-flaws-exposed-developer-devices-to-sil-c98dfc93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Code%20Flaws%20Exposed%20Developer%20Devices%20to%20Silent%20Hacking&amp;severity=medium&amp;id=69a04d56b7ef31ef0b544dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-signal-in-the-noise-lessons-learned-runnin-c4433059</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20Signal%20in%20the%20Noise%3A%20Lessons%20Learned%20Running%20a%20Honeypot%20with%20AI%20Assistance%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Tue%2C%20Feb%2024th)&amp;severity=medium&amp;id=699faf21b7ef31ef0b7fed42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-clair-model-a-synthesized-conceptual-framework-298e7e4e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20CLAIR%20Model%3A%20A%20Synthesized%20Conceptual%20Framework%20for%20Mapping%20Critical%20Infrastructure%20Interdependencies%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Feb%2025th)&amp;severity=critical&amp;id=699f6598b7ef31ef0b50ca3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zyxel-patches-critical-vulnerability-in-many-devic-523ddaa3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zyxel%20Patches%20Critical%20Vulnerability%20in%20Many%20Device%20Models&amp;severity=critical&amp;id=69a0383eb7ef31ef0b397aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14343-cwe-79-improper-neutralization-of-i-eef0abf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dokuzsoft%20Technology%20Ltd.%20E-Commerce%20Product&amp;severity=high&amp;id=69a03f7bb7ef31ef0b3f555c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1198-cwe-89-improper-neutralization-of-sp-3b46b959</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1198%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Simple%20SA%20Simple.ERP&amp;severity=high&amp;id=69a0316db7ef31ef0b2da192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disrupting-the-gridtide-global-cyber-espionage-cam-ef6113c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disrupting%20the%20GRIDTIDE%20Global%20Cyber%20Espionage%20Campaign&amp;severity=medium&amp;id=69a042c8b7ef31ef0b424ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-russian-exploit-broker-operation-zero-75531468</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Sanctions%20Russian%20Exploit%20Broker%20Operation%20Zero&amp;severity=medium&amp;id=69a02326b7ef31ef0b082dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64999-cwe-79-improper-neutralization-of-i-ecc6390b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64999%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69a02368b7ef31ef0b08990e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-patches-critical-apex-one-vulnerabilit-6afeacc3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20Patches%20Critical%20Apex%20One%20Vulnerabilities&amp;severity=critical&amp;id=69a01c1eb7ef31ef0bfb5f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-catalyst-sd-wan-zero-day-exploited-b-c55ec69f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Catalyst%20SD-WAN%20Zero-Day%20Exploited%20by%20Highly%20Sophisticated%20Hackers&amp;severity=high&amp;id=69a01191b7ef31ef0be29255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28138-deserialization-of-untrusted-data-i-23ed4314</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28138%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Stylemix%20uListing&amp;severity=high&amp;id=69a00ac0b7ef31ef0bdd3046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28136-improper-neutralization-of-special--ad5c4742</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28136%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VeronaLabs%20WP%20SMS&amp;severity=high&amp;id=69a00ac0b7ef31ef0bdd3043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28132-improper-neutralization-of-script-r-c4977c49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28132%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20villatheme%20WooCommerce%20Photo%20Reviews&amp;severity=medium&amp;id=69a00ac0b7ef31ef0bdd3040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28131-insertion-of-sensitive-information--c8914030</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28131%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPVibes%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=69a00ac0b7ef31ef0bdd303d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28083-improper-neutralization-of-input-du-dac8d5cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28083%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UX-themes%20Flatsome&amp;severity=medium&amp;id=69a00ac0b7ef31ef0bdd303a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1698-cwe-644-improper-neutralization-of-h-04573e8c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1698%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4069e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1697-cwe-614-sensitive-cookie-in-https-se-000f8650</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1697%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4069b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1696-cwe-79-improper-neutralization-of-in-5fb33f1b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20arcinfo%20PcVue&amp;severity=low&amp;id=69a00034b7ef31ef0bd40698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1695-cwe-79-improper-neutralization-of-in-7eca6c71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd40695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1694-cwe-201-insertion-of-sensitive-infor-0503a7bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1694%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20into%20Sent%20Data%20in%20arcinfo%20PcVue&amp;severity=low&amp;id=69a00034b7ef31ef0bd40692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1693-cwe-1390-weak-authentication-in-arci-7231b5ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1693%3A%20CWE-1390%20Weak%20Authentication%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4068f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1692-cwe-1385-missing-origin-validation-i-4c16ce65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1692%3A%20CWE-1385%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4068c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25191-uncontrolled-search-path-element-in-34c03d5f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25191%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Digital%20Arts%20Inc.%20FinalCode%20Ver.5%20series&amp;severity=high&amp;id=699fe090b7ef31ef0bbb51b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23703-incorrect-default-permissions-in-di-0baa4b8d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23703%3A%20Incorrect%20default%20permissions%20in%20Digital%20Arts%20Inc.%20FinalCode%20Ver.5%20series&amp;severity=high&amp;id=699fe090b7ef31ef0bbb51b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1311-cwe-22-improper-limitation-of-a-path-245cd234</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1311%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bearsthemes%20Worry%20Proof%20Backup&amp;severity=high&amp;id=699fd280b7ef31ef0bb488bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27465-cwe-201-insertion-of-sensitive-info-d63e9e3f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27465%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a05b9eb7ef31ef0b68a604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25963-cwe-863-incorrect-authorization-in--2d2f916a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25963%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a05b9eb7ef31ef0b68a601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23999-cwe-330-use-of-insufficiently-rando-2363c4fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23999%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a06645b7ef31ef0b73ce20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24004-cwe-862-missing-authorization-in-fl-988a60f2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24004%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a05b9eb7ef31ef0b68a5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1779-cwe-288-authentication-bypass-using--c715b4b7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1779%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=high&amp;id=69a05b9eb7ef31ef0b68a5fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2356-cwe-284-improper-access-control-in-w-3646e401</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2356%3A%20CWE-284%20Improper%20Access%20Control%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69a062b5b7ef31ef0b701612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27974-cwe-79-improper-neutralization-of-i-489e365f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27974%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf-app&amp;severity=medium&amp;id=69a062b5b7ef31ef0b70160e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27963-cwe-79-improper-neutralization-of-i-13a3dc2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27963%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf&amp;severity=medium&amp;id=69a062b5b7ef31ef0b70160a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27973-cwe-79-improper-neutralization-of-i-d42c2cca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27973%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf&amp;severity=medium&amp;id=699fabd8b7ef31ef0b7dea2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27966-cwe-94-improper-control-of-generati-8ac7c0b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27966%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=699fabd8b7ef31ef0b7dea23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27969-cwe-22-improper-limitation-of-a-pat-4b60f36b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27969%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitessio%20vitess&amp;severity=critical&amp;id=699fabd8b7ef31ef0b7dea27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27965-cwe-78-improper-neutralization-of-s-92b79488</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27965%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20vitessio%20vitess&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27959-cwe-20-improper-input-validation-in-ce484d7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27959%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20koajs%20koa&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27961-cwe-1336-improper-neutralization-of-89dbc720</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27961%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Agenta-AI%20agenta&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27952-cwe-94-improper-control-of-generati-de9bd46d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27952%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Agenta-AI%20agenta-api&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27948-cwe-79-improper-neutralization-of-i-af27e043</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27948%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=medium&amp;id=699fabd8b7ef31ef0b7dea0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2499-cwe-79-improper-neutralization-of-in-c0dc3012</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tgrk%20Custom%20Logo&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2029-cwe-79-improper-neutralization-of-in-066236f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2029%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20Beaver%20Builder&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2489-cwe-79-improper-neutralization-of-in-8979fb6c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2489%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20readymadeweb%20TP2WP%20Importer&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2498-cwe-79-improper-neutralization-of-in-c6873f44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bulktheme%20WP%20Social%20Meta&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1557-cwe-22-improper-limitation-of-a-path-8855fcee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1557%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20stuartbates%20WP%20Responsive%20Images&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2506-cwe-79-improper-neutralization-of-in-742fe189</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motahar1%20EM%20Cost%20Calculator&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27942-cwe-120-buffer-copy-without-checkin-fb63e4d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27942%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=low&amp;id=699fabd8b7ef31ef0b7dea09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27904-cwe-1333-inefficient-regular-expres-decea18d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27904%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20isaacs%20minimatch&amp;severity=high&amp;id=699fa148b7ef31ef0b7796b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27903-cwe-407-inefficient-algorithmic-com-f3f31176</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27903%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20isaacs%20minimatch&amp;severity=high&amp;id=699fa148b7ef31ef0b7796b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27902-cwe-79-improper-neutralization-of-i-31462c5d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27902%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=699fa148b7ef31ef0b7796ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27901-cwe-79-improper-neutralization-of-i-27a56aa6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27901%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=699fa148b7ef31ef0b7796a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27887-cwe-770-allocation-of-resources-wit-73cfbd0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27887%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20spinframework%20spin&amp;severity=medium&amp;id=699fa148b7ef31ef0b77969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27900-cwe-532-insertion-of-sensitive-info-4a37c898</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27900%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20linode%20terraform-provider-linode&amp;severity=medium&amp;id=699fa148b7ef31ef0b7796a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22728-cwe-284-in-bitnami-sealed-secrets-5b4a5a73</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22728%3A%20CWE-284%20in%20Bitnami%20sealed-secrets&amp;severity=medium&amp;id=699fa148b7ef31ef0b77969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27899-cwe-269-improper-privilege-manageme-f3381704</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27899%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20h44z%20wg-portal&amp;severity=high&amp;id=699fa148b7ef31ef0b7796a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27896-cwe-178-improper-handling-of-case-s-047c4414</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27896%3A%20CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20modelcontextprotocol%20go-sdk&amp;severity=high&amp;id=699f9a40b7ef31ef0b726109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27830-cwe-502-deserialization-of-untruste-8c764401</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27830%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20swaldman%20c3p0&amp;severity=high&amp;id=699f9a40b7ef31ef0b7260eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27888-cwe-400-uncontrolled-resource-consu-fcc40868</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27888%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=699f9a40b7ef31ef0b726103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27884-cwe-22-improper-limitation-of-a-pat-6a3213c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27884%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Pennyw0rth%20NetExec&amp;severity=medium&amp;id=699f9a40b7ef31ef0b7260fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27829-cwe-918-server-side-request-forgery-8b06cfbd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27829%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=medium&amp;id=699f9a40b7ef31ef0b7260e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27837-cwe-1321-improperly-controlled-modi-ec3116e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27837%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20mickhansen%20dottie.js&amp;severity=medium&amp;id=699f9a40b7ef31ef0b7260f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27831-cwe-125-out-of-bounds-read-in-blued-851df2f0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27831%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bluedragonsecurity%20rldns&amp;severity=high&amp;id=699f9a40b7ef31ef0b7260f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26186-cwe-89-improper-neutralization-of-s-d124966d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26186%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=699f8fb4b7ef31ef0b6dc8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27818-cwe-20-improper-input-validation-in-ff48f4c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27818%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20TerriaJS%20terriajs-server&amp;severity=high&amp;id=699f8fb4b7ef31ef0b6dc8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27812-cwe-116-improper-encoding-or-escapi-0ec87a03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27812%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Wei-Shaw%20sub2api&amp;severity=high&amp;id=699f8fb4b7ef31ef0b6dc8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-26-f35e5c14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-26&amp;severity=medium&amp;id=69a0e0e532ffcdb8a28b810e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50857-na-cde40b1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50857%3A%20n%2Fa&amp;severity=critical&amp;id=69a0a1cf85912abc71d0bf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56605-na-c59c1be3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56605%3A%20n%2Fa&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26682-na-caa850a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26682%3A%20n%2Fa&amp;severity=high&amp;id=69a0826ab7ef31ef0b92a673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71057-na-f9840d49</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71057%3A%20n%2Fa&amp;severity=high&amp;id=69a06645b7ef31ef0b73ce17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-26-57a0eba7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-26&amp;severity=medium&amp;id=69a01513b7ef31ef0be66b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-26-0c6bbf64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-26&amp;severity=low&amp;id=69a01513b7ef31ef0be66b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27808-cwe-918-server-side-request-forgery-0907ab33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27808%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=699f8fb4b7ef31ef0b6dc8d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27804-cwe-327-use-of-a-broken-or-risky-cr-9a87af7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27804%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=699f8fb4b7ef31ef0b6dc8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27735-cwe-22-improper-limitation-of-a-pat-cbe310bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27735%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=699f8fb4b7ef31ef0b6dc8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27711-cwe-125-out-of-bounds-read-in-m2tea-1a6755bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27711%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699f8c2fb7ef31ef0b6c21cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27710-cwe-191-integer-underflow-wrap-or-w-6d6f93e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27710%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699f8c2fb7ef31ef0b6c21c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27709-cwe-125-out-of-bounds-read-in-m2tea-36da9c67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27709%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699f8c2fb7ef31ef0b6c21c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27976-cwe-61-unix-symbolic-link-symlink-f-275886dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27976%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20zed-industries%20zed&amp;severity=high&amp;id=699f8c2fb7ef31ef0b6c21d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27967-cwe-59-improper-link-resolution-bef-66fdc1ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27967%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=699f8c2fb7ef31ef0b6c21ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27800-cwe-22-improper-limitation-of-a-pat-e91aae3a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27800%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=699f88afb7ef31ef0b6add23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27933-cwe-613-insufficient-session-expira-39a8e3c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27933%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20manyfold3d%20manyfold&amp;severity=medium&amp;id=699f8527b7ef31ef0b6936d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27635-cwe-78-improper-neutralization-of-s-ea449436</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27635%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20manyfold3d%20manyfold&amp;severity=high&amp;id=699f8527b7ef31ef0b6936d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27633-cwe-400-uncontrolled-resource-consu-d8ccb557</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27633%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20maximmasiutin%20TinyWeb&amp;severity=high&amp;id=699f8527b7ef31ef0b6936cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27630-cwe-400-uncontrolled-resource-consu-a65a120f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27630%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20maximmasiutin%20TinyWeb&amp;severity=high&amp;id=699f8527b7ef31ef0b6936c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3209-improper-access-controls-in-fosrl-pa-9b724eee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3209%3A%20Improper%20Access%20Controls%20in%20fosrl%20Pangolin&amp;severity=medium&amp;id=699f81a4b7ef31ef0b675cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27613-cwe-78-improper-neutralization-of-s-552b887a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27613%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=699f81a4b7ef31ef0b675cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27498-cwe-94-improper-control-of-generati-673d3ea0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27498%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7e1fb7ef31ef0b65d59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27578-cwe-80-improper-neutralization-of-s-45b6ec8e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27578%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=699f7e1fb7ef31ef0b65d5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27577-cwe-94-improper-control-of-generati-fe1b37b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27577%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7a9cb7ef31ef0b62e4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27497-cwe-94-improper-control-of-generati-7583bd72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27497%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7a9cb7ef31ef0b62e4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27495-cwe-94-improper-control-of-generati-32b06175</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27495%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7718b7ef31ef0b6119ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27494-cwe-497-exposure-of-sensitive-syste-451de5e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27494%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20n8n-io%20n8n&amp;severity=high&amp;id=699f7718b7ef31ef0b6119e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27493-cwe-94-improper-control-of-generati-920a070d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27493%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7718b7ef31ef0b6119dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27148-cwe-74-improper-neutralization-of-s-5a9d6dc6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27148%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20storybookjs%20storybook&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27819-cwe-22-improper-limitation-of-a-pat-a38aca2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27819%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27616-cwe-79-improper-neutralization-of-i-6e63a630</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27616%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27575-cwe-521-weak-password-requirements--02691e1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27575%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20go-vikunja%20vikunja&amp;severity=critical&amp;id=699f7012b7ef31ef0b5b7bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27116-cwe-79-improper-neutralization-of-i-8c728693</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27116%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=699f7012b7ef31ef0b5b7bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26985-cwe-22-improper-limitation-of-a-pat-134e54a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26985%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2694-cwe-285-improper-authorization-in-st-aacdc266</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2694%3A%20CWE-285%20Improper%20Authorization%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=699f7012b7ef31ef0b5b7bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26984-cwe-22-improper-limitation-of-a-pat-189f270a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26984%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=699f6d86b7ef31ef0b587d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3172-integer-underflow-or-wraparound-in-p-4fc97e5b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3172%3A%20Integer%20Underflow%20or%20Wraparound%20in%20pgvector&amp;severity=high&amp;id=699f6b0db7ef31ef0b54d928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0542-cwe-653-improper-isolation-or-compar-5d8d7dac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0542%3A%20CWE-653%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20ServiceNow%20ServiceNow%20AI%20Platform&amp;severity=critical&amp;id=699f6203b7ef31ef0b506075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3200-sql-injection-in-z-9527-admin-11a7aee8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3200%3A%20SQL%20Injection%20in%20z-9527%20admin&amp;severity=medium&amp;id=699f5b59b7ef31ef0b4d0f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-agent-tesla-a-deep-dive-into-a-multi-sta-ba77bd32</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20Agent%20Tesla%3A%20A%20Deep%20Dive%20into%20a%20Multi-Stage%20Campaign&amp;severity=medium&amp;id=699f5e46b7ef31ef0b4e8a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22721-cwe-269-improper-privilege-manageme-49e5e7d1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22721%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=medium&amp;id=699f5b59b7ef31ef0b4d0f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22720-cwe-79-improper-neutralization-of-i-fdb8baf3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=high&amp;id=699f6b0db7ef31ef0b54d932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22719-vulnerability-in-vmware-aria-operat-d1a0f7ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22719%3A%20Vulnerability%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=high&amp;id=699f6b2db7ef31ef0b54f05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2636-cwe-159-improper-handling-of-invalid-c9000dfa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2636%3A%20CWE-159%20%20Improper%20Handling%20of%20Invalid%20Use%20of%20Special%20Elements%20in%20Microsoft%20Windows%20OS&amp;severity=medium&amp;id=699f6b2db7ef31ef0b54f063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3221-cwe-312-cleartext-storage-of-sensiti-b543f909</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3221%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Devolutions%20Server&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27795-cwe-918-server-side-request-forgery-f4816062</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27795%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchainjs&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3194-missing-authentication-in-chia-block-e4dfa1da</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3194%3A%20Missing%20Authentication%20in%20Chia%20Blockchain&amp;severity=low&amp;id=699f6c30b7ef31ef0b560f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21902-cwe-732-incorrect-permission-assign-a3c54a93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21902%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=critical&amp;id=699f6b6fb7ef31ef0b5556ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27850-cwe-940-improper-verification-of-so-51bb8bbe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27850%3A%20cwe-940%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Linksys%20MR9600&amp;severity=high&amp;id=699f6b6fb7ef31ef0b5556b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27794-cwe-502-deserialization-of-untruste-3cd0df7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27794%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langgraph-checkpoint&amp;severity=medium&amp;id=699f6d86b7ef31ef0b587d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27739-cwe-918-server-side-request-forgery-9cfbc4e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27739%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20angular%20angular-cli&amp;severity=critical&amp;id=699f6e6fb7ef31ef0b5a094a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27738-cwe-601-url-redirection-to-untruste-c2409b1d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27738%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20angular%20angular-cli&amp;severity=medium&amp;id=699f6e70b7ef31ef0b5a0a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3193-cross-site-request-forgery-in-chia-b-660586ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3193%3A%20Cross-Site%20Request%20Forgery%20in%20Chia%20Blockchain&amp;severity=low&amp;id=699f6e70b7ef31ef0b5a0a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20033-buffer-access-with-incorrect-length-01834230</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20033%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20NX-OS%20System%20Software%20in%20ACI%20Mode&amp;severity=high&amp;id=699f6b6eb7ef31ef0b555634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20048-uncontrolled-memory-allocation-in-c-9630ca06</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20048%3A%20Uncontrolled%20Memory%20Allocation%20in%20Cisco%20Cisco%20NX-OS%20System%20Software%20in%20ACI%20Mode&amp;severity=high&amp;id=699f6b6eb7ef31ef0b55563a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20099-improper-neutralization-of-special--2103b41c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20099%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Extensible%20Operating%20System%20(FXOS)&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b55569b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20091-improper-neutralization-of-input-du-03ee8a0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20091%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Firepower%20Extensible%20Operating%20System%20(FXOS)&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b555698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20037-execution-with-unnecessary-privileg-92e47074</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20037%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=699f6b6eb7ef31ef0b555637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27849-cwe-78-improper-neutralization-of-s-ae598b62</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27849%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Linksys%20MR9600&amp;severity=critical&amp;id=699f6e70b7ef31ef0b5a0a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20010-buffer-access-with-incorrect-length-e06a1787</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20010%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=high&amp;id=699f6b6eb7ef31ef0b555631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-blast-radius-problem-stolen-credentials-are-we-1d748531</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Blast%20Radius%20Problem%3A%20Stolen%20Credentials%20are%20Weaponizing%20Agentic%20AI&amp;severity=medium&amp;id=699f2282b7ef31ef0b357ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20036-improper-neutralization-of-special--5fab8f84</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20036%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=699f6d14b7ef31ef0b56db7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20107-insufficient-granularity-of-access--f4ddc726</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20107%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Cisco%20Cisco%20Application%20Policy%20Infrastructure%20Controller%20(APIC)&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b55569e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20051-use-of-uninitialized-variable-in-ci-5f25aa8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20051%3A%20Use%20of%20Uninitialized%20Variable%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=high&amp;id=699f6b6eb7ef31ef0b55563d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20122-incorrect-use-of-privileged-apis-in-90ab3c7c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20122%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=699f6d14b7ef31ef0b56db81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20127-improper-authentication-in-cisco-ci-2ddcf584</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20127%3A%20Improper%20Authentication%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=critical&amp;id=699f6dd9b7ef31ef0b58f88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20128-storing-passwords-in-a-recoverable--b14fe640</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20128%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=high&amp;id=699f6b6fb7ef31ef0b5556a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20129-improper-authentication-in-cisco-ci-ca713753</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20129%3A%20Improper%20Authentication%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=critical&amp;id=699f6b6fb7ef31ef0b5556a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20126-incorrect-use-of-privileged-apis-in-0b35fe35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20126%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=high&amp;id=699f6b6fb7ef31ef0b5556a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20133-exposure-of-sensitive-information-t-5512c3fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20133%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b5556aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3192-improper-authentication-in-chia-bloc-1561c236</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3192%3A%20Improper%20Authentication%20in%20Chia%20Blockchain&amp;severity=medium&amp;id=699f5e7eb7ef31ef0b4e9b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3189-server-side-request-forgery-in-feiyu-14bb2646</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3189%3A%20Server-Side%20Request%20Forgery%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=low&amp;id=699f5e7eb7ef31ef0b4e9b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disrupts-chinese-cyberespionage-campaign-ta-1b7a1764</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Disrupts%20Chinese%20Cyberespionage%20Campaign%20Targeting%20Telecoms%2C%20Governments&amp;severity=medium&amp;id=699f1efeb7ef31ef0b33341e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27727-cwe-74-improper-neutralization-of-s-8287b1ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27727%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20swaldman%20mchange-commons-java&amp;severity=high&amp;id=699f5e7eb7ef31ef0b4e9b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27706-cwe-918-server-side-request-forgery-f42319c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27706%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20makeplane%20plane&amp;severity=high&amp;id=699f5b59b7ef31ef0b4d0f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27705-cwe-639-authorization-bypass-throug-ded9079b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27705%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20makeplane%20plane&amp;severity=medium&amp;id=699f5b59b7ef31ef0b4d0f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22866-cwe-347-improper-verification-of-cr-1cf14df0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22866%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ensdomains%20ens-contracts&amp;severity=low&amp;id=699f6203b7ef31ef0b506078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27730-cwe-918-server-side-request-forgery-b582d8e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27730%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=699f6203b7ef31ef0b50607d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50180-cwe-918-server-side-request-forgery-1e770482</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50180%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=699f6e70b7ef31ef0b5a0a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3188-path-traversal-in-feiyuchuixue-sz-bo-801a6dfd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3188%3A%20Path%20Traversal%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699f6e70b7ef31ef0b5a0a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-patches-four-critical-serv-u-vulnerabil-ecdae751</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Patches%20Four%20Critical%20Serv-U%20Vulnerabilities&amp;severity=critical&amp;id=699f17f7b7ef31ef0b2ea26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1242-cwe-798-use-of-hard-coded-credential-3c49accf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1242%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Gardyn%20Home%20Kit&amp;severity=critical&amp;id=699f183fb7ef31ef0b2eb1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27704-cwe-22-improper-limitation-of-a-pat-7ee8fa72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27704%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dart-lang%20sdk&amp;severity=medium&amp;id=699f183fb7ef31ef0b2eb1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27848-cwe-78-improper-neutralization-of-s-d78302ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27848%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Linksys%20MR9600&amp;severity=critical&amp;id=699f183fb7ef31ef0b2eb1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/variations-of-the-clickfix-kaspersky-official-blog-8cce2ef7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Variations%20of%20the%20ClickFix%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=699f14e0b7ef31ef0b2d24ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3206-cwe-404-improper-resource-shutdown-o-0fa6e2e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3206%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20KrakenD%20KrakenD-CE&amp;severity=low&amp;id=699f183fb7ef31ef0b2eb1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27847-cwe-89-improper-neutralization-of-s-a7b0346f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27847%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Linksys%20MR9600&amp;severity=critical&amp;id=699f183fb7ef31ef0b2eb1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27701-cwe-94-improper-control-of-generati-c2099fec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27701%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20live-codes%20livecodes&amp;severity=high&amp;id=699f183fb7ef31ef0b2eb1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27846-cwe-306-missing-authentication-for--6692e99e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27846%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Linksys%20MR9600&amp;severity=medium&amp;id=699f183fb7ef31ef0b2eb1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27700-cwe-345-insufficient-verification-o-a50ef423</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27700%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20honojs%20hono&amp;severity=high&amp;id=699f183fb7ef31ef0b2eb1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27699-cwe-22-improper-limitation-of-a-pat-a776ea60</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27699%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickjuchli%20basic-ftp&amp;severity=critical&amp;id=699f1123b7ef31ef0b2a7c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27695-cwe-770-allocation-of-resources-wit-bff82a68</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27695%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20zeroae%20zae-limiter&amp;severity=medium&amp;id=699f1123b7ef31ef0b2a7c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2878-cwe-331-insufficient-entropy-in-prog-d8a9f60b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2878%3A%20CWE-331%20Insufficient%20Entropy%20in%20Progress%20Software%20Telerik%20UI%20for%20ASP.NET%20AJAX&amp;severity=medium&amp;id=699f1123b7ef31ef0b2a7c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27692-cwe-125-out-of-bounds-read-in-inter-7b596b3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27692%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=699f1123b7ef31ef0b2a7c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27691-cwe-190-integer-overflow-or-wraparo-efb0b7d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27691%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3203-cwe-126-buffer-over-read-in-wireshar-77866e88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3203%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3202-cwe-476-null-pointer-dereference-in--91e773e9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3202%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3201-cwe-1325-improperly-controlled-seque-eee636bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3201%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3187-unrestricted-upload-in-feiyuchuixue--6e14b61f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3187%3A%20Unrestricted%20Upload%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/caught-in-the-hook-rce-and-api-token-exfiltration--467253d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Caught%20in%20the%20Hook%3A%20RCE%20and%20API%20Token%20Exfiltration%20Through%20Claude%20Code%20Project%20Files%20%7C%20CVE-2025-59536%20%7C%20CVE-2026-21852&amp;severity=critical&amp;id=699f0345b7ef31ef0b20b850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medical-device-maker-ufp-technologies-hit-by-cyber-b573b4f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medical%20Device%20Maker%20UFP%20Technologies%20Hit%20by%20Cyberattack&amp;severity=medium&amp;id=699eff5ab7ef31ef0b1d212e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3186-use-of-default-password-in-feiyuchui-c666b76c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3186%3A%20Use%20of%20Default%20Password%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699effa2b7ef31ef0b1d5ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3185-authorization-bypass-in-feiyuchuixue-2638462c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3185%3A%20Authorization%20Bypass%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699effa2b7ef31ef0b1d5e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-us-defense-contractor-executive-jailed-for-sell-1eace578</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-US%20Defense%20Contractor%20Executive%20Jailed%20for%20Selling%20Exploits%20to%20Russia&amp;severity=medium&amp;id=699ef4ceb7ef31ef0b09b97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28196-cwe-459-in-jetbrains-teamcity-d58b6a40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28196%3A%20CWE-459%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=699ef887b7ef31ef0b0c395d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28195-cwe-862-in-jetbrains-teamcity-83b0a743</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28195%3A%20CWE-862%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=699ef887b7ef31ef0b0c395a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28194-cwe-601-in-jetbrains-teamcity-eefbaf9e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28194%3A%20CWE-601%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=699ef887b7ef31ef0b0c3957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28193-cwe-862-in-jetbrains-youtrack-02c83ca9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28193%3A%20CWE-862%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=699ef887b7ef31ef0b0c3954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2624-cwe-306-missing-authentication-for-c-f523ffcf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2624%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ePati%20Cyber%20%E2%80%8B%E2%80%8BSecurity%20Technologies%20Inc.%20Antikor%20Next%20Generation%20Firewall%20(NGFW)&amp;severity=critical&amp;id=699ef17fb7ef31ef0b08499b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-12-million-users-impacted-by-cargurus-data-br-be873cf0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2012%20Million%20Users%20Impacted%20by%20CarGurus%20Data%20Breach&amp;severity=medium&amp;id=699eedc5b7ef31ef0b06ebdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0704-file-modificationdeletion-path-trave-a67d541f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0704%3A%20File%20Modification%2FDeletion%20Path%20Traversal%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=medium&amp;id=699eee0bb7ef31ef0b07114d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-latest-plugx-variant-executed-by-staticplugin-5267edd3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Latest%20PlugX%20Variant%20Executed%20by%20STATICPLUGIN&amp;severity=medium&amp;id=699ee338b7ef31ef0b0201e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wynn-resorts-confirms-data-breach-after-hackers-re-66a2b7ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wynn%20Resorts%20Confirms%20Data%20Breach%20After%20Hackers%20Remove%20It%20From%20Leak%20Site&amp;severity=high&amp;id=699edfb6b7ef31ef0b00cd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mercenary-akula-hits-ukraine-supporting-financial-3cdfd2cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mercenary%20Akula%20Hits%20Ukraine-Supporting%20Financial...&amp;severity=medium&amp;id=699ee338b7ef31ef0b0201d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3118-improper-neutralization-of-special-e-de20a68b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3118%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Developer%20Hub%201.8&amp;severity=medium&amp;id=699edffab7ef31ef0b00d523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25701-cwe-377-insecure-temporary-file-in--ca7227b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25701%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20openSUSE%20sdbootutil&amp;severity=high&amp;id=699edc67b7ef31ef0bffee91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26104-missing-authorization-in-red-hat-re-e49792af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26104%3A%20Missing%20Authorization%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=699ed8e3b7ef31ef0bfe5906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62878-cwe-23-relative-path-traversal-in-s-e8aa8cda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62878%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20SUSE%20Rancher&amp;severity=critical&amp;id=699ed8e3b7ef31ef0bfe58fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67601-cwe-295-improper-certificate-valida-cd78fd99</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67601%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20SUSE%20rancher&amp;severity=high&amp;id=699ed8e3b7ef31ef0bfe5902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67860-cwe-522-insufficiently-protected-cr-b1edb39d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67860%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SUSE%20harvester&amp;severity=low&amp;id=699ed1dfb7ef31ef0bfbbf25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26103-missing-authorization-in-red-hat-re-f6e8c238</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26103%3A%20Missing%20Authorization%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=699ed1dfb7ef31ef0bfbbf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reddit-hit-with-20-million-uk-data-privacy-fine-ov-a3954f96</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reddit%20Hit%20With%20%2420%20Million%20UK%20Data%20Privacy%20Fine%20Over%20Child%20Safety%20Failings&amp;severity=medium&amp;id=699eca9db7ef31ef0bf8a751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claudes-new-ai-vulnerability-scanner-sends-cyberse-3472c897</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%E2%80%99s%20New%20AI%20Vulnerability%20Scanner%20Sends%20Cybersecurity%20Shares%20Plunging&amp;severity=medium&amp;id=699ec71ab7ef31ef0bf720a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2367-cwe-79-improper-neutralization-of-in-8070a879</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2301-cwe-862-missing-authorization-in-met-411cd241</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2301%3A%20CWE-862%20Missing%20Authorization%20in%20metaphorcreations%20Post%20Duplicator&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2410-cwe-352-cross-site-request-forgery-c-d12db616</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themeisle%20Disable%20Admin%20Notices%20%E2%80%93%20Hide%20Dashboard%20Notifications&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14742-cwe-639-authorization-bypass-throug-cb27f6e8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14742%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3171-cross-site-scripting-in-sourcecodest-da1bd858</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3171%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=699eb93fb7ef31ef0bf05d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1929-cwe-94-improper-control-of-generatio-d104e328</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1929%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mihail-barinov%20Advanced%20Woo%20Labels%20%E2%80%93%20Product%20Labels%20%26%20Badges%20for%20WooCommerce&amp;severity=high&amp;id=699eb5bab7ef31ef0bee1261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2416-cwe-89-improper-neutralization-of-sp-2ddd610e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2416%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=high&amp;id=699eb5bab7ef31ef0bee1268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1916-cwe-862-missing-authorization-in-jav-8b4073b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1916%3A%20CWE-862%20Missing%20Authorization%20in%20javmah%20WPGSI%3A%20Spreadsheet%20Integration&amp;severity=high&amp;id=699eb5bab7ef31ef0bee1257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2479-cwe-918-server-side-request-forgery--d3147280</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2479%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dfactory%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=699eb5bab7ef31ef0bee126e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ad-tech-company-optimizely-targeted-in-cyberattack-701553b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ad%20Tech%20Company%20Optimizely%20Targeted%20in%20Cyberattack&amp;severity=medium&amp;id=699eb201b7ef31ef0beb30e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3170-cross-site-scripting-in-sourcecodest-7369a4ba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3170%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=699eaeb3b7ef31ef0be98664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3169-buffer-overflow-in-tenda-f453-69816231</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3169%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699eab2eb7ef31ef0be89303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3168-buffer-overflow-in-tenda-f453-508dab5e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3168%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699ea0a3b7ef31ef0be4a302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3167-buffer-overflow-in-tenda-f453-afffcc0b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3167%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699ea0a3b7ef31ef0be4a2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1614-cwe-79-improper-neutralization-of-in-97325495</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eaglethemes%20Rise%20Blocks%20%E2%80%93%20A%20Complete%20Gutenberg%20Page%20Builder&amp;severity=medium&amp;id=699ea0a3b7ef31ef0be4a2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3166-buffer-overflow-in-tenda-f453-624b36c0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3166%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699e999bb7ef31ef0be2319c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3165-buffer-overflow-in-tenda-f453-c9971778</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3165%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699f6d86b7ef31ef0b587d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3164-sql-injection-in-itsourcecode-news-p-dfd28c6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3164%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=699f6d86b7ef31ef0b587d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25785-improper-limitation-of-a-pathname-t-f44e9ddb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25785%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20MOTEX%20Inc.%20Lanscope%20Endpoint%20Manager%20(On-Premises)%20Sub-Manager%20Server&amp;severity=critical&amp;id=699f6d86b7ef31ef0b587d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3179-cwe-22-improper-limitation-of-a-path-180a5bd6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3179%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ASUSTOR%20ADM&amp;severity=critical&amp;id=699e999bb7ef31ef0be231a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3100-cwe-295-improper-certificate-validat-103fbf82</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3100%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=699e999bb7ef31ef0be231a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3163-server-side-request-forgery-in-sourc-a598193f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3163%3A%20Server-Side%20Request%20Forgery%20in%20SourceCodester%20Website%20Link%20Extractor&amp;severity=medium&amp;id=699e8f0fb7ef31ef0bdc6155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3153-sql-injection-in-itsourcecode-docume-715dc6d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3153%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699e8f0fb7ef31ef0bdc614e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3152-sql-injection-in-itsourcecode-colleg-aad2116a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3152%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e8808b7ef31ef0bd9ce55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3151-sql-injection-in-itsourcecode-colleg-2aed5ab2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3151%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e8808b7ef31ef0bd9ce4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3150-sql-injection-in-itsourcecode-colleg-d243c4d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3150%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6daa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0976-cwe-532-insertion-of-sensitive-infor-fc9d9bab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0976%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hitachi%20Hitachi%20Ops%20Center%20API%20Configuration%20Manager&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27696-cwe-918-server-side-request-forgery-86f48884</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27696%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=699e80ffb7ef31ef0bd6da90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27645-cwe-79-improper-neutralization-of-i-cd313692</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27645%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3149-sql-injection-in-itsourcecode-colleg-99c7b07a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3149%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3148-sql-injection-in-sourcecodester-simp-ec2a2164</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3148%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20and%20Nice%20Shopping%20Cart%20Script&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27597-cwe-94-improper-control-of-generati-c298fcde</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27597%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20agentfront%20enclave&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27641-cwe-1336-improper-neutralization-of-693604e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27641%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20jugmac00%20flask-reuploaded&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27640-cwe-212-improper-removal-of-sensiti-42d4b470</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27640%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20oocx%20tfplan2md&amp;severity=high&amp;id=699e7673b7ef31ef0bd379bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27627-cwe-79-improper-neutralization-of-i-373ae35f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27627%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karakeep-app%20karakeep&amp;severity=high&amp;id=699e7673b7ef31ef0bd379a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27639-cwe-79-improper-neutralization-of-i-5d8db224</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27639%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dbarzin%20mercator&amp;severity=high&amp;id=699e7673b7ef31ef0bd379b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27636-cwe-434-unrestricted-upload-of-file-b2fdd401</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27636%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=699e7673b7ef31ef0bd379ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27637-cwe-330-use-of-insufficiently-rando-8f97b2e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27637%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3147-heap-based-buffer-overflow-in-libvip-1354e241</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3147%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=699e7674b7ef31ef0bd379e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27743-cwe-89-improper-neutralization-of-s-0723b396</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SPIP%20referer_spam&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27744-cwe-94-improper-control-of-generati-6654b571</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27744%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SPIP%20tickets&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27745-cwe-94-improper-control-of-generati-57f4fcf8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27745%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SPIP%20interface_traduction_objets&amp;severity=high&amp;id=699e7673b7ef31ef0bd379cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27746-cwe-79-improper-neutralization-of-i-90ae5a56</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SPIP%20jeux&amp;severity=medium&amp;id=699e7674b7ef31ef0bd379de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27747-cwe-89-improper-neutralization-of-s-2659fae3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27747%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SPIP%20interface_traduction_objets&amp;severity=high&amp;id=699e7674b7ef31ef0bd379e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3146-null-pointer-dereference-in-libvips-513efbb0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3146%3A%20NULL%20Pointer%20Dereference%20in%20libvips&amp;severity=medium&amp;id=699e6866b7ef31ef0bae9df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5781-cwe-532-insertion-of-sensitive-infor-aae3b878</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5781%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hitachi%20Hitachi%20Ops%20Center%20API%20Configuration%20Manager&amp;severity=medium&amp;id=699e6864b7ef31ef0bae9cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27628-cwe-835-loop-with-unreachable-exit--62eb22d7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27628%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=low&amp;id=699e6864b7ef31ef0bae9d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27612-cwe-79-improper-neutralization-of-i-96b43164</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27612%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20denpiligrim%20repostat&amp;severity=medium&amp;id=699e6864b7ef31ef0bae9d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27621-cwe-79-improper-neutralization-of-i-b8844ad0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27621%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TypiCMS%20Core&amp;severity=medium&amp;id=699e6864b7ef31ef0bae9d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27615-cwe-40-path-traversal-uncsharename--b9cde004</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27615%3A%20CWE-40%3A%20Path%20Traversal%3A%20&apos;UNCsharename&apos;%20(Windows%20UNC%20Share)%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27611-cwe-200-exposure-of-sensitive-infor-a3c67993</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27611%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gtsteffaniak%20filebrowser&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27595-cwe-306-missing-authentication-for--2da76779</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27595%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20parse-community%20parse-dashboard&amp;severity=critical&amp;id=699e6864b7ef31ef0bae9d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27610-cwe-1289-improper-validation-of-uns-48254a1b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27610%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20parse-community%20parse-dashboard&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27609-cwe-352-cross-site-request-forgery--dfc8a5e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27609%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20parse-community%20parse-dashboard&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27608-cwe-862-missing-authorization-in-pa-52557f8e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27608%3A%20CWE-862%3A%20Missing%20Authorization%20in%20parse-community%20parse-dashboard&amp;severity=critical&amp;id=699e6864b7ef31ef0bae9d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3145-memory-corruption-in-libvips-2bae8caa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3145%3A%20Memory%20Corruption%20in%20libvips&amp;severity=medium&amp;id=699e6866b7ef31ef0bae9de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2914-insecure-permissions-in-cyberark-sof-877fa41a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2914%3A%20Insecure%20Permissions%20in%20CyberArk%20Software%2C%20a%20Palo%20Alto%20Networks%20Company%20Endpoint%20Privilege%20Manager%20Agent&amp;severity=high&amp;id=699e5a58b7ef31ef0b9afd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3137-stack-based-buffer-overflow-in-codea-4a89e8a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3137%3A%20Stack-based%20Buffer%20Overflow%20in%20CodeAstro%20Food%20Ordering%20System&amp;severity=medium&amp;id=699e48bfb7ef31ef0b85c3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27598-cwe-22-improper-limitation-of-a-pat-337a2a17</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27598%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dagu-org%20dagu&amp;severity=high&amp;id=699e48bfb7ef31ef0b85c3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3135-sql-injection-in-itsourcecode-news-p-0a7c6d73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3135%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=699e48bfb7ef31ef0b85c3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-25-e6cbb2ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-25&amp;severity=medium&amp;id=699f8f7ab7ef31ef0b6d58b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69771-na-113581c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69771%3A%20n%2Fa&amp;severity=critical&amp;id=699f6e70b7ef31ef0b5a0a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26717-na-808c7875</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26717%3A%20n%2Fa&amp;severity=medium&amp;id=699f6e70b7ef31ef0b5a0a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-25-9eec935b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-25&amp;severity=medium&amp;id=699ef84fb7ef31ef0b0b64a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-25-b8278a68</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-25&amp;severity=low&amp;id=699e682bb7ef31ef0bae3509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3134-sql-injection-in-itsourcecode-news-p-8a5e3d8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3134%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=699e3aafb7ef31ef0b769651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3133-sql-injection-in-itsourcecode-docume-93ea08f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3133%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699e3aafb7ef31ef0b76964a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27117-cwe-22-improper-limitation-of-a-pat-c5a5b2bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27117%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rikyoz%20bit7z&amp;severity=medium&amp;id=699e1e91b7ef31ef0b4dd8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27593-cwe-640-weak-password-recovery-mech-d0c0ac0e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27593%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20statamic%20cms&amp;severity=critical&amp;id=699e1e91b7ef31ef0b4dd8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27572-cwe-770-allocation-of-resources-wit-1e2e3060</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27572%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=699e1b0db7ef31ef0b464b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/developer-targeting-campaign-using-malicious-nextj-0d448287</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Developer-targeting%20campaign%20using%20malicious%20Next.js%20repositories&amp;severity=medium&amp;id=699e1e59b7ef31ef0b4da0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27204-cwe-400-uncontrolled-resource-consu-e113940a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27204%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=699e1b0db7ef31ef0b464b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27195-cwe-755-improper-handling-of-except-2af78dcd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27195%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=699e178ab7ef31ef0b4219f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25899-cwe-789-memory-allocation-with-exce-25b0b15f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25899%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20gofiber%20fiber&amp;severity=high&amp;id=699e178ab7ef31ef0b4219f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25891-cwe-22-improper-limitation-of-a-pat-54f51692</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25891%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gofiber%20fiber&amp;severity=high&amp;id=699e178ab7ef31ef0b4219ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25882-cwe-129-improper-validation-of-arra-fc87a38b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25882%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20gofiber%20fiber&amp;severity=medium&amp;id=699e140db7ef31ef0b397342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22553-cwe-78-in-insat-masterscada-buk-ts-da2080e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22553%3A%20CWE-78%20in%20InSAT%20MasterSCADA%20BUK-TS&amp;severity=critical&amp;id=699e140db7ef31ef0b39733e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21410-cwe-89-in-insat-masterscada-buk-ts-10cd43d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21410%3A%20CWE-89%20in%20InSAT%20MasterSCADA%20BUK-TS&amp;severity=critical&amp;id=699e140db7ef31ef0b39733a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-zoom-meeting-update-silently-installs-surveil-2fbb42c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Zoom%20meeting%20&apos;update&apos;%20silently%20installs%20surveillance%20software&amp;severity=medium&amp;id=699e0e19be58cf853b27f354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46320-a-cross-site-scripting-xss-vulnerab-84cf6eee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46320%3A%20A%20cross-site%20scripting%20(XSS)%20vulnerability%20in%20a%20FileMaker%20WebDirect%20custom%20homepage%20could%20lead%20to%20unauthorized%20access%20and%20remote%20code%20execution.%20in%20Claris%20FileMaker%20Server&amp;severity=medium&amp;id=699e0e51be58cf853b283374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24443-cwe-620-unverified-password-change--b7991ec8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24443%3A%20CWE-620%20Unverified%20Password%20Change%20in%20NETIKUS.NET%20ltd%20EventSentry&amp;severity=high&amp;id=699e0acebe58cf853b264b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23859-cwe-602-client-side-enforcement-of--f49cfd91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23859%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=low&amp;id=699e0f3bbe58cf853b2906c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23858-cwe-79-improper-neutralization-of-i-0c121421</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23858%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22766-cwe-434-unrestricted-upload-of-file-cb813835</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22766%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=high&amp;id=699e0f3bbe58cf853b2906c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22765-cwe-862-missing-authorization-in-de-bdb3a520</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22765%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=high&amp;id=699e0f3bbe58cf853b2906c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3131-cwe-200-exposure-of-sensitive-inform-b9371043</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3131%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=medium&amp;id=699df940be58cf853b1d7ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1768-cwe-863-incorrect-authorization-in-d-757628e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1768%3A%20CWE-863%20Incorrect%20Authorization%20in%20Devolutions%20Devolutions%20Server&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1789-incorrect-default-permissions-in-gen-4aea821b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1789%3A%20Incorrect%20Default%20Permissions%20in%20Genetec%20Inc.%20Genetec%20Update%20Service&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1787-cwe-346-origin-validation-error-in-g-a3f949ce</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1787%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Genetec%20Inc.%20Genetec%20Update%20Service&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24241-cwe-287-improper-authentication-in--f6ee97c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24241%3A%20CWE-287%20Improper%20Authentication%20in%20NVIDIA%20DLS%20component%20of%20NVIDIA%20License%20System&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33181-cwe-77-improper-neutralization-of-s-a9d11bfd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33181%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20Cumulus%20Linux%20GA&amp;severity=high&amp;id=699df93ebe58cf853b1d7e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33180-cwe-77-improper-neutralization-of-s-84bb56a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33180%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20Cumulus%20Linux%20GA&amp;severity=high&amp;id=699df93ebe58cf853b1d7e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33179-cwe-266-incorrect-privilege-assignm-36a7a0f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33179%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20NVIDIA%20Cumulus%20Linux%20GA&amp;severity=high&amp;id=699df93ebe58cf853b1d7e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26342-cwe-613-insufficient-session-expira-5e45b75e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26342%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Tattile%20s.r.l.%20Smart%2B&amp;severity=high&amp;id=699df93ebe58cf853b1d7e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26341-cwe-1392-use-of-default-credentials-b1797eea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26341%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Tattile%20s.r.l.%20Smart%2B&amp;severity=critical&amp;id=699df93ebe58cf853b1d7e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26340-cwe-306-missing-authentication-for--b67ea307</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26340%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Tattile%20s.r.l.%20Smart%2B&amp;severity=high&amp;id=699df93ebe58cf853b1d7e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-redirects-a-forgotten-vulnerabilityx3f-tue-fe-264b2774</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20Redirects%3A%20A%20Forgotten%20Vulnerability%26%23x3f%3B%2C%20(Tue%2C%20Feb%2024th)&amp;severity=medium&amp;id=699de770be58cf853b0d95d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26222-cwe-502-deserialization-of-untruste-e414adc9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26222%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Beyond%20Limits%20Inc.%20Altec%20DocLink&amp;severity=critical&amp;id=699e0f3bbe58cf853b2906cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25603-cwe-22-improper-limitation-of-a-pat-a874863b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25603%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Linksys%20MR9600&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14963-cwe-20-improper-input-validation-in-f0e2d925</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14963%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Trellix%20Endpoint%20HX%20Agent%20(xAgent)&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27156-cwe-79-improper-neutralization-of-i-4af1ee20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27156%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/moonrise-rat-a-new-low-detection-threat-with-high--f024cb0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Moonrise%20RAT%3A%20A%20New%20Low-Detection%20Threat%20with%20High-Cost%20Consequences&amp;severity=medium&amp;id=699e0e19be58cf853b27f359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27590-cwe-20-improper-input-validation-in-7b21592c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27590%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3cbe58cf853b290cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27589-cwe-352-cross-site-request-forgery--489061df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27589%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20caddyserver%20caddy&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27588-cwe-178-improper-handling-of-case-s-9da8a007</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27588%3A%20CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3bbe58cf853b2906de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27587-cwe-178-improper-handling-of-case-s-d8aff9af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27587%3A%20CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3bbe58cf853b2906da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27586-cwe-755-improper-handling-of-except-26e6760a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27586%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3cbe58cf853b290cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27585-cwe-20-improper-input-validation-in-aa8fd750</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27585%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20caddyserver%20caddy&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27571-cwe-409-improper-handling-of-highly-87bdeb7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27571%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=699e0f3cbe58cf853b290ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13776-cwe-798-use-of-hard-coded-credentia-9501fe87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13776%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20TIK-SOFT%20Finka-FK&amp;severity=high&amp;id=699e0f3cbe58cf853b290ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47904-cwe-494-download-of-code-without-in-e960b4d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47904%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Microchip%20Time%20Provider%204100&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arkanix-stealer-malware-disappears-shortly-after-d-1a307deb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Arkanix%20Stealer%E2%80%99%20Malware%20Disappears%20Shortly%20After%20Debut&amp;severity=medium&amp;id=699dc448be58cf853bf0ea31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27521-cwe-307-improper-restriction-of-exc-c078447a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27521%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=medium&amp;id=699e0f3fbe58cf853b290d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27520-cwe-312-cleartext-storage-of-sensit-09493c83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27520%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3fbe58cf853b290d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27519-cwe-321-use-of-hard-coded-cryptogra-94d78496</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27519%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3ebe58cf853b290d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27518-cwe-352-cross-site-request-forgery--ddf83b1f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27518%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=medium&amp;id=699e0f3ebe58cf853b290d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27517-cwe-79-improper-neutralization-of-i-baeb6519</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27517%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=medium&amp;id=699e0f3ebe58cf853b290d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27516-cwe-201-insertion-of-sensitive-info-c7219ab3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27516%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3ebe58cf853b290d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27515-cwe-330-use-of-insufficiently-rando-99761ece</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27515%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=critical&amp;id=699e0f3ebe58cf853b290d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27507-cwe-798-use-of-hard-coded-credentia-55a024a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27507%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=critical&amp;id=699e0f3ebe58cf853b290d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23678-cwe-78-improper-neutralization-of-s-d736646c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23678%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3ebe58cf853b290d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27584-cwe-306-missing-authentication-for--1cea9ea4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27584%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20actualbudget%20actual&amp;severity=critical&amp;id=699e0f3fbe58cf853b290da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0402-cwe-125-out-of-bounds-read-in-sonicw-650941e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0402%3A%20CWE-125%20Out-of-bounds%20Read%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3ebe58cf853b290d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27732-cwe-918-server-side-request-forgery-664ae78b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27732%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=699e0f3fbe58cf853b290da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0401-cwe-476-null-pointer-dereference-in--37b8ba10</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0401%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3cbe58cf853b290d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0400-cwe-134-use-of-externally-controlled-8c81d50f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0400%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27568-cwe-79-improper-neutralization-of-i-3872684f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27568%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=699e0f3fbe58cf853b290d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0399-cwe-121-stack-based-buffer-overflow--a0c7be97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0399%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3102-os-command-injection-in-exiftool-3a183022</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3102%3A%20OS%20Command%20Injection%20in%20exiftool&amp;severity=medium&amp;id=699db9f0be58cf853be5ecac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3101-os-command-injection-in-intelbras-ti-e14b0379</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3101%3A%20OS%20Command%20Injection%20in%20Intelbras%20TIP%20635G&amp;severity=medium&amp;id=699db9f0be58cf853be5eca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmware-aria-operations-vulnerability-could-allow-r-1fe31f0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMware%20Aria%20Operations%20Vulnerability%20Could%20Allow%20Remote%20Code%20Execution&amp;severity=critical&amp;id=699db638be58cf853be39fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27567-cwe-918-server-side-request-forgery-6aff0dba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27567%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20payloadcms%20payload&amp;severity=medium&amp;id=699db9f0be58cf853be5eca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10010-cwe-353-missing-support-for-integri-1ee3965a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10010%3A%20CWE-353%20Missing%20Support%20for%20Integrity%20Check%20in%20CPSD%20IT%20SERVICES%20GMBH%20CryptoPro%20Secure%20Disk%20for%20BitLocker&amp;severity=medium&amp;id=699e0f3fbe58cf853b290da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27208-cwe-78-improper-neutralization-of-s-983562b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20bleon-ethical%20api-gateway-deploy&amp;severity=critical&amp;id=699e0f3fbe58cf853b290dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sandwormmode-supply-chain-attack-hits-npm-0a6fbb0e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98Sandworm_Mode%E2%80%99%20Supply%20Chain%20Attack%20Hits%20NPM&amp;severity=medium&amp;id=699dabadbe58cf853bd9ca32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2807-vulnerability-in-mozilla-firefox-7b7fdcd9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2807%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf72be58cf853bdde2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2806-vulnerability-in-mozilla-firefox-4330b422</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2806%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf72be58cf853bdde2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2805-vulnerability-in-mozilla-firefox-ad33e68e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2805%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf72be58cf853bdde2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2804-vulnerability-in-mozilla-firefox-12858c36</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2804%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf72be58cf853bdde2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2803-vulnerability-in-mozilla-firefox-34cfc56c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2803%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf72be58cf853bdde2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2802-vulnerability-in-mozilla-firefox-c2727259</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2802%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf71be58cf853bdde278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2801-vulnerability-in-mozilla-firefox-c6bc2714</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2801%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2800-vulnerability-in-mozilla-firefox-f1e052df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2800%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf71be58cf853bdde270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2799-vulnerability-in-mozilla-firefox-e1242b75</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2799%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2798-vulnerability-in-mozilla-firefox-fc6b6733</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2798%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2797-vulnerability-in-mozilla-firefox-21b1b9fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2797%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2796-vulnerability-in-mozilla-firefox-e6fcc340</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2796%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf71be58cf853bdde260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2795-vulnerability-in-mozilla-firefox-2510859e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2795%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2794-vulnerability-in-mozilla-firefox-dec444fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2794%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf71be58cf853bdde258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2634-vulnerability-in-mozilla-firefox-for-558bf208</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2634%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2793-vulnerability-in-mozilla-firefox-9218e885</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2793%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf71be58cf853bdde252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2792-vulnerability-in-mozilla-firefox-88665c56</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2792%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2791-vulnerability-in-mozilla-firefox-129224c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2791%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2790-vulnerability-in-mozilla-firefox-a2cce219</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2790%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2789-vulnerability-in-mozilla-firefox-cd6165cf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2789%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2788-vulnerability-in-mozilla-firefox-51148c31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2788%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde21e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2787-vulnerability-in-mozilla-firefox-99349e0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2787%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2786-vulnerability-in-mozilla-firefox-fb95e8e0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2786%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2785-vulnerability-in-mozilla-firefox-6fc98356</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2785%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2784-vulnerability-in-mozilla-firefox-b8ed28c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2784%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2783-vulnerability-in-mozilla-firefox-9e492a9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2783%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf70be58cf853bdde204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2782-vulnerability-in-mozilla-firefox-961efa1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2782%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2781-vulnerability-in-mozilla-firefox-e3d3b895</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2781%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2780-vulnerability-in-mozilla-firefox-67fb735b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2780%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2779-vulnerability-in-mozilla-firefox-637601e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2779%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2778-vulnerability-in-mozilla-firefox-a2efee7a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2778%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2777-vulnerability-in-mozilla-firefox-23a61c9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2777%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2776-vulnerability-in-mozilla-firefox-aecaf008</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2776%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2775-vulnerability-in-mozilla-firefox-705fae87</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2775%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2774-vulnerability-in-mozilla-firefox-7a87e224</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2774%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2773-vulnerability-in-mozilla-firefox-168ce6bf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2773%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2772-vulnerability-in-mozilla-firefox-2427429c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2772%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2771-vulnerability-in-mozilla-firefox-b1c396b5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2771%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2770-vulnerability-in-mozilla-firefox-cdc3b286</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2770%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2769-vulnerability-in-mozilla-firefox-d07a057c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2769%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2768-vulnerability-in-mozilla-firefox-22e282bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2768%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2767-vulnerability-in-mozilla-firefox-8ddcd7e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2767%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2766-vulnerability-in-mozilla-firefox-cf3992e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2766%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2765-vulnerability-in-mozilla-firefox-21f8ff58</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2765%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2764-vulnerability-in-mozilla-firefox-f42df24a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2764%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2763-vulnerability-in-mozilla-firefox-f8a7d148</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2763%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2762-vulnerability-in-mozilla-firefox-9f81a8d1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2762%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2761-vulnerability-in-mozilla-firefox-31b382de</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2761%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2760-vulnerability-in-mozilla-firefox-ed19354d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2760%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2759-vulnerability-in-mozilla-firefox-44d5c550</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2759%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2758-vulnerability-in-mozilla-firefox-254a6777</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2758%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2757-vulnerability-in-mozilla-firefox-5913ed24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2757%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2460-cwe-267-privilege-defined-with-unsaf-5f6cf7ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2460%3A%20CWE-267%20Privilege%20Defined%20with%20Unsafe%20Actions%20in%20Hitachi%20Energy%20Relion%20REB500&amp;severity=high&amp;id=699daf6bbe58cf853bdddd65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2459-cwe-267-privilege-defined-with-unsaf-7562341c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2459%3A%20CWE-267%20Privilege%20Defined%20with%20Unsafe%20Actions%20in%20Hitachi%20Energy%20Relion%20REB500&amp;severity=high&amp;id=699daf6bbe58cf853bdddd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14577-cwe-306-missing-authentication-for--6857041d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14577%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Slican%20NCP&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1773-cwe-20-improper-input-validation-in--220535b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1773%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Hitachi%20Energy%20RTU500%20series%20CMU%20firmware&amp;severity=high&amp;id=699da85ebe58cf853bd63632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1772-cwe-287-improper-authentication-in-h-849f1103</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1772%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Hitachi%20Energy%20RTU500%20series%20CMU%20firmware&amp;severity=medium&amp;id=699da85ebe58cf853bd6362f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23969-cwe-89-improper-neutralization-of-s-52e98444</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23969%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=699da85ebe58cf853bd63635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23980-cwe-89-improper-neutralization-of-s-641d36bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23980%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=699da85ebe58cf853bd63638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23982-cwe-863-incorrect-authorization-in--16335c07</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23982%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=high&amp;id=699da85ebe58cf853bd6363b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23983-cwe-200-exposure-of-sensitive-infor-28a635f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23983%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=low&amp;id=699da85ebe58cf853bd6363e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23984-cwe-863-incorrect-authorization-in--27e36bda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23984%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=high&amp;id=699da85ebe58cf853bd63641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-lazarus-group-now-working-with-medusa-e96d15e3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Lazarus%20Group%20Now%20Working%20With%20Medusa%20Ransomware&amp;severity=medium&amp;id=699e0e19be58cf853b27f362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-issues-abused-in-copilot-attack-leading-to--1f686409</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Issues%20Abused%20in%20Copilot%20Attack%20Leading%20to%20Repository%20Takeover&amp;severity=medium&amp;id=699d9a19be58cf853bcbde28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/taiwan-security-firm-confirms-flaw-flagged-by-cisa-09d184a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Taiwan%20Security%20Firm%20Confirms%20Flaw%20Flagged%20by%20CISA%20Likely%20Exploited%20by%20Chinese%20APTs&amp;severity=medium&amp;id=699d9310be58cf853bc6f17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27555-cwe-201-insertion-of-sensitive-info-4a1ea050</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27555%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=699d7ab4be58cf853bad4712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2664-cwe-125-out-of-bounds-read-in-docker-0cedbcfc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2664%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Docker%20Docker%20Desktop&amp;severity=medium&amp;id=699d7ab4be58cf853bad4716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56373-cwe-94-improper-control-of-generati-6e419591</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56373%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=699d7ab4be58cf853bad470e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anonymous-fnix-members-arrested-in-spain-e869e34a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anonymous%20F%C3%A9nix%20Members%20Arrested%20in%20Spain&amp;severity=medium&amp;id=699d7a75be58cf853bace567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1524-cwe-290-authentication-bypass-by-spo-45d10e8f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1524%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=high&amp;id=699d6c99be58cf853b9c9dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-malicious-nuget-packages-target-aspnet-develo-3558d828</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Malicious%20NuGet%20Packages%20Target%20ASP.NET%20Developers%20With%20JIT%20Hooking%20and%20Credential%20Exfiltration&amp;severity=medium&amp;id=699d68e0be58cf853b9798dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1229-cwe-682-incorrect-calculation-in-clo-52f8a557</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1229%3A%20CWE-682%20Incorrect%20Calculation%20in%20Cloudflare%20CIRCL&amp;severity=low&amp;id=699e0f3fbe58cf853b290d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40541-cwe-704-incorrect-type-conversion-o-153e8f0e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40541%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699e0f3fbe58cf853b290d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40540-cwe-704-incorrect-type-conversion-o-393839b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40540%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699d5781be58cf853b851ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40539-cwe-704-incorrect-type-conversion-o-7631618c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40539%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699d5781be58cf853b851ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40538-cwe-269-improper-privilege-manageme-e66e0c99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40538%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699d5781be58cf853b851cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15386-cwe-79-cross-site-scripting-xss-in--43bb529b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15386%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=high&amp;id=699d4271be58cf853b689cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15589-path-traversal-in-muyucms-df4dace0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15589%3A%20Path%20Traversal%20in%20MuYuCMS&amp;severity=medium&amp;id=699d4271be58cf853b689cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24314-cwe-497-exposure-of-sensitive-syste-37035500</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24314%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SAP_SE%20S%2F4HANA%20(Manage%20Payment%20Media)&amp;severity=medium&amp;id=699d3b61be58cf853b5fc3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3070-cross-site-scripting-in-sourcecodest-3e0ce52e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3070%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Modern%20Image%20Gallery%20App&amp;severity=medium&amp;id=699d347abe58cf853b589ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3069-sql-injection-in-itsourcecode-docume-630afbd9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3069%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699d29efbe58cf853b4f36be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3068-sql-injection-in-itsourcecode-docume-9b86d381</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3068%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699d1f63be58cf853b2dec7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3067-path-traversal-in-hummerrisk-3ded3089</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3067%3A%20Path%20Traversal%20in%20HummerRisk&amp;severity=medium&amp;id=699d1f63be58cf853b2dec75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3066-command-injection-in-hummerrisk-8f2007d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3066%3A%20Command%20Injection%20in%20HummerRisk&amp;severity=medium&amp;id=699d1f63be58cf853b2dec6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1459-cwe-78-improper-neutralization-of-sp-f412c512</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1459%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=high&amp;id=699d14d6be58cf853b182c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27129-cwe-918-server-side-request-forgery-bfb112ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27129%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=699d14d8be58cf853b182c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27128-cwe-367-time-of-check-time-of-use-t-c9b0d5dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27128%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20craftcms%20cms&amp;severity=medium&amp;id=699d14d6be58cf853b182c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27127-cwe-367-time-of-check-time-of-use-t-5842a733</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27127%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20craftcms%20cms&amp;severity=high&amp;id=699d14d6be58cf853b182c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13943-cwe-78-improper-neutralization-of-s-420a90c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13943%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20EX3301-T0%20firmware&amp;severity=high&amp;id=699d14d6be58cf853b182c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13942-cwe-78-improper-neutralization-of-s-dbc807d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13942%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20EX3510-B0%20firmware&amp;severity=critical&amp;id=699d14d6be58cf853b182c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3065-command-injection-in-hummerrisk-ca310b2d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3065%3A%20Command%20Injection%20in%20HummerRisk&amp;severity=medium&amp;id=699d14d8be58cf853b182c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3064-command-injection-in-hummerrisk-b16e562e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3064%3A%20Command%20Injection%20in%20HummerRisk&amp;severity=medium&amp;id=699d14d8be58cf853b182c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3091-uncontrolled-search-path-element-in--0806b6af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3091%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Synology%20Synology%20Presto%20Client&amp;severity=medium&amp;id=699d14d8be58cf853b182c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27126-cwe-79-improper-neutralization-of-i-eb6f17da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27126%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=699d14d6be58cf853b182c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26981-cwe-195-signed-to-unsigned-conversi-204c3c44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26981%3A%20CWE-195%3A%20Signed%20to%20Unsigned%20Conversion%20Error%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=699d14d6be58cf853b182c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11848-cwe-476-null-pointer-dereference-in-105c946a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11848%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d14d6be58cf853b182c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11847-cwe-476-null-pointer-dereference-in-ff3f069c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11847%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d14d6be58cf853b182c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26198-cwe-89-improper-neutralization-of-s-7460e41f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26198%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20collerek%20ormar&amp;severity=critical&amp;id=699d14d6be58cf853b182c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3057-sql-injection-in-a54552239-pearproje-adecca21</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3057%3A%20SQL%20Injection%20in%20a54552239%20pearProjectApi&amp;severity=medium&amp;id=699d14d8be58cf853b182c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3054-cross-site-scripting-in-alinto-sogo-403be324</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3054%3A%20Cross%20Site%20Scripting%20in%20Alinto%20SOGo&amp;severity=medium&amp;id=699d14d8be58cf853b182c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11846-cwe-476-null-pointer-dereference-in-3381f5d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11846%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d06cabe58cf853b07ca60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3053-missing-authentication-in-datalinkdc-e60a8a1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3053%3A%20Missing%20Authentication%20in%20DataLinkDC%20dinky&amp;severity=medium&amp;id=699d06cabe58cf853b07ca6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3052-server-side-request-forgery-in-datal-340d6c23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3052%3A%20Server-Side%20Request%20Forgery%20in%20DataLinkDC%20dinky&amp;severity=medium&amp;id=699d06cabe58cf853b07ca63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11845-cwe-476-null-pointer-dereference-in-bbab33dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11845%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d06cabe58cf853b07ca5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3051-path-traversal-in-datalinkdc-dinky-173f35b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3051%3A%20Path%20Traversal%20in%20DataLinkDC%20dinky&amp;severity=medium&amp;id=699cfc3cbe58cf853bfd2f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3050-cross-site-scripting-in-horilla-open-fd660903</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3050%3A%20Cross%20Site%20Scripting%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=699cfc3cbe58cf853bfd2f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27729-cwe-770-allocation-of-resources-wit-e5a15975</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27729%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20withastro%20astro&amp;severity=medium&amp;id=699cfc3cbe58cf853bfd2f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25802-cwe-79-improper-neutralization-of-i-48d25c61</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25802%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=699cfc3cbe58cf853bfd2f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25591-cwe-943-improper-neutralization-of--2ce4358a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25591%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=699cfc3cbe58cf853bfd2f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25545-cwe-918-server-side-request-forgery-da1603da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25545%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=medium&amp;id=699cf533be58cf853bf604dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3049-open-redirect-in-horilla-opensource--27a936b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3049%3A%20Open%20Redirect%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=699cf534be58cf853bf60511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3046-sql-injection-in-itsourcecode-e-logb-a4efe6dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3046%3A%20SQL%20Injection%20in%20itsourcecode%20E-Logbook%20with%20Health%20Monitoring%20System%20for%20COVID-19&amp;severity=medium&amp;id=699cf533be58cf853bf604f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21864-cwe-20-improper-input-validation-in-7c8ea75e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21864%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20valkey-io%20valkey-bloom&amp;severity=medium&amp;id=699cf533be58cf853bf604d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27643-cwe-209-generation-of-error-message-2622d2b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27643%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20free5gc%20udr&amp;severity=medium&amp;id=699cf533be58cf853bf604ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27642-cwe-20-improper-input-validation-in-be522119</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27642%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20free5gc%20udm&amp;severity=medium&amp;id=699cf533be58cf853bf604e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26025-cwe-476-null-pointer-dereference-in-3b4027a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26025%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20smf&amp;severity=medium&amp;id=699cf533be58cf853bf604e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26024-cwe-476-null-pointer-dereference-in-e26d8b24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26024%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20smf&amp;severity=medium&amp;id=699cf533be58cf853bf604e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25501-cwe-476-null-pointer-dereference-in-1f72e97a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25501%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20smf&amp;severity=medium&amp;id=699cf533be58cf853bf604d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9120-cwe-94-improper-control-of-generatio-9ed3eff4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9120%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenText%E2%84%A2%20Carbonite%20Safe%20Server%20Backup&amp;severity=high&amp;id=699cf533be58cf853bf604d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69253-cwe-209-generation-of-error-message-d29135ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69253%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20free5gc%20udr&amp;severity=medium&amp;id=699cf533be58cf853bf604cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-24-e8f8d164</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-24&amp;severity=medium&amp;id=699e3dfab7ef31ef0b77ae66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67445-na-faa393bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67445%3A%20n%2Fa&amp;severity=medium&amp;id=699e0f3fbe58cf853b290d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69985-na-4f2ec836</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69985%3A%20n%2Fa&amp;severity=critical&amp;id=699e0f3ebe58cf853b290d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63409-na-7f1dcd5e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63409%3A%20n%2Fa&amp;severity=high&amp;id=699e0f3ebe58cf853b290d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-24-3a80d607</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-24&amp;severity=medium&amp;id=699dd95dbe58cf853b0239a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-24-21d76c33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-24&amp;severity=low&amp;id=699d4cbebe58cf853b76a245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69252-cwe-476-null-pointer-dereference-in-80fd7d12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69252%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20udm&amp;severity=medium&amp;id=699cee30be58cf853bef4e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58041-cwe-338-use-of-cryptographically-we-a78c8e9e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58041%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20WONKO%20Smolder&amp;severity=critical&amp;id=699cee30be58cf853bef4e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69251-cwe-20-improper-input-validation-in-196cf2df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69251%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20free5gc%20udm&amp;severity=medium&amp;id=699cee30be58cf853bef4e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69250-cwe-754-improper-check-for-unusual--3c39503e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69250%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20free5gc%20udm&amp;severity=medium&amp;id=699ceab4be58cf853bdfbf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3044-stack-based-buffer-overflow-in-tenda-c3428cc0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3044%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=699ce723be58cf853bdd38db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3043-cross-site-scripting-in-itsourcecode-9b765d7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3043%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699ce39fbe58cf853bdb3eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3042-sql-injection-in-itsourcecode-event--cdf5b04f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3042%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699ce39fbe58cf853bdb3eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-openclaw-skills-used-to-distribute-atomi-1ab81aed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20OpenClaw%20Skills%20Used%20to%20Distribute%20Atomic%20MacOS%20Stealer&amp;severity=medium&amp;id=699d68e0be58cf853b9798e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21665-vulnerability-in-fiserv-originate-l-7a298a26</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21665%3A%20Vulnerability%20in%20Fiserv%20Originate%20Loans%20Peripherals%20(formerly%20Velocity%20Services)%20--%20Print%20Service%20component&amp;severity=high&amp;id=699cd8f4be58cf853bd429b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3063-inappropriate-implementation-in-goog-4f7bfd85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3063%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=699cd56ebe58cf853bd2d6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3062-out-of-bounds-read-and-write-in-goog-9826ac8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3062%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=699cd56ebe58cf853bd2d69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3061-out-of-bounds-read-in-google-chrome-0054353c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3061%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=699cd56ebe58cf853bd2d698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3041-cross-site-scripting-in-xingfuggz-ba-5f6e055c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3041%3A%20Cross%20Site%20Scripting%20in%20xingfuggz%20BaykeShop&amp;severity=medium&amp;id=699cd1ebbe58cf853bd0c5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3040-os-command-injection-in-draytek-vigo-57c5d6ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3040%3A%20OS%20Command%20Injection%20in%20DrayTek%20Vigor%20300B&amp;severity=medium&amp;id=699cd1ebbe58cf853bd0c5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69248-cwe-129-improper-validation-of-arra-5330a8bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69248%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20free5gc%20amf&amp;severity=medium&amp;id=699ccae3be58cf853bccd9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69247-cwe-122-heap-based-buffer-overflow--08fe6e18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69247%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20free5gc%20go-upf&amp;severity=low&amp;id=699ccae3be58cf853bccd9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3028-cross-site-scripting-in-erzhongxmu-j-8e46de0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3028%3A%20Cross%20Site%20Scripting%20in%20erzhongxmu%20JEEWMS&amp;severity=medium&amp;id=699ccae3be58cf853bccda00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69232-cwe-20-improper-input-validation-in-8b0905ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69232%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20free5gc%20go-upf&amp;severity=low&amp;id=699ccae3be58cf853bccd9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69208-cwe-209-generation-of-error-message-4967da13</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69208%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20free5gc%20udr&amp;severity=low&amp;id=699cc75ebe58cf853bcb5ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3027-cross-site-scripting-in-erzhongxmu-j-0bf04477</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3027%3A%20Cross%20Site%20Scripting%20in%20erzhongxmu%20JEEWMS&amp;severity=medium&amp;id=699cc3dbbe58cf853bc8ee23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3075-exposure-of-sensitive-system-informa-6b46d1ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3075%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Jeff%20Starr%20Simple%20Ajax%20Chat&amp;severity=medium&amp;id=699cc3dbbe58cf853bc8ee29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23693-cwe-306-missing-authentication-for--873ad830</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23693%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=critical&amp;id=699cee30be58cf853bef4e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23694-cwe-352-cross-site-request-forgery--43b258cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23694%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aruba.it%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=699cee30be58cf853bef4e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3026-server-side-request-forgery-in-erzho-9622fd01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3026%3A%20Server-Side%20Request%20Forgery%20in%20erzhongxmu%20JEEWMS&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3025-unrestricted-upload-in-shuoren-smart-03a84ad2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3025%3A%20Unrestricted%20Upload%20in%20ShuoRen%20Smart%20Heating%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b3b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27623-cwe-20-improper-input-validation-in-08357453</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27623%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20valkey-io%20valkey&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21863-cwe-125-out-of-bounds-read-in-valke-7a33c1e6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21863%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20valkey-io%20valkey&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67733-cwe-74-improper-neutralization-of-s-dcc8bdf1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67733%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20valkey-io%20valkey&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2698-cwe-639-authorization-bypass-through-2795e5b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2698%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tenable%20Security%20Center&amp;severity=medium&amp;id=699c852abe58cf853ba9853b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27514-cwe-201-insertion-of-sensitive-info-a2b48227</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27514%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=high&amp;id=699c852abe58cf853ba98537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27513-cwe-352-cross-site-request-forgery--75243c1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27513%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=medium&amp;id=699c852abe58cf853ba98533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27512-cwe-79-improper-neutralization-of-i-a19304cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=medium&amp;id=699c852abe58cf853ba9852f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27511-cwe-1021-improper-restriction-of-re-64ef0ade</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27511%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=medium&amp;id=699c852abe58cf853ba9852b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22567-cwe-20-improper-input-validation-in-63d0c936</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22567%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zscaler%20ZIA%20Admin%20UI&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22568-cwe-20-improper-input-validation-in-14777d68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22568%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zscaler%20ZIA%20Admin%20UI&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14905-heap-based-buffer-overflow-in-red-h-35910148</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14905%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Directory%20Server%2011.5%20E4S%20for%20RHEL%208&amp;severity=high&amp;id=699c7b9bbe58cf853ba52827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-healthcare-diagnostic-firm-says-140000-affected-8cf2ff6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Healthcare%20Diagnostic%20Firm%20Says%20140%2C000%20Affected%20by%20Data%20Breach&amp;severity=medium&amp;id=699c7451be58cf853ba092b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2025-the-untold-stories-of-check-point-research-ca2e7873</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2025%3A%20The%20Untold%20Stories%20of%20Check%20Point%20Research&amp;severity=high&amp;id=699c74cbbe58cf853ba0e606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2697-cwe-639-authorization-bypass-through-2cdeceab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2697%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tenable%20Security%20Center&amp;severity=medium&amp;id=699cbd8ebe58cf853bc4b505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3016-buffer-overflow-in-utt-hiper-810g-d2bb40c6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3016%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699c7b9bbe58cf853ba52830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-huorong-security-site-infects-users-with-vall-431a5b9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Huorong%20security%20site%20infects%20users%20with%20ValleyRAT&amp;severity=medium&amp;id=699cdc61be58cf853bd5eac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3015-buffer-overflow-in-utt-hiper-810g-03f10e33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3015%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-day-another-malicious-jpeg-mon-feb-23rd-e56dc9d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20day%2C%20another%20malicious%20JPEG%2C%20(Mon%2C%20Feb%2023rd)&amp;severity=medium&amp;id=699c5811be58cf853b908718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21420-cwe-427-uncontrolled-search-path-el-d39a8b17</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21420%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20Repository%20Manager&amp;severity=high&amp;id=699c625dbe58cf853b95454c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-gets-5-years-in-us-prison-for-aiding-nor-3773a458</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Gets%205%20Years%20in%20US%20Prison%20for%20Aiding%20North%20Korean%20IT%20Fraud&amp;severity=low&amp;id=699c5babbe58cf853b9201f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autonomous-ai-agents-provide-new-class-of-supply-c-5fa92ec8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Autonomous%20AI%20Agents%20Provide%20New%20Class%20of%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=699c48adbe58cf853b83ceca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romanian-hacker-pleads-guilty-to-selling-access-to-a925b71f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Romanian%20Hacker%20Pleads%20Guilty%20to%20Selling%20Access%20to%20US%20State%20Network&amp;severity=medium&amp;id=699c41d8be58cf853b80437c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-fortigate-firewalls-hacked-in-ai-power-9152681d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20FortiGate%20Firewalls%20Hacked%20in%20AI-Powered%20Attacks%3A%20AWS&amp;severity=medium&amp;id=699c3f2ebe58cf853b7ecfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59873-vulnerability-in-hcl-software-zie-f-4e64c827</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59873%3A%20Vulnerability%20in%20HCL%20Software%20ZIE%20for%20Web&amp;severity=medium&amp;id=699c33c0be58cf853b7818c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-roundcube-webmail-vulnerability-exploited-i-f1f3083a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20RoundCube%20Webmail%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=medium&amp;id=699c3380be58cf853b77f148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2985-server-side-request-forgery-in-tiand-d99c179a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2985%3A%20Server-Side%20Request%20Forgery%20in%20Tiandy%20Video%20Surveillance%20System%20%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=699c3035be58cf853b75f0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mississippi-hospital-system-closes-all-clinics-aft-12980cb9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mississippi%20Hospital%20System%20Closes%20All%20Clinics%20After%20Ransomware%20Attack&amp;severity=medium&amp;id=699c2c78be58cf853b742b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40701-cwe-79-improper-neutralization-of-i-a0c042b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SOTE%20SOTESHOP&amp;severity=medium&amp;id=699c3035be58cf853b75f0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-olalampo-inside-muddywaters-latest-campa-56d8b12a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Olalampo%3A%20Inside%20MuddyWater&apos;s%20Latest%20Campaign&amp;severity=medium&amp;id=699c28f3be58cf853b724307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sandwormmode-shai-hulud-style-npm-worm-hijacks-ci--970e0fb3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SANDWORM_MODE%3A%20Shai-Hulud-Style%20npm%20Worm%20Hijacks%20CI%20Workflows%20and%20Poisons%20AI%20Toolchains&amp;severity=medium&amp;id=699c28f3be58cf853b72434e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2984-denial-of-service-in-sourcecodester--85191ae6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2984%3A%20Denial%20of%20Service%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=699c2930be58cf853b7275d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chronology-of-muddywater-apt-attacks-targeting-the-33954b79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chronology%20of%20MuddyWater%20APT%20Attacks%20Targeting%20the%20Middle%20East&amp;severity=medium&amp;id=699c256fbe58cf853b6f4a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2983-improper-access-controls-in-sourceco-8f46df55</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2983%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=699c25a9be58cf853b6f8c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41002-cwe-89-improper-neutralization-of-s-7d1e6964</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41002%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MANANTIAL%20DE%20IDEAS%20Infoticketing&amp;severity=critical&amp;id=699c25a9be58cf853b6f8c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/paypal-data-breach-led-to-fraudulent-transactions-0fd4c8b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PayPal%20Data%20Breach%20Led%20to%20Fraudulent%20Transactions&amp;severity=medium&amp;id=699c1ae4be58cf853b65d710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2981-buffer-overflow-in-utt-hiper-810g-ebbad869</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2981%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699c1b36be58cf853b6616ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/23rd-february-threat-intelligence-report-fb0a35b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=23rd%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=699cec45be58cf853be40e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25747-cwe-502-deserialization-of-untruste-ad77e0d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25747%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20LevelDB&amp;severity=high&amp;id=699c1b36be58cf853b6616a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23552-cwe-346-origin-validation-error-in--099c72c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23552%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=699c1b36be58cf853b6616a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2980-buffer-overflow-in-utt-hiper-810g-30621ae4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2980%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699c1416be58cf853b60d4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2979-unrestricted-upload-in-fastapiadmin-06d9cf68</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2979%3A%20Unrestricted%20Upload%20in%20FastApiAdmin&amp;severity=medium&amp;id=699c1094be58cf853b5f1afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2978-unrestricted-upload-in-fastapiadmin-ddf67fcc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2978%3A%20Unrestricted%20Upload%20in%20FastApiAdmin&amp;severity=medium&amp;id=699c0601be58cf853b557229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2977-unrestricted-upload-in-fastapiadmin-d14e9069</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2977%3A%20Unrestricted%20Upload%20in%20FastApiAdmin&amp;severity=medium&amp;id=699c027dbe58cf853b5217e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1367-cwe-89-improper-neutralization-of-sp-dbb8032b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1367%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20ADSelfService%20Plus&amp;severity=high&amp;id=699c027dbe58cf853b5217e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2976-information-disclosure-in-fastapiadm-86338872</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2976%3A%20Information%20Disclosure%20in%20FastApiAdmin&amp;severity=medium&amp;id=699bfb74be58cf853b4ca3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2975-information-disclosure-in-fastapiadm-e687242b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2975%3A%20Information%20Disclosure%20in%20FastApiAdmin&amp;severity=medium&amp;id=699bf46dbe58cf853b4576f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2974-exposure-of-backup-file-to-an-unauth-cd87fe58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2974%3A%20Exposure%20of%20Backup%20File%20to%20an%20Unauthorized%20Control%20Sphere%20in%20AliasVault%20App&amp;severity=low&amp;id=699bed72be58cf853b3d54c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2972-cross-site-scripting-in-a466350665-s-53a6567b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2972%3A%20Cross%20Site%20Scripting%20in%20a466350665%20Smart-SSO&amp;severity=medium&amp;id=699c5bedbe58cf853b920fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2971-cross-site-scripting-in-a466350665-s-22186f60</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2971%3A%20Cross%20Site%20Scripting%20in%20a466350665%20Smart-SSO&amp;severity=medium&amp;id=699bdf53be58cf853b335276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2970-deserialization-in-datapizza-labs-da-52f20926</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2970%3A%20Deserialization%20in%20datapizza-labs%20datapizza-ai&amp;severity=low&amp;id=699bd4c9be58cf853b2b9049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2969-improper-neutralization-of-special-e-6d54c976</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2969%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20datapizza-labs%20datapizza-ai&amp;severity=medium&amp;id=699bd4c9be58cf853b2b9042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2968-improper-verification-of-cryptograph-cb146a79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2968%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=699bca3ebe58cf853b0516da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2998-cwe-426-untrusted-search-path-in-eai-2fea061f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2998%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20eAI%20Technologies%20ERP%20F2&amp;severity=high&amp;id=699bca3ebe58cf853b0516e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2967-improper-verification-of-source-of-a-57b8c69e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2967%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=699bca3ebe58cf853b0516d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2966-insufficiently-random-values-in-cesa-e29cea84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2966%3A%20Insufficiently%20Random%20Values%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=699bbc2cbe58cf853bf32018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2997-cwe-639-authorization-bypass-through-f3504232</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2997%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WisdomGarden%20Tronclass&amp;severity=medium&amp;id=699bbc2cbe58cf853bf3201f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2965-cross-site-scripting-in-07flycms-9d8672b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2965%3A%20Cross%20Site%20Scripting%20in%2007FLYCMS&amp;severity=medium&amp;id=699bbc2cbe58cf853bf32012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24494-cwe-89-improper-neutralization-of-s-fae4075c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24494%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Order%20Up%20Online%20Ordering%20System&amp;severity=critical&amp;id=699bae1dbe58cf853be51a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2964-improperly-controlled-modification-o-1db41d02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2964%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20higuma%20web-audio-recorder-js&amp;severity=low&amp;id=699bae1dbe58cf853be51a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2963-sql-injection-in-jinher-oa-c6-9c9c2ebe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2963%3A%20SQL%20Injection%20in%20Jinher%20OA%20C6&amp;severity=medium&amp;id=699ba713be58cf853bda304f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2962-stack-based-buffer-overflow-in-d-lin-37c3a76b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2962%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699ba713be58cf853bda3048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2961-stack-based-buffer-overflow-in-d-lin-722e4783</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2961%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699ba00cbe58cf853bd054b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2960-stack-based-buffer-overflow-in-d-lin-29b3b35d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2960%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699ba00cbe58cf853bd054ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71056-na-32de5bd1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71056%3A%20n%2Fa&amp;severity=high&amp;id=699cee30be58cf853bef4e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-23-1e99d923</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-23&amp;severity=medium&amp;id=699cebebbe58cf853be165c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70045-na-e43003f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70045%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8ebe58cf853bc4b508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70044-na-ecdebec6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70044%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8ebe58cf853bc4b500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70043-na-753ec698</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70043%3A%20n%2Fa&amp;severity=critical&amp;id=699cbd8cbe58cf853bc4b489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61146-na-c537bae5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61146%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61145-na-b8ca930f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61145%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61144-na-a864084d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61144%3A%20n%2Fa&amp;severity=critical&amp;id=699cbd8cbe58cf853bc4b478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61143-na-6d6fd10d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61143%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26464-na-9c4ae060</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26464%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61147-na-7a270c4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61147%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b45d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63946-na-a5435ae2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63946%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63945-na-2233fd7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63945%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70329-na-e700a716</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70329%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70328-na-5c36c839</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70328%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70327-na-d22f971f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70327%3A%20n%2Fa&amp;severity=critical&amp;id=699cbd8cbe58cf853bc4b3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-23-50f3ad29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-23&amp;severity=medium&amp;id=699cbc9bbe58cf853bc24344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70058-na-32d6ca8c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70058%3A%20n%2Fa&amp;severity=high&amp;id=699c7b9bbe58cf853ba5282b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69700-na-5de56747</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69700%3A%20n%2Fa&amp;severity=high&amp;id=699c625dbe58cf853b954549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-23-f5ab6aae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-23&amp;severity=low&amp;id=699c2ff9be58cf853b75cfa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26365-cwe-444-inconsistent-interpretation-96fb7f75</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26365%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Akamai%20Ghost&amp;severity=medium&amp;id=699c1094be58cf853b5f1af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2959-stack-based-buffer-overflow-in-d-lin-54cc012d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2959%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699b9581be58cf853bc3dfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2958-stack-based-buffer-overflow-in-d-lin-bf6778d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2958%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699b9581be58cf853bc3dfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2588-cwe-190-integer-overflow-or-wraparou-4f2a3d33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2588%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20TIMLEGGE%20Crypt%3A%3ANaCl%3A%3ASodium&amp;severity=critical&amp;id=699b9581be58cf853bc3df9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2957-denial-of-service-in-qinming99-dst-a-0aef73fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2957%3A%20Denial%20of%20Service%20in%20qinming99%20dst-admin&amp;severity=medium&amp;id=699b8e79be58cf853bbd6216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2956-command-injection-in-qinming99-dst-a-1c74e846</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2956%3A%20Command%20Injection%20in%20qinming99%20dst-admin&amp;severity=medium&amp;id=699b8069be58cf853bb3c827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2954-injection-in-dromara-ujcms-b332a795</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2954%3A%20Injection%20in%20Dromara%20UJCMS&amp;severity=medium&amp;id=699b1df9be58cf853b5c408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2953-path-traversal-in-dromara-ujcms-ab2c642f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2953%3A%20Path%20Traversal%20in%20Dromara%20UJCMS&amp;severity=medium&amp;id=699b0fe9be58cf853b4f96d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2952-os-command-injection-in-vaelsys-49bece5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2952%3A%20OS%20Command%20Injection%20in%20Vaelsys&amp;severity=medium&amp;id=699b0fe9be58cf853b4f96d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2947-cross-site-scripting-in-rymcu-forest-64f20955</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2947%3A%20Cross%20Site%20Scripting%20in%20rymcu%20forest&amp;severity=medium&amp;id=699b0c63be58cf853b4cb9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2946-cross-site-scripting-in-rymcu-forest-abcecd89</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2946%3A%20Cross%20Site%20Scripting%20in%20rymcu%20forest&amp;severity=medium&amp;id=699b01d9be58cf853b401db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2945-server-side-request-forgery-in-jeecg-da011b53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2945%3A%20Server-Side%20Request%20Forgery%20in%20JeecgBoot&amp;severity=medium&amp;id=699b01d9be58cf853b401dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2944-os-command-injection-in-tosei-online-56edbc08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2944%3A%20OS%20Command%20Injection%20in%20Tosei%20Online%20Store%20Management%20System%20%E3%83%8D%E3%83%83%E3%83%88%E5%BA%97%E8%88%97%E7%AE%A1%E7%90%86%E3%82%B7%E3%82%B9%E3%83%86%E3%83%A0&amp;severity=medium&amp;id=699ae5b9be58cf853b26a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2943-cross-site-scripting-in-sapneshnaik--0f3a9e14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2943%3A%20Cross%20Site%20Scripting%20in%20SapneshNaik%20Student%20Management%20System&amp;severity=medium&amp;id=699adeb1be58cf853b22022d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2940-out-of-bounds-write-in-zaher1307-tin-2936ffcb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2940%3A%20Out-of-bounds%20Write%20in%20Zaher1307%20tiny_web_server&amp;severity=medium&amp;id=699ad7a9be58cf853b1cfbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2939-cross-site-scripting-in-itsourcecode-0e030c3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2939%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=699ad0a1be58cf853b190e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2938-improper-access-controls-in-sourceco-92db5ba5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2938%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=699ac613be58cf853b1434d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2385-cwe-345-insufficient-verification-of-07926427</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2385%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699abf0dbe58cf853b0fc39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2935-buffer-overflow-in-utt-hiper-810g-939f645f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2935%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699b6bbfbe58cf853b9fec50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2934-cross-site-scripting-in-yifang-cms-9b3c2ff3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2934%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=699b6bbfbe58cf853b9fec4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2933-cross-site-scripting-in-yifang-cms-f18756f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2933%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=699ab481be58cf853b04fa68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2932-cross-site-scripting-in-yifang-cms-5172b3a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2932%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=699ab481be58cf853b04fa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2930-stack-based-buffer-overflow-in-tenda-1060ec7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2930%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18&amp;severity=medium&amp;id=699aa2ecbe58cf853bf5261c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1369-cwe-601-url-redirection-to-untrusted-8bf9bb9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1369%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Conditional%20CAPTCHA&amp;severity=medium&amp;id=699b6bbfbe58cf853b9fec56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2929-stack-based-buffer-overflow-in-d-lin-63e7a69b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2929%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a9861be58cf853bec2c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2928-stack-based-buffer-overflow-in-d-lin-ba314a06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2928%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a9159be58cf853be4af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2927-stack-based-buffer-overflow-in-d-lin-aa7f83a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2927%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a8a51be58cf853bdd6463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2926-stack-based-buffer-overflow-in-d-lin-b63cbef8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2926%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a8a51be58cf853bdd645c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2925-stack-based-buffer-overflow-in-d-lin-790f34e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2925%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a8349be58cf853bd68ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2913-heap-based-buffer-overflow-in-libvip-d7babcf4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2913%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=low&amp;id=699a8349be58cf853bd68abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2912-sql-injection-in-code-projects-onlin-bf9f085a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2912%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=699a8349be58cf853bd68ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2911-buffer-overflow-in-tenda-fh451-0afdc9cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2911%3A%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=699b6bbfbe58cf853b9fec60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-winos-40-campaigns-target-taiwan-61006908</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Winos%204.0%20Campaigns%20Target%20Taiwan&amp;severity=medium&amp;id=699c21ebbe58cf853b6b6adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2910-stack-based-buffer-overflow-in-tenda-db290378</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2910%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699b6bbfbe58cf853b9fec59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2909-stack-based-buffer-overflow-in-tenda-c1902d12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2909%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2908-stack-based-buffer-overflow-in-tenda-8458ae06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2908%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2907-stack-based-buffer-overflow-in-tenda-e9f3e7c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2907%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2906-stack-based-buffer-overflow-in-tenda-4d6e371a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2906%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2905-stack-based-buffer-overflow-in-tenda-1e2cb94f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2905%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a5c9dbe58cf853b91714c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2904-buffer-overflow-in-utt-hiper-810g-b0bb6f4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2904%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699a5593be58cf853b7fcbb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2903-null-pointer-dereference-in-skvadrik-a9b7e0e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2903%3A%20NULL%20Pointer%20Dereference%20in%20skvadrik%20re2c&amp;severity=medium&amp;id=699a5593be58cf853b7fcba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2898-deserialization-in-funadmin-1655bf68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2898%3A%20Deserialization%20in%20funadmin&amp;severity=medium&amp;id=699a5593be58cf853b7fcba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2897-cross-site-scripting-in-funadmin-361272fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2897%3A%20Cross%20Site%20Scripting%20in%20funadmin&amp;severity=medium&amp;id=699a5593be58cf853b7fcb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-22-ba8f968c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-22&amp;severity=medium&amp;id=699cebc3be58cf853be054cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-22-4d8876f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-22&amp;severity=medium&amp;id=699b9c51be58cf853bc9aa6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-22-c03fd373</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-22&amp;severity=low&amp;id=699a8312be58cf853bd645fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2896-improper-authorization-in-funadmin-8b9a76de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2896%3A%20Improper%20Authorization%20in%20funadmin&amp;severity=medium&amp;id=699a4401be58cf853b61d862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2895-weak-password-recovery-in-funadmin-197487f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2895%3A%20Weak%20Password%20Recovery%20in%20funadmin&amp;severity=medium&amp;id=699a3cfabe58cf853b5c220a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2894-information-disclosure-in-funadmin-e975faf5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2894%3A%20Information%20Disclosure%20in%20funadmin&amp;severity=medium&amp;id=699a3cfabe58cf853b5c2203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2889-use-after-free-in-ccextractor-8a5137dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2889%3A%20Use%20After%20Free%20in%20CCExtractor&amp;severity=medium&amp;id=699a2ee9be58cf853b52baf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2887-uncontrolled-recursion-in-aardappel--a74e0dc3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2887%3A%20Uncontrolled%20Recursion%20in%20aardappel%20lobster&amp;severity=medium&amp;id=699a20dabe58cf853b48d564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2886-stack-based-buffer-overflow-in-tenda-a6c0a7e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2886%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=699a20dabe58cf853b48d55d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2885-stack-based-buffer-overflow-in-d-lin-17be11df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2885%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a1a4cbe58cf853b44c9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2884-stack-based-buffer-overflow-in-d-lin-b154b949</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2884%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a1a4cbe58cf853b44c9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2883-stack-based-buffer-overflow-in-d-lin-5a90424a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2883%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a12cabe58cf853b2525ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2882-stack-based-buffer-overflow-in-d-lin-e735582c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2882%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a12cabe58cf853b2525c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2881-stack-based-buffer-overflow-in-d-lin-f2038f8e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2881%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a0bc7be58cf853b06b4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2877-stack-based-buffer-overflow-in-tenda-d45c8c4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2877%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18&amp;severity=high&amp;id=699a0133be58cf853bda57b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2876-stack-based-buffer-overflow-in-tenda-20fd82b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2876%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18&amp;severity=high&amp;id=6999efa1be58cf853bad3f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2874-stack-based-buffer-overflow-in-tenda-d1cd837e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2874%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999efa1be58cf853bad3f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2873-stack-based-buffer-overflow-in-tenda-9e1c5986</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2873%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999e192be58cf853ba5a4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2872-stack-based-buffer-overflow-in-tenda-c3d8c5e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2872%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999da89be58cf853ba20638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2871-stack-based-buffer-overflow-in-tenda-bd337d40</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2871%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999d381be58cf853b9e8de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2870-stack-based-buffer-overflow-in-tenda-01319858</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2870%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999c571be58cf853b997438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2869-out-of-bounds-read-in-janet-lang-jan-d96dcc6b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2869%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=6999c571be58cf853b99742e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2867-sql-injection-in-itsourcecode-vehicl-078e6aa4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2867%3A%20SQL%20Injection%20in%20itsourcecode%20Vehicle%20Management%20System&amp;severity=medium&amp;id=6999bae3be58cf853b900a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-grandstream-phone-vulnerability-exposes-c-7d749d0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Grandstream%20Phone%20Vulnerability%20Exposes%20Calls%20to%20Interception&amp;severity=critical&amp;id=69999e90be58cf853b84f9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1787-cwe-862-missing-authorization-in-thi-cbb97bf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1787%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20Backup%20%26%20Migration%20Tool&amp;severity=medium&amp;id=69998d30be58cf853b7cb605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27579-cwe-346-origin-validation-error-in--edc4b98e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27579%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20karnop%20realtime-collaboration-platform&amp;severity=high&amp;id=699989acbe58cf853b7b329e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27492-cwe-488-exposure-of-data-element-to-626119f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27492%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20lettermint%20lettermint-node&amp;severity=medium&amp;id=699989acbe58cf853b7b3299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14339-cwe-862-missing-authorization-in-we-9669a54d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14339%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20weMail%3A%20Email%20Marketing%2C%20Email%20Automation%2C%20Newsletters%2C%20Subscribers%20%26%20Email%20Optins%20for%20WooCommerce&amp;severity=medium&amp;id=69997b9dbe58cf853b7530da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27482-cwe-396-declaration-of-catch-for-ge-d7eb6f83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27482%3A%20CWE-396%3A%20Declaration%20of%20Catch%20for%20Generic%20Exception%20in%20ray-project%20ray&amp;severity=medium&amp;id=69997b9dbe58cf853b7530e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27479-cwe-918-server-side-request-forgery-8b1d9bca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27479%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69996d8dbe58cf853b6e3314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2865-sql-injection-in-itsourcecode-agri-t-9413028e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2865%3A%20SQL%20Injection%20in%20itsourcecode%20Agri-Trading%20Online%20Shopping%20System&amp;severity=medium&amp;id=69996301be58cf853b611671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2864-path-traversal-in-fenghaha-ssm-erp-918de2b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2864%3A%20Path%20Traversal%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=69996301be58cf853b61166a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27469-cwe-79-improper-neutralization-of-i-6807b486</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27469%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20isso-comments%20isso&amp;severity=medium&amp;id=69996301be58cf853b611665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27206-cwe-502-deserialization-of-untruste-e15a97f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27206%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20zumba%20json-serializer&amp;severity=high&amp;id=69995bf9be58cf853b593127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27458-cwe-80-improper-neutralization-of-s-f57f6777</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27458%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69995bf9be58cf853b59312f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27452-cwe-200-exposure-of-sensitive-infor-d39700d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27452%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20JonathanWilbur%20asn1-ts&amp;severity=critical&amp;id=69995bf9be58cf853b59312c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27471-cwe-862-missing-authorization-in-fr-0d95cb60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27471%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frappe%20erpnext&amp;severity=critical&amp;id=699954f1be58cf853b55f45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/japanese-language-phishing-emails-sat-feb-21st-02b8ce8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Japanese-Language%20Phishing%20Emails%2C%20(Sat%2C%20Feb%2021st)&amp;severity=medium&amp;id=69994db5be58cf853b530115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2863-path-traversal-in-fenghaha-ssm-erp-086ce83e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2863%3A%20Path%20Traversal%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=69994df7be58cf853b531474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2861-information-disclosure-in-foswiki-785784dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2861%3A%20Information%20Disclosure%20in%20Foswiki&amp;severity=medium&amp;id=69994df7be58cf853b53146c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27212-cwe-1321-improperly-controlled-modi-35374c82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27212%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nolimits4web%20swiper&amp;severity=critical&amp;id=69994a6fbe58cf853b51dfc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26047-uncontrolled-resource-consumption-2faa897d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26047%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=69994a6fbe58cf853b51dfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26046-improper-neutralization-of-special--aded30ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26046%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=69994a6fbe58cf853b51dfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26045-improper-control-of-generation-of-c-ac6ce0f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26045%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=69994a6fbe58cf853b51dfb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27210-cwe-79-improper-neutralization-of-i-304bf2ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27210%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mpetroff%20pannellum&amp;severity=medium&amp;id=699946e0be58cf853b4e0107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27205-cwe-524-use-of-cache-containing-sen-0adafbc3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27205%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20pallets%20flask&amp;severity=low&amp;id=699946e0be58cf853b4e0102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27199-cwe-67-improper-handling-of-windows-2d486c7b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27199%3A%20CWE-67%3A%20Improper%20Handling%20of%20Windows%20Device%20Names%20in%20pallets%20werkzeug&amp;severity=medium&amp;id=699a1a4cbe58cf853b44ca10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27198-cwe-269-improper-privilege-manageme-f67eef78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27198%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20getformwork%20formwork&amp;severity=high&amp;id=699a1a4cbe58cf853b44c9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27197-cwe-287-improper-authentication-in--f7f67e7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27197%3A%20CWE-287%3A%20Improper%20Authentication%20in%20getsentry%20sentry&amp;severity=critical&amp;id=69993c53be58cf853b46cc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2860-improper-authorization-in-fenghaha-s-7b872e85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2860%3A%20Improper%20Authorization%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=69993c53be58cf853b46cc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27196-cwe-79-improper-neutralization-of-i-471a7dc8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27196%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69993c53be58cf853b46cc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27194-cwe-74-improper-neutralization-of-s-60332a35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27194%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20man-group%20dtale&amp;severity=high&amp;id=6999354dbe58cf853b449470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27193-cwe-200-exposure-of-sensitive-infor-8c54f238</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27193%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20feathersjs%20feathers&amp;severity=high&amp;id=6999354dbe58cf853b44946b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27192-cwe-346-origin-validation-error-in--17700ad4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27192%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20feathersjs%20feathers&amp;severity=high&amp;id=69992e44be58cf853b3dccd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27191-cwe-601-url-redirection-to-untruste-5f61f9b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27191%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20feathersjs%20feathers&amp;severity=high&amp;id=69992e44be58cf853b3dcccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65995-cwe-209-generation-of-error-message-fae63ced</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65995%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=699923b9be58cf853b17289f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-21-47397153</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-21&amp;severity=medium&amp;id=699a4ad1be58cf853b672ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-21-314b93fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-21&amp;severity=medium&amp;id=6999f672be58cf853bb0d039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-21-d084b561</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-21&amp;severity=low&amp;id=6999664dbe58cf853b67e1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27168-cwe-122-heap-based-buffer-overflow--338e400d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27168%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20HappySeaFox%20sail&amp;severity=high&amp;id=6998f281be58cf853bdfabe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27203-cwe-15-external-control-of-system-o-d4123025</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27203%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20YosefHayim%20ebay-mcp&amp;severity=high&amp;id=6998f281be58cf853bdfabe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27134-cwe-287-improper-authentication-in--be5a44cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27134%3A%20CWE-287%3A%20Improper%20Authentication%20in%20strimzi%20strimzi-kafka-operator&amp;severity=high&amp;id=6998eb7cbe58cf853bdd2aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27133-cwe-295-improper-certificate-valida-e5103e94</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27133%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20strimzi%20strimzi-kafka-operator&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27125-cwe-915-improperly-controlled-modif-2f99b788</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27125%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27122-cwe-79-improper-neutralization-of-i-d6a4de72</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27122%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27121-cwe-79-improper-neutralization-of-i-f01a2543</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27121%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27119-cwe-79-improper-neutralization-of-i-0a61a055</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27119%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2490-cwe-59-improper-link-resolution-befo-d299ff2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2490%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20RustDesk%20Client%20for%20Windows&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2041-cwe-78-improper-neutralization-of-sp-9112e8cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2041%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Host&amp;severity=high&amp;id=6998e0efbe58cf853bd86542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2043-cwe-78-improper-neutralization-of-sp-f93a8c83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2043%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Host&amp;severity=high&amp;id=6998e0efbe58cf853bd8654a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2042-cwe-78-improper-neutralization-of-sp-c3d99d64</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2042%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Host&amp;severity=high&amp;id=6998e0efbe58cf853bd86546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2040-cwe-427-uncontrolled-search-path-ele-0eaf6799</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2040%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=6998e0efbe58cf853bd8653f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2039-cwe-862-missing-authorization-in-gfi-14597c17</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2039%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd8653c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2036-cwe-502-deserialization-of-untrusted-d76c5725</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2036%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd86533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2038-cwe-862-missing-authorization-in-gfi-f5fda3da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2038%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd86539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2037-cwe-502-deserialization-of-untrusted-7d9015ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2037%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd86536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2035-cwe-78-improper-neutralization-of-sp-ffc2acfa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2035%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Deciso%20OPNsense&amp;severity=medium&amp;id=6998e0efbe58cf853bd8652f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2034-cwe-120-buffer-copy-without-checking-ee11093c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2034%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Sante%20DICOM%20Viewer%20Pro&amp;severity=high&amp;id=6998e0efbe58cf853bd8652c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2858-out-of-bounds-read-in-wren-lang-wren-beaad496</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2858%3A%20Out-of-Bounds%20Read%20in%20wren-lang%20wren&amp;severity=medium&amp;id=6998d662be58cf853bc3fe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27120-cwe-75-failure-to-sanitize-special--5394c06d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27120%3A%20CWE-75%3A%20Failure%20to%20Sanitize%20Special%20Elements%20into%20a%20Different%20Plane%20(Special%20Element%20Injection)%20in%20vapor%20leaf-kit&amp;severity=medium&amp;id=6998d2dfbe58cf853bb9b97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27118-cwe-346-origin-validation-error-in--a2829ba2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27118%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20sveltejs%20kit&amp;severity=medium&amp;id=6998d2dfbe58cf853bb9b978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27112-cwe-863-incorrect-authorization-in--0476694e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27112%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20akuity%20kargo&amp;severity=critical&amp;id=6998d2dfbe58cf853bb9b974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27111-cwe-862-missing-authorization-in-ak-4eba098a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27111%3A%20CWE-862%3A%20Missing%20Authorization%20in%20akuity%20kargo&amp;severity=medium&amp;id=6998d2dfbe58cf853bb9b970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27026-cwe-770-allocation-of-resources-wit-2c968574</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27026%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27025-cwe-834-excessive-iteration-in-py-p-037c1442</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27025%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27024-cwe-835-loop-with-unreachable-exit--6dceccea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27024%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27022-cwe-74-improper-neutralization-of-s-4e85c924</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27022%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20langchain-ai%20langgraphjs&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27020-cwe-79-improper-neutralization-of-i-87028508</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27020%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lukas12000%20photobooth&amp;severity=medium&amp;id=6998cf5abe58cf853bb24fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2857-stack-based-buffer-overflow-in-d-lin-756386cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2857%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998cf5abe58cf853bb24faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25896-cwe-185-incorrect-regular-expressio-a786da3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25896%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=critical&amp;id=6998cf5abe58cf853bb24fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27190-cwe-78-improper-neutralization-of-s-61ca1d2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27190%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=6998e47cbe58cf853bd9f781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2856-stack-based-buffer-overflow-in-d-lin-e5278306</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2856%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c9e1be58cf853bab6aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2855-stack-based-buffer-overflow-in-d-lin-4a6d59bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2855%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c0ac2c4d84f260ce40a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62326-cwe-79-improper-neutralization-of-i-0249db27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62326%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCLSoftware%20Digital%20Experience&amp;severity=medium&amp;id=6998c0ac2c4d84f260ce40a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2473-cwe-340-generation-of-predictable-nu-62055df8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2473%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20Google%20Cloud%20Vertex%20AI%20Experiments&amp;severity=high&amp;id=6998c9e1be58cf853bab6ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2472-cwe-79-improper-neutralization-of-in-08ce0843</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2472%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Google%20Cloud%20Vertex%20AI%20SDK%20for%20Python&amp;severity=high&amp;id=6998c9e1be58cf853bab6ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2854-stack-based-buffer-overflow-in-d-lin-0ac6d2fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2854%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c9e2be58cf853bab6b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2853-stack-based-buffer-overflow-in-d-lin-37fdae85</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2853%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c9e2be58cf853bab6afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2852-improper-access-controls-in-yeqifu-w-d3d7f563</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2852%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6998c9e4be58cf853bab7605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2832-cwe-200-in-hp-inc-samsung-multixpres-5f46e4eb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2832%3A%20CWE-200%20in%20HP%20Inc%20Samsung%20MultiXpress%20SL-X7600LXR%2C%20SL-X7500LXR%2C%20SL-X7400LXR&amp;severity=medium&amp;id=69989d822c4d84f260b8d827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27115-cwe-22-improper-limitation-of-a-pat-30707c13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27115%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=699899fe2c4d84f260b6810c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2851-improper-access-controls-in-yeqifu-w-ad7331dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2851%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=699899fe2c4d84f260b68119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2850-improper-access-controls-in-yeqifu-w-53b18e86</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2850%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=699899fe2c4d84f260b68111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26102-cwe-732-incorrect-permission-assign-3e8ec137</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26102%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26101-cwe-732-incorrect-permission-assign-507e105d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26101%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26100-cwe-732-incorrect-permission-assign-13572654</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26100%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=medium&amp;id=6998c9e6be58cf853bab77cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27506-cwe-79-improper-neutralization-of-i-f9e184f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26099-cwe-427-uncontrolled-search-path-el-e9a235da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26099%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26098-cwe-427-uncontrolled-search-path-el-122bfb41</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26098%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26097-cwe-427-uncontrolled-search-path-el-a14c6dd5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26097%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab7622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26096-cwe-732-incorrect-permission-assign-d2bc77a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26096%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab761f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26095-cwe-732-incorrect-permission-assign-d597aa2a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26095%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab761c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26093-cwe-77-improper-neutralization-of-s-05064f5f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26093%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab7619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27505-cwe-79-improper-neutralization-of-i-d9eb7933</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27504-cwe-79-improper-neutralization-of-i-79d41f19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27503-cwe-79-improper-neutralization-of-i-299cc120</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27503%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2333-cwe-77-improper-neutralization-of-sp-a6e584ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2333%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Owl%20opds&amp;severity=critical&amp;id=6998c9e6be58cf853bab77d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27502-cwe-79-improper-neutralization-of-i-497f1478</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15583-cross-site-scripting-in-detronetdip-f3411607</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15583%3A%20Cross%20Site%20Scripting%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6998c9e6be58cf853bab77e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15582-authorization-bypass-in-detronetdip-decee4fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15582%3A%20Authorization%20Bypass%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6998c9e6be58cf853bab77db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1842-cwe-613-insufficient-session-expirat-81f62f0b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1842%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20SoftIron%20HyperCloud&amp;severity=medium&amp;id=6998c9e2be58cf853bab6b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24790-cwe-306-in-welker-odoreyes-ecosyste-ec3e6d58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24790%3A%20CWE-306%20in%20Welker%20OdorEyes%20EcoSystem%20Pulse%20Bypass%20System%20with%20XL4%20Controller&amp;severity=high&amp;id=69988bee2c4d84f260ae23d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26048-cwe-306-in-jinan-usr-iot-technology-9c6d3db0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26048%3A%20CWE-306%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=high&amp;id=6998c9e1be58cf853bab6ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26049-cwe-522-in-jinan-usr-iot-technology-c466334b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26049%3A%20CWE-522%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=medium&amp;id=6998c0ac2c4d84f260ce40b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2818-cwe-23-relative-path-traversal-in-vm-a93f5c94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2818%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20VMware%20Spring%20Data%20Geode&amp;severity=high&amp;id=6998c42f2c4d84f260d040b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2849-improper-access-controls-in-yeqifu-w-a0183a9d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2849%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6998c9e7be58cf853bab82aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2848-sql-injection-in-sourcecodester-simp-900bfef3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2848%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=6998c9e7be58cf853bab82a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24455-cwe-319-in-jinan-usr-iot-technology-1aff07c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24455%3A%20CWE-319%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=high&amp;id=6998c0ac2c4d84f260ce40b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25715-cwe-521-in-jinan-usr-iot-technology-b37d98fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25715%3A%20CWE-521%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=critical&amp;id=6998c0ac2c4d84f260ce40b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nists-quantum-breakthrough-single-photons-produced-1c6551af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NIST%E2%80%99s%20Quantum%20Breakthrough%3A%20Single%20Photons%20Produced%20on%20a%20Chip&amp;severity=medium&amp;id=699884b12c4d84f260a9a399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27072-improper-neutralization-of-input-du-639631d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PixelYourSite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=high&amp;id=6998ca03be58cf853bab938b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24959-improper-neutralization-of-special--8ecab645</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24959%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=high&amp;id=6998c9e4be58cf853bab7616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24956-improper-neutralization-of-special--3235d069</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24956%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjada%20Download%20Manager%20Addons%20for%20Elementor&amp;severity=critical&amp;id=6998ca03be58cf853bab9388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24955-improper-neutralization-of-input-du-9138314c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24955%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Whizz%20Plugins&amp;severity=high&amp;id=6998c9e4be58cf853bab7613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24953-improper-limitation-of-a-pathname-t-a40d9485</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24953%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mitchell%20Bennis%20Simple%20File%20List&amp;severity=medium&amp;id=6998ca03be58cf853bab9385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24950-authorization-bypass-through-user-c-c56e4f1e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24950%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeplugs%20Authorsy&amp;severity=high&amp;id=6998c9e4be58cf853bab7610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24949-improper-neutralization-of-input-du-5bc860f3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20PhotoMe&amp;severity=high&amp;id=6998ca03be58cf853bab9382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24948-improper-neutralization-of-input-du-f23c3cea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24948%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Reflector&amp;severity=high&amp;id=6998c9e4be58cf853bab760d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24946-missing-authorization-in-tychesoftw-9a5efc38</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24946%3A%20Missing%20Authorization%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=medium&amp;id=6998ca02be58cf853bab9356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24944-missing-authorization-in-wedevs-sub-bab27ece</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24944%3A%20Missing%20Authorization%20in%20weDevs%20Subscribe2&amp;severity=medium&amp;id=6998c9e4be58cf853bab7602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24943-improper-neutralization-of-input-du-6c89e4dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Conference&amp;severity=high&amp;id=6998ca02be58cf853bab9353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24941-missing-authorization-in-wpjobporta-9352ccfd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24941%3A%20Missing%20Authorization%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=high&amp;id=6998c9e2be58cf853bab6b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22384-deserialization-of-untrusted-data-i-c8cd76a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22384%3A%20Deserialization%20of%20Untrusted%20Data%20in%20leafcolor%20Applay%20-%20Shortcodes&amp;severity=critical&amp;id=6998ca02be58cf853bab9350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22383-authorization-bypass-through-user-c-2a198f42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22383%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20PawFriends%20-%20Pet%20Shop%20and%20Veterinary%20WordPress%20Theme&amp;severity=high&amp;id=6998c9e2be58cf853bab6b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22381-improper-control-of-filename-for-in-8b33630f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20PawFriends%20-%20Pet%20Shop%20and%20Veterinary%20WordPress%20Theme&amp;severity=high&amp;id=6998ca02be58cf853bab934d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22380-improper-control-of-filename-for-in-7673de4b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22380%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20UnlimHost&amp;severity=high&amp;id=6998c9e2be58cf853bab6afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22379-improper-control-of-filename-for-in-fd0926aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22379%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Netmix&amp;severity=high&amp;id=6998ca02be58cf853bab934a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22378-improper-control-of-filename-for-in-532e1939</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22378%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Blabber&amp;severity=high&amp;id=6998c9e2be58cf853bab6af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22377-improper-control-of-filename-for-in-54cf682d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22377%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Saveo&amp;severity=high&amp;id=6998ca02be58cf853bab9347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22376-improper-control-of-filename-for-in-47860a6b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22376%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Parkivia&amp;severity=high&amp;id=6998c9e2be58cf853bab6af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22375-improper-control-of-filename-for-in-9e4ca84a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22375%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Impacto%20Patronus&amp;severity=high&amp;id=6998ca02be58cf853bab9344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22374-improper-control-of-filename-for-in-ff6f952c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22374%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Zio%20Alberto&amp;severity=high&amp;id=6998c9e2be58cf853bab6af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22373-improper-control-of-filename-for-in-91fdd6af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22373%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Fooddy&amp;severity=high&amp;id=6998ca02be58cf853bab9341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22372-improper-control-of-filename-for-in-99586c4a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22372%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Isida&amp;severity=high&amp;id=6998c9e2be58cf853bab6aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22371-improper-control-of-filename-for-in-8243fd9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22371%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Gustavo&amp;severity=high&amp;id=6998ca02be58cf853bab933e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22370-improper-control-of-filename-for-in-bbcd8a85</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22370%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Marveland&amp;severity=high&amp;id=6998c9e1be58cf853bab6ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22369-improper-control-of-filename-for-in-b974319a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22369%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Ironfit&amp;severity=high&amp;id=6998ca02be58cf853bab933b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22368-improper-control-of-filename-for-in-52f1856f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22368%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Redy&amp;severity=high&amp;id=6998c9e1be58cf853bab6ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22367-improper-control-of-filename-for-in-4478fc38</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22367%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Coworking&amp;severity=high&amp;id=6998ca00be58cf853bab9221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22366-improper-control-of-filename-for-in-3cf8c652</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22366%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Jude&amp;severity=high&amp;id=6998c9e1be58cf853bab6abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22365-improper-control-of-filename-for-in-d19f4323</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22365%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Soleng&amp;severity=high&amp;id=6998ca00be58cf853bab921e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22364-improper-control-of-filename-for-in-70fc26a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20SevenTrees&amp;severity=high&amp;id=6998c9e1be58cf853bab6aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22363-improper-control-of-filename-for-in-2eb32049</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22363%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rhodos&amp;severity=high&amp;id=6998ca00be58cf853bab921b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22362-improper-control-of-filename-for-in-9a7bc312</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22362%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Photolia&amp;severity=high&amp;id=6998c9e1be58cf853bab6aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22361-improper-control-of-filename-for-in-5e350512</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22361%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20A-Mart&amp;severity=high&amp;id=6998ca00be58cf853bab9218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22357-improper-neutralization-of-input-du-32b18cf1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spencer%20Haws%20Link%20Whisper%20Free&amp;severity=high&amp;id=6998ca00be58cf853bab9215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22356-improper-control-of-filename-for-in-7d50b9f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22356%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Automattic%20Jetpack%20CRM&amp;severity=high&amp;id=6998ca00be58cf853bab9212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22354-deserialization-of-untrusted-data-i-a275f0c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22354%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Dotstore%20Woocommerce%20Category%20Banner%20Management&amp;severity=high&amp;id=6998ca00be58cf853bab920f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22352-improper-neutralization-of-input-du-82c9c764</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PersianScript%20Persian%20Woocommerce%20SMS&amp;severity=high&amp;id=6998ca00be58cf853bab920c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22351-missing-authorization-in-marcus-aka-382d6452</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22351%3A%20Missing%20Authorization%20in%20Marcus%20(aka%20%40msykes)%20WP%20FullCalendar&amp;severity=high&amp;id=6998ca00be58cf853bab9209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22350-missing-authorization-in-add-onsorg-90039836</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22350%3A%20Missing%20Authorization%20in%20add-ons.org%20PDF%20for%20Elementor%20Forms%20%2B%20Drag%20And%20Drop%20Template%20Builder&amp;severity=medium&amp;id=6998ca00be58cf853bab9206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22346-deserialization-of-untrusted-data-i-85dcd642</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22346%3A%20Deserialization%20of%20Untrusted%20Data%20in%20A%20WP%20Life%20Slider%20Responsive%20Slideshow%20%E2%80%93%20Image%20slider%2C%20Gallery%20slideshow&amp;severity=high&amp;id=6998c9ffbe58cf853bab91df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22345-deserialization-of-untrusted-data-i-f1793858</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22345%3A%20Deserialization%20of%20Untrusted%20Data%20in%20A%20WP%20Life%20Image%20Gallery%20%E2%80%93%20Lightbox%20Gallery%2C%20Responsive%20Photo%20Gallery%2C%20Masonry%20Gallery&amp;severity=high&amp;id=6998c9ffbe58cf853bab91dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22344-improper-control-of-filename-for-in-72fff014</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22344%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20FiveStar&amp;severity=high&amp;id=6998c9ffbe58cf853bab91d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22341-authentication-bypass-using-an-alte-258b6c54</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22341%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Case-Themes%20Booked&amp;severity=medium&amp;id=6998c9ffbe58cf853bab91d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69410-improper-control-of-filename-for-in-4818f79c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69410%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Belletrist&amp;severity=high&amp;id=6998c9ffbe58cf853bab91d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69409-improper-control-of-filename-for-in-8f64e0af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69409%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20PJ%20%7C%20Life%20%26%20Business%20Coaching&amp;severity=high&amp;id=6998c9ffbe58cf853bab91cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69408-improper-control-of-filename-for-in-5ca7bc52</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69408%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20HealthFirst&amp;severity=high&amp;id=6998c9ffbe58cf853bab91ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69407-improper-control-of-filename-for-in-b72f7028</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69407%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Struktur&amp;severity=high&amp;id=6998c9ffbe58cf853bab91c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69406-improper-control-of-filename-for-in-8c56f980</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69406%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20FreightCo&amp;severity=high&amp;id=6998c9ffbe58cf853bab91c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69405-deserialization-of-untrusted-data-i-7fb533d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69405%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Lorem%20Ipsum%20%7C%20Books%20%26%20Media%20Store&amp;severity=critical&amp;id=6998c9fdbe58cf853bab917f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69404-deserialization-of-untrusted-data-i-6248805e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69404%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Extreme%20Store&amp;severity=critical&amp;id=6998c9fdbe58cf853bab917c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69403-unrestricted-upload-of-file-with-da-1742b5b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69403%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Bravis-Themes%20Bravis%20Addons&amp;severity=critical&amp;id=6998c9fdbe58cf853bab9179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69402-improper-control-of-filename-for-in-c155e509</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69402%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20R%26F&amp;severity=high&amp;id=6998c9fdbe58cf853bab9176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69401-authentication-bypass-by-spoofing-i-603d5f42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69401%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20mdalabar%20WooODT%20Lite&amp;severity=high&amp;id=6998c9fdbe58cf853bab9173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69400-improper-control-of-filename-for-in-aa67087f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69400%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yokoo&amp;severity=high&amp;id=6998c9fdbe58cf853bab9170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69399-improper-control-of-filename-for-in-d84915fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69399%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Cobble&amp;severity=high&amp;id=6998c9fdbe58cf853bab916d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69398-improper-control-of-filename-for-in-76bcabef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69398%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Plank&amp;severity=high&amp;id=6998c9fdbe58cf853bab9169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69397-improper-control-of-filename-for-in-2d7f5a1f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69397%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tint&amp;severity=high&amp;id=6998c9fdbe58cf853bab9166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69396-improper-control-of-filename-for-in-cd4d231d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69396%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Splendour&amp;severity=high&amp;id=6998c9fdbe58cf853bab915e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69395-improper-control-of-filename-for-in-3d4a5ce4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69395%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Gable&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69393-missing-authorization-in-jthemes-ex-5b6e7a1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69393%3A%20Missing%20Authorization%20in%20Jthemes%20Exzo&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69392-improper-neutralization-of-input-du-90e30f56</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itex%20iMoney&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69391-improper-neutralization-of-input-du-33c897e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69391%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20Diamond&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69390-improper-neutralization-of-input-du-59d41ec8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69390%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themebon%20Business%20Template%20Blocks%20for%20WPBakery%20(Visual%20Composer)%20Page%20Builder&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69389-improper-neutralization-of-input-du-b9f61373</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hugh%20Mungus%20Visitor%20Maps%20Extended%20Referer%20Field&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69388-missing-authorization-in-cliengo-cl-828a358a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69388%3A%20Missing%20Authorization%20in%20cliengo%20Cliengo%20%E2%80%93%20Chatbot&amp;severity=medium&amp;id=6998c9fbbe58cf853bab8d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69387-improper-control-of-filename-for-in-bd9b7785</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69387%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20whatwouldjessedo%20Simple%20Retail%20Menus&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69386-improper-neutralization-of-input-du-559119a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69386%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realvirtualmx%20RVCFDI%20para%20Woocommerce&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69385-missing-authorization-in-agnihd-car-5e178203</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69385%3A%20Missing%20Authorization%20in%20AgniHD%20Cartify%20-%20WooCommerce%20Gutenberg%20WordPress%20Theme&amp;severity=medium&amp;id=6998c9fbbe58cf853bab8d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69384-improper-neutralization-of-input-du-dcf39699</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69384%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Timeline%20Event%20History&amp;severity=high&amp;id=6998c9fabe58cf853bab8d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69383-improper-control-of-filename-for-in-bdded47d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69383%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Agence%20web%20Eoxia%20-%20Montpellier%20WP%20shop&amp;severity=high&amp;id=6998c9fabe58cf853bab8d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69382-deserialization-of-untrusted-data-i-d1f8436f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69382%3A%20Deserialization%20of%20Untrusted%20Data%20in%20themesflat%20Themesflat%20Elementor&amp;severity=critical&amp;id=6998c9fabe58cf853bab8d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69381-missing-authorization-in-vanquish-w-22979e9c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69381%3A%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Bulk%20Product%20Editor&amp;severity=high&amp;id=6998c9fabe58cf853bab8d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69380-improper-limitation-of-a-pathname-t-0705c153</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69380%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20Upload%20Files%20Anywhere&amp;severity=high&amp;id=6998c9fabe58cf853bab8cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69379-improper-limitation-of-a-pathname-t-7d9b991f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69379%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20Upload%20Files%20Anywhere&amp;severity=high&amp;id=6998c9fabe58cf853bab8cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69378-incorrect-privilege-assignment-in-x-adbe137f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69378%3A%20Incorrect%20Privilege%20Assignment%20in%20XforWooCommerce%20Product%20Filter%20for%20WooCommerce&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69377-improper-limitation-of-a-pathname-t-444ddb21</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69377%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20User%20Extra%20Fields&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69376-improper-limitation-of-a-pathname-t-8d35ed40</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69376%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20User%20Extra%20Fields&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69375-improper-control-of-filename-for-in-aceae499</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69375%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SolverWp%20Portfolio%20Builder&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69374-improper-control-of-filename-for-in-c98b4c6c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69374%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SolverWp%20Eleblog%20%E2%80%93%20Elementor%20Blog%20And%20Magazine%20Addons&amp;severity=high&amp;id=6998c9f8be58cf853bab8ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69373-improper-control-of-filename-for-in-8a23076b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69373%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20beeteam368%20VidoRev&amp;severity=high&amp;id=6998c9f8be58cf853bab8c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69372-deserialization-of-untrusted-data-i-478c0a38</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69372%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20SevenHills&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69371-deserialization-of-untrusted-data-i-9dcd4607</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69371%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20KindlyCare&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69370-deserialization-of-untrusted-data-i-c59240a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69370%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Capella&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69368-improper-neutralization-of-input-du-b3fb562b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69368%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20SOHO%20-%20Photography%20WordPress%20Theme&amp;severity=high&amp;id=6998c9f8be58cf853bab8c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69367-improper-neutralization-of-input-du-9e3ce157</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69367%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20Oyster%20-%20Photography%20WordPress%20Theme&amp;severity=high&amp;id=6998c9f8be58cf853bab8c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69366-improper-neutralization-of-special--9fb40b7d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69366%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Emerce%20Core&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69365-improper-neutralization-of-special--9f132755</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69365%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Uroan%20Core&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69337-improper-neutralization-of-special--a25bade3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69337%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20don-themes%20Wolmart%20Core&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69330-improper-neutralization-of-input-du-0fc4e224</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69330%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jthemes%20Prestige&amp;severity=high&amp;id=6998c9f7be58cf853bab8c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69329-deserialization-of-untrusted-data-i-5554d9e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69329%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Jthemes%20Prestige&amp;severity=critical&amp;id=6998c9f7be58cf853bab8c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69328-deserialization-of-untrusted-data-i-1008c2af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69328%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=high&amp;id=6998c9f7be58cf853bab8c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69326-improper-neutralization-of-input-du-066280cd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69326%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basix%20NEX-Forms&amp;severity=high&amp;id=6998c9f7be58cf853bab8c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69325-path-traversal-in-primersoftware-pr-d91b8f83</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69325%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20primersoftware%20Primer%20MyData%20for%20Woocommerce&amp;severity=medium&amp;id=6998c9f7be58cf853bab8c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69324-improper-neutralization-of-input-du-c43fe3a3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basix%20NEX-Forms&amp;severity=high&amp;id=6998c9f7be58cf853bab8c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69323-improper-neutralization-of-input-du-3d87008f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VeronaLabs%20Slimstat%20Analytics&amp;severity=high&amp;id=6998c9f7be58cf853bab8c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69322-improper-control-of-filename-for-in-30c6fada</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69322%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20PeakShops&amp;severity=high&amp;id=6998c9f7be58cf853bab8c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69310-improper-neutralization-of-special--63c262ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69310%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Woodly%20Core&amp;severity=critical&amp;id=6998c9f7be58cf853bab8c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69309-improper-neutralization-of-special--f916c2e0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69309%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Saasplate%20Core&amp;severity=critical&amp;id=6998c9f7be58cf853bab8c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69308-improper-neutralization-of-special--b67a36af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69308%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Nestbyte%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69307-improper-neutralization-of-special--ec1cc96c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69307%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Medinik%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69306-improper-neutralization-of-special--b1330bd2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69306%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Electio%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69305-improper-neutralization-of-special--6c729442</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69305%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Crete%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69304-improper-neutralization-of-special--0851bfff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69304%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Allmart&amp;severity=critical&amp;id=6998c9f5be58cf853bab87a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69303-missing-authorization-in-modeltheme-fd7a5bf7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69303%3A%20Missing%20Authorization%20in%20modeltheme%20ModelTheme%20Framework&amp;severity=high&amp;id=6998c9f5be58cf853bab87a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69302-improper-neutralization-of-input-du-9e32252c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69302%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Core%20Features&amp;severity=high&amp;id=6998c9f5be58cf853bab879d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69301-deserialization-of-untrusted-data-i-01b61f2d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69301%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20PhotoMe&amp;severity=critical&amp;id=6998c9f5be58cf853bab879a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69299-server-side-request-forgery-ssrf-in-e830acbf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69299%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Laborator%20Oxygen&amp;severity=high&amp;id=6998c9f5be58cf853bab8797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69298-missing-authorization-in-ghostpool--dab750db</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69298%3A%20Missing%20Authorization%20in%20GhostPool%20Gauge&amp;severity=high&amp;id=6998c9f5be58cf853bab8794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69297-missing-authorization-in-ghostpool--4d32211b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69297%3A%20Missing%20Authorization%20in%20GhostPool%20Aardvark%20Plugin&amp;severity=high&amp;id=6998c9f3be58cf853bab8754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69296-improper-neutralization-of-input-du-3cf6c340</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhostPool%20Aardvark&amp;severity=high&amp;id=6998c9f3be58cf853bab8751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69295-improper-neutralization-of-special--97e31acb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69295%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Coven%20Core&amp;severity=critical&amp;id=6998c9f3be58cf853bab874e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69294-deserialization-of-untrusted-data-i-973f59a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69294%3A%20Deserialization%20of%20Untrusted%20Data%20in%20fuelthemes%20PeakShops&amp;severity=high&amp;id=6998c9f3be58cf853bab874b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69063-missing-authorization-in-saad-iqbal-38006240</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69063%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=high&amp;id=6998c9f3be58cf853bab8748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69011-improper-neutralization-of-input-du-827a8668</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPKube%20Cool%20Tag%20Cloud&amp;severity=medium&amp;id=6998c9f3be58cf853bab8745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68895-authentication-bypass-using-an-alte-e179568e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68895%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ahachat%20AhaChat%20Messenger%20Marketing&amp;severity=medium&amp;id=6998c9f3be58cf853bab8742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68880-improper-neutralization-of-input-du-45b81ed2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68880%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peterwsterling%20Simple%20Archive%20Generator&amp;severity=high&amp;id=6998c9f3be58cf853bab873f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68863-improper-neutralization-of-input-du-4674b2bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68863%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zack%20Katz%20iContact%20for%20Gravity%20Forms&amp;severity=high&amp;id=6998c9f3be58cf853bab873c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68862-improper-limitation-of-a-pathname-t-47bc47d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68862%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Murtaza%20Bhurgri%20Woo%20File%20Dropzone&amp;severity=high&amp;id=6998c9f3be58cf853bab8739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68856-improper-neutralization-of-input-du-05949549</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68856%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20keeswolters%20Mopinion%20Feedback%20Form&amp;severity=high&amp;id=6998c9f2be58cf853bab86e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68855-insertion-of-sensitive-information--0c4f6164</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68855%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20themeglow%20JobBoard%20Job%20listing&amp;severity=medium&amp;id=6998c9f2be58cf853bab86e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68854-improper-neutralization-of-input-du-72219380</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68854%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20harman79%20ID%20Arrays&amp;severity=high&amp;id=6998c9f2be58cf853bab86e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68853-deserialization-of-untrusted-data-i-506d20b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68853%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Kleor%20Contact%20Manager&amp;severity=high&amp;id=6998c9f2be58cf853bab86df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68852-improper-neutralization-of-input-du-2bac6d5c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68852%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webmuehle%20Court%20Reservation&amp;severity=high&amp;id=6998c9f2be58cf853bab86dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68848-improper-neutralization-of-input-du-64555e11</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68848%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anmari%20amr%20cron%20manager&amp;severity=high&amp;id=6998c9f2be58cf853bab86d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68847-improper-neutralization-of-input-du-0893a46a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68847%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itex%20iSape&amp;severity=high&amp;id=6998c9f2be58cf853bab86d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68846-improper-neutralization-of-input-du-59a39808</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68846%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Paris%20Holley%20Asynchronous%20Javascript&amp;severity=high&amp;id=6998c9f2be58cf853bab86d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68845-improper-neutralization-of-input-du-c1a8b4ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68845%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aThemeArt%20Translations%20eDS%20Responsive%20Menu&amp;severity=high&amp;id=6998c9f2be58cf853bab86d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68844-improper-neutralization-of-input-du-cb75cd2c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68844%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DaleAB%20Membee%20Login&amp;severity=high&amp;id=6998c9f2be58cf853bab86cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68843-improper-neutralization-of-input-du-8f6fcf3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68843%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bas%20Schuiling%20FeedWordPress%20Advanced%20Filters&amp;severity=high&amp;id=6998c9f0be58cf853bab85d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68842-improper-neutralization-of-input-du-7eab223a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68842%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20totalbounty%20Widget%20Logic%20Visual&amp;severity=high&amp;id=6998c9f0be58cf853bab85cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68841-improper-control-of-filename-for-in-dc039b31</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68841%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Themepul%20TopperPack%20%E2%80%93%20Complete%20Elementor%20Addons%2C%20Theme%20%26%20CPT%20Builder&amp;severity=high&amp;id=6998c9f0be58cf853bab85cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68837-missing-authorization-in-elextensio-def71628</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68837%3A%20Missing%20Authorization%20in%20ELEXtensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=6998c9f0be58cf853bab85c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68834-missing-authorization-in-saiful-isl-51f7d3ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68834%3A%20Missing%20Authorization%20in%20Saiful%20Islam%20Sync%20Master%20Sheet%20%E2%80%93%20Product%20Sync%20with%20Google%20Sheet%20for%20WooCommerce&amp;severity=high&amp;id=6998c9f0be58cf853bab85c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68552-improper-control-of-filename-for-in-47d1e875</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68552%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebCodingPlace%20WooCommerce%20Coming%20Soon%20Product%20with%20Countdown&amp;severity=high&amp;id=6998c9f0be58cf853bab85c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68549-unrestricted-upload-of-file-with-da-f300012a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68549%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Wiguard&amp;severity=critical&amp;id=6998c9f0be58cf853bab85c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68545-improper-control-of-filename-for-in-e55abf46</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68545%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Nika&amp;severity=high&amp;id=6998c9f0be58cf853bab85bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68543-improper-control-of-filename-for-in-ec7a0378</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68543%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Diza&amp;severity=high&amp;id=6998c9f0be58cf853bab85ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68542-missing-authorization-in-vgdevsolut-4bad2e8c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68542%3A%20Missing%20Authorization%20in%20vgdevsolutions%20Checkout%20Gateway%20for%20IRIS&amp;severity=medium&amp;id=6998c9f0be58cf853bab85b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68541-deserialization-of-untrusted-data-i-129a58cb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68541%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Ippsum&amp;severity=critical&amp;id=6998c9efbe58cf853bab857d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68539-improper-control-of-filename-for-in-ce4a1980</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68539%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Fana&amp;severity=high&amp;id=6998c9efbe58cf853bab857a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68536-improper-control-of-filename-for-in-c935bbb3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68536%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Zota&amp;severity=high&amp;id=6998c9efbe58cf853bab8577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68534-missing-authorization-in-add-onsorg-81e370f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68534%3A%20Missing%20Authorization%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=medium&amp;id=6998c9efbe58cf853bab8574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68531-deserialization-of-untrusted-data-i-863bd6f5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68531%3A%20Deserialization%20of%20Untrusted%20Data%20in%20modeltheme%20ModelTheme%20Addons%20for%20WPBakery%20and%20Elementor&amp;severity=high&amp;id=6998c9efbe58cf853bab8571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68526-deserialization-of-untrusted-data-i-cbe087a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68526%3A%20Deserialization%20of%20Untrusted%20Data%20in%20A%20WP%20Life%20Modal%20Popup%20Box&amp;severity=high&amp;id=6998c9efbe58cf853bab856e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68514-authorization-bypass-through-user-c-16b1a07c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68514%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cozmoslabs%20Paid%20Member%20Subscriptions&amp;severity=medium&amp;id=6998c9efbe58cf853bab856b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68501-improper-neutralization-of-input-du-bb80394a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68501%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mollie%20Mollie%20Payments%20for%20WooCommerce&amp;severity=high&amp;id=6998c9efbe58cf853bab8568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68495-improper-neutralization-of-input-du-a12344e3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68495%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=6998c9efbe58cf853bab8565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68069-missing-authorization-in-wpwax-dire-46097e51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68069%3A%20Missing%20Authorization%20in%20wpWax%20Directorist&amp;severity=high&amp;id=6998c9efbe58cf853bab8562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68048-missing-authorization-in-xlplugins--6cbcdeeb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68048%3A%20Missing%20Authorization%20in%20XLPlugins%20NextMove%20Lite&amp;severity=high&amp;id=6998c9edbe58cf853bab853a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68037-improper-neutralization-of-input-du-72ad97fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atlas%20Gondal%20Export%20Media%20URLs&amp;severity=high&amp;id=6998c9edbe58cf853bab8537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68032-missing-authorization-in-passionate-ce65cf7a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68032%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20Advanced%20WC%20Analytics&amp;severity=medium&amp;id=6998c9edbe58cf853bab8534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68031-improper-neutralization-of-input-du-36f5d8bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=high&amp;id=6998c9edbe58cf853bab8531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68028-missing-authorization-in-passionate-0531b7c1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68028%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20GA4WP%3A%20Google%20Analytics%20for%20WordPress&amp;severity=medium&amp;id=6998c9edbe58cf853bab852e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68026-missing-authorization-in-niaj-morsh-decb3063</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68026%3A%20Missing%20Authorization%20in%20Niaj%20Morshed%20LC%20Wizard&amp;severity=medium&amp;id=6998c9edbe58cf853bab852b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68025-missing-authorization-in-addonify-a-80dba42c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68025%3A%20Missing%20Authorization%20in%20Addonify%20Addonify%20Floating%20Cart%20For%20WooCommerce&amp;severity=medium&amp;id=6998c9edbe58cf853bab8528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68024-missing-authorization-in-addonify-a-946402e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68024%3A%20Missing%20Authorization%20in%20Addonify%20Addonify%20%E2%80%93%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=6998c9edbe58cf853bab8525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68023-missing-authorization-in-addonify-a-eac8ceeb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68023%3A%20Missing%20Authorization%20in%20Addonify%20Addonify%20%E2%80%93%20Compare%20Products%20For%20WooCommerce&amp;severity=medium&amp;id=6998c9edbe58cf853bab8522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68022-missing-authorization-in-soporteblu-ee8ea804</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68022%3A%20Missing%20Authorization%20in%20soporteblue%20Plugin%20BlueX%20for%20WooCommerce&amp;severity=high&amp;id=6998c9edbe58cf853bab851f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68005-missing-authorization-in-themewant--1a4a0af9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68005%3A%20Missing%20Authorization%20in%20themewant%20Easy%20Hotel%20Booking&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68002-improper-limitation-of-a-pathname-t-04dee762</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68002%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20100plugins%20Open%20User%20Map&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68000-missing-authorization-in-pickplugin-6f6543a3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68000%3A%20Missing%20Authorization%20in%20PickPlugins%20Testimonial%20Slider&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67998-authentication-bypass-using-an-alte-c4558126</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67998%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20kamleshyadav%20Miraculous%20Elementor&amp;severity=high&amp;id=6998c9ecbe58cf853bab84d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67997-deserialization-of-untrusted-data-i-ea8428bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67997%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Travelicious&amp;severity=critical&amp;id=6998c9ecbe58cf853bab84d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67996-deserialization-of-untrusted-data-i-0cb61011</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67996%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Nestin&amp;severity=critical&amp;id=6998c9ecbe58cf853bab84ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67995-deserialization-of-untrusted-data-i-acd7a12c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67995%3A%20Deserialization%20of%20Untrusted%20Data%20in%20LoftOcean%20PatioTime&amp;severity=critical&amp;id=6998c9ecbe58cf853bab84cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67994-missing-authorization-in-yaycommerc-c7ea2cf4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67994%3A%20Missing%20Authorization%20in%20YayCommerce%20YayCurrency&amp;severity=high&amp;id=6998c9ecbe58cf853bab84c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67993-missing-authorization-in-vito-peleg-3197c6fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67993%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67992-improper-control-of-filename-for-in-679a1900</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67992%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LoftOcean%20PatioTime&amp;severity=high&amp;id=6998c9ecbe58cf853bab84c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67991-improper-neutralization-of-input-du-776021b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vanquish%20User%20Extra%20Fields&amp;severity=high&amp;id=6998c9eabe58cf853bab835c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67990-improper-neutralization-of-input-du-3006f4c4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67990%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20GMap%20Targeting&amp;severity=high&amp;id=6998c9eabe58cf853bab8359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67988-improper-control-of-filename-for-in-236db501</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67988%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LoftOcean%20CozyStay&amp;severity=high&amp;id=6998c9eabe58cf853bab8356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67987-improper-neutralization-of-special--112bf3eb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67987%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=high&amp;id=6998c9eabe58cf853bab8353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67984-improper-neutralization-of-input-du-e2f8e180</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20calliko%20NPS%20computy&amp;severity=high&amp;id=6998c9eabe58cf853bab8350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67982-improper-control-of-filename-for-in-712cbfe8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67982%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Urna&amp;severity=high&amp;id=6998c9eabe58cf853bab834d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67981-improper-control-of-filename-for-in-f1219db4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67981%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Besa&amp;severity=high&amp;id=6998c9eabe58cf853bab834a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67980-improper-control-of-filename-for-in-9a55cb06</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67980%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Hara&amp;severity=high&amp;id=6998c9eabe58cf853bab8347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67979-improper-control-of-generation-of-c-bb0bfd2a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67979%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WesternDeal%20WPForms%20Google%20Sheet%20Connector&amp;severity=critical&amp;id=6998c9eabe58cf853bab8344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67978-improper-neutralization-of-input-du-9190c74a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67978%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FixBD%20Educare&amp;severity=high&amp;id=6998c9eabe58cf853bab8341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67977-missing-authorization-in-villatheme-4000ddd1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67977%3A%20Missing%20Authorization%20in%20VillaTheme%20HAPPY&amp;severity=high&amp;id=6998c9e9be58cf853bab830e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67974-missing-authorization-in-wp-legal-p-e9f4f790</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67974%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WPLegalPages&amp;severity=high&amp;id=6998c9e9be58cf853bab830b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67973-missing-authorization-in-sunshineph-1ae5502d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67973%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=medium&amp;id=6998c9e9be58cf853bab8308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67972-improper-neutralization-of-input-du-b07efd45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67972%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Prague&amp;severity=high&amp;id=6998c9e9be58cf853bab8305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67971-improper-neutralization-of-input-du-41121860</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPManageNinja%20FluentCart&amp;severity=high&amp;id=6998c9e9be58cf853bab8302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67970-missing-authorization-in-vertim-sch-71e7bfbc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67970%3A%20Missing%20Authorization%20in%20vertim%20Schedula&amp;severity=medium&amp;id=6998c9e9be58cf853bab82ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67969-missing-authorization-in-knitpay-up-14cf04d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67969%3A%20Missing%20Authorization%20in%20knitpay%20UPI%20QR%20Code%20Payment%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=6998c9e9be58cf853bab82fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67624-missing-authorization-in-arya-dhira-fa3ec6c7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67624%3A%20Missing%20Authorization%20in%20Arya%20Dhiratara%20Optimize%20More!%20%E2%80%93%20Images&amp;severity=medium&amp;id=6998c9e9be58cf853bab82f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67547-missing-authorization-in-uixthemes--a2440eab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67547%3A%20Missing%20Authorization%20in%20uixthemes%20Konte&amp;severity=medium&amp;id=6998c9e9be58cf853bab82f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60183-improper-neutralization-of-input-du-63f9a290</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60183%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silence%20Silencesoft%20RSS%20Reader&amp;severity=medium&amp;id=6998c9e9be58cf853bab82f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60087-improper-control-of-filename-for-in-3f1b81bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60087%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nenad%20Obradovic%20Extensive%20VC%20Addons%20for%20WPBakery%20page%20builder&amp;severity=high&amp;id=6998c9e8be58cf853bab82e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53237-improper-neutralization-of-input-du-1c83c219</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soflyy%20WP%20Wizard%20Cloak&amp;severity=high&amp;id=6998c9e8be58cf853bab82e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53233-improper-neutralization-of-input-du-2e3f291a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RylanH%20Storyform&amp;severity=high&amp;id=6998c9e8be58cf853bab82e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53231-improper-neutralization-of-input-du-8073dcd8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevstudio%20Easy%20Taxonomy%20Images&amp;severity=high&amp;id=6998c9e8be58cf853bab82dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53228-improper-neutralization-of-input-du-f0496251</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53228%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jezza101%20bbpress%20Simple%20Advert%20Units&amp;severity=high&amp;id=6998c9e8be58cf853bab82da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53217-missing-authorization-in-staviravn--0ff7bc23</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53217%3A%20Missing%20Authorization%20in%20staviravn%20AIO%20WP%20Builder&amp;severity=high&amp;id=6998c9e8be58cf853bab82d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52744-improper-control-of-generation-of-c-a7a31bdc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52744%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20inpersttion%20Inpersttion%20For%20Theme&amp;severity=high&amp;id=6998c9e8be58cf853bab82d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56208-improper-neutralization-of-input-du-1b25fa8f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56208%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20desertthemes%20NewsMash&amp;severity=medium&amp;id=6998c9e8be58cf853bab82d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54222-missing-authorization-in-seraphinit-70be42d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54222%3A%20Missing%20Authorization%20in%20Seraphinite%20Solutions%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=6998c9e8be58cf853bab82ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52387-improper-neutralization-of-input-du-a433f62f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52387%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6998c9e8be58cf853bab82cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51915-improper-neutralization-of-input-du-bfa7ecbf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51915%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LiteSpeed%20Technologies%20LiteSpeed%20Cache&amp;severity=medium&amp;id=6998c9e7be58cf853bab82be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50555-improper-neutralization-of-input-du-894cf101</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=medium&amp;id=6998c9e7be58cf853bab82bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50452-improper-neutralization-of-input-du-ad138d1d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=medium&amp;id=6998c9e7be58cf853bab82b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43228-missing-authorization-in-secupress--cc2fda00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43228%3A%20Missing%20Authorization%20in%20SecuPress%20SecuPress%20Free&amp;severity=medium&amp;id=6998c9e7be58cf853bab82b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34438-missing-authorization-in-anssi-lait-aeee1e22</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34438%3A%20Missing%20Authorization%20in%20Anssi%20Laitila%20Shared%20Files&amp;severity=medium&amp;id=6998c9e7be58cf853bab82b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22885-cwe-125-in-enocean-edge-inc-smartse-f22a8efc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22885%3A%20CWE-125%20in%20EnOcean%20Edge%20Inc%20SmartServer%20IoT&amp;severity=low&amp;id=6998c0ac2c4d84f260ce40ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20761-cwe-77-in-enocean-edge-inc-smartser-9757ab30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20761%3A%20CWE-77%20in%20EnOcean%20Edge%20Inc%20SmartServer%20IoT&amp;severity=high&amp;id=6998c42f2c4d84f260d0409d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2847-os-command-injection-in-utt-hiper-52-018dc81b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2847%3A%20OS%20Command%20Injection%20in%20UTT%20HiPER%20520&amp;severity=high&amp;id=6998ca03be58cf853bab939f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2846-os-command-injection-in-utt-hiper-52-0e4310ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2846%3A%20OS%20Command%20Injection%20in%20UTT%20HiPER%20520&amp;severity=high&amp;id=6998ca03be58cf853bab9399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-ransomware-shuts-us-clinics-ics-vuln-e4a097e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Ransomware%20Shuts%20US%20Clinics%2C%20ICS%20Vulnerability%20Surge%2C%20European%20Parliament%20Bans%20AI&amp;severity=medium&amp;id=6998812d2c4d84f260a7f175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52603-cwe-213-exposure-of-sensitive-infor-70398438</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52603%3A%20CWE-213%20%20Exposure%20of%20Sensitive%20Information%20Due%20to%20Incompatible%20Schemas%20in%20HCLSoftware%20Connections&amp;severity=low&amp;id=6998c9e1be58cf853bab6aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mimicrat-clickfix-campaign-delivers-custom-rat-via-6562c0b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MIMICRAT%3A%20ClickFix%20Campaign%20Delivers%20Custom%20RAT%20via%20Compromised%20Legitimate%20Websites&amp;severity=medium&amp;id=6998d62bbe58cf853bbef474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14055-cwe-191-integer-underflow-wrap-or-w-90759bce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14055%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20silabs.com%20Simplicity%20SDK%2C%20Gecko%20SDK&amp;severity=low&amp;id=69987a5a2c4d84f260a3d5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21627-cwe-284-improper-access-control-in--2cdc7bab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21627%3A%20CWE-284%20Improper%20Access%20Control%20in%20tassos.gr%20Novarain%2FTassos%20Framework%20(plg_system_nrframework)&amp;severity=critical&amp;id=69986fcd2c4d84f2609bdee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14547-cwe-191-integer-underflow-wrap-or-w-929387be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14547%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20silabs.com%20Simplicity%20SDK&amp;severity=low&amp;id=69986fcd2c4d84f2609bdedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-vulnerability-exploited-in-ransomware--5bc2f812</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Vulnerability%20Exploited%20in%20Ransomware%20Attacks&amp;severity=medium&amp;id=699856fd2c4d84f26027f687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10970-cwe-89-improper-neutralization-of-s-93695009</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10970%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kolay%20Software%20Inc.%20Talentics&amp;severity=critical&amp;id=699849242c4d84f260e0c473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2486-cwe-79-improper-neutralization-of-in-1483f93c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20For%20Elementor%20%E2%80%93%20Widgets%2C%20Extensions%2C%20Theme%20Builder%2C%20Popup%20Builder%20%26%20Template%20Kits&amp;severity=medium&amp;id=699849242c4d84f260e0c476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-20-million-losses-caused-by-700-atm-jackpottin-96c1ed05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20%2420%20Million%20Losses%20Caused%20by%20700%20ATM%20Jackpotting%20Attacks%20in%202025&amp;severity=medium&amp;id=699841e52c4d84f260dc08ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21620-cwe-23-relative-path-traversal-in-e-c649a935</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21620%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Erlang%20OTP&amp;severity=low&amp;id=699842282c4d84f260dc3158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chip-testing-giant-advantest-hit-by-ransomware-94fb5275</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chip%20Testing%20Giant%20Advantest%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=69982ccd2c4d84f260d68ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26050-uncontrolled-search-path-element-in-8a10be9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26050%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Ricoh%20Company%2C%20Ltd.%20%E3%82%B8%E3%83%A7%E3%83%96%E3%83%AD%E3%82%B0%E9%9B%86%E8%A8%88%2F%E5%88%86%E6%9E%90%E3%82%BD%E3%83%95%E3%83%88%E3%82%A6%E3%82%A7%E3%82%A2%20RICOH%E3%82%B8%E3%83%A7%E3%83%96%E3%83%AD%E3%82%B0%E9%9B%86%E8%A8%88%E3%83%84%E3%83%BC%E3%83%AB&amp;severity=high&amp;id=69981b6d2c4d84f260ba1514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59819-vulnerability-in-zenitel-alphacomxe-52bf65ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59819%3A%20Vulnerability%20in%20zenitel%20alphacom_xe_audio_server&amp;severity=medium&amp;id=699817e92c4d84f260b3b7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26370-cross-site-scripting-xss-in-ays-pro-56c43348</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26370%3A%20Cross-site%20scripting%20(XSS)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=medium&amp;id=699814672c4d84f260b0ab28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/promptspy-android-malware-abuses-gemini-ai-at-runt-c11b47db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PromptSpy%20Android%20Malware%20Abuses%20Gemini%20AI%20at%20Runtime%20for%20Persistence&amp;severity=medium&amp;id=69980a3dd7880ec89b828a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2825-cross-site-scripting-in-rachelos-wer-0b8688e2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2825%3A%20Cross%20Site%20Scripting%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=6997ffe5d7880ec89b7f6308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2824-command-injection-in-comfast-cf-e7-9473cc19</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2824%3A%20Command%20Injection%20in%20Comfast%20CF-E7&amp;severity=medium&amp;id=6997f559d7880ec89b7a587f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2823-command-injection-in-comfast-cf-e7-d06bcd96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2823%3A%20Command%20Injection%20in%20Comfast%20CF-E7&amp;severity=medium&amp;id=6997ee52d7880ec89b7878ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2739-infinite-loop-in-bnjs-275193c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2739%3A%20Infinite%20loop%20in%20bn.js&amp;severity=medium&amp;id=6997ee52d7880ec89b7878a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2822-sql-injection-in-jeecgboot-80678eca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2822%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=6997e749d7880ec89b76b0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26996-cwe-1333-inefficient-regular-expres-e16ebdd4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26996%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20isaacs%20minimatch&amp;severity=high&amp;id=6997d231d7880ec89b52f4e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26994-cwe-693-protection-mechanism-failur-b9c23838</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26994%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20refraction-networking%20utls&amp;severity=medium&amp;id=6997d231d7880ec89b52f4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27017-cwe-1240-use-of-a-cryptographic-pri-4912fee6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27017%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20refraction-networking%20utls&amp;severity=low&amp;id=6997d231d7880ec89b52f4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26993-cwe-79-improper-neutralization-of-i-e0932b1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26993%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FlintSH%20Flare&amp;severity=medium&amp;id=6997d231d7880ec89b52f4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2821-sql-injection-in-fujian-smart-integr-beb955f4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2821%3A%20SQL%20Injection%20in%20Fujian%20Smart%20Integrated%20Management%20Platform%20System&amp;severity=medium&amp;id=6997d231d7880ec89b52f4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2384-cwe-79-improper-neutralization-of-in-9ab065e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2384%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Quiz%20Maker&amp;severity=medium&amp;id=6997d231d7880ec89b52f4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2820-sql-injection-in-fujian-smart-integr-6e17dc32</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2820%3A%20SQL%20Injection%20in%20Fujian%20Smart%20Integrated%20Management%20Platform%20System&amp;severity=medium&amp;id=6997c421d7880ec89b4b332d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26065-cwe-22-improper-limitation-of-a-pat-53326093</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26065%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=critical&amp;id=6997c421d7880ec89b4b3324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26064-cwe-22-improper-limitation-of-a-pat-71d04e0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26064%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=critical&amp;id=6997c421d7880ec89b4b3320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2819-missing-authorization-in-dromara-ruo-8f2bcf3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2819%3A%20Missing%20Authorization%20in%20Dromara%20RuoYi-Vue-Plus&amp;severity=medium&amp;id=6997c421d7880ec89b4b3328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26960-cwe-22-improper-limitation-of-a-pat-f4c7978c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26960%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=6997b995d7880ec89b49375c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26980-cwe-89-improper-neutralization-of-s-8eb7ae8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26980%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TryGhost%20Ghost&amp;severity=critical&amp;id=6997b995d7880ec89b493764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26977-cwe-862-missing-authorization-in-fr-ffbb104f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26977%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frappe%20lms&amp;severity=medium&amp;id=6997b995d7880ec89b493761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26975-cwe-73-external-control-of-file-nam-f0001b29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26975%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20music-assistant%20server&amp;severity=high&amp;id=6997b28bd7880ec89b4763b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26974-cwe-829-inclusion-of-functionality--308fd3d3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26974%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Tygo-van-den-Hurk%20Slyde&amp;severity=high&amp;id=6997b28bd7880ec89b4763ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30416-cwe-862-in-acronis-acronis-cyber-pr-18eb4836</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30416%3A%20CWE-862%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=critical&amp;id=6997b28bd7880ec89b4763a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30410-cwe-306-in-acronis-acronis-cyber-pr-860d526f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30410%3A%20CWE-306%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=critical&amp;id=6997b28bd7880ec89b47639b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30412-cwe-1390-in-acronis-acronis-cyber-p-987c0858</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30412%3A%20CWE-1390%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=critical&amp;id=6997b28bd7880ec89b4763a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30411-cwe-1390-in-acronis-acronis-cyber-p-fb33b5b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30411%3A%20CWE-1390%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=critical&amp;id=6997b28bd7880ec89b47639e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26967-cwe-122-heap-based-buffer-overflow--08daf09a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26967%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=6997b28bd7880ec89b4763a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-20-83513d60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-20&amp;severity=medium&amp;id=6998f951be58cf853be4de6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67438-na-a723b11f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67438%3A%20n%2Fa&amp;severity=medium&amp;id=6998ca03be58cf853bab9395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70831-na-fa79fcf8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70831%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9ffbe58cf853bab91d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26722-na-4b78286c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26722%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9e7be58cf853bab82a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26721-na-eb123149</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26721%3A%20n%2Fa&amp;severity=high&amp;id=6998c9e7be58cf853bab829d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70833-na-f5cb3103</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70833%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9e7be58cf853bab829a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26745-na-81cf31d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26745%3A%20n%2Fa&amp;severity=medium&amp;id=6998c9e6be58cf853bab77eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26747-na-b48669ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26747%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9e6be58cf853bab77d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26746-na-0aa41fc0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26746%3A%20n%2Fa&amp;severity=high&amp;id=69988bee2c4d84f260ae23de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26725-na-693f5a50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26725%3A%20n%2Fa&amp;severity=critical&amp;id=69988bee2c4d84f260ae23db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26724-na-c05ea1f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26724%3A%20n%2Fa&amp;severity=high&amp;id=69988bee2c4d84f260ae23d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26723-na-edc024f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26723%3A%20n%2Fa&amp;severity=high&amp;id=69988bee2c4d84f260ae23d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-20-dbe5a726</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-20&amp;severity=medium&amp;id=699848ea2c4d84f260df6052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-20-483261dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-20&amp;severity=low&amp;id=6997bce2d7880ec89b49f57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26964-cwe-200-exposure-of-sensitive-infor-8aa0004f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26964%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20windmill-labs%20windmill&amp;severity=low&amp;id=6997a804d7880ec89b3e50e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26957-cwe-209-generation-of-error-message-7d2335a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26957%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20abhinavxd%20github.com%2Fabhinavxd%2Flibredesk&amp;severity=medium&amp;id=6997a0f9d7880ec89b3c537a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26959-cwe-829-inclusion-of-functionality--f5a9dc71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26959%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=69979d74d7880ec89b3b86a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2350-insertion-of-sensitive-information-i-31b4d7ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2350%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20Interact&amp;severity=medium&amp;id=699799f2d7880ec89b3a60c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1292-insertion-of-sensitive-information-i-909b0d7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1292%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20Trends&amp;severity=medium&amp;id=699799f2d7880ec89b3a60be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2605-insertion-of-sensitive-information-i-48b70d08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2605%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20TanOS&amp;severity=medium&amp;id=699799f2d7880ec89b3a60ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2408-use-after-free-in-tanium-cloud-workl-a7d99991</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2408%3A%20Use%20After%20Free%20in%20Tanium%20Cloud%20Workloads&amp;severity=medium&amp;id=699799f2d7880ec89b3a60c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2435-improper-neutralization-of-special-e-0dedcf2a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2435%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tanium%20Asset&amp;severity=medium&amp;id=699799f2d7880ec89b3a60c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26958-cwe-665-improper-initialization-in--5a8d8b28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26958%3A%20CWE-665%3A%20Improper%20Initialization%20in%20FiloSottile%20filippo.io%2Fedwards25519&amp;severity=low&amp;id=699799f2d7880ec89b3a60d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26953-cwe-20-improper-input-validation-in-8d5e6ff8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26953%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pi-hole%20web&amp;severity=medium&amp;id=699799f2d7880ec89b3a60cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26952-cwe-20-improper-input-validation-in-df9bf6c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26952%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pi-hole%20web&amp;severity=medium&amp;id=6997966bd7880ec89b39b1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1658-cwe-451-user-interface-ui-misreprese-a1f01e7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1658%3A%20CWE-451%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20OpenText%E2%84%A2%20Directory%20Services&amp;severity=medium&amp;id=6997966bd7880ec89b39b1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9208-cwe-79-improper-neutralization-of-in-929ee02c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9208%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%E2%84%A2%20Web%20Site%20Management%20Server&amp;severity=high&amp;id=6997966bd7880ec89b39b1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13671-cwe-352-cross-site-request-forgery--32f486e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13671%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenText%E2%84%A2%20Web%20Site%20Management%20Server&amp;severity=medium&amp;id=6997966bd7880ec89b39b1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13672-cwe-79-improper-neutralization-of-i-90740624</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%E2%84%A2%20Web%20Site%20Management%20Server&amp;severity=high&amp;id=6997966bd7880ec89b39b1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24122-cwe-295-improper-certificate-valida-6ee03aa4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24122%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20sigstore%20cosign&amp;severity=low&amp;id=69978f65d7880ec89b384555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8054-cwe-22-improper-limitation-of-a-path-4a1532b2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8054%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenText%E2%84%A2%20XM%20Fax&amp;severity=high&amp;id=69978f65d7880ec89b38454f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8055-cwe-918-server-side-request-forgery--f0ad7d95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8055%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20OpenText%E2%84%A2%20XM%20Fax&amp;severity=medium&amp;id=69978f65d7880ec89b384552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21535-cwe-284-improper-access-control-in--009ed0d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21535%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Teams&amp;severity=high&amp;id=699812ae2c4d84f260aeb027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26275-cwe-354-improper-validation-of-inte-950dde7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26275%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20junkurihara%20httpsig-rs&amp;severity=high&amp;id=699784dbd7880ec89b358466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26315-cwe-203-observable-discrepancy-in-e-62cd0e05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26315%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20ethereum%20go-ethereum&amp;severity=medium&amp;id=69978157d7880ec89b34978b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26314-cwe-20-improper-input-validation-in-4cb96009</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26314%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ethereum%20go-ethereum&amp;severity=high&amp;id=69978157d7880ec89b349786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26313-cwe-770-allocation-of-resources-wit-4e11e521</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26313%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ethereum%20go-ethereum&amp;severity=medium&amp;id=69977dd1d7880ec89b33bbe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26312-cwe-770-allocation-of-resources-wit-7acc7255</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26312%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20stalwartlabs%20stalwart&amp;severity=medium&amp;id=69977dd1d7880ec89b33bbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27114-cwe-835-loop-with-unreachable-exit--1b68482c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27114%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=69977dd1d7880ec89b33bbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27014-cwe-674-uncontrolled-recursion-in-m-f769ac9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27014%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699812af2c4d84f260aeb048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27476-improper-neutralization-of-special--c7ddf948</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27476%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Bixat%20RustFly&amp;severity=critical&amp;id=699812af2c4d84f260aeb05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26282-cwe-126-buffer-over-read-in-m2team--9d414d04</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26282%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699812af2c4d84f260aeb044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27440-improper-neutralization-of-input-du-8b27954b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27440%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20myCred&amp;severity=medium&amp;id=699812af2c4d84f260aeb05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27387-missing-authorization-in-designinve-9c9522c2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27387%3A%20Missing%20Authorization%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=699812af2c4d84f260aeb057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27368-missing-authorization-in-seedprod-c-d0069c9f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27368%3A%20Missing%20Authorization%20in%20SeedProd%20Coming%20Soon%20Page%2C%20Under%20Construction%20%26%20Maintenance%20Mode%20by%20SeedProd&amp;severity=medium&amp;id=699812af2c4d84f260aeb054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27360-improper-neutralization-of-input-du-2e9761ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010Web%20Photo%20Gallery%20by%2010Web&amp;severity=medium&amp;id=699812af2c4d84f260aeb051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27343-improper-control-of-filename-for-in-8ee1e181</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27343%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20VanKarWai%20Airtifact&amp;severity=high&amp;id=699812af2c4d84f260aeb04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27328-missing-authorization-in-devsblink--83eee8d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27328%3A%20Missing%20Authorization%20in%20DevsBlink%20EduBlink&amp;severity=medium&amp;id=699784dbd7880ec89b35847f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27327-missing-authorization-in-yaycommerc-2d0152ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27327%3A%20Missing%20Authorization%20in%20YayCommerce%20YayMail&amp;severity=medium&amp;id=699812af2c4d84f260aeb04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-threats-using-genai-usher-in-a-new-era-6e840891</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20threats%20using%20GenAI%20usher%20in%20a%20new%20era&amp;severity=medium&amp;id=69985e042c4d84f2604e723d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2738-cwe-131-incorrect-calculation-of-buf-20bc2c53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2738%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20OpenVPN%20ovpn-dco-win&amp;severity=medium&amp;id=699812b02c4d84f260aeb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26318-cwe-78-improper-neutralization-of-s-7d41b3c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26318%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sebhildebrandt%20systeminformation&amp;severity=high&amp;id=69978157d7880ec89b3497b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/under-the-hood-of-dynowiper-thu-feb-19th-48c2f7c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Under%20the%20Hood%20of%20DynoWiper%2C%20(Thu%2C%20Feb%2019th)&amp;severity=medium&amp;id=69976885d7880ec89b2d6bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26280-cwe-78-improper-neutralization-of-s-31a2a73c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26280%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sebhildebrandt%20systeminformation&amp;severity=high&amp;id=69978157d7880ec89b3497ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26278-cwe-776-improper-restriction-of-rec-355d55b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26278%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=high&amp;id=69978157d7880ec89b3497a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27013-cwe-79-improper-neutralization-of-i-2ccb5e6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27013%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fabricjs%20fabric.js&amp;severity=high&amp;id=69978157d7880ec89b3497cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26267-cwe-670-always-incorrect-control-fl-d3fc9f12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26267%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20stellar%20rs-soroban-sdk&amp;severity=high&amp;id=69978157d7880ec89b3497a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26205-cwe-863-incorrect-authorization-in--708376a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26205%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20open-policy-agent%20opa-envoy-plugin&amp;severity=high&amp;id=69978157d7880ec89b34979b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26203-cwe-416-use-after-free-in-pjsip-pjm-a4f01553</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26203%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjmedia-video&amp;severity=medium&amp;id=69978157d7880ec89b349797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26201-cwe-362-concurrent-execution-using--74d92c70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26201%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20jm33-m0%20emp3r0r&amp;severity=high&amp;id=69978157d7880ec89b349792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26200-cwe-122-heap-based-buffer-overflow--cf8f880a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26200%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20HDFGroup%20hdf5&amp;severity=high&amp;id=699784dbd7880ec89b35847c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26189-cwe-78-improper-neutralization-of-s-0d1acbd7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26189%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20aquasecurity%20trivy-action&amp;severity=medium&amp;id=699784dbd7880ec89b358477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26063-cwe-20-improper-input-validation-in-f84fe624</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26063%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20xpertforextradeinc%20CediPay&amp;severity=high&amp;id=699784dbd7880ec89b358474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26059-cwe-79-improper-neutralization-of-i-dec12dc7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26059%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=low&amp;id=699784dbd7880ec89b358471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26057-cwe-668-exposure-of-resource-to-wro-3cb17f96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26057%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20cisco-ai-defense%20skill-scanner&amp;severity=medium&amp;id=699784dbd7880ec89b35846d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23621-cwe-203-observable-discrepancy-in-g-89bef3ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23621%3A%20CWE-203%20Observable%20Discrepancy%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23620-cwe-203-observable-discrepancy-in-g-00e9e3a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23620%3A%20CWE-203%20Observable%20Discrepancy%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23619-cwe-79-improper-neutralization-of-i-0ba70a1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23618-cwe-79-improper-neutralization-of-i-0f203b95</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23617-cwe-79-improper-neutralization-of-i-1f682953</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23616-cwe-79-improper-neutralization-of-i-c76edad5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23616%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23615-cwe-79-improper-neutralization-of-i-836d7073</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23614-cwe-79-improper-neutralization-of-i-3647667c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23613-cwe-79-improper-neutralization-of-i-4d93243b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23612-cwe-79-improper-neutralization-of-i-6a6d684d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23611-cwe-79-improper-neutralization-of-i-7afa1f4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23610-cwe-79-improper-neutralization-of-i-baa9798b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23610%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23609-cwe-79-improper-neutralization-of-i-1ae29dc0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23608-cwe-79-improper-neutralization-of-i-4186b949</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23607-cwe-79-improper-neutralization-of-i-d3ef599a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23607%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23606-cwe-79-improper-neutralization-of-i-ab3a8c9d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23606%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2409-cwe-89-improper-neutralization-of-sp-62e3fd17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2409%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Delinea%20Cloud%20Suite&amp;severity=critical&amp;id=69975aafd7880ec89b287cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23605-cwe-79-improper-neutralization-of-i-7eeab11c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23605%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23604-cwe-79-improper-neutralization-of-i-883f38b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23604%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2243-out-of-bounds-read-in-red-hat-red-ha-6a33bed9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2243%3A%20Out-of-bounds%20Read&amp;severity=medium&amp;id=69975aafd7880ec89b287cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2817-cwe-538-insertion-of-sensitive-infor-f124ebf9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2817%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20VMware%20Spring%20Data%20Geode&amp;severity=medium&amp;id=69975ab1d7880ec89b287d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26339-cwe-918-server-side-request-forgery-f1de4ab8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26339%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Hyland%20Alfresco%20Transformation%20Service%20(Enterprise)&amp;severity=critical&amp;id=699747f4532dc41ff8925d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26338-cwe-918-server-side-request-forgery-b8fbc0b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26338%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Hyland%20Alfresco%20Transformation%20Service%20(Enterprise)&amp;severity=medium&amp;id=699747f4532dc41ff8925d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26337-cwe-36-absolute-path-traversal-in-h-328c4a75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26337%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Hyland%20Alfresco%20Transformation%20Service%20(Enterprise)&amp;severity=high&amp;id=699747f4532dc41ff8925d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2232-cwe-89-improper-neutralization-of-sp-42d3fb6b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2232%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wcproducttable%20Product%20Table%20and%20List%20Builder%20for%20WooCommerce%20Lite&amp;severity=high&amp;id=699740bf3af16a0ef60c5452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1581-cwe-89-improper-neutralization-of-sp-1b58bb62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1581%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=699740bf3af16a0ef60c544c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26030-cwe-94-improper-control-of-generati-8c490551</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26030%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20microsoft%20semantic-kernel&amp;severity=critical&amp;id=69973b6be884a8a4cb409743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26336-cwe-863-incorrect-authorization-in--91415450</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26336%3A%20CWE-863%20Incorrect%20Authorization%20in%20Hyland%20Alfresco%20Enterprise&amp;severity=high&amp;id=69973b6be884a8a4cb409748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26016-cwe-639-authorization-bypass-throug-e8901bb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26016%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pterodactyl%20panel&amp;severity=critical&amp;id=69973b6be884a8a4cb40973f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25998-cwe-323-reusing-a-nonce-key-pair-in-650a41e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25998%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20strongswan%20strongMan&amp;severity=high&amp;id=69973b6be884a8a4cb40973c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25766-cwe-22-improper-limitation-of-a-pat-bf9abee8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25766%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20labstack%20echo&amp;severity=medium&amp;id=69973b6be884a8a4cb40974c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25940-cwe-116-improper-encoding-or-escapi-3b5e393d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25940%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69973033732724e9dc4fe1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/banners-bots-and-butchers-the-ai-driven-long-con-i-201d23f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Banners%2C%20Bots%20and%20Butchers%3A%20The%20AI-Driven%20Long%20Con%20in%20Asia&amp;severity=medium&amp;id=69974c64d7880ec89b0185a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dns-used-to-hide-fake-investment-platform-schemes-6f0a62ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DNS%20Used%20to%20Hide%20Fake%20Investment%20Platform%20Schemes&amp;severity=medium&amp;id=69974fe8d7880ec89b065c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-malicious-cryptocurrency-scam-domains-a-3f601d65</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Malicious%20Cryptocurrency%20Scam%20Domains%20and%20Hacked%20YouTube%20Channels&amp;severity=medium&amp;id=69974fe8d7880ec89b065c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-in-action-how-fake-captcha-can-encrypt-an-cb7d2d98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20in%20action%3A%20how%20fake%20captcha%20can%20encrypt%20an%20entire%20company&amp;severity=medium&amp;id=69974fe8d7880ec89b065be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-homebrew-pages-deliver-cuckoo-stealer-via-cli-06fd4ca1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Homebrew%20Pages%20Deliver%20Cuckoo%20Stealer%20via%20ClickFix%20%7C%20macOS%20Threat%20Hunting%20Analysis&amp;severity=medium&amp;id=69974fe8d7880ec89b065bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-curious-case-of-the-triton-malware-fork-7ad7ab52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Curious%20Case%20of%20the%20Triton%20Malware%20Fork&amp;severity=medium&amp;id=69974fe8d7880ec89b065bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/invitation-to-trouble-the-rise-of-calendar-phishin-a8d550c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Invitation%20to%20Trouble%3A%20The%20Rise%20of%20Calendar%20Phishing%20Attacks&amp;severity=medium&amp;id=69974fe8d7880ec89b065bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2274-cwe-918-server-side-request-forgery--9b739968</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2274%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20AppSheet%20AppSheet%20Web%20(Main%20Server)&amp;severity=high&amp;id=69973033732724e9dc4fe1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-government-says-12-million-bank-accounts-ex-c8159355</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Government%20Says%201.2%20Million%20Bank%20Accounts%20Exposed%20in%20Breach&amp;severity=medium&amp;id=699727c07e7f1adb9b09d85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71250-37952455</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71250&amp;severity=null&amp;id=699812b02c4d84f260aeb08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71249-9c5c2bd7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71249&amp;severity=null&amp;id=699812b02c4d84f260aeb08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71248-06ef444d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71248&amp;severity=null&amp;id=699812b02c4d84f260aeb08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71247-6402c740</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71247&amp;severity=null&amp;id=699812b02c4d84f260aeb088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71246-69173469</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71246&amp;severity=null&amp;id=69973033732724e9dc4fe1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71245-8ab54884</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71245&amp;severity=null&amp;id=69973033732724e9dc4fe1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71243-improper-control-of-generation-of-c-2638c8dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71243%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SPIP%20Saisies%20pour%20formulaire&amp;severity=critical&amp;id=69972933732724e9dc4156ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25755-cwe-94-improper-control-of-generati-50f78405</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25755%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20parallax%20jsPDF&amp;severity=high&amp;id=6997264f5215391843713250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25535-cwe-400-uncontrolled-resource-consu-f7e35d0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25535%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20parallax%20jsPDF&amp;severity=high&amp;id=6997264f521539184371324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25527-cwe-22-improper-limitation-of-a-pat-fbd70c8f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25527%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=medium&amp;id=6997227c0018ac3e97d29273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2744-a-blind-time-based-sql-injection-exi-c9474617</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2744&amp;severity=null&amp;id=699718e0b557332a80facb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nearly-1-million-user-records-compromised-in-figur-3dddb4f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nearly%201%20Million%20User%20Records%20Compromised%20in%20Figure%20Data%20Breach&amp;severity=medium&amp;id=69970e21b557332a80f47921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-exploitation-surges-as-zero-day-attacks-tra-6b929eb3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Exploitation%20Surges%20as%20Zero-Day%20Attacks%20Traced%20Back%20to%20July%202025&amp;severity=medium&amp;id=6996fcc88fb9188dea8dc9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9953-cwe-566-authorization-bypass-through-d2732060</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9953%3A%20CWE-566%20Authorization%20Bypass%20Through%20User-Controlled%20SQL%20Primary%20Key%20in%20DATABASE%20Software%20Training%20Consulting%20Ltd.%20Databank%20Accreditation%20Software&amp;severity=critical&amp;id=6996fd118fb9188dea8e12c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-exposure-to-exploitation-how-ai-collapses-you-4f26d7b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Exposure%20to%20Exploitation%3A%20How%20AI%20Collapses%20Your%20Response%20Window&amp;severity=low&amp;id=6996fcb68fb9188dea8dba1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8350-cwe-698-execution-after-redirect-ear-309eb7b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8350%3A%20CWE-698%20Execution%20After%20Redirect%20(EAR)%20in%20Inrove%20Software%20and%20Internet%20Services%20BiEticaret%20CMS&amp;severity=critical&amp;id=6996f9728fb9188dea8891b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arkanix-stealer-targets-a-variety-of-data-offers-a-3dad42b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arkanix%20Stealer%20targets%20a%20variety%20of%20data%2C%20offers%20a%20MaaS%20referral%20program&amp;severity=medium&amp;id=69970717b557332a80d468e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dont-trustconnect-its-a-rat-in-an-rmm-hat-b510e7bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=(Don&apos;t)%20TrustConnect%3A%20It&apos;s%20a%20RAT%20in%20an%20RMM%20hat&amp;severity=medium&amp;id=69970717b557332a80d468cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-malicious-oauth-campaigns-in-entra-id-98390171</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Malicious%20OAuth%20Campaigns%20in%20Entra%20ID&amp;severity=medium&amp;id=69970717b557332a80d4689b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-iptv-app-terminates-your-savings-9a8666f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20your%20IPTV%20app%20terminates%20your%20savings&amp;severity=medium&amp;id=69970717b557332a80d468c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15563-cwe-862-missing-authorization-in-ne-95441c78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15563%3A%20CWE-862%20Missing%20Authorization%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=medium&amp;id=6996efe46aea4a407a546d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-security-issues-continue-as-secureclaw-op-ca5db0ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Security%20Issues%20Continue%20as%20SecureClaw%20Open%20Source%20Tool%20Debuts&amp;severity=medium&amp;id=6996ef9e6aea4a407a546318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9062-cwe-639-authorization-bypass-through-3859c6ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9062%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MeCODE%20Informatics%20and%20Engineering%20Services%20Ltd.%20Envanty&amp;severity=high&amp;id=6996efe46aea4a407a546d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15562-cwe-79-improper-neutralization-of-i-8a71ee5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15562%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=medium&amp;id=6996efe46aea4a407a546d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15561-cwe-269-improper-privilege-manageme-7dcf7ca4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15561%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=high&amp;id=6996efe46aea4a407a546d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15560-cwe-89-improper-neutralization-of-s-f69ba2aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15560%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=high&amp;id=6996efe46aea4a407a546d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15559-cwe-78-improper-neutralization-of-s-b731eacc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15559%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=critical&amp;id=6996efe46aea4a407a546d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13590-vulnerability-in-wso2-wso2-api-mana-b8162e66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13590%3A%20Vulnerability%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=6996e1c36aea4a407a50ab8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12107-cwe-1336-improper-neutralization-of-29bfd138</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12107%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=high&amp;id=6996e1c36aea4a407a50ab8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1219-cwe-639-authorization-bypass-through-443dcd1e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1219%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2718-cwe-79-improper-neutralization-of-in-6113053f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2718%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dealia%20Dealia%20%E2%80%93%20Request%20a%20quote&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2716-cwe-79-improper-neutralization-of-in-872e7bb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2716%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amu02aftab%20Client%20Testimonial%20Slider&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1461-cwe-230-improper-handling-of-missing-fe7cd9e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1461%3A%20CWE-230%20Improper%20Handling%20of%20Missing%20Values%20in%20wpinsider-1%20Simple%20Membership&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22267-cwe-266-incorrect-privilege-assignm-254d0ded</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22267%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=6996fb458fb9188dea8c0109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/german-rail-giant-deutsche-bahn-hit-by-large-scale-ea70538e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=German%20Rail%20Giant%20Deutsche%20Bahn%20Hit%20by%20Large-Scale%20DDoS%20Attack&amp;severity=medium&amp;id=6996d7026aea4a407a4de64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22268-cwe-266-incorrect-privilege-assignm-7bfe1e59</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22268%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=6996fb458fb9188dea8c010c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22266-cwe-146-improper-neutralization-of--6efabe7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22266%3A%20CWE-146%3A%20Improper%20Neutralization%20of%20Expression%2FCommand%20Delimiters%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=6996fb458fb9188dea8c0105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22269-cwe-940-improper-verification-of-so-b7ee7e18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22269%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=6996d42f6aea4a407a4d2c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41023-cwe-287-improper-authentication-in--2613c504</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41023%3A%20CWE-287%20Improper%20Authentication%20in%20Thesamur%20AutoGPT&amp;severity=medium&amp;id=6996d42f6aea4a407a4d2c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26358-cwe-862-missing-authorization-in-de-3cb4a373</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26358%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996d42f6aea4a407a4d2c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40697-cwe-79-improper-neutralization-of-i-be69e57f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Lewe%20WebMeasure&amp;severity=medium&amp;id=6996d42f6aea4a407a4d2c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26360-cwe-73-external-control-of-file-nam-58de98ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26360%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996d0406aea4a407a4bdbf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2736-cwe-79-improper-neutralization-of-in-36538f08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2736%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Alkacon%20OpenCms&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-via-google-tasks-kaspersky-official-blog-67986fba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20via%20Google%20Tasks%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6996cce46aea4a407a4aeea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2735-cwe-79-improper-neutralization-of-in-2caebd8a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Alkacon%20OpenCms&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26359-cwe-73-external-control-of-file-nam-3c2b5529</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26359%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996d0406aea4a407a4bdbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27094-improper-neutralization-of-input-du-3a6ce8ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoDaddy%20CoBlocks&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27092-missing-authorization-in-greg-winia-42c235cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27092%3A%20Missing%20Authorization%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27090-cross-site-request-forgery-csrf-in--21629815</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27090%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Moose%20Kenta%20Companion&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27074-improper-neutralization-of-input-du-ec830fd8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27074%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vaakash%20Shortcoder&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27069-improper-neutralization-of-input-du-d5ac6a7b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27069%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Soledad&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27066-missing-authorization-in-pi-web-sol-a04d8bc6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27066%3A%20Missing%20Authorization%20in%20PI%20Web%20Solution%20Live%20sales%20notification%20for%20WooCommerce&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27059-improper-neutralization-of-input-du-800fcc52</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Recipe&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27058-improper-neutralization-of-input-du-3546c209</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27058%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Podcast&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27057-improper-neutralization-of-input-du-558cfaf1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Filter%20Everything&amp;severity=medium&amp;id=6996d0406aea4a407a4bdc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27055-missing-authorization-in-pencidesig-c4c69316</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27055%3A%20Missing%20Authorization%20in%20PenciDesign%20Penci%20AI%20SmartContent%20Creator&amp;severity=medium&amp;id=6996d0406aea4a407a4bdc03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27052-improper-control-of-filename-for-in-edeeece4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27052%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20villatheme%20Sales%20Countdown%20Timer%20for%20WooCommerce%20and%20WordPress&amp;severity=high&amp;id=6996d0406aea4a407a4bdc00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27050-cross-site-request-forgery-csrf-in--8fabd6ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27050%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThimPress%20RealPress&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27042-missing-authorization-in-wpdevelope-0b951907</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27042%3A%20Missing%20Authorization%20in%20WPDeveloper%20NotificationX&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25473-missing-authorization-in-aa-team-wz-2422b9e0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25473%3A%20Missing%20Authorization%20in%20AA-Team%20WZone&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25472-improper-neutralization-of-input-du-bcf2c1a1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25463-improper-neutralization-of-input-du-be7e3ad9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25463%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WpEstate%20Wpresidence%20Core&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25459-missing-authorization-in-uixthemes--73feec42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25459%3A%20Missing%20Authorization%20in%20uixthemes%20Sober&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25453-improper-neutralization-of-input-du-b9e30016</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25453%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25451-improper-neutralization-of-input-du-15b76c39</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25451%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25441-missing-authorization-in-varunvaira-f0cb3156</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25441%3A%20Missing%20Authorization%20in%20varunvairavanlc%20LeadConnector&amp;severity=medium&amp;id=69ea9e8d87115cfb686fd784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25432-improper-neutralization-of-input-du-72dd3094</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25432%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omnipressteam%20Omnipress&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25428-server-side-request-forgery-ssrf-in-7cc51cd9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25428%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20totalsoft%20TS%20Poll&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25423-missing-authorization-in-creativein-e1c95667</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25423%3A%20Missing%20Authorization%20in%20creativeinteractivemedia%20Real%203D%20FlipBook&amp;severity=low&amp;id=6996d03e6aea4a407a4bdbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25422-cross-site-request-forgery-csrf-in--259d5f65</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25422%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Themes4WP%20Popularis%20Extra&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25419-missing-authorization-in-flycart-up-adad61a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25419%3A%20Missing%20Authorization%20in%20flycart%20UpsellWP&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25418-improper-neutralization-of-special--7990e464</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25418%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bit%20Apps%20Bit%20Form&amp;severity=high&amp;id=6996d03e6aea4a407a4bdbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25416-missing-authorization-in-blazetheme-79a5f340</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25416%3A%20Missing%20Authorization%20in%20blazethemes%20News%20Kit%20Elementor%20Addons&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25415-missing-authorization-in-iqonicdesi-646705f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25415%3A%20Missing%20Authorization%20in%20iqonicdesign%20WPBookit%20Pro&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25412-missing-authorization-in-mdempfle-a-ec684b57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25412&amp;severity=null&amp;id=6996d03d6aea4a407a4bdb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25411-cross-site-request-forgery-csrf-in--180d3fa1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25411%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themastercut%20Revision%20Manager%20TMC&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25410-missing-authorization-in-tstephenso-4b7b85ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25410%3A%20Missing%20Authorization%20in%20tstephenson%20WP-CORS&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25409-missing-authorization-in-crgeary-ja-dfc92e7f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25409%3A%20Missing%20Authorization%20in%20crgeary%20JAMstack%20Deployments&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25408-missing-authorization-in-pluginrx-b-dba145e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25408%3A%20Missing%20Authorization%20in%20PluginRx%20Broken%20Link%20Notifier&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25404-missing-authorization-in-automattic-4e8ade6a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25404%3A%20Missing%20Authorization%20in%20Automattic%20WP%20Job%20Manager&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25402-missing-authorization-in-echoplugin-d048715d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25402%3A%20Missing%20Authorization%20in%20echoplugins%20Knowledge%20Base%20for%20Documentation%2C%20FAQs%20with%20AI%20Assistance&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25399-missing-authorization-in-cryoutcrea-06781103</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25399%3A%20Missing%20Authorization%20in%20CryoutCreations%20Serious%20Slider&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25395-missing-authorization-in-ikreatethe-1b5ad1e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25395%3A%20Missing%20Authorization%20in%20ikreatethemes%20Business%20Roy&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25394-missing-authorization-in-sparklewpt-6fa71379</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25394%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Fitness%20FSE&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25393-missing-authorization-in-sparklewpt-e54b2b2e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25393%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Hello%20FSE&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25392-url-redirection-to-untrusted-site-o-073f2a0b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25392%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20KaizenCoders%20Update%20URLs%20%E2%80%93%20Quick%20and%20Easy%20way%20to%20search%20old%20links%20and%20replace%20them%20with%20new%20links%20in%20WordPress&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25391-missing-authorization-in-wp-grids-w-7ee36a35</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25391%3A%20Missing%20Authorization%20in%20WP%20Grids%20WP%20Wand&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25389-exposure-of-sensitive-system-inform-28856952</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25389%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Metagauss%20EventPrime&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25388-missing-authorization-in-scripteo-a-1c6db8df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25388%3A%20Missing%20Authorization%20in%20scripteo%20Ads%20Pro&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25387-missing-authorization-in-elementor--19a8b174</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25387%3A%20Missing%20Authorization%20in%20Elementor%20Image%20Optimizer%20by%20Elementor&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25386-missing-authorization-in-elementor--08435fd6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25386%3A%20Missing%20Authorization%20in%20Elementor%20Ally&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25385-server-side-request-forgery-ssrf-in-61b3efa0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25385%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20KaizenCoders%20URL%20Shortify&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25384-missing-authorization-in-wp-lab-wp--d641c9ce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25384%3A%20Missing%20Authorization%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20eBay&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25378-improper-neutralization-of-special--1061033a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25378%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=high&amp;id=6996d03b6aea4a407a4bdb4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25375-missing-authorization-in-wp-chill-i-b047d8e6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25375%3A%20Missing%20Authorization%20in%20WP%20Chill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25374-missing-authorization-in-raratheme--ff689366</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25374%3A%20Missing%20Authorization%20in%20raratheme%20Spa%20and%20Salon&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25372-missing-authorization-in-kodezen-ll-d79d483e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25372%3A%20Missing%20Authorization%20in%20Kodezen%20LLC%20Academy%20LMS&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25370-missing-authorization-in-aresit-wp--e21e150e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25370%3A%20Missing%20Authorization%20in%20AresIT%20WP%20Compress&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25368-missing-authorization-in-codepeople-22306e55</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25368%3A%20Missing%20Authorization%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25367-missing-authorization-in-nootheme-c-d914e208</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25367%3A%20Missing%20Authorization%20in%20NooTheme%20CitiLights&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25364-missing-authorization-in-boldgrid-c-f7a39e1e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25364%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25363-missing-authorization-in-fooplugins-d6a0900a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25363%3A%20Missing%20Authorization%20in%20FooPlugins%20FooGallery&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25362-improper-neutralization-of-input-du-64f8da8f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25362%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FooPlugins%20FooGallery&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25348-missing-authorization-in-alttextai--401d8de9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25348%3A%20Missing%20Authorization%20in%20alttextai%20Download%20Alt%20Text%20AI&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25343-improper-neutralization-of-input-du-ac41061b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VeronaLabs%20WP%20SMS&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25338-missing-authorization-in-ays-pro-ai-66c38245</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25338%3A%20Missing%20Authorization%20in%20Ays%20Pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25337-cross-site-request-forgery-csrf-in--8313170b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25337%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpcoachify%20Coachify&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25336-missing-authorization-in-wpcoachify-998f5918</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25336%3A%20Missing%20Authorization%20in%20wpcoachify%20Coachify&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25335-missing-authorization-in-ays-pro-se-2ea44f1a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25335%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25333-missing-authorization-in-peregrinet-3c853645</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25333%3A%20Missing%20Authorization%20in%20peregrinethemes%20Shopwell&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25332-missing-authorization-in-fahad-mahm-6ec6ce9b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25332%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20Endless%20Posts%20Navigation&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25331-improper-neutralization-of-input-du-aa7a8b7f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25331%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Melapress%20WP%20Activity%20Log&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25330-missing-authorization-in-publishpre-b3ec89fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25330%3A%20Missing%20Authorization%20in%20PublishPress%20PublishPress%20Authors&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25329-missing-authorization-in-expresstec-12fd90b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25329%3A%20Missing%20Authorization%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=6996d0396aea4a407a4bdabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25326-improper-control-of-filename-for-in-65619dcc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cmsmasters%20CMSMasters%20Content%20Composer&amp;severity=high&amp;id=6996d0396aea4a407a4bdabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25325-exposure-of-sensitive-system-inform-6f27c875</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25325%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20rtCamp%20rtMedia%20for%20WordPress%2C%20BuddyPress%20and%20bbPress&amp;severity=medium&amp;id=6996d0396aea4a407a4bdab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25324-authorization-bypass-through-user-c-e4d41ddb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25324%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=6996d0396aea4a407a4bdab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25323-missing-authorization-in-mika-osm-a88b9dab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25323%3A%20Missing%20Authorization%20in%20MiKa%20OSM&amp;severity=medium&amp;id=6996d0396aea4a407a4bdab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25322-cross-site-request-forgery-csrf-in--04f4991e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25322%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PublishPress%20PublishPress%20Revisions&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25321-missing-authorization-in-psm-plugin-d65c99a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25321%3A%20Missing%20Authorization%20in%20PSM%20Plugins%20SupportCandy&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25320-missing-authorization-in-cool-plugi-2a32e607</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25320%3A%20Missing%20Authorization%20in%20Cool%20Plugins%20Elementor%20Contact%20Form%20DB&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25319-cross-site-request-forgery-csrf-in--3b15fc23</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25319%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpzita%20Zita%20Elementor%20Site%20Library&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25318-missing-authorization-in-wisernotif-3f7bb303</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25318%3A%20Missing%20Authorization%20in%20Wisernotify%20team%20WiserReview%20Product%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25316-deserialization-of-untrusted-data-i-59087cd2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25316%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Brainstorm%20Force%20CartFlows&amp;severity=high&amp;id=6996d0386aea4a407a4bda8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25315-missing-authorization-in-hcaptcha-h-07a34daf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25315%3A%20Missing%20Authorization%20in%20hcaptcha%20hCaptcha%20for%20WP&amp;severity=medium&amp;id=6996d0386aea4a407a4bda8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25314-missing-authorization-in-wp-messiah-0418239d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25314%3A%20Missing%20Authorization%20in%20WP%20Messiah%20TOP%20Table%20Of%20Contents&amp;severity=medium&amp;id=6996d0386aea4a407a4bda89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25313-missing-authorization-in-shahjahan--0f6ad9ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25313%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20FluentForm&amp;severity=medium&amp;id=6996d0386aea4a407a4bda86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25311-missing-authorization-in-10up-autos-33062f6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25311%3A%20Missing%20Authorization%20in%2010up%20Autoshare%20for%20Twitter&amp;severity=medium&amp;id=6996d0386aea4a407a4bda83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25310-server-side-request-forgery-ssrf-in-6d72ac77</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25310%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Alobaidi%20Extend%20Link&amp;severity=medium&amp;id=6996d0386aea4a407a4bda80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25308-missing-authorization-in-wpinsider--0b8f7c9b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25308%3A%20Missing%20Authorization%20in%20wp.insider%20Simple%20Membership&amp;severity=medium&amp;id=6996d0386aea4a407a4bda7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25307-improper-neutralization-of-input-du-6dbcd956</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=medium&amp;id=6996d0386aea4a407a4bda7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25305-improper-neutralization-of-input-du-f5beaf43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore&amp;severity=medium&amp;id=6996d0386aea4a407a4bda77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25008-insertion-of-sensitive-information--0dd2307c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25008%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shahjahan%20Jewel%20Ninja%20Tables&amp;severity=medium&amp;id=6996d0386aea4a407a4bda74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25006-improper-neutralization-of-script-r-5b622005</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25006%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%208theme%20XStore&amp;severity=medium&amp;id=6996d0376aea4a407a4bda51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25005-authorization-bypass-through-user-c-6404975d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25005%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20N-Media%20Frontend%20File%20Manager&amp;severity=medium&amp;id=6996d0376aea4a407a4bda4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25004-improper-neutralization-of-input-du-60d5840d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Business%20Directory&amp;severity=medium&amp;id=6996d0376aea4a407a4bda4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25003-missing-authorization-in-madalinung-0b9b2d3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25003%3A%20Missing%20Authorization%20in%20madalin.ungureanu%20Client%20Portal&amp;severity=medium&amp;id=6996d0376aea4a407a4bda48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25000-missing-authorization-in-kraft-plug-cd5f9376</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25000%3A%20Missing%20Authorization%20in%20Kraft%20Plugins%20Wheel%20of%20Life&amp;severity=medium&amp;id=6996d0376aea4a407a4bda45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24392-improper-neutralization-of-input-du-94e77840</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nabil%20Lemsieh%20HurryTimer&amp;severity=medium&amp;id=6996d0376aea4a407a4bda42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24375-missing-authorization-in-wp-swings--9db90c65</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24375%3A%20Missing%20Authorization%20in%20WP%20Swings%20Ultimate%20Gift%20Cards%20For%20WooCommerce&amp;severity=medium&amp;id=6996d0376aea4a407a4bda3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23805-improper-neutralization-of-special--a345d836</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23805%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yoren%20Chang%20Media%20Search%20Enhanced&amp;severity=high&amp;id=6996d0376aea4a407a4bda3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23804-missing-authorization-in-bbr-plugin-8011aa53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23804%3A%20Missing%20Authorization%20in%20BBR%20Plugins%20Better%20Business%20Reviews&amp;severity=medium&amp;id=6996d0376aea4a407a4bda39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23803-server-side-request-forgery-ssrf-in-8ac5dfee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23803%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Burhan%20Nasir%20Smart%20Auto%20Upload%20Images&amp;severity=high&amp;id=6996d0376aea4a407a4bda36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23549-deserialization-of-untrusted-data-i-f6de6946</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23549%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=critical&amp;id=6996d0366aea4a407a4bd9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23548-missing-authorization-in-designinve-984efe83</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23548%3A%20Missing%20Authorization%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23547-missing-authorization-in-cmsmasters-b7a3c615</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23547%3A%20Missing%20Authorization%20in%20cmsmasters%20CMSMasters%20Content%20Composer&amp;severity=high&amp;id=6996d0366aea4a407a4bd9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23545-missing-authorization-in-arubait-de-8215f625</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23545%3A%20Missing%20Authorization%20in%20Aruba.it%20Dev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23544-deserialization-of-untrusted-data-i-d501051b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23544%3A%20Deserialization%20of%20Untrusted%20Data%20in%20codetipi%20Valenti&amp;severity=high&amp;id=6996d0366aea4a407a4bd9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23543-missing-authorization-in-wpdevelope-5a26a14b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23543%3A%20Missing%20Authorization%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23542-deserialization-of-untrusted-data-i-3e8b78cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23542%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=critical&amp;id=6996d0366aea4a407a4bd9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23541-missing-authorization-in-wpfunnels--ff68d94b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23541%3A%20Missing%20Authorization%20in%20WPFunnels%20Mail%20Mint&amp;severity=high&amp;id=6996d0366aea4a407a4bd9ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22422-improper-neutralization-of-script-r-4517dc58</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22422%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpeverest%20Everest%20Forms&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22333-deserialization-of-untrusted-data-i-bb2e8d62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22333%3A%20Deserialization%20of%20Untrusted%20Data%20in%20YITHEMES%20YITH%20WooCommerce%20Compare&amp;severity=high&amp;id=6996d0366aea4a407a4bd9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26362-cwe-23-relative-path-traversal-in-d-60ca4fba</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26362%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996c9266aea4a407a4971ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27056-missing-authorization-in-stellarwp--ebd4b79e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27056%3A%20Missing%20Authorization%20in%20StellarWP%20iThemes%20Sync&amp;severity=medium&amp;id=6996c9266aea4a407a4971f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26361-cwe-73-external-control-of-file-nam-1088a3e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26361%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=medium&amp;id=6996c9266aea4a407a4971eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2733-improper-authorization-in-red-hat-re-a42563f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2733%3A%20Improper%20Authorization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=6996c21f6aea4a407a46d597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2711-server-side-request-forgery-in-zhuto-56075871</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2711%3A%20Server-Side%20Request%20Forgery%20in%20zhutoutoutousan%20worldquant-miner&amp;severity=medium&amp;id=6996be9a6aea4a407a45caee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2681-out-of-bounds-write-2d36b40a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2681%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=6996b7926aea4a407a43b2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1994-cwe-269-improper-privilege-managemen-8fe39267</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1994%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20clavaque%20s2Member%20%E2%80%93%20Excellent%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=critical&amp;id=6996b7926aea4a407a43b2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2731-cwe-22-improper-limitation-of-a-path-c618341d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2731%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DynamicWeb%20DynamicWeb%209&amp;severity=critical&amp;id=6996b7926aea4a407a43b2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2709-open-redirect-in-busy-b1beee0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2709%3A%20Open%20Redirect%20in%20busy&amp;severity=medium&amp;id=6996b08a6aea4a407a42042b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2706-sql-injection-in-code-projects-patie-e3cc38fd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2706%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6996fb458fb9188dea8c0110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2705-out-of-bounds-read-in-open-babel-27ebd2a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2705%3A%20Out-of-Bounds%20Read%20in%20Open%20Babel&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0722-cwe-89-improper-neutralization-of-sp-6a47f717</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0722%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=699697f56aea4a407a3be0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13851-cwe-269-improper-privilege-manageme-f596f457</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13851%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20scriptsbundle%20Buyent&amp;severity=critical&amp;id=699697f36aea4a407a3be048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1373-cwe-79-improper-neutralization-of-in-539fb955</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1373%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lawsonry%20Easy%20Author%20Image&amp;severity=medium&amp;id=699697f56aea4a407a3be103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2284-cwe-862-missing-authorization-in-web-0ddb2ff6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2284%3A%20CWE-862%20Missing%20Authorization%20in%20webangon%20News%20Element%20Elementor%20Blog%20Magazine&amp;severity=medium&amp;id=699697f66aea4a407a3be124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1455-cwe-352-cross-site-request-forgery-c-03feb7a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1455%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20whatsiplus%20Whatsiplus%20Scheduled%20Notification%20for%20Woocommerce&amp;severity=medium&amp;id=699697f66aea4a407a3be115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14445-cwe-79-improper-neutralization-of-i-3ef243b9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20levantoan%20Image%20Hotspot%20by%20DevVN&amp;severity=medium&amp;id=699697f46aea4a407a3be08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0926-cwe-98-improper-control-of-filename--2995b72c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0926%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20prodigycommerce%20Prodigy%20Commerce&amp;severity=critical&amp;id=699697f56aea4a407a3be0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14357-cwe-862-missing-authorization-in-mi-278742bb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14357%3A%20CWE-862%20Missing%20Authorization%20in%20misbahwp%20Mega%20Store%20Woocommerce&amp;severity=medium&amp;id=699697f46aea4a407a3be082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0561-cwe-79-improper-neutralization-of-in-0930a715</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0561%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=699697f56aea4a407a3be0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2504-cwe-862-missing-authorization-in-dea-a89224cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2504%3A%20CWE-862%20Missing%20Authorization%20in%20dealia%20Dealia%20%E2%80%93%20Request%20a%20quote&amp;severity=medium&amp;id=699697f66aea4a407a3be130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14452-cwe-79-improper-neutralization-of-i-7f77f351</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14452%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bompus%20WP%20Customer%20Reviews&amp;severity=high&amp;id=699697f46aea4a407a3be090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14983-cwe-79-improper-neutralization-of-i-a51c85ba</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mattkeys%20Advanced%20Custom%20Fields%3A%20Font%20Awesome%20Field&amp;severity=medium&amp;id=699697f46aea4a407a3be0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14167-cwe-352-cross-site-request-forgery--c7484d26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14167%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20akshayshah5189%20Remove%20Post%20Type%20Slug&amp;severity=medium&amp;id=699697f36aea4a407a3be05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0974-cwe-862-missing-authorization-in-ord-71118a8e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0974%3A%20CWE-862%20Missing%20Authorization%20in%20orderable%20Orderable%20%E2%80%93%20WordPress%20Restaurant%20Online%20Ordering%20System%20and%20Food%20Ordering%20Plugin&amp;severity=high&amp;id=699697f56aea4a407a3be0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14270-cwe-862-missing-authorization-in-wa-38c78435</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14270%3A%20CWE-862%20Missing%20Authorization%20in%20walterpinem%20OneClick%20Chat%20to%20Order&amp;severity=low&amp;id=699697f36aea4a407a3be063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13563-cwe-269-improper-privilege-manageme-f316666c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13563%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20BuddhaThemes%20Lizza%20LMS%20Pro&amp;severity=critical&amp;id=699697f26aea4a407a3bdfcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14851-cwe-79-improper-neutralization-of-i-e9a8e67b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yhunter%20YaMaps%20for%20WordPress%20Plugin&amp;severity=medium&amp;id=699697f46aea4a407a3be099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1044-cwe-79-improper-neutralization-of-in-690d4bbf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20renoiriii%20Tennis%20Court%20Bookings&amp;severity=medium&amp;id=699697f56aea4a407a3be0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14427-cwe-862-missing-authorization-in-pa-7cdb0948</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14427%3A%20CWE-862%20Missing%20Authorization%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=699697f46aea4a407a3be087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14864-cwe-862-missing-authorization-in-vi-94f7408f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14864%3A%20CWE-862%20Missing%20Authorization%20in%20virusdie%20Virusdie%20%E2%80%93%20One-click%20website%20security&amp;severity=medium&amp;id=699697f46aea4a407a3be09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13091-cwe-15-external-control-of-system-o-14fb2f77</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13091%3A%20CWE-15%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20wpfable%20Shopire&amp;severity=medium&amp;id=699697f26aea4a407a3bdfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13603-cwe-862-missing-authorization-in-hu-8ad3cb73</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13603%3A%20CWE-862%20Missing%20Authorization%20in%20husainali52%20WP%20AUDIO%20GALLERY&amp;severity=high&amp;id=699697f26aea4a407a3bdfd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1043-cwe-79-improper-neutralization-of-in-b68931d1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1043%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gagan0123%20PostmarkApp%20Email%20Integrator&amp;severity=medium&amp;id=699697f56aea4a407a3be0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14076-cwe-79-improper-neutralization-of-i-805923c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icount%20iXML%20%E2%80%93%20Google%20XML%20sitemap%20generator&amp;severity=medium&amp;id=699697f36aea4a407a3be059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14342-cwe-862-missing-authorization-in-ci-3aae7fa1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14342%3A%20CWE-862%20Missing%20Authorization%20in%20cifi%20SEO%20Plugin%20by%20Squirrly%20SEO&amp;severity=medium&amp;id=699697f36aea4a407a3be073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0549-cwe-79-improper-neutralization-of-in-d3b6a94d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0549%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itthinx%20Groups&amp;severity=medium&amp;id=699697f46aea4a407a3be0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13738-cwe-79-improper-neutralization-of-i-3e3a57ee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13738%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Easy%20Table%20of%20Contents&amp;severity=medium&amp;id=699697f36aea4a407a3be03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13438-cwe-352-cross-site-request-forgery--f9da7b26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13438%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dienodigital%20Page%20Title%2C%20Description%20%26%20Open%20Graph%20Updater&amp;severity=medium&amp;id=699697f26aea4a407a3bdfc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0556-cwe-79-improper-neutralization-of-in-77332a23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0556%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ishitaka%20XO%20Event%20Calendar&amp;severity=medium&amp;id=699697f56aea4a407a3be0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1047-cwe-79-improper-neutralization-of-in-0644c054</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1047%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goback2%20salavat%20counter%20Plugin&amp;severity=medium&amp;id=699697f56aea4a407a3be0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13842-cwe-639-authorization-bypass-throug-14905ddc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13842%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mtekk%20Breadcrumb%20NavXT&amp;severity=medium&amp;id=699697f36aea4a407a3be043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13864-cwe-862-missing-authorization-in-cl-6b00292c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13864%3A%20CWE-862%20Missing%20Authorization%20in%20cloudways%20Breeze%20Cache&amp;severity=medium&amp;id=699697f36aea4a407a3be04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13617-cwe-79-improper-neutralization-of-i-ef5a0727</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apollo13themes%20Apollo13%20Framework%20Extensions&amp;severity=medium&amp;id=699697f26aea4a407a3bdfe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4521-cwe-285-improper-authorization-in-th-365d2771</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4521%3A%20CWE-285%20Improper%20Authorization%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=high&amp;id=699697f46aea4a407a3be0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2282-cwe-79-improper-neutralization-of-in-6abaa2ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2282%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hollandben%20Slidorion&amp;severity=medium&amp;id=699697f66aea4a407a3be11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12975-cwe-862-missing-authorization-in-wa-022d7735</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12975%3A%20CWE-862%20Missing%20Authorization%20in%20wahid0003%20Product%20Feed%20Manager%20for%20WooCommerce%20%E2%80%93%20CTX%20Feed%20%E2%80%93%20Support%20220%2B%20Shopping%20%26%20Social%20Channels&amp;severity=high&amp;id=699697f26aea4a407a3bdfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0912-cwe-269-improper-privilege-managemen-d24351a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0912%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20toret%20Toret%20Manager&amp;severity=high&amp;id=699697f56aea4a407a3be0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13612-cwe-79-improper-neutralization-of-i-dce9e05b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20essentialplugin%20Album%20and%20Image%20Gallery%20Plus%20Lightbox&amp;severity=medium&amp;id=699697f26aea4a407a3bdfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1405-cwe-434-unrestricted-upload-of-file--bdda35a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1405%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20franchidesign%20Slider%20Future&amp;severity=critical&amp;id=699697f66aea4a407a3be111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13930-cwe-862-missing-authorization-in-qu-74a5a47a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13930%3A%20CWE-862%20Missing%20Authorization%20in%20quadlayers%20Checkout%20Field%20Manager%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=medium&amp;id=699697f36aea4a407a3be053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1646-cwe-79-improper-neutralization-of-in-e044dc38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1646%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iamjaydip%20Advance%20Block%20Extend&amp;severity=medium&amp;id=699697f66aea4a407a3be11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15041-cwe-862-missing-authorization-in-wp-57795334</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15041%3A%20CWE-862%20Missing%20Authorization%20in%20wp_media%20BackWPup%20%E2%80%93%20WordPress%20Backup%20%26%20Restore%20Plugin&amp;severity=high&amp;id=699697f46aea4a407a3be0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14294-cwe-306-missing-authentication-for--b729fef3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14294%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20razorpay%20Razorpay%20for%20WooCommerce&amp;severity=medium&amp;id=699697f36aea4a407a3be06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13413-cwe-352-cross-site-request-forgery--08917483</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13413%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20soyrodriguez%20Country%20Blocker%20for%20AdSense&amp;severity=medium&amp;id=699697f26aea4a407a3bdfc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13732-cwe-79-improper-neutralization-of-i-9d94ce94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clavaque%20s2Member%20%E2%80%93%20Excellent%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=medium&amp;id=699697f26aea4a407a3bdfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13587-cwe-20-improper-input-validation-in-299586cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13587%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ss88_uk%20Two%20Factor%20(2FA)%20Authentication%20via%20Email&amp;severity=medium&amp;id=699697f26aea4a407a3bdfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2502-cwe-79-improper-neutralization-of-in-b4ccae91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yehudah%20xmlrpc%20attacks%20blocker&amp;severity=medium&amp;id=699697f66aea4a407a3be129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2704-out-of-bounds-read-in-open-babel-8733ccdd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2704%3A%20Out-of-Bounds%20Read%20in%20Open%20Babel&amp;severity=medium&amp;id=699697f66aea4a407a3be139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2703-off-by-one-in-xlnt-community-xlnt-0e483827</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2703%3A%20Off-by-One%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69968d666aea4a407a390167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15586-cwe-287-improper-authentication-in--000235d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15586%3A%20CWE-287%20Improper%20Authentication%20in%20OpenGamePanel%20OGP-Website&amp;severity=critical&amp;id=69968d666aea4a407a39015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2702-hard-coded-credentials-in-beetel-777-0a5e4ed2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2702%3A%20Hard-coded%20Credentials%20in%20Beetel%20777VR1&amp;severity=low&amp;id=69968d666aea4a407a390160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12500-cwe-434-unrestricted-upload-of-file-09de847c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12500%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20quadlayers%20Checkout%20Field%20Manager%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=medium&amp;id=69968d656aea4a407a39011c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12081-cwe-862-missing-authorization-in-na-99e39864</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12081%3A%20CWE-862%20Missing%20Authorization%20in%20navzme%20ACF%20Photo%20Gallery%20Field&amp;severity=medium&amp;id=69968d636aea4a407a3900c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13048-cwe-79-improper-neutralization-of-i-80bcab79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statcounter%20StatCounter%20%E2%80%93%20Free%20Real%20Time%20Visitor%20Stats&amp;severity=medium&amp;id=69968d656aea4a407a390139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12117-cwe-79-improper-neutralization-of-i-37d0aa8f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Renden&amp;severity=medium&amp;id=69968d636aea4a407a3900d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13113-cwe-200-exposure-of-sensitive-infor-ef9e08ae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13113%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20accessibewp%20Web%20Accessibility%20by%20accessiBe&amp;severity=medium&amp;id=69968d656aea4a407a390144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12845-cwe-862-missing-authorization-in-es-fca10b3a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12845%3A%20CWE-862%20Missing%20Authorization%20in%20essekia%20Tablesome%20Table%20%E2%80%93%20Contact%20Form%20DB%20%E2%80%93%20WPForms%2C%20CF7%2C%20Gravity%2C%20Forminator%2C%20Fluent&amp;severity=high&amp;id=69968d656aea4a407a39012c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12884-cwe-284-improper-access-control-in--528c8d73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12884%3A%20CWE-284%20Improper%20Access%20Control%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=medium&amp;id=69968d656aea4a407a390134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12821-cwe-352-cross-site-request-forgery--919c4720</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12821%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20spicethemes%20NewsBlogger&amp;severity=high&amp;id=69968d656aea4a407a390128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12116-cwe-79-improper-neutralization-of-i-7a6487d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Drift&amp;severity=medium&amp;id=69968d636aea4a407a3900cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12882-cwe-269-improper-privilege-manageme-16cf93ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12882%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SmartDataSoft%20Clasifico%20Listing&amp;severity=critical&amp;id=69968d656aea4a407a390130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12707-cwe-89-improper-neutralization-of-s-d2c19dbe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12707%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20owthub%20Library%20Management%20System&amp;severity=high&amp;id=69968d656aea4a407a390123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13079-cwe-1241-use-of-predictable-algorit-50fba982</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13079%3A%20CWE-1241%20Use%20of%20Predictable%20Algorithm%20in%20Random%20Number%20Generator%20in%20popupbuilder%20Popup%20Builder%20%E2%80%93%20Create%20highly%20converting%2C%20mobile%20friendly%20marketing%20popups.&amp;severity=medium&amp;id=69968d656aea4a407a39013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12375-cwe-918-server-side-request-forgery-409790b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12375%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20printful%20Printful%20Integration%20for%20WooCommerce&amp;severity=medium&amp;id=69968d636aea4a407a3900d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12451-cwe-79-improper-neutralization-of-i-7d20ae4c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20benjamin_zekavica%20Easy%20SVG%20Support&amp;severity=medium&amp;id=69968d656aea4a407a390117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11754-cwe-862-missing-authorization-in-wp-e1b287bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11754%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Cookie%20Banner%20for%20GDPR%20%2F%20CCPA%20%E2%80%93%20WPLP%20Cookie%20Consent&amp;severity=high&amp;id=69968d636aea4a407a3900bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12172-cwe-352-cross-site-request-forgery--33daff6f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12172%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mailchimp%20Mailchimp%20List%20Subscribe%20Form&amp;severity=medium&amp;id=69968d636aea4a407a3900d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11706-cwe-79-improper-neutralization-of-i-332bc478</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arubadev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=69968d636aea4a407a3900b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12448-cwe-79-improper-neutralization-of-i-82d22b78</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartsupp%20Smartsupp%20%E2%80%93%20live%20chat%2C%20AI%20shopping%20assistant%20and%20chatbots&amp;severity=medium&amp;id=69968d636aea4a407a3900e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11725-cwe-862-missing-authorization-in-ar-5f34b89c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11725%3A%20CWE-862%20Missing%20Authorization%20in%20arubadev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=69968d636aea4a407a3900b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12027-cwe-862-missing-authorization-in-ho-2323287a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12027%3A%20CWE-862%20Missing%20Authorization%20in%20horearadu%20Mesmerize%20Companion&amp;severity=medium&amp;id=69968d636aea4a407a3900c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2693-improper-authorization-in-cocoteanet-cec810f3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2693%3A%20Improper%20Authorization%20in%20CoCoTeaNet%20CyreneAdmin&amp;severity=medium&amp;id=699682d66aea4a407a1958b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2692-path-traversal-in-cocoteanet-cyrenea-1b8f731f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2692%3A%20Path%20Traversal%20in%20CoCoTeaNet%20CyreneAdmin&amp;severity=medium&amp;id=699674c56aea4a407a102a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4960-cwe-863-incorrect-authorization-in-e-60a4c497</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4960%3A%20CWE-863%20Incorrect%20Authorization%20in%20EPSON%20EPSON%20Printer%20Controller%20Installer&amp;severity=high&amp;id=699674c56aea4a407a1029fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2691-sql-injection-in-itsourcecode-event--a1045ded</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2691%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699674c56aea4a407a102a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2690-sql-injection-in-itsourcecode-event--a819ead6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2690%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699666b66aea4a407a031a69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2689-sql-injection-in-itsourcecode-event--cc09d79e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2689%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=69965fae6aea4a407afcc69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2686-os-command-injection-in-seccn-dingch-6d02b310</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2686%3A%20OS%20Command%20Injection%20in%20SECCN%20Dingcheng%20G10&amp;severity=critical&amp;id=699655226aea4a407af3e26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67304-na-25725329</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67304%3A%20n%2Fa&amp;severity=critical&amp;id=699812b02c4d84f260aeb084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67305-na-1d23333f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67305%3A%20n%2Fa&amp;severity=critical&amp;id=699812af2c4d84f260aeb061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-19-7204c9d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-19&amp;severity=medium&amp;id=6997a7c9d7880ec89b3e18d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26744-na-888b51ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26744%3A%20n%2Fa&amp;severity=medium&amp;id=69978157d7880ec89b34978e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69725-na-1bd8ed05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69725%3A%20n%2Fa&amp;severity=medium&amp;id=69973b6be884a8a4cb409738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69674-na-89b2ee83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69674%3A%20n%2Fa&amp;severity=medium&amp;id=69973b6be884a8a4cb409734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-19-04c57537</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-19&amp;severity=medium&amp;id=69972c74732724e9dc48b620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55853-na-10f5b826</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55853%3A%20n%2Fa&amp;severity=critical&amp;id=6997227c0018ac3e97d2926f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-19-9b55a4bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-19&amp;severity=low&amp;id=69969ebf6aea4a407a3d8b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2684-unrestricted-upload-in-tsinghua-unig-ecd78fea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2684%3A%20Unrestricted%20Upload%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=6996519e6aea4a407af2b707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24126-cwe-88-improper-neutralization-of-a-85b85bf7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24126%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69964a966aea4a407af16032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2683-path-traversal-in-tsinghua-unigroup--fa982e7b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2683%3A%20Path%20Traversal%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=699647126aea4a407af0a2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15581-cwe-287-improper-authentication-in--eb504042</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15581%3A%20CWE-287%20Improper%20Authentication%20in%20orthanc-server%20orthanc&amp;severity=medium&amp;id=699647126aea4a407af0a2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2682-sql-injection-in-tsinghua-unigroup-e-980aa67f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2682%3A%20SQL%20Injection%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=6996438e6aea4a407aefe487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12812-cwe-89-improper-neutralization-of-s-40d68e92</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12812%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Delinea%20Inc.%20Cloud%20Suite%20and%20Privileged%20Access%20Service&amp;severity=medium&amp;id=69963c866aea4a407aee80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12811-cwe-444-inconsistent-interpretation-52fa5661</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12811%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Delinea%20Inc.%20Cloud%20Suite%20and%20Privileged%20Access%20Service&amp;severity=medium&amp;id=69963c866aea4a407aee80dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2676-improper-authorization-in-googtech-s-cf4660a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2676%3A%20Improper%20Authorization%20in%20GoogTech%20sms-ssm&amp;severity=medium&amp;id=69963c866aea4a407aee80e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2650-heap-buffer-overflow-in-google-chrom-0bc72c99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2650%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6996357e6aea4a407aec4451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2649-integer-overflow-in-google-chrome-1776d2df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2649%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6996357e6aea4a407aec444d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2648-heap-buffer-overflow-in-google-chrom-8ba8b4eb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2648%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6996357e6aea4a407aec4449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2672-path-traversal-in-tsinghua-unigroup--f5bf5b6d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2672%3A%20Path%20Traversal%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=6996357e6aea4a407aec4455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27181-missing-authorization-in-sergejey-m-847720a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27181%3A%20Missing%20Authorization%20in%20sergejey%20MajorDoMo&amp;severity=high&amp;id=69962e786aea4a407ae9220d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27180-download-of-code-without-integrity--99709b79</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27180%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20sergejey%20MajorDoMo&amp;severity=critical&amp;id=69962e786aea4a407ae92208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27179-improper-neutralization-of-special--08ebabbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27179%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=high&amp;id=69962e786aea4a407ae92203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27178-improper-neutralization-of-input-du-92230b61</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27178%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=medium&amp;id=69962e786aea4a407ae921fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27177-improper-neutralization-of-input-du-8fe6a9fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27177%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=medium&amp;id=69962e786aea4a407ae921f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27176-improper-neutralization-of-input-du-e69a01b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27176%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=medium&amp;id=69962e786aea4a407ae921f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27175-improper-neutralization-of-special--9a0f14bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27175%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=critical&amp;id=69962e786aea4a407ae921ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27174-improper-control-of-generation-of-c-e7d5bad6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27174%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=critical&amp;id=69962e786aea4a407ae921ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2670-os-command-injection-in-advantech-wi-d366eba0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2670%3A%20OS%20Command%20Injection%20in%20Advantech%20WISE-6610&amp;severity=high&amp;id=69962e796aea4a407ae92231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2669-improper-access-controls-in-rongzhit-fabb5c97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2669%3A%20Improper%20Access%20Controls%20in%20Rongzhitong%20Visual%20Integrated%20Command%20and%20Dispatch%20Platform&amp;severity=medium&amp;id=69962e786aea4a407ae92217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27182-missing-authentication-for-critical-1fc2462d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27182%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20saturnremote%20Saturn%20Remote%20Mouse%20Server&amp;severity=high&amp;id=69962e786aea4a407ae92212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0665-out-of-bounds-write-2671d8e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0665%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=69962af36aea4a407ae847e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8860-improper-removal-of-sensitive-inform-32c0e355</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8860%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer&amp;severity=low&amp;id=69962af36aea4a407ae847df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14876-allocation-of-resources-without-lim-2e422163</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14876%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=69962af36aea4a407ae847db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1999-cwe-863-incorrect-authorization-in-g-962c7a88</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1999%3A%20CWE-863%20Incorrect%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69962af36aea4a407ae847ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1355-cwe-862-missing-authorization-in-git-91bfc7af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1355%3A%20CWE-862%20Missing%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69962af36aea4a407ae847e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0573-cwe-601-url-redirection-to-untrusted-fb40cff6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0573%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=699631fa6aea4a407aeb5692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2668-improper-access-controls-in-rongzhit-55d063a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2668%3A%20Improper%20Access%20Controls%20in%20Rongzhitong%20Visual%20Integrated%20Command%20and%20Dispatch%20Platform&amp;severity=medium&amp;id=699631fa6aea4a407aeb569a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2667-improper-access-controls-in-rongzhit-48cfbb24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2667%3A%20Improper%20Access%20Controls%20in%20Rongzhitong%20Visual%20Integrated%20Command%20and%20Dispatch%20Platform&amp;severity=medium&amp;id=6996fb458fb9188dea8c0126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1272-vulnerability-in-fedora-project-fedo-30f9c46b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1272%3A%20Vulnerability%20in%20Fedora%20Project%20Fedora%20Linux&amp;severity=high&amp;id=69962af36aea4a407ae847fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12343-double-free-dde3ee36</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12343%3A%20Double%20Free&amp;severity=low&amp;id=6996fb458fb9188dea8c0122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10256-null-pointer-dereference-58bc4ddc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10256%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=6996fb458fb9188dea8c011c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0577-insufficient-entropy-df53ccfe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0577%3A%20Insufficient%20Entropy&amp;severity=medium&amp;id=6996fb458fb9188dea8c0118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1200-access-of-uninitialized-pointer-in-h-16b69636</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1200%3A%20Access%20of%20Uninitialized%20Pointer%20in%20https%3A%2F%2Fgithub.com%2Frgaufman%2Flive555%20rgaufman%2Flive555&amp;severity=medium&amp;id=699620676aea4a407add8670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2666-unrestricted-upload-in-mingsoft-mcms-c239d51e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2666%3A%20Unrestricted%20Upload%20in%20mingSoft%20MCMS&amp;severity=medium&amp;id=6996fb458fb9188dea8c013a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2665-unrestricted-upload-in-huanzi-qch-ba-223f0da8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2665%3A%20Unrestricted%20Upload%20in%20huanzi-qch%20base-admin&amp;severity=medium&amp;id=6996fb458fb9188dea8c0132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0875-cwe-787-out-of-bounds-write-in-autod-a34a9a01</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0875%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=699620676aea4a407add8679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0874-cwe-787-out-of-bounds-write-in-autod-190be7a3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0874%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=699620676aea4a407add8675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2663-sql-injection-in-alixhan-xh-admin-ba-882bff48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2663%3A%20SQL%20Injection%20in%20Alixhan%20xh-admin-backend&amp;severity=medium&amp;id=6996fb478fb9188dea8c030c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2662-out-of-bounds-read-in-fascinatedbox--0b95d4f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2662%3A%20Out-of-Bounds%20Read%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=6996fb478fb9188dea8c0304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2661-heap-based-buffer-overflow-in-squirr-3af36c3c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2661%3A%20Heap-based%20Buffer%20Overflow%20in%20Squirrel&amp;severity=medium&amp;id=6996fb478fb9188dea8c0319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69287-cwe-573-improper-following-of-speci-c693b5d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69287%3A%20CWE-573%3A%20Improper%20Following%20of%20Specification%20by%20Caller%20in%20bsv-blockchain%20ts-sdk&amp;severity=medium&amp;id=6996fb478fb9188dea8c0320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2660-use-after-free-in-fascinatedbox-lily-056100ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2660%3A%20Use%20After%20Free%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=6996fb498fb9188dea8c09a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14009-cwe-94-improper-control-of-generati-6b025b75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14009%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20nltk%20nltk%2Fnltk&amp;severity=critical&amp;id=69969ef76aea4a407a3d9a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2659-out-of-bounds-read-in-squirrel-abffbf8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2659%3A%20Out-of-Bounds%20Read%20in%20Squirrel&amp;severity=medium&amp;id=6996fb498fb9188dea8c09d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2658-cross-site-request-forgery-in-newbee-e3d0b3db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2658%3A%20Cross-Site%20Request%20Forgery%20in%20newbee-ltd%20newbee-mall&amp;severity=medium&amp;id=6996fb498fb9188dea8c09c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remcos-revisited-inside-the-rats-evolving-command--00631ee6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remcos%20Revisited%3A%20Inside%20the%20RAT&apos;s%20Evolving%20Command-and-Control%20Techniques&amp;severity=medium&amp;id=699612556aea4a407acc7412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20142-information-written-to-log-files-ca-f0d31475</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20142%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20138-information-written-to-log-files-ca-f3c5c5c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20138%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20139-the-software-does-not-properly-cont-7f5310ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20139%3A%20The%20software%20does%20not%20properly%20control%20the%20allocation%20and%20maintenance%20of%20a%20limited%20resource%20thereby%20enabling%20an%20actor%20to%20influence%20the%20amount%20of%20resources%20consumed%2C%20eventually%20leading%20to%20the%20exhaustion%20of%20available%20resources.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=6996fb4b8fb9188dea8c0dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20144-information-written-to-log-files-ca-00300c2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20144%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20141-the-product-exposes-sensitive-infor-3b6f8480</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20141%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=6996fb498fb9188dea8c09bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20137-the-product-exposes-sensitive-infor-4bd9248d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20137%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=6996fb498fb9188dea8c09b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2657-stack-based-buffer-overflow-in-wren--da471de2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2657%3A%20Stack-based%20Buffer%20Overflow%20in%20wren-lang%20wren&amp;severity=medium&amp;id=6996fb498fb9188dea8c09bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2230-cwe-639-authorization-bypass-through-2fdc86b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2230%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6996fb478fb9188dea8c0328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/law-firm-sites-hijacked-in-suspected-supply-chain--44484675</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Law%20Firm%20Sites%20Hijacked%20in%20Suspected%20Supply-Chain%20Attack&amp;severity=medium&amp;id=699612556aea4a407acc7417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2507-cwe-476-null-pointer-dereference-in--04591590</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2507%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=6996fb4b8fb9188dea8c0de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-keenadu-android-malware-found-on-thousands-of--aeb3c090</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Keenadu%20Android%20Malware%20Found%20on%20Thousands%20of%20Devices&amp;severity=medium&amp;id=6995e0ea6aea4a407ac10f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15579-cwe-502-deserialization-of-untruste-8ab4ff09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15579%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20OpenText%E2%84%A2%20Directory%20Services&amp;severity=critical&amp;id=6995da1e6aea4a407abec468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61982-cwe-94-improper-control-of-generati-7ed7f412</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61982%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenCFD%20OpenFOAM&amp;severity=high&amp;id=6995d3146aea4a407abc1a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2656-use-after-free-in-chaiscript-f70f7207</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2656%3A%20Use%20After%20Free%20in%20ChaiScript&amp;severity=low&amp;id=6995d3146aea4a407abc1a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1404-cwe-79-improper-neutralization-of-in-d8b84df7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1404%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=6995cf916aea4a407abb58be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1426-cwe-502-deserialization-of-untrusted-d5d3ff22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1426%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20berocket%20Advanced%20AJAX%20Product%20Filters&amp;severity=high&amp;id=6995cf916aea4a407abb58c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71228-5c740b16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71228&amp;severity=null&amp;id=69a0d69332ffcdb8a26c704b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71226-e967f3fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71226&amp;severity=null&amp;id=69a0d69332ffcdb8a26c7049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27100-vulnerability-in-jenkins-project-je-a7ca03e3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27100%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6995cf916aea4a407abb58cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27099-vulnerability-in-jenkins-project-je-f2bd90c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27099%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=6995cf916aea4a407abb58cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2329-cwe-121-stack-based-buffer-overflow--e34cb0a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2329%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Grandstream%20GXP1610&amp;severity=critical&amp;id=6995cf916aea4a407abb58d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60038-cwe-502-deserialization-of-untruste-df25c0a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60038%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60037-cwe-502-deserialization-of-untruste-3b11b4fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60037%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60036-cwe-502-deserialization-of-untruste-01ac078c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60036%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2655-use-after-free-in-chaiscript-4469a246</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2655%3A%20Use%20After%20Free%20in%20ChaiScript&amp;severity=low&amp;id=6995c8856aea4a407a9d0d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60035-cwe-502-deserialization-of-untruste-4ac47a15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60035%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33240-cwe-94-improper-control-of-generati-7295b46a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33240%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-Bridge&amp;severity=high&amp;id=6995c8836aea4a407a9d0caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33239-cwe-94-improper-control-of-generati-ce2d736d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33239%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-Bridge&amp;severity=high&amp;id=6995c8836aea4a407a9d0caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33253-cwe-502-deserialization-of-untruste-87fed69d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33253%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8856aea4a407a9d0cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33252-cwe-502-deserialization-of-untruste-05b53bca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33252%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8856aea4a407a9d0cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33251-cwe-94-improper-control-of-generati-cf832903</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33251%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8846aea4a407a9d0cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33250-cwe-94-improper-control-of-generati-c81e2e61</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33250%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8846aea4a407a9d0ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33249-cwe-77-improper-neutralization-of-s-fbdebcf6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33249%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8846aea4a407a9d0cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33246-cwe-77-improper-neutralization-of-s-665c462e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33246%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33245-cwe-502-deserialization-of-untruste-52801645</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33245%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33243-cwe-502-deserialization-of-untruste-6f19f5cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33243%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33241-cwe-502-deserialization-of-untruste-f2752c91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33241%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33236-cwe-94-improper-control-of-generati-bab7e094</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33236%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2464-cwe-22-improper-limitation-of-a-path-49dc2395</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2464%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AMR%20AMR%20Printer%20Management%20Beta%20web%20service&amp;severity=high&amp;id=6995c8856aea4a407a9d0d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59920-cwe-89-improper-neutralization-of-s-2feb09f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59920%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20systems%20at%20work%20time%20at%20work&amp;severity=high&amp;id=6995c8856aea4a407a9d0d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8308-cwe-79-improper-neutralization-of-in-80089374</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8308%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Key%20Software%20Solutions%20Inc.%20INFOREX-%20General%20Information%20Management%20System&amp;severity=medium&amp;id=6995cf916aea4a407abb58db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14340-cwe-79-improper-neutralization-of-i-71ccb838</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14340%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Payara%20Platform%20Payara%20Server&amp;severity=high&amp;id=6995cf916aea4a407abb58d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2654-server-side-request-forgery-in-huggi-4f6f3e57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2654%3A%20Server-Side%20Request%20Forgery%20in%20huggingface%20smolagents&amp;severity=medium&amp;id=6995cf936aea4a407abb58fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-in-popular-pdf-platforms-allowed-a-944486e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20in%20Popular%20PDF%20Platforms%20Allowed%20Account%20Takeover%2C%20Data%20Exfiltration&amp;severity=low&amp;id=6995bed580d747be206eb309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaws-found-in-four-vs-code-extensions-wi-563d9726</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaws%20Found%20in%20Four%20VS%20Code%20Extensions%20with%20Over%20125%20Million%20Installs&amp;severity=critical&amp;id=6995bec280d747be206eaf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1441-cwe-79-improper-neutralization-of-in-a4fd3745</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1441%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf936aea4a407abb58f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1440-cwe-79-improper-neutralization-of-in-659e2c74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf936aea4a407abb58f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1439-cwe-79-improper-neutralization-of-in-d1082814</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf936aea4a407abb58f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1438-cwe-79-improper-neutralization-of-in-7aa14847</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1438%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf916aea4a407abb58e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1437-cwe-79-improper-neutralization-of-in-cb0fed4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf916aea4a407abb58e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1436-cwe-639-authorization-bypass-through-46e35fb9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1436%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=high&amp;id=6995cf916aea4a407abb58de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1435-cwe-613-insufficient-session-expirat-34761982</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1435%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=critical&amp;id=6995da1e6aea4a407abec46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1317-cwe-89-improper-neutralization-of-sp-6541c750</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1317%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=medium&amp;id=6995b46b80d747be206b6168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1582-cwe-200-exposure-of-sensitive-inform-e684b84f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1582%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20soflyy%20WP%20All%20Export%20%E2%80%93%20Drag%20%26%20Drop%20Export%20to%20Any%20Custom%20CSV%2C%20XML%20%26%20Excel&amp;severity=low&amp;id=6995b46b80d747be206b616e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2386-cwe-863-incorrect-authorization-in-p-ce591677</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2386%3A%20CWE-863%20Incorrect%20Authorization%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=6995b46b80d747be206b6173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8781-cwe-89-improper-neutralization-of-sp-54f84aa7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8781%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bookster%20Bookster%20%E2%80%93%20WordPress%20Appointment%20Booking%20Plugin&amp;severity=medium&amp;id=6995b46b80d747be206b6163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-campaign-abuses-atlassian-jira-targets-govern-d550c7cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%20Campaign%20Abuses%20Atlassian%20Jira%2C%20Targets%20Government%20and%20Corporate%20Entities&amp;severity=medium&amp;id=6995e8256aea4a407ac323e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7630-cwe-307-improper-restriction-of-exce-e9a6662f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7630%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Doruk%20Communication%20and%20Automation%20Industry%20and%20Trade%20Inc.%20Wispotter&amp;severity=medium&amp;id=6995b0e780d747be206a5422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-tech-predictions-for-2026-operating--d75f27b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20Tech%20Predictions%20for%202026%3A%20Operating%20in%20a%20World%20of%20Permanent%20Instability&amp;severity=medium&amp;id=6995da846aea4a407abee716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14799-cwe-843-access-of-resource-using-in-c4359a93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14799%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20neeraj_slit%20Brevo%20%E2%80%93%20Email%2C%20SMS%2C%20Web%20Push%2C%20Chat%2C%20and%20more.&amp;severity=medium&amp;id=6995a2d880d747be206547e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2653-heap-based-buffer-overflow-in-admesh-c73931a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2653%3A%20Heap-based%20Buffer%20Overflow%20in%20admesh&amp;severity=medium&amp;id=69959f5480d747be2063f039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dell-recoverpoint-for-vms-zero-day-cve-2026-22769--1a732439</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dell%20RecoverPoint%20for%20VMs%20Zero-Day%20CVE-2026-22769%20Exploited%20Since%20Mid-2024&amp;severity=medium&amp;id=6995da846aea4a407abee719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-hackers-exploiting-vulnerability-in-product-o-a099b96b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%3A%20Hackers%20Exploiting%20Vulnerability%20in%20Product%20of%20Taiwan%20Security%20Firm%20TeamT5&amp;severity=medium&amp;id=6995949480d747be205f87ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2426-cwe-22-improper-limitation-of-a-path-3d51e834</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2426%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gamerz%20WP-DownloadManager&amp;severity=medium&amp;id=699594d680d747be205fb508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1942-cwe-862-missing-authorization-in-pr--c306e9aa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1942%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=699594d680d747be205fb502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14444-cwe-345-insufficient-verification-o-ccfaa86b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14444%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=medium&amp;id=699594d680d747be205fb4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11185-cwe-79-improper-neutralization-of-i-3a4690bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11185%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20complianz%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=medium&amp;id=699586ba80d747be2059d036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13727-cwe-79-improper-neutralization-of-i-a926559b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Video%20Share%20VOD%20%E2%80%93%20Turnkey%20Video%20Site%20Builder%20Script&amp;severity=medium&amp;id=699586ba80d747be2059d03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2126-cwe-863-incorrect-authorization-in-s-2ba6c938</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2126%3A%20CWE-863%20Incorrect%20Authorization%20in%20specialk%20User%20Submitted%20Posts%20%E2%80%93%20Enable%20Users%20to%20Submit%20Posts%20from%20the%20Front%20End&amp;severity=medium&amp;id=699586ba80d747be2059d043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1656-cwe-862-missing-authorization-in-str-a682e6d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1656%3A%20CWE-862%20Missing%20Authorization%20in%20strategy11team%20Business%20Directory%20Plugin%20%E2%80%93%20Easy%20Listing%20Directories%20for%20WordPress&amp;severity=medium&amp;id=699578ab80d747be205539d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1649-cwe-79-improper-neutralization-of-in-45919fab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=medium&amp;id=699578ab80d747be205539cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2127-cwe-862-missing-authorization-in-gpr-82301c35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2127%3A%20CWE-862%20Missing%20Authorization%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=699578ab80d747be205539e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2495-cwe-89-improper-neutralization-of-sp-08e20fbb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2495%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20qdonow%20WPNakama%20%E2%80%93%20Team%20and%20multi-Client%20Collaboration%2C%20Editorial%20and%20Project%20Management&amp;severity=high&amp;id=699578ab80d747be205539ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1941-cwe-79-improper-neutralization-of-in-e87c4116</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1941%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xylus%20WP%20Event%20Aggregator%3A%20Import%20Eventbrite%20events%2C%20Meetup%20events%2C%20social%20events%20and%20any%20iCal%20Events%20into%20Event%20Calendar&amp;severity=medium&amp;id=699578ab80d747be205539da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-malware-campaigns-with-reused-material-we-f81192c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20Malware%20Campaigns%20With%20Reused%20Material%2C%20(Wed%2C%20Feb%2018th)&amp;severity=medium&amp;id=6995787680d747be205506ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-fixes-hijacked-update-mechanism-used-to-de-7dc05b1b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Fixes%20Hijacked%20Update%20Mechanism%20Used%20to%20Deliver%20Targeted%20Malware&amp;severity=medium&amp;id=6995909980d747be205dea22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25421-1dcf4a9e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25421&amp;severity=null&amp;id=6995719e80d747be205195d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2112-cwe-352-cross-site-request-forgery-c-a2c12543</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2112%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webguyio%20Dam%20Spam&amp;severity=medium&amp;id=69956e1c80d747be20503e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1831-cwe-862-missing-authorization-in-yay-f8b220fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1831%3A%20CWE-862%20Missing%20Authorization%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=low&amp;id=69956e1c80d747be20503e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1860-cwe-862-missing-authorization-in-wpc-d30e477c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1860%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Kali%20Forms%20%E2%80%94%20Contact%20Form%20%26%20Drag-and-Drop%20Builder&amp;severity=medium&amp;id=69956e1c80d747be20503e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1943-cwe-79-improper-neutralization-of-in-45cd9e0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1943%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=medium&amp;id=69956e1c80d747be20503e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1938-cwe-862-missing-authorization-in-yay-7ae76c05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1938%3A%20CWE-862%20Missing%20Authorization%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=medium&amp;id=69956e1c80d747be20503e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1655-cwe-862-missing-authorization-in-met-24a3e3cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1655%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=69956e1c80d747be20503e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2419-cwe-22-improper-limitation-of-a-path-275cb74b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2419%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gamerz%20WP-DownloadManager&amp;severity=low&amp;id=69956e1c80d747be20503e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dell-recoverpoint-zero-day-exploited-by-chinese-cy-148649a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dell%20RecoverPoint%20Zero-Day%20Exploited%20by%20Chinese%20Cyberespionage%20Group&amp;severity=medium&amp;id=699566e580d747be204cca72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2644-out-of-bounds-read-in-niklasso-minis-3863f627</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2644%3A%20Out-of-Bounds%20Read%20in%20niklasso%20minisat&amp;severity=medium&amp;id=6995672780d747be204d295f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-four-security-flaws-under-active-exploi-14954e9e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Four%20Security%20Flaws%20Under%20Active%20Exploitation%20in%20Latest%20KEV%20Update&amp;severity=low&amp;id=6995909980d747be205dea25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2296-cwe-94-improper-control-of-generatio-5b1b1df0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2296%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20acowebs%20Product%20Addons%20for%20Woocommerce%20%E2%80%93%20Product%20Options%20with%20Custom%20Fields&amp;severity=high&amp;id=6995672780d747be204d2951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2633-cwe-862-missing-authorization-in-ste-269f9374</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2633%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=6995672780d747be204d2959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2281-cwe-79-improper-neutralization-of-in-518f2262</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2281%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20edersonpeka%20Private%20Comment&amp;severity=medium&amp;id=6995672780d747be204d294b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1640-cwe-862-missing-authorization-in-tas-e9acd827</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1640%3A%20CWE-862%20Missing%20Authorization%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20Project%20Management%20%26%20Task%20Management%20Tool%20With%20Kanban%20Board&amp;severity=medium&amp;id=6995672780d747be204d2927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1807-cwe-79-improper-neutralization-of-in-229ebdad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20interactivecalculator%20InteractiveCalculator%20for%20WordPress&amp;severity=medium&amp;id=6995672780d747be204d2933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1937-cwe-862-missing-authorization-in-yay-12c0a139</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1937%3A%20CWE-862%20Missing%20Authorization%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=high&amp;id=6995672780d747be204d293f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1666-cwe-79-improper-neutralization-of-in-3f7d4556</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=6995672780d747be204d292c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1857-cwe-918-server-side-request-forgery--805c3795</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1857%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=6995672780d747be204d2939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2019-cwe-74-improper-neutralization-of-sp-628198fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2019%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20villatheme%20Cart%20All%20In%20One%20For%20WooCommerce&amp;severity=high&amp;id=6995672780d747be204d2945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2642-null-pointer-dereference-in-ggreer-t-3ad53a2e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2642%3A%20NULL%20Pointer%20Dereference%20in%20ggreer%20the_silver_searcher&amp;severity=medium&amp;id=6995600b80d747be204893b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1368-cwe-287-improper-authentication-in-v-252c05b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1368%3A%20CWE-287%20Improper%20Authentication%20in%20Video%20Conferencing%20with%20Zoom&amp;severity=high&amp;id=6995590380d747be20465104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2641-uncontrolled-recursion-in-universal--0b937f98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2641%3A%20Uncontrolled%20Recursion%20in%20universal-ctags%20ctags&amp;severity=medium&amp;id=6995557f80d747be2043e625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12356-cwe-862-missing-authorization-in-ti-2b7bb65c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12356%3A%20CWE-862%20Missing%20Authorization%20in%20tickera%20Tickera%20%E2%80%93%20Sell%20Tickets%20%26%20Manage%20Events&amp;severity=medium&amp;id=6995557f80d747be2043e5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1304-cwe-79-improper-neutralization-of-in-84444595</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1304%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=6995557f80d747be2043e604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12122-cwe-78-improper-neutralization-of-s-95a10c0f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12122%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20wpcalc%20Popup%20Box%20%E2%80%93%20Easily%20Create%20WordPress%20Popups&amp;severity=medium&amp;id=6995557f80d747be2043e5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1072-cwe-352-cross-site-request-forgery-c-9c430d35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1072%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jamesits%20Keybase.io%20Verification&amp;severity=medium&amp;id=6995557f80d747be2043e5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1906-cwe-862-missing-authorization-in-wpo-2766b763</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1906%3A%20CWE-862%20Missing%20Authorization%20in%20wpovernight%20PDF%20Invoices%20%26%20Packing%20Slips%20for%20WooCommerce&amp;severity=medium&amp;id=6995557f80d747be2043e618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1639-cwe-89-improper-neutralization-of-sp-f7f4ef30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1639%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20Project%20Management%20%26%20Task%20Management%20Tool%20With%20Kanban%20Board&amp;severity=medium&amp;id=6995557f80d747be2043e612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11737-cwe-79-improper-neutralization-of-i-22f7971a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kurudrive%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=6995557f80d747be2043e5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2023-cwe-352-cross-site-request-forgery-c-ec86f230</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2023%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brikou%20WP%20Plugin%20Info%20Card&amp;severity=medium&amp;id=6995557f80d747be2043e61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1925-cwe-862-missing-authorization-in-rox-64475f95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1925%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20EmailKit%20%E2%80%93%20Email%20Customizer%20for%20WooCommerce%20%26%20WP&amp;severity=medium&amp;id=6995477080d747be203eb807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2576-cwe-89-improper-neutralization-of-sp-ac9124c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2576%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20strategy11team%20Business%20Directory%20Plugin%20%E2%80%93%20Easy%20Listing%20Directories%20for%20WordPress&amp;severity=high&amp;id=6995477180d747be203eb81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1714-cwe-93-improper-neutralization-of-cr-f05f49aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1714%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=high&amp;id=6995477080d747be203eb7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1277-cwe-601-url-redirection-to-untrusted-f948f014</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1277%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20kaizencoders%20URL%20Shortify%20%E2%80%93%20Simple%20and%20Easy%20URL%20Shortener&amp;severity=medium&amp;id=6995477080d747be203eb7f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12037-cwe-79-improper-neutralization-of-i-6a60de39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12037%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hwk-fr%20WP%20404%20Auto%20Redirect%20to%20Similar%20Post&amp;severity=medium&amp;id=6995477080d747be203eb7d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6460-cwe-79-improper-neutralization-of-in-28148615</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gserafini%20Display%20During%20Conditional%20Shortcode&amp;severity=medium&amp;id=6995477080d747be203eb7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1296-cwe-601-url-redirection-to-untrusted-0f085222</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1296%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpshuffle%20Frontend%20Post%20Submission%20Manager%20Lite%20%E2%80%93%20Frontend%20Posting%20WordPress%20Plugin&amp;severity=medium&amp;id=6995477080d747be203eb7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12075-cwe-862-missing-authorization-in-fa-23ec4d5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12075%3A%20CWE-862%20Missing%20Authorization%20in%20fahadmahmood%20Order%20Splitter%20for%20WooCommerce&amp;severity=medium&amp;id=6995477080d747be203eb7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1931-cwe-79-improper-neutralization-of-in-fa3944d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1931%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonschr%20Rent%20Fetch&amp;severity=high&amp;id=6995477180d747be203eb817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12071-cwe-639-authorization-bypass-throug-052ab4dc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12071%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20absikandar%20Frontend%20User%20Notes&amp;severity=medium&amp;id=6995477080d747be203eb7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13959-cwe-79-improper-neutralization-of-i-1d68a836</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13959%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanaver%20Filestack&amp;severity=medium&amp;id=6995477080d747be203eb7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12074-cwe-200-exposure-of-sensitive-infor-e6ca8f6b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12074%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20postmagthemes%20Context%20Blog&amp;severity=medium&amp;id=6995477080d747be203eb7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-18-116ea64e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-18&amp;severity=medium&amp;id=69971b5eb557332a80fbff32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65791-na-c5be6e2d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65791%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb4b8fb9188dea8c0df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65519-na-864da093</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65519%3A%20n%2Fa&amp;severity=medium&amp;id=6996fb4b8fb9188dea8c0df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24708-cwe-669-incorrect-resource-transfer-b65710b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24708%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20OpenStack%20Nova&amp;severity=high&amp;id=6996fb4b8fb9188dea8c0ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70148-na-8c970d6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70148%3A%20n%2Fa&amp;severity=high&amp;id=6996fb4b8fb9188dea8c0de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70150-na-831b2e9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70150%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb4b8fb9188dea8c0ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70152-na-7fcec29d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70152%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb498fb9188dea8c09b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70151-na-132a0884</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70151%3A%20n%2Fa&amp;severity=high&amp;id=6996fb498fb9188dea8c09b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70149-na-25fc9c21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70149%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb498fb9188dea8c09ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70141-na-7495087b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70141%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb498fb9188dea8c09a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70147-na-713f71ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70147%3A%20n%2Fa&amp;severity=high&amp;id=6996fb478fb9188dea8c0331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70146-na-f560c7ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70146%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb478fb9188dea8c032d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70064-na-0097a5a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70064%3A%20n%2Fa&amp;severity=high&amp;id=6996fb478fb9188dea8c0324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70063-na-e6c89975</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70063%3A%20n%2Fa&amp;severity=medium&amp;id=6996fb478fb9188dea8c0315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70062-na-a4275ec3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70062%3A%20n%2Fa&amp;severity=medium&amp;id=6996fb478fb9188dea8c0311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-18-d351e167</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-18&amp;severity=medium&amp;id=699654eb6aea4a407af39030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70998-na-77dc81ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70998%3A%20n%2Fa&amp;severity=critical&amp;id=6995da1e6aea4a407abec46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-18-9670f798</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-18&amp;severity=low&amp;id=699582fd80d747be20583fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1344-incorrect-permission-assignment-for--4cd8ccfc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1344%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Tanium%20Enforce%20Recovery%20Key%20Portal&amp;severity=medium&amp;id=6995011f80d747be20e100cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23599-vulnerability-in-hewlett-packard-en-fdc96349</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23599%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=6994f69980d747be20df435a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22048-918-in-netapp-storagegrid-formerly--5c913f90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22048%3A%20918%20in%20NETAPP%20StorageGRID%20(formerly%20StorageGRID%20Webscale)&amp;severity=high&amp;id=6994f69980d747be20df4357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26119-cwe-287-improper-authentication-in--f09bdabb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26119%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=high&amp;id=6994f69980d747be20df4365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1670-cwe-306-missing-authentication-for-c-7263f78b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1670%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Honeywell%20I-HIB2PI-UL%202MP%20IP&amp;severity=critical&amp;id=6994f69980d747be20df4360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62183-cwe-79-improper-neutralization-of-i-fb957050</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62183%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=6994f69980d747be20df435d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13333-cwe-358-improperly-implemented-secu-e16039f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13333%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=6994f31080d747be20de97a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13689-cwe-434-unrestricted-upload-of-file-eecd60ee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13689%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20DataStage%20on%20Cloud%20Pak&amp;severity=high&amp;id=699575b980d747be2053752c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2629-os-command-injection-in-jishi-node-s-35f7c933</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2629%3A%20OS%20Command%20Injection%20in%20jishi%20node-sonos-http-api&amp;severity=medium&amp;id=6994e88380d747be20dc67c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33135-cwe-79-improper-neutralization-of-i-f6fbdd1f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Financial%20Transaction%20Manager%20for%20ACH%20Services%20and%20Check%20Services%20for%20Multi-Platform&amp;severity=medium&amp;id=6994e1f780d747be20dad4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33088-cwe-732-incorrect-permission-assign-9dbe55da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33088%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Concert&amp;severity=high&amp;id=6994e1f780d747be20dad49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36183-cwe-434-unrestricted-upload-of-file-4e55895a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36183%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20watsonx.data&amp;severity=low&amp;id=6994e1f780d747be20dad4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2627-link-following-in-softland-fbackup-21db41d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2627%3A%20Link%20Following%20in%20Softland%20FBackup&amp;severity=high&amp;id=6994e1f780d747be20dad4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36348-cwe-209-generation-of-error-message-2e5a614e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36348%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=6994e1f780d747be20dad4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2623-path-traversal-in-blossom-e8f3b710</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2623%3A%20Path%20Traversal%20in%20Blossom&amp;severity=medium&amp;id=6994e1f780d747be20dad4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23598-vulnerability-in-hewlett-packard-en-c78a381d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23598%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=medium&amp;id=6994e1f780d747be20dad4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23597-vulnerability-in-hewlett-packard-en-97c8adfe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23597%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=medium&amp;id=699575b980d747be2053755e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23596-vulnerability-in-hewlett-packard-en-5a0b28fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23596%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=medium&amp;id=699575b980d747be20537554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23595-vulnerability-in-hewlett-packard-en-aaebd4dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23595%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=high&amp;id=699575b980d747be2053754a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36376-cwe-613-insufficient-session-expira-27f04f89</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36376%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=699575b980d747be20537568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2622-cross-site-scripting-in-blossom-a97e2f4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2622%3A%20Cross%20Site%20Scripting%20in%20Blossom&amp;severity=medium&amp;id=699575b980d747be20537628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36377-cwe-613-insufficient-session-expira-47b9f738</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36377%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=699575b980d747be20537572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36379-cwe-326-inadequate-encryption-stren-e8c56bdd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36379%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=699575b980d747be2053757a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13691-cwe-497-exposure-of-sensitive-syste-e4d4e018</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13691%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=high&amp;id=699575b980d747be20537634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14289-cwe-80-improper-neutralization-of-s-15994d02</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14289%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20webMethods%20Integration%20Server&amp;severity=medium&amp;id=699575b980d747be20537533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2621-sql-injection-in-sciyon-koyuan-therm-c2c7056e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2621%3A%20SQL%20Injection%20in%20Sciyon%20Koyuan%20Thermoelectricity%20Heat%20Network%20Management%20System&amp;severity=medium&amp;id=699575b980d747be2053753f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22762-cwe-22-improper-limitation-of-a-pat-fb7162fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22762%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Avamar%20Server&amp;severity=medium&amp;id=699575bb80d747be205376a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27898-cwe-613-insufficient-session-expira-1fb50650</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27898%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27899-cwe-526-cleartext-storage-of-sensit-79a8cd73</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27899%3A%20CWE-526%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27900-cwe-601-url-redirection-to-untruste-44a62879</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27900%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22284-cwe-77-improper-neutralization-of-s-5569d01c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22284%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=69954e7880d747be2041357b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26357-cwe-79-improper-neutralization-of-i-851a7e59</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26357%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax%209.2.4.18&amp;severity=medium&amp;id=699575bb80d747be205376a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27901-cwe-644-improper-neutralization-of--a8ea6de3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27901%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be2053763a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27903-cwe-319-cleartext-transmission-of-s-e4976127</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27903%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be2053762e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27904-cwe-352-cross-site-request-forgery--7dfc647d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27904%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36598-cwe-22-improper-limitation-of-a-pat-c71d019c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36598%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Avamar%20Virtual%20Edition&amp;severity=medium&amp;id=699575b980d747be20537539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22769-cwe-798-use-of-hard-coded-credentia-cad7841a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22769%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Dell%20RecoverPoint%20for%20Virtual%20Machines&amp;severity=critical&amp;id=69954e7880d747be2041357f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33130-cwe-120-buffer-copy-without-checkin-6003e44e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33130%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20IBM%20DB2%20Merge%20Backup%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0102-cwe-359-exposure-of-private-personal-0ea43207</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0102%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=low&amp;id=6994f69980d747be20df436a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33124-cwe-131-incorrect-calculation-of-bu-b76dcfb4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33124%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20IBM%20DB2%20Merge%20Backup%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13108-vulnerability-in-ibm-db2-merge-back-fc73d8f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13108%3A%20Vulnerability%20in%20IBM%20DB2%20Merge%20Backup%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-how-modern-soc-teams-use-ai-and-context-to-72344316</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20How%20Modern%20SOC%20Teams%20Use%20AI%20and%20Context%20to%20Investigate%20Cloud%20Breaches%20Faster&amp;severity=medium&amp;id=6995909980d747be205dea28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36597-cwe-22-improper-limitation-of-a-pat-5ff59b14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36597%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Avamar%20Server&amp;severity=medium&amp;id=699575bb80d747be2053771d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33101-cwe-244-improper-clearing-of-heap-m-bfe34f61</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33101%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be20537717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2620-sql-injection-in-huace-monitoring-an-0c8cd687</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2620%3A%20SQL%20Injection%20in%20Huace%20Monitoring%20and%20Early%20Warning%20System&amp;severity=medium&amp;id=699575bb80d747be20537720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33089-cwe-798-use-of-hard-coded-credentia-ebf5d876</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33089%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be20537714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36243-cwe-918-server-side-request-forgery-a8c35159</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36243%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be2053771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43178-cwe-327-use-of-a-broken-or-risky-cr-5e3b81b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43178%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be2053772a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36018-cwe-352-cross-site-request-forgery--b52c9328</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36018%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20Concert&amp;severity=medium&amp;id=6994e50080d747be20db79f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24734-cwe-20-improper-input-validation-in-7e1027c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24734%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat%20Native&amp;severity=high&amp;id=699575bd80d747be205377f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36019-cwe-79-improper-neutralization-of-i-2052d908</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36019%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575b980d747be2053763d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24733-cwe-20-improper-input-validation-in-12b56c6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24733%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=699575bd80d747be205377ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12755-cwe-117-improper-output-neutralizat-4a26a9ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12755%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=699575b980d747be20537637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66614-cwe-20-improper-input-validation-in-bcf18b8d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66614%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=699575bd80d747be205377ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2630-cwe-78-improper-neutralization-of-sp-3ee12498</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2630%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tenable%20Security%20Center&amp;severity=high&amp;id=6994b74c80d747be20cdd662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-show-copilot-and-grok-can-be-abused-as-64561493</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Show%20Copilot%20and%20Grok%20Can%20Be%20Abused%20as%20Malware%20C2%20Proxies&amp;severity=low&amp;id=6995909980d747be205dea2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badiis-to-the-bone-new-insights-to-a-global-seo-po-f94b5abc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BADIIS%20to%20the%20Bone%3A%20New%20Insights%20to%20a%20Global%20SEO%20Poisoning%20Campaign&amp;severity=medium&amp;id=6994b74a80d747be20cdd527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-clickfix-opens-the-door-to-stealthy-stealc-inf-765d6586</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20ClickFix%20Opens%20the%20Door%20to%20Stealthy%20StealC%20Information%20Stealer&amp;severity=medium&amp;id=6994b74a80d747be20cdd577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36247-cwe-611-improper-restriction-of-xml-6af3c952</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36247%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=high&amp;id=699575bb80d747be20537709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36425-cwe-256-in-ibm-db2-for-linux-unix-a-ed5229e3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36425%3A%20CWE-256%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be2053770c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13867-cwe-1284-improper-validation-of-spe-49ea700b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13867%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14689-cwe-1284-improper-validation-of-spe-6a88675e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14689%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bd80d747be20537800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/keenadu-firmware-backdoor-infects-android-tablets--f07d8f19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Keenadu%20Firmware%20Backdoor%20Infects%20Android%20Tablets%20via%20Signed%20OTA%20Updates&amp;severity=medium&amp;id=6995909980d747be205dea2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2618-risky-cryptographic-algorithm-in-bee-16b2753e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2618%3A%20Risky%20Cryptographic%20Algorithm%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=699575bd80d747be20537849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23648-cwe-732-incorrect-permission-assign-3c011f22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23648%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Glory%20Global%20Solutions%20RBG-100&amp;severity=high&amp;id=699575bb80d747be205376b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23647-cwe-798-use-of-hard-coded-credentia-6b5abde7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23647%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Glory%20Global%20Solutions%20RBG-100&amp;severity=critical&amp;id=699575bb80d747be205376b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2617-insecure-default-initialization-of-r-3378e449</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2617%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=69948d1c80d747be20bdf6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-offer-to-sell-millions-of-eurail-user-reco-ee3e48d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Offer%20to%20Sell%20Millions%20of%20Eurail%20User%20Records&amp;severity=medium&amp;id=6994896480d747be20bc82aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31118-cwe-862-missing-authorization-in-sm-0efd5cdb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31118%3A%20CWE-862%20Missing%20Authorization%20in%20Smartypants%20SP%20Project%20%26%20Document%20Manager&amp;severity=medium&amp;id=6994861680d747be20bbcc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2616-hard-coded-credentials-in-beetel-777-5f01c821</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2616%3A%20Hard-coded%20Credentials%20in%20Beetel%20777VR1&amp;severity=high&amp;id=6994861680d747be20bbcc54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22208-cwe-749-exposed-dangerous-method-or-4594ea65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22208%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20OpenS100%20Project%20OpenS100&amp;severity=critical&amp;id=69947f0d80d747be20b9dc52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-in-the-middle-turning-web-based-ai-services-int-ec8326ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20in%20the%20Middle%3A%20Turning%20Web-Based%20AI%20Services%20into%20C2%20Proxies%20%26%20The%20Future%20Of%20AI%20Driven%20Attacks&amp;severity=low&amp;id=6995917280d747be205e4203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-the-ongoing-fight-to-secure-in-7c6a9e61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20The%20Ongoing%20Fight%20to%20Secure%20Industrial%20Control%20Systems&amp;severity=critical&amp;id=699477d280d747be20b76d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/api-threats-grow-in-scale-as-ai-expands-the-blast--2e69a229</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=API%20Threats%20Grow%20in%20Scale%20as%20AI%20Expands%20the%20Blast%20Radius&amp;severity=medium&amp;id=699477d280d747be20b76d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23861-cwe-79-improper-neutralization-of-i-0569a841</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23861%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax%20vApp%2C&amp;severity=medium&amp;id=6994782680d747be20b7ac3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7706-cwe-306-missing-authentication-for-c-b448fb38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7706%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Liderahenk&amp;severity=medium&amp;id=699470fb80d747be20b50362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25087-cwe-416-use-after-free-in-apache-so-03b761d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25087%3A%20CWE-416%20Use%20After%20Free%20in%20Apache%20Software%20Foundation%20Apache%20Arrow&amp;severity=high&amp;id=699470fb80d747be20b50365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2615-command-injection-in-wavlink-wl-nu51-f6063523</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2615%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=699469f380d747be20b30312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/man-linked-to-phobos-ransomware-arrested-in-poland-3b18f07a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Man%20Linked%20to%20Phobos%20Ransomware%20Arrested%20in%20Poland&amp;severity=medium&amp;id=6994663c80d747be20b1b382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartloader-attack-uses-trojanized-oura-mcp-server-98cb6579</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartLoader%20Attack%20Uses%20Trojanized%20Oura%20MCP%20Server%20to%20Deploy%20StealC%20Infostealer&amp;severity=medium&amp;id=6995909980d747be205dea31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-tablet-conqueror-and-the-links-between-major-a-456f5297</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20tablet%20conqueror%20and%20the%20links%20between%20major%20Android%20botnets&amp;severity=medium&amp;id=6994909f80d747be20bf9d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8303-cwe-79-improper-neutralization-of-in-44be8a63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20EKA%20Software%20Computer%20Information%20Advertising%20Services%20Ltd.%20Real%20Estate%20Script%20V5%20(With%20Doping%20Module%20%E2%80%93%20Store%20Module%20%E2%80%93%20New%20Language%20System)&amp;severity=medium&amp;id=69945be380d747be20af629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7631-cwe-89-improper-neutralization-of-sp-5ca07faf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7631%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tumeva%20Internet%20Technologies%20Software%20Information%20Advertising%20and%20Consulting%20Services%20Trade%20Ltd.%20Co.%20Tumeva%20Prime%20News%20Software&amp;severity=high&amp;id=6994585e80d747be20ae418f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2247-cwe-89-improper-neutralization-of-sp-b8f5f03e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2247%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Clickedu%20SaaS%20platform&amp;severity=high&amp;id=6994585e80d747be20ae4192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2608-cwe-862-missing-authorization-in-ste-f8e195f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2608%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=6994515780d747be20ac24ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3-threat-groups-started-targeting-icsot-in-2025-dr-67494e06</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3%20Threat%20Groups%20Started%20Targeting%20ICS%2FOT%20in%202025%3A%20Dragos&amp;severity=medium&amp;id=69944da080d747be20aa71bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25903-cwe-862-missing-authorization-in-ap-96d68c81</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25903%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20NiFi&amp;severity=high&amp;id=69943fc480d747be20a60510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-finds-summarize-with-ai-prompts-manipula-f515017d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Finds%20%E2%80%9CSummarize%20with%20AI%E2%80%9D%20Prompts%20Manipulating%20Chatbot%20Recommendations&amp;severity=medium&amp;id=69943af180d747be20a42712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/password-managers-vulnerable-to-vault-compromise-u-4a6c986f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Password%20Managers%20Vulnerable%20to%20Vault%20Compromise%20Under%20Malicious%20Server&amp;severity=medium&amp;id=6994388980d747be20a2d08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1216-cwe-79-improper-neutralization-of-in-1a4c00e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1216%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=high&amp;id=699438cd80d747be20a32bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-incident-report-used-in-phishing-campaign-tue-566cec83</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Incident%20Report%20Used%20in%20Phishing%20Campaign%2C%20(Tue%2C%20Feb%2017th)&amp;severity=medium&amp;id=69943c3e80d747be20a4e763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-tests-end-to-end-encrypted-rcs-messaging-in--81f691ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Tests%20End-to-End%20Encrypted%20RCS%20Messaging%20in%20iOS%2026.4%20Developer%20Beta&amp;severity=medium&amp;id=69943af180d747be20a42715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0829-cwe-862-missing-authorization-in-fro-323c4855</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0829%3A%20CWE-862%20Missing%20Authorization%20in%20Frontend%20File%20Manager%20Plugin&amp;severity=medium&amp;id=69940acad1735ca73126f76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1657-cwe-862-missing-authorization-in-met-a2523868</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1657%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=6994003ed1735ca7311ee332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2592-cwe-284-improper-access-control-in-z-22959dc1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2592%3A%20CWE-284%20Improper%20Access%20Control%20in%20zarinpal%20Zarinpal%20Gateway&amp;severity=high&amp;id=6993f937d1735ca7311a09bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2002-cwe-79-improper-neutralization-of-in-2ec61ced</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2002%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=6993f937d1735ca7311a09bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26220-cwe-502-deserialization-of-untruste-3d57a118</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26220%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ModelTC%20LightLLM&amp;severity=critical&amp;id=6994257080d747be207b7270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70397-na-47a1cc8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70397%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be20537850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55270-na-03bef1f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55270%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26736-na-558b5db5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26736%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26732-na-96df64c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26732%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26731-na-626ee67c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26731%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59793-na-8a24ed08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59793%3A%20n%2Fa&amp;severity=critical&amp;id=699575bd80d747be205377e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67905-na-fa4970fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67905%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be20537726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32355-na-085b6720</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32355%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be2053770f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70846-na-5e0ec656</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70846%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be205376c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67102-na-4a2a6626</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67102%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be2053769e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-17-43270302</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-17&amp;severity=medium&amp;id=6995046d80d747be20e1792b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65753-na-a83a2ef3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65753%3A%20n%2Fa&amp;severity=high&amp;id=6994a23480d747be20c6db0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55271-na-4ed4070f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55271%3A%20n%2Fa&amp;severity=low&amp;id=6994a23480d747be20c6db09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70830-na-05399173</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70830%3A%20n%2Fa&amp;severity=critical&amp;id=69948d1c80d747be20bdf6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70828-na-795b8689</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70828%3A%20n%2Fa&amp;severity=high&amp;id=69948d1c80d747be20bdf6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70829-na-8558d9cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70829%3A%20n%2Fa&amp;severity=medium&amp;id=6994861680d747be20bbcc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-17-96a06716</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-17&amp;severity=low&amp;id=6993d5d8d1735ca731db4256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12062-cwe-22-improper-limitation-of-a-pat-191a7218</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12062%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=high&amp;id=6993abded1735ca731bdefea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2439-cwe-340-generation-of-predictable-nu-8847b5d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2439%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20BVA%20Concierge%3A%3ASessions&amp;severity=critical&amp;id=69938fbfd1735ca731b5ffa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15578-cwe-338-use-of-cryptographically-we-572f6a23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15578%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20TEEJAY%20Maypole&amp;severity=critical&amp;id=69938c3ad1735ca731b45482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2474-cwe-122-heap-based-buffer-overflow-i-3d94ea2a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2474%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20DDICK%20Crypt%3A%3AURandom&amp;severity=high&amp;id=6994257080d747be207b7278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2001-cwe-862-missing-authorization-in-wpx-dd0b0e65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2001%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20WowRevenue%20%E2%80%93%20Product%20Bundles%20%26%20Bulk%20Discounts&amp;severity=high&amp;id=6993739ed1735ca731a8ba4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-steals-openclaw-ai-agent-configuration-8bbd2b7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20Steals%20OpenClaw%20AI%20Agent%20Configuration%20Files%20and%20Gateway%20Tokens&amp;severity=medium&amp;id=69943af180d747be20a42718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/study-uncovers-25-password-recovery-attacks-in-maj-6f2cde85</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Study%20Uncovers%2025%20Password%20Recovery%20Attacks%20in%20Major%20Cloud%20Password%20Managers&amp;severity=medium&amp;id=69943af180d747be20a4271b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/16th-february-threat-intelligence-report-aa8bfcdd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=16th%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=low&amp;id=69943ba880d747be20a474a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2567-stack-based-buffer-overflow-in-wavli-0c1e9353</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2567%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=6993577fd1735ca7319ea144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2566-stack-based-buffer-overflow-in-wavli-f35978e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2566%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=699353fad1735ca7319d6c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2565-stack-based-buffer-overflow-in-wavli-6deb4b90</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2565%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=6994257080d747be207b7280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26930-cwe-79-improper-neutralization-of-i-8e58780b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26930%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SmarterTools%20SmarterMail&amp;severity=high&amp;id=6994257080d747be207b727c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2101-cwe-79-improper-neutralization-of-in-15efa45d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2101%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIAvpm%20Web%20Access&amp;severity=high&amp;id=6994257080d747be207b7286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2564-weak-password-recovery-in-intelbras--15b4ad92</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2564%3A%20Weak%20Password%20Recovery%20in%20Intelbras%20VIP%203260%20Z%20IA&amp;severity=critical&amp;id=6994257080d747be207b7289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2563-privilege-escalation-in-jingdong-jd--d2760a62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2563%3A%20Improper%20Privilege%20Management%20in%20JingDong%20JD%20Cloud%20Box%20AX6600&amp;severity=medium&amp;id=6994257080d747be207b728e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dior-louis-vuitton-tiffany-fined-25-million-in-sou-2f72e32c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dior%2C%20Louis%20Vuitton%2C%20Tiffany%20Fined%20%2425%20Million%20in%20South%20Korea%20After%20Data%20Breaches&amp;severity=medium&amp;id=69933423d1735ca731935dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2562-privilege-escalation-in-jingdong-jd--f3eb266d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2562%3A%20Improper%20Privilege%20Management%20in%20JingDong%20JD%20Cloud%20Box%20AX6600&amp;severity=medium&amp;id=69933465d1735ca73193848d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2561-privilege-escalation-in-jingdong-jd--0fdfd21b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2561%3A%20Improper%20Privilege%20Management%20in%20JingDong%20JD%20Cloud%20Box%20AX6600&amp;severity=medium&amp;id=699330d2d1735ca731922b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-ai-assistant-extensions-targeting-260000-chro-971e4e95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20AI%20Assistant%20Extensions%20Targeting%20260%2C000%20Chrome%20Users%20via%20injected%20iframes&amp;severity=medium&amp;id=6994942680d747be20c100a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-macromaze-new-apt28-campaign-using-basic-8c994355</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20MacroMaze%3A%20New%20APT28%20Campaign%20Using%20Basic%20Tooling%20and%20Legitimate%20Infrastructure&amp;severity=medium&amp;id=6994942680d747be20c10099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2032-vulnerability-in-mozilla-firefox-for-3fb5eb69</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2032%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=6994257180d747be207b740f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2447-vulnerability-in-mozilla-firefox-ef99469f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2447%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6994257180d747be207b740a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2560-os-command-injection-in-kalcaddle-ko-1fd95a3d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2560%3A%20OS%20Command%20Injection%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69932648d1735ca7318be8a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-17-beta-strengthens-secure-by-default-desi-e8c0e0a5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%2017%20Beta%20Strengthens%20Secure-by-Default%20Design%20for%20Privacy%20and%20App%20Security&amp;severity=medium&amp;id=69932290d1735ca731892ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-navigates-dhs-shutdown-with-reduced-staff-3f2ba258</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Navigates%20DHS%20Shutdown%20With%20Reduced%20Staff&amp;severity=medium&amp;id=69932290d1735ca731892ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1335-cwe-787-out-of-bounds-write-in-dassa-22d5a00c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1335%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=699322e0d1735ca7318966e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1334-cwe-125-out-of-bounds-read-in-dassau-5f48827a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1334%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=699322e0d1735ca7318966e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1333-cwe-457-use-of-uninitialized-variabl-1f2a1adb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1333%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=699322e0d1735ca7318966e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2558-server-side-request-forgery-in-geeka-7a60bbf7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2558%3A%20Server-Side%20Request%20Forgery%20in%20GeekAI&amp;severity=medium&amp;id=699322e0d1735ca7318966eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/key-openclaw-risks-clawdbot-moltbot-kaspersky-offi-a732c8e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Key%20OpenClaw%20risks%2C%20Clawdbot%2C%20Moltbot%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69931bf6d1735ca731864664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2557-cross-site-scripting-in-cskefu-a32390c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2557%3A%20Cross%20Site%20Scripting%20in%20cskefu&amp;severity=medium&amp;id=69931bbad1735ca731861d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-outlook-add-ins-hijack-0-day-patches--0d4cc800</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weekly%20Recap%3A%20Outlook%20Add-Ins%20Hijack%2C%200-Day%20Patches%2C%20Wormable%20Botnet%20%26%20AI%20Malware&amp;severity=low&amp;id=69943af180d747be20a4271e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2556-server-side-request-forgery-in-cskef-9b320b42</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2556%3A%20Server-Side%20Request%20Forgery%20in%20cskefu&amp;severity=medium&amp;id=699314b2d1735ca73181d582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2555-deserialization-in-jeecgboot-47ee4cd1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2555%3A%20Deserialization%20in%20JeecgBoot&amp;severity=low&amp;id=69931f3ed1735ca73187d04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-clickfix-attack-abusing-dns-loo-0fffbe0e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20of%20ClickFix%20Attack%20Abusing%20DNS%20Lookups&amp;severity=medium&amp;id=69930679d1735ca7315980e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/safe-and-inclusive-esociety-how-lithuania-is-braci-dbbd7465</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Safe%20and%20Inclusive%20E%E2%80%91Society%3A%20How%20Lithuania%20Is%20Bracing%20for%20AI%E2%80%91Driven%20Cyber%20Fraud&amp;severity=medium&amp;id=69931da4d1735ca731873d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2418-cwe-601-url-redirection-to-untrusted-fc5517c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2418%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20TR7%20Cyber%20%E2%80%8B%E2%80%8BDefense%20Inc.%20Web%20Application%20Firewall&amp;severity=medium&amp;id=699306bfd1735ca7315a65f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2553-sql-injection-in-tushar-2223-hotel-m-f8823bdb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2553%3A%20SQL%20Injection%20in%20tushar-2223%20Hotel-Management-System&amp;severity=medium&amp;id=699306bfd1735ca7315a65f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2552-path-traversal-in-zentao-5658ef66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2552%3A%20Path%20Traversal%20in%20ZenTao&amp;severity=medium&amp;id=6992fd2fbda29fb02f6aa184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-and-ninja-browser-malware-campaign-a-3606198a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20and%20Ninja%20Browser%20malware%20campaign%20abusing%20Google%20Groups&amp;severity=medium&amp;id=6992f9abbda29fb02f68dd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2551-path-traversal-in-zentao-868a3066</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2551%3A%20Path%20Traversal%20in%20ZenTao&amp;severity=medium&amp;id=6992f627bda29fb02f6786e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-zerodayrat-mobile-spyware-enables-real-time-su-d5c92f82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ZeroDayRAT%20Mobile%20Spyware%20Enables%20Real-Time%20Surveillance%20and%20Data%20Theft&amp;severity=medium&amp;id=69931da4d1735ca731873d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2452-cwe-627-dynamic-variable-evaluation--1e0b8836</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2452%3A%20CWE-627%20Dynamic%20Variable%20Evaluation%20in%20pretix%20pretix-newsletter&amp;severity=high&amp;id=6992f627bda29fb02f6786dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2451-cwe-627-dynamic-variable-evaluation--3e2879f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2451%3A%20CWE-627%20Dynamic%20Variable%20Evaluation%20in%20pretix%20pretix-doistep&amp;severity=high&amp;id=6992f627bda29fb02f6786da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2550-unrestricted-upload-in-efm-iptime-a6-a8baac0d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2550%3A%20Unrestricted%20Upload%20in%20EFM%20iptime%20A6004MX&amp;severity=critical&amp;id=6992ef1fbda29fb02f643b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2577-cwe-306-missing-authentication-for-c-d0d526e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2577%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HKUDS%20nanobot&amp;severity=critical&amp;id=6992ef1fbda29fb02f643b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2549-improper-access-controls-in-zhanghua-d9a74f1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2549%3A%20Improper%20Access%20Controls%20in%20zhanghuanhao%20LibrarySystem%20%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=6992eb9bbda29fb02f62aae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2548-command-injection-in-wayos-fbm-220g-21493729</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2548%3A%20Command%20Injection%20in%20WAYOS%20FBM-220G&amp;severity=medium&amp;id=69930886d1735ca7315e7f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2547-cross-site-scripting-in-ligerosmart-10ccf03b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2547%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=6992da08bda29fb02f5c0246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2546-cross-site-scripting-in-ligerosmart-e8ff2733</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2546%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=6992d684bda29fb02f5a9bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-first-actively-exploited-chrome-zer-9fc21206</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20First%20Actively%20Exploited%20Chrome%20Zero-Day%20of%202026&amp;severity=medium&amp;id=6992cf48bda29fb02f56ff7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2026-64-bits-malware-trend-mon-feb-16th-76ab2197</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2026%2064-Bits%20Malware%20Trend%2C%20(Mon%2C%20Feb%2016th)&amp;severity=low&amp;id=69931e47d1735ca7318782d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2545-cross-site-scripting-in-ligerosmart-43aa65d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2545%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=6992cbf7bda29fb02f561cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2544-os-command-injection-in-yued-fe-lulu-aec8889b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2544%3A%20OS%20Command%20Injection%20in%20yued-fe%20LuLu%20UI&amp;severity=medium&amp;id=6992cbf7bda29fb02f561cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2543-unverified-password-change-in-vichan-bedef274</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2543%3A%20Unverified%20Password%20Change%20in%20vichan-devel%20vichan&amp;severity=medium&amp;id=6992c4f0bda29fb02f53b417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chrome-zero-day-cve-2026-2441-under-active-att-ba9a1f06</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Chrome%20Zero-Day%20(CVE-2026-2441)%20Under%20Active%20Attack%20%E2%80%94%20Patch%20Released&amp;severity=high&amp;id=69931da4d1735ca731873d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2542-unquoted-search-path-in-total-vpn-86fa0d9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2542%3A%20Unquoted%20Search%20Path%20in%20Total%20VPN&amp;severity=high&amp;id=6992bde8bda29fb02f5127ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2538-uncontrolled-search-path-in-flos-fre-d9540b5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2538%3A%20Uncontrolled%20Search%20Path%20in%20Flos%20Freeware%20Notepad2&amp;severity=high&amp;id=6992b6dfbda29fb02f4dd9f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0929-cwe-862-missing-authorization-in-reg-a36cfddd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0929%3A%20CWE-862%20Missing%20Authorization%20in%20RegistrationMagic&amp;severity=medium&amp;id=69930886d1735ca7315e7f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2537-command-injection-in-comfast-cf-e4-d2596177</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2537%3A%20Command%20Injection%20in%20Comfast%20CF-E4&amp;severity=medium&amp;id=6992b36bbda29fb02f4bb440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2536-xml-external-entity-reference-in-ope-cff9a8a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2536%3A%20XML%20External%20Entity%20Reference%20in%20opencc%20JFlow&amp;severity=medium&amp;id=6992ac53bda29fb02f486070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2535-command-injection-in-comfast-cf-n1-v-8437b00c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2535%3A%20Command%20Injection%20in%20Comfast%20CF-N1%20V2&amp;severity=medium&amp;id=6992a54bbda29fb02f457206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2534-command-injection-in-comfast-cf-n1-v-8ba549f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2534%3A%20Command%20Injection%20in%20Comfast%20CF-N1%20V2&amp;severity=medium&amp;id=69929abfbda29fb02f425d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2533-command-injection-in-tosei-self-serv-3617be85</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2533%3A%20Command%20Injection%20in%20Tosei%20Self-service%20Washing%20Machine&amp;severity=medium&amp;id=69929abfbda29fb02f425d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2532-server-side-request-forgery-in-lints-c44236a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2532%3A%20Server-Side%20Request%20Forgery%20in%20lintsinghua%20DeepAudit&amp;severity=medium&amp;id=69928cafbda29fb02f1ec50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2531-server-side-request-forgery-in-minds-fd7157b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2531%3A%20Server-Side%20Request%20Forgery%20in%20MindsDB&amp;severity=medium&amp;id=69928cafbda29fb02f1ec505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2530-command-injection-in-wavlink-wl-wn57-daec65f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2530%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69928cafbda29fb02f1ec4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2529-command-injection-in-wavlink-wl-wn57-744d9dbe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2529%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927ea0bda29fb02f12609a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2528-command-injection-in-wavlink-wl-wn57-1a573700</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2528%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927ea0bda29fb02f126094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2527-command-injection-in-wavlink-wl-wn57-afb46441</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2527%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927ea0bda29fb02f12608e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2526-command-injection-in-wavlink-wl-wn57-d05d2dfa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2526%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927413bda29fb02f0e1194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2525-denial-of-service-in-free5gc-897c96c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2525%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69927413bda29fb02f0e118c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2524-denial-of-service-in-open5gs-6effde78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2524%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69926d0abda29fb02f03f172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2523-reachable-assertion-in-open5gs-c69cfefb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2523%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=69926d0abda29fb02f03f16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65717-na-1fa0a602</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65717%3A%20n%2Fa&amp;severity=medium&amp;id=6994257180d747be207b7406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65716-na-7ce38e2e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65716%3A%20n%2Fa&amp;severity=high&amp;id=6994257080d747be207b729c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65715-na-fdb8ef7a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65715%3A%20n%2Fa&amp;severity=high&amp;id=6994257080d747be207b7298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-16-388c1363</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-16&amp;severity=medium&amp;id=6993b2afd1735ca731bf33b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-16-309da41c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-16&amp;severity=low&amp;id=6992ba2ebda29fb02f4f9c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2522-memory-corruption-in-open5gs-7f05b583</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2522%3A%20Memory%20Corruption%20in%20Open5GS&amp;severity=medium&amp;id=69925b77bda29fb02fd9898a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2521-memory-corruption-in-open5gs-c3391632</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2521%3A%20Memory%20Corruption%20in%20Open5GS&amp;severity=medium&amp;id=699253b94b0e3abdf99ab24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26369-improper-privilege-management-in-ju-f86570ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26369%3A%20Improper%20Privilege%20Management%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=critical&amp;id=6991ea414b0e3abdf972b019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26368-missing-authorization-in-jung-enet--3a6df6c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26368%3A%20Missing%20Authorization%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=high&amp;id=6991ea414b0e3abdf972b015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26367-missing-authorization-in-jung-enet--173718f4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26367%3A%20Missing%20Authorization%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=high&amp;id=6991ea414b0e3abdf972b010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26366-use-of-default-credentials-in-jung--23983d02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26366%3A%20Use%20of%20Default%20Credentials%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=critical&amp;id=6991ea414b0e3abdf972b00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-discloses-dns-based-clickfix-attack-usin-fbef1593</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Discloses%20DNS-Based%20ClickFix%20Attack%20Using%20Nslookup%20for%20Malware%20Staging&amp;severity=medium&amp;id=6992699ebda29fb02fff2c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2517-denial-of-service-in-open5gs-08313086</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2517%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=6991c0114b0e3abdf95dbbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2516-uncontrolled-search-path-in-unidocs--c9898b25</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2516%3A%20Uncontrolled%20Search%20Path%20in%20Unidocs%20ezPDF%20DRM%20Reader&amp;severity=high&amp;id=6991bc8d4b0e3abdf95c3022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2541-cwe-331-insufficient-entropy-in-micc-57e2a0ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2541%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20Micca%20Auto%20Electronics%20Co.%2C%20Ltd.%20Car%20Alarm%20System%20KE700&amp;severity=medium&amp;id=6991aaf94b0e3abdf953ce6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2540-cwe-288-authentication-bypass-using--06adb1fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2540%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Micca%20Auto%20Electronics%20Co.%2C%20Ltd.%20Car%20Alarm%20System%20KE700&amp;severity=high&amp;id=6991aaf94b0e3abdf953ce6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2539-cwe-319-cleartext-transmission-of-se-fff717fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2539%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Micca%20Auto%20Electronics%20Co.%2C%20Ltd.%20Car%20Alarm%20System%20KE700&amp;severity=medium&amp;id=69925668bda29fb02fd3ee5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32063-cwe-306-missing-authentication-for--681dee89</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32063%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=6991a7744b0e3abdf9520b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32062-cwe-121-stack-based-buffer-overflow-2fc9767c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32062%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=high&amp;id=6991a7744b0e3abdf9520b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32061-cwe-121-stack-based-buffer-overflow-92f71bd2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32061%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=high&amp;id=6991a7744b0e3abdf9520b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32060-cwe-347-improper-verification-of-cr-41ae0f8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32060%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=6991a7744b0e3abdf9520b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32059-cwe-121-stack-based-buffer-overflow-162b7b2c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32059%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=high&amp;id=6991a7744b0e3abdf9520b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32058-cwe-121-stack-based-buffer-overflow-68f844de</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32058%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=critical&amp;id=6991a7744b0e3abdf9520b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1793-cwe-22-improper-limitation-of-a-path-4752164f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1793%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699151874b0e3abdf9d7dee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1750-cwe-269-improper-privilege-managemen-02c6a8ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1750%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ecwid%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart&amp;severity=high&amp;id=699151874b0e3abdf9d7dedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1490-cwe-350-reliance-on-reverse-dns-reso-0fc3066a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1490%3A%20CWE-350%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20cleantalk%20Spam%20protection%2C%20Honeypot%2C%20Anti-Spam%20by%20CleanTalk&amp;severity=critical&amp;id=69913eb4c9e1ff5ad8fbefbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-15-2c822212</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-15&amp;severity=medium&amp;id=69926249bda29fb02ff8a81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-15-3a1244b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-15&amp;severity=low&amp;id=69919cb34b0e3abdf946b1dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-300-malicious-chrome-extensions-caught-leakin-5e10fd10</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20300%20Malicious%20Chrome%20Extensions%20Caught%20Leaking%20or%20Stealing%20User%20Data&amp;severity=medium&amp;id=69906489c9e1ff5ad887c2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2312-cwe-862-missing-authorization-in-max-a02e1ede</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2312%3A%20CWE-862%20Missing%20Authorization%20in%20maxfoundry%20Media%20Library%20Folders&amp;severity=medium&amp;id=69906138c9e1ff5ad886470f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1512-cwe-79-improper-neutralization-of-in-96d8989a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=6990489cc9e1ff5ad87d7ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1258-cwe-89-improper-neutralization-of-sp-f39be00a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1258%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20getwpfunnels%20Mail%20Mint%20%E2%80%93%20Email%20Marketing%2C%20Newsletter%2C%20Email%20Automation%20%26%20WooCommerce%20Emails&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0550-cwe-79-improper-neutralization-of-in-c7aab6e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0550%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saadiqbal%20Points%20Management%20System%20For%20Gamification%2C%20Ranks%2C%20Badges%2C%20and%20Loyalty%20Rewards%20Program%20%E2%80%93%20myCred&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8572-cwe-269-improper-privilege-managemen-357fd27c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8572%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dreamstechnologies%20Truelysell%20Core&amp;severity=critical&amp;id=69903384c9e1ff5ad8746a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1843-cwe-79-improper-neutralization-of-in-da8cc8a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1843%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Super%20Page%20Cache&amp;severity=high&amp;id=69903384c9e1ff5ad8746a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1254-cwe-862-missing-authorization-in-wpc-c0fbfd3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1254%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Modula%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1249-cwe-918-server-side-request-forgery--1a4e68ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1249%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1988-cwe-98-improper-control-of-filename--9af2696b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1988%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpdecent%20Flexi%20Product%20Slider%20and%20Grid%20for%20WooCommerce&amp;severity=high&amp;id=69901aeec9e1ff5ad868940c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1987-cwe-639-authorization-bypass-through-b74bd663</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1987%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20morelmathieuj%20Scheduler%20Widget&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0736-cwe-79-improper-neutralization-of-in-b1ef6454</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0736%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collectchat%20Chatbot%20for%20WordPress%20by%20Collect.chat%20%E2%9A%A1%EF%B8%8F&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1187-cwe-79-improper-neutralization-of-in-7770e71d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1187%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20terrazoom%20ZoomifyWP%20Free&amp;severity=medium&amp;id=69901aecc9e1ff5ad868938e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1915-cwe-79-improper-neutralization-of-in-a7b5b569</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1915%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestony%20Simple%20Plyr&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1985-cwe-79-improper-neutralization-of-in-aac7a77d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arieslab%20Press3D&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0753-cwe-79-improper-neutralization-of-in-6158470c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitacre%20Super%20Simple%20Contact%20Form&amp;severity=high&amp;id=69901aecc9e1ff5ad8689381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1306-cwe-434-unrestricted-upload-of-file--95798a0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1306%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20adminkov%20midi-Synth&amp;severity=critical&amp;id=69901aecc9e1ff5ad8689399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0735-cwe-79-improper-neutralization-of-in-90791c84</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webilop%20User%20Language%20Switch&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15483-cwe-79-improper-neutralization-of-i-7adcdaf1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15483%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajferg%20Link%20Hopper&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1303-cwe-862-missing-authorization-in-mat-619170e8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1303%3A%20CWE-862%20Missing%20Authorization%20in%20matthieuscarset%20MailChimp%20Campaigns&amp;severity=medium&amp;id=69901aecc9e1ff5ad8689394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1910-cwe-79-improper-neutralization-of-in-eb230e1c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20upmenu%20UpMenu%20%E2%80%93%20Online%20ordering%20for%20restaurants&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0693-cwe-79-improper-neutralization-of-in-24714602</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0693%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arnoesterhuizen%20Allow%20HTML%20in%20Category%20Descriptions&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1096-cwe-79-improper-neutralization-of-in-1ba42204</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1096%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20raju_ahmed%20Best-wp-google-map&amp;severity=medium&amp;id=69901aecc9e1ff5ad8689388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0559-cwe-79-improper-neutralization-of-in-3ffb3a17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1394-cwe-352-cross-site-request-forgery-c-bd95f994</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1394%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dmitritechs%20WP%20Quick%20Contact%20Us&amp;severity=medium&amp;id=69901aecc9e1ff5ad86893a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1905-cwe-79-improper-neutralization-of-in-0538bb4b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1905%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devmw%20Sphere%20Manager&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14852-cwe-352-cross-site-request-forgery--9b67a2c3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14852%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20antevenio%20MDirector%20Newsletter%20WordPress%20Plugin&amp;severity=medium&amp;id=69901aebc9e1ff5ad86892ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1944-cwe-862-missing-authorization-in-kre-7484832f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1944%3A%20CWE-862%20Missing%20Authorization%20in%20krellbat%20CallbackKiller%20service%20widget&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0557-cwe-79-improper-neutralization-of-in-477d19e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0557%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peterschulznl%20WP%20Data%20Access%20%E2%80%93%20App%20Builder%20for%20Tables%2C%20Forms%2C%20Charts%2C%20Maps%20%26%20Dashboards&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2024-cwe-89-improper-neutralization-of-sp-e9679b86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2024%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20savitasoni%20PhotoStack%20Gallery&amp;severity=high&amp;id=69901aeec9e1ff5ad8689418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1939-cwe-79-improper-neutralization-of-in-2797da7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1939%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cutesalah%20Percent%20to%20Infograph&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1795-cwe-79-improper-neutralization-of-in-f021e9a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1795%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sivenso%20Address%20Bar%20Ads&amp;severity=medium&amp;id=69901aecc9e1ff5ad86893a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1903-cwe-79-improper-neutralization-of-in-ad4b822d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1903%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shellbot%20Ravelry%20Designs%20Widget&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1792-cwe-79-improper-neutralization-of-in-5d191d6b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1792%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20owencutajar%20Geo%20Widget&amp;severity=medium&amp;id=69901aecc9e1ff5ad86893a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0745-cwe-918-server-side-request-forgery--d2649c34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0745%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20webilop%20User%20Language%20Switch&amp;severity=medium&amp;id=69901aecc9e1ff5ad8689375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2022-cwe-862-missing-authorization-in-edg-f55545e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2022%3A%20CWE-862%20Missing%20Authorization%20in%20edgarrojas%20Smart%20Forms%20%E2%80%93%20when%20you%20need%20more%20than%20just%20a%20contact%20form&amp;severity=medium&amp;id=69901aeec9e1ff5ad8689413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1901-cwe-79-improper-neutralization-of-in-1eecf619</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1901%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20questionpro%20QuestionPro%20Surveys&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14873-cwe-352-cross-site-request-forgery--070bf878</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14873%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0727-cwe-862-missing-authorization-in-ess-2f6c0588</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0727%3A%20CWE-862%20Missing%20Authorization%20in%20essentialplugin%20Accordion%20and%20Accordion%20Slider&amp;severity=medium&amp;id=69901aebc9e1ff5ad868931d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0751-cwe-79-improper-neutralization-of-in-c61be848</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandonfire%20Payment%20Page%20%7C%20Payment%20Form%20for%20Stripe&amp;severity=medium&amp;id=69901aecc9e1ff5ad868937c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6792-cwe-306-missing-authentication-for-c-1e53c2e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6792%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20amentotechpvtltd%20One%20to%20one%20user%20Chat%20by%20WPGuppy&amp;severity=medium&amp;id=69901aebc9e1ff5ad868930c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1796-cwe-79-improper-neutralization-of-in-c8d86ecc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1796%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20indextwo%20StyleBidet&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1932-cwe-862-missing-authorization-in-bss-73d0e9c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1932%3A%20CWE-862%20Missing%20Authorization%20in%20bssoftware%20Appointment%20Booking%20Calendar%20Plugin%20%E2%80%93%20Bookr&amp;severity=medium&amp;id=699010d0c9e1ff5ad864b5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2469-improper-neutralization-of-special-e-90b4e04e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2469%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20directorytree%2Fimapengine&amp;severity=high&amp;id=69901846c9e1ff5ad867f1ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0692-cwe-862-missing-authorization-in-blu-69b2b913</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0692%3A%20CWE-862%20Missing%20Authorization%20in%20bluesnap%20BlueSnap%20Payment%20Gateway%20for%20WooCommerce&amp;severity=high&amp;id=698ffec8c9e1ff5ad85c71ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1912-cwe-79-improper-neutralization-of-in-35e454d9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1912%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ulaulaman%20Citations%20tools&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c7202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1983-cwe-352-cross-site-request-forgery-c-ced2e775</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1983%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sourcez%20SEATT%3A%20Simple%20Event%20Attendance&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c7206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1164-cwe-79-improper-neutralization-of-in-d439c77f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1164%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phoenixstudiodz%20Easy%20Voice%20Mail&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c71f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1904-cwe-79-improper-neutralization-of-in-f585d933</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nayon46%20Simple%20Wp%20colorfull%20Accordion&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c71fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1754-cwe-79-improper-neutralization-of-in-d238dc53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexeyknyazev%20personal-authors-category&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c71f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2144-cwe-269-improper-privilege-managemen-86e5e526</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2144%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20katsushi-kawamori%20Magic%20Login%20Mail%20or%20QR%20Code&amp;severity=high&amp;id=698ffec8c9e1ff5ad85c7211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2027-cwe-79-improper-neutralization-of-in-ab34f6ef</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2027%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ampenhancer%20AMP%20Enhancer%20%E2%80%93%20Compatibility%20Layer%20for%20Official%20AMP%20Plugin&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c720b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-on-the-edge-of-the-web-and-mobile-using-q-9c0e2dc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20on%20the%20Edge%20of%20the%20Web%20and%20Mobile%20Using%20QR%20Codes&amp;severity=medium&amp;id=6992f627bda29fb02f678619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14608-cwe-862-missing-authorization-in-in-75b65e8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14608%3A%20CWE-862%20Missing%20Authorization%20in%20infosatech%20WP%20Last%20Modified%20Info&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14067-cwe-862-missing-authorization-in-ha-9b0973c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14067%3A%20CWE-862%20Missing%20Authorization%20in%20hassantafreshi%20Easy%20Form%20Builder%20by%20WhiteStudio%20%E2%80%94%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13973-cwe-200-exposure-of-sensitive-infor-87f72582</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13973%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kasuga16%20StickEasy%20Protected%20Contact%20Form&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13681-cwe-22-improper-limitation-of-a-pat-bc28d7b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13681%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thebaldfatguy%20BFG%20Tools%20%E2%80%93%20Extension%20Zipper&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-14-c654b42a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-14&amp;severity=medium&amp;id=699110cac9e1ff5ad8c8365f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-14-389c6444</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-14&amp;severity=low&amp;id=698ff083c9e1ff5ad817a9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26273-cwe-200-exposure-of-sensitive-infor-d59f1dbb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26273%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20idno%20known&amp;severity=critical&amp;id=698f9fdcc9e1ff5ad86c396f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1841-cwe-79-improper-neutralization-of-in-da2dead1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelyoursite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20%26%20API%20Manager&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1844-cwe-79-improper-neutralization-of-in-13a5fcdf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1844%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelyoursite%20PixelYourSite%20Pro%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15157-cwe-862-missing-authorization-in-st-7fd1e561</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15157%3A%20CWE-862%20Missing%20Authorization%20in%20starfishwp%20Starfish%20Review%20Generation%20%26%20Marketing%20for%20WordPress&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26334-cwe-798-use-of-hard-coded-credentia-74ab6645</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26334%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Calero%20VeraSMART&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26333-cwe-306-missing-authentication-for--bbf1e7d2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26333%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Calero%20VeraSMART&amp;severity=critical&amp;id=698f9c59c9e1ff5ad86a8edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26335-cwe-321-use-of-hard-coded-cryptogra-07023d75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26335%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Calero%20VeraSMART&amp;severity=critical&amp;id=698f9c59c9e1ff5ad86a8ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26208-cwe-502-deserialization-of-untruste-4dc06e3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26208%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=698f793ac9e1ff5ad85a8a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26190-cwe-306-missing-authentication-for--6b5551d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26190%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20milvus-io%20milvus&amp;severity=critical&amp;id=698f793ac9e1ff5ad85a8a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26187-cwe-22-improper-limitation-of-a-pat-b61d1b8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26187%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20treeverse%20lakeFS&amp;severity=high&amp;id=698f723cc9e1ff5ad857abde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25991-cwe-918-server-side-request-forgery-fb24aa80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25991%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=698f723cc9e1ff5ad857abd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2441-use-after-free-in-google-chrome-1b1b8c59</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2441%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=698f723cc9e1ff5ad857abe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25964-cwe-22-improper-limitation-of-a-pat-9ddfb3f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25964%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=698f723cc9e1ff5ad857abd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-ties-suspected-russian-actor-to-canfail-mal-4b808088</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Ties%20Suspected%20Russian%20Actor%20to%20CANFAIL%20Malware%20Attacks%20on%20Ukrainian%20Orgs&amp;severity=medium&amp;id=698f605fc9e1ff5ad84f914a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1790-execution-with-unnecessary-privilege-abe9bcfc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1790%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Genetec%20Inc.%20Genetec%20Sipelia&amp;severity=medium&amp;id=698f5d11c9e1ff5ad84e392b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26226-cwe-79-improper-neutralization-of-i-47603533</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20lukilabs%20beautiful-mermaid&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-links-china-iran-russia-north-korea-to-coor-be696efd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Links%20China%2C%20Iran%2C%20Russia%2C%20North%20Korea%20to%20Coordinated%20Defense%20Sector%20Cyber%20Operations&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2026-cwe-276-incorrect-default-permission-871e516d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2026%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Tenable%20Agent&amp;severity=medium&amp;id=698f5286c9e1ff5ad84a5d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uat-9921-deploys-voidlink-malware-to-target-techno-ff44eb2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UAT-9921%20Deploys%20VoidLink%20Malware%20to%20Target%20Technology%20and%20Financial%20Sectors&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26221-cwe-502-deserialization-of-untruste-9949df79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26221%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hyland%20OnBase%20Workflow%20Timer%20Service&amp;severity=critical&amp;id=698f4474c9e1ff5ad8426b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-google-looks-at-ai-abuse-trump-pause-beabdaf4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Google%20Looks%20at%20AI%20Abuse%2C%20Trump%20Pauses%20China%20Bans%2C%20Disney%E2%80%99s%20%242.7M%20Fine&amp;severity=medium&amp;id=698f3d39c9e1ff5ad83e90c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1578-cwe-79-in-hp-inc-hp-app-fbc79362</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1578%3A%20CWE-79%20in%20HP%20Inc%20HP%20App&amp;severity=medium&amp;id=698f40f0c9e1ff5ad8409b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1619-cwe-639-authorization-bypass-through-f50fd75b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1619%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Universal%20Software%20Inc.%20FlexCity%2FKiosk&amp;severity=high&amp;id=698f2856c9e1ff5ad831b997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1618-cwe-288-authentication-bypass-using--4e2f8f4b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1618%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Universal%20Software%20Inc.%20FlexCity%2FKiosk&amp;severity=high&amp;id=698f2856c9e1ff5ad831b994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14349-cwe-267-privilege-defined-with-unsa-4d64021b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14349%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Universal%20Software%20Inc.%20FlexCity%2FKiosk&amp;severity=high&amp;id=698f2856c9e1ff5ad831b991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-carrier-odido-discloses-data-breach-impactin-e3d3a0d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20Carrier%20Odido%20Discloses%20Data%20Breach%20Impacting%206%20Million&amp;severity=medium&amp;id=698f1309c9e1ff5ad826ee2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2443-out-of-bounds-read-in-red-hat-red-ha-7926b12b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2443%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=698f214cc9e1ff5ad82dd77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33042-cwe-94-improper-control-of-generati-afe678c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33042%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Avro%20Java%20SDK&amp;severity=high&amp;id=698f16c1c9e1ff5ad828f5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-chrome-extensions-caught-stealing-busine-8d267a5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Chrome%20Extensions%20Caught%20Stealing%20Business%20Data%2C%20Emails%2C%20and%20Browsing%20History&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-vulnerability-targeted-by-hackers-with-450e3726</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Vulnerability%20Targeted%20by%20Hackers%20Within%2024%20Hours%20of%20PoC%20Release&amp;severity=critical&amp;id=698f04f9c9e1ff5ad81fd15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npms-update-to-harden-their-supply-chain-and-point-a4628ed5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%E2%80%99s%20Update%20to%20Harden%20Their%20Supply%20Chain%2C%20and%20Points%20to%20Consider&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-solarwinds-notepad-microso-e99c0319</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20SolarWinds%2C%20Notepad%2B%2B%2C%20Microsoft%20Vulnerabilities&amp;severity=medium&amp;id=698f0175c9e1ff5ad81defee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-weaponize-rmm-tools-via-zoom-meet-teams--bedec14e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Weaponize%20RMM%20Tools%20via%20Zoom%2C%20Meet%2C%20%26%20Teams%20Lures&amp;severity=medium&amp;id=698f1dccc9e1ff5ad82c8dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0872-cwe-295-improper-certificate-validat-05369c91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0872%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Thales%20SafeNet%20Agent%20for%20Windows%20Logon&amp;severity=low&amp;id=698f214cc9e1ff5ad82dd777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-observe-in-the-wild-exploitation-of-be-7ab8e8f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Observe%20In-the-Wild%20Exploitation%20of%20BeyondTrust%20CVSS%209.9%20Vulnerability&amp;severity=critical&amp;id=699067a1c9e1ff5ad8890c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-145-patches-11-vulnerabilities-910eb94d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20145%20Patches%2011%20Vulnerabilities&amp;severity=high&amp;id=698ee1d1c9e1ff5ad80c75e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-revives-tianfu-cup-hacking-contest-under-inc-4cdc4a0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Revives%20Tianfu%20Cup%20Hacking%20Contest%20Under%20Increased%20Secrecy&amp;severity=medium&amp;id=698eccb9c9e1ff5ad8fd6962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15520-cwe-200-information-exposure-in-reg-6e404135</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15520%3A%20CWE-200%20Information%20Exposure%20in%20RegistrationMagic&amp;severity=medium&amp;id=698ec262c9e1ff5ad8f5317e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48023-cwe-617-reachable-assertion-in-yoko-bac58b67</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48023%3A%20CWE-617%20Reachable%20Assertion%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb7d6c9e1ff5ad8edd0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48022-cwe-130-in-yokogawa-electric-corpor-44c6e289</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48022%3A%20CWE-130%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb7d6c9e1ff5ad8edd0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48021-cwe-191-integer-underflow-wrap-or-w-f12d0e3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48021%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb7d6c9e1ff5ad8edd0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48020-cwe-617-reachable-assertion-in-yoko-6e599e6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48020%3A%20CWE-617%20Reachable%20Assertion%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb0ccc9e1ff5ad8e97a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48019-cwe-617-reachable-assertion-in-yoko-0e0071b2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48019%3A%20CWE-617%20Reachable%20Assertion%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb0ccc9e1ff5ad8e97a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1924-cwe-191-integer-underflow-wrap-or-wr-fdbea02f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1924%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb0ccc9e1ff5ad8e97a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25108-improper-neutralization-of-special--8909b9f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25108%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Soliton%20Systems%20K.K.%20FileZen&amp;severity=high&amp;id=698ea641c9e1ff5ad8e3f0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1721-feae9b4f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1721&amp;severity=medium&amp;id=698e8a20c9e1ff5ad87f7e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9293-cwe-295-improper-certificate-validat-d1d8ef32</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9293%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20App&amp;severity=high&amp;id=698e788cc9e1ff5ad8549279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9292-cwe-942-permissive-cross-domain-secu-dbb25b94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9292%3A%20CWE-942%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20TP-Link%20Systems%20Inc.%20Omada%20Cloud%20Controller&amp;severity=low&amp;id=698e788cc9e1ff5ad8549276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-13-672978b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-13&amp;severity=medium&amp;id=698fbf4ac9e1ff5ad878e2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70957-na-7bf46715</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70957%3A%20n%2Fa&amp;severity=high&amp;id=698f9fdcc9e1ff5ad86c396a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69633-na-14384712</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69633%3A%20n%2Fa&amp;severity=critical&amp;id=698f9fdcc9e1ff5ad86c3966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70955-na-2052c071</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70955%3A%20n%2Fa&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70954-na-50a83a06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70954%3A%20n%2Fa&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70866-na-5a7b6f22</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70866%3A%20n%2Fa&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70093-na-f5f88d30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70093%3A%20n%2Fa&amp;severity=high&amp;id=698f98d5c9e1ff5ad868bfbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70956-na-f3a79383</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70956%3A%20n%2Fa&amp;severity=high&amp;id=698f98d5c9e1ff5ad868bfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69770-na-4c2996be</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69770%3A%20n%2Fa&amp;severity=critical&amp;id=698f6419c9e1ff5ad8512193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66676-na-9476df4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66676%3A%20n%2Fa&amp;severity=medium&amp;id=698f60acc9e1ff5ad84fbaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70095-na-a36d5605</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70095%3A%20n%2Fa&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70091-na-1767a000</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70091%3A%20n%2Fa&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70123-na-82db7ba4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70123%3A%20n%2Fa&amp;severity=high&amp;id=698f5286c9e1ff5ad84a5d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70122-na-2037c377</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70122%3A%20n%2Fa&amp;severity=high&amp;id=698f5286c9e1ff5ad84a5d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70121-na-deced414</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70121%3A%20n%2Fa&amp;severity=high&amp;id=698f5286c9e1ff5ad84a5d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70094-na-132ab04f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70094%3A%20n%2Fa&amp;severity=medium&amp;id=698f4474c9e1ff5ad8426b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-13-fc9bcc6c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-13&amp;severity=low&amp;id=698ed3bfc9e1ff5ad804300a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21961-cwe-119-improper-restriction-of-ope-a0bfc363</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21961%3A%20CWE-119%20%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20AMD%20AMD%20EPYC%E2%84%A2%207002%20Series%20Processors&amp;severity=medium&amp;id=698e6a7bc9e1ff5ad82ff4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40905-cwe-338-use-of-cryptographically-we-1325ff2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40905%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20DBOOK%20WWW%3A%3AOAuth&amp;severity=high&amp;id=698e66f8c9e1ff5ad82e611b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26188-cwe-79-improper-neutralization-of-i-73929d2c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26188%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20solspace%20craft-freeform&amp;severity=medium&amp;id=698ec65ac9e1ff5ad8f7fbe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26068-cwe-77-improper-neutralization-of-s-58777eec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26068%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20jm33-m0%20emp3r0r&amp;severity=critical&amp;id=698ec65ac9e1ff5ad8f7fbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26224-cwe-367-time-of-check-time-of-use-t-b30068a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26224%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Intego%20Log%20Reporter&amp;severity=high&amp;id=698ec65ac9e1ff5ad8f7fc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26225-cwe-59-improper-link-resolution-bef-505203a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26225%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Intego%20Personal%20Backup&amp;severity=high&amp;id=698ec65ac9e1ff5ad8f7fc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26076-cwe-770-allocation-of-resources-wit-ed01ebe8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26076%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20pendulum-project%20ntpd-rs&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad8206a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26075-cwe-352-cross-site-request-forgery--6c6a6891</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26075%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad8206a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14282-incorrect-privilege-assignment-in-h-693927bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14282%3A%20Incorrect%20Privilege%20Assignment%20in%20https%3A%2F%2Fgithub.com%2Fmkj%2Fdropbear%2F%20dropbear&amp;severity=medium&amp;id=69962af36aea4a407ae847f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26069-cwe-200-exposure-of-sensitive-infor-4d72e5e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26069%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thecfu%20scraparr&amp;severity=critical&amp;id=698e4ad9c9e1ff5ad81db30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1358-cwe-434-in-airleader-gmbh-airleader--2b35e562</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1358%3A%20CWE-434%20in%20Airleader%20GmbH%20Airleader%20Master&amp;severity=critical&amp;id=698e4ad9c9e1ff5ad81db306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26056-cwe-94-improper-control-of-generati-da134cd8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26056%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20yokecd%20yoke&amp;severity=high&amp;id=698e4ad9c9e1ff5ad81db314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26055-cwe-306-missing-authentication-for--d8f9a9d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26055%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20yokecd%20yoke&amp;severity=high&amp;id=698e4e5cc9e1ff5ad8206a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26020-cwe-285-improper-authorization-in-s-31ca744c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26020%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Significant-Gravitas%20AutoGPT&amp;severity=critical&amp;id=698e404cc9e1ff5ad81500e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26011-cwe-787-out-of-bounds-write-in-ros--a5e729c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26011%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20ros-navigation%20navigation2&amp;severity=critical&amp;id=698e404cc9e1ff5ad81500de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26005-cwe-918-server-side-request-forgery-c84eb98a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26005%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=698e3cc8c9e1ff5ad81239fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26000-cwe-1021-improper-restriction-of-re-a50b6a03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26000%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=698e3cc8c9e1ff5ad81239f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0619-cwe-190-integer-overflow-or-wraparou-ada214b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0619%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20silabs.com%20Silicon%20Labs%20Matter&amp;severity=medium&amp;id=698e3944c9e1ff5ad80febe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25933-cwe-78-improper-neutralization-of-s-9b77262f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25933%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20arduino%20arduino-app-lab&amp;severity=medium&amp;id=698e35c0c9e1ff5ad80da744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25768-cwe-862-missing-authorization-in-cl-4dd72b51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25768%3A%20CWE-862%3A%20Missing%20Authorization%20in%20cloudamqp%20lavinmq&amp;severity=high&amp;id=698e323cc9e1ff5ad80b581e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25767-cwe-863-incorrect-authorization-in--8f387b94</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25767%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20cloudamqp%20lavinmq&amp;severity=high&amp;id=698e323cc9e1ff5ad80b5817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25922-cwe-287-improper-authentication-in--b40b4560</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25922%3A%20CWE-287%3A%20Improper%20Authentication%20in%20goauthentik%20authentik&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25748-cwe-287-improper-authentication-in--711f143d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25748%3A%20CWE-287%3A%20Improper%20Authentication%20in%20goauthentik%20authentik&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25227-cwe-94-improper-control-of-generati-cc39f642</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25227%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20goauthentik%20authentik&amp;severity=critical&amp;id=698e2eb9c9e1ff5ad808ac29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24895-cwe-180-incorrect-behavior-order-va-e6909ced</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24895%3A%20CWE-180%3A%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20php%20frankenphp&amp;severity=high&amp;id=698e2b39c9e1ff5ad806e180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24894-cwe-269-improper-privilege-manageme-ae84e94f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24894%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20php%20frankenphp&amp;severity=high&amp;id=698e2b39c9e1ff5ad806e17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24044-cwe-336-same-seed-in-pseudo-random--1eb14671</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24044%3A%20CWE-336%3A%20Same%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20element-hq%20ess-helm&amp;severity=critical&amp;id=698e2b39c9e1ff5ad806e176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22821-cwe-89-improper-neutralization-of-s-db2cc7da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22821%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pluginsGLPI%20mreporting&amp;severity=medium&amp;id=698e242ec9e1ff5ad802d084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26219-cwe-327-use-of-a-broken-or-risky-cr-46123275</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26219%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20newbee-ltd%20newbee-mall&amp;severity=critical&amp;id=698e242ec9e1ff5ad802d08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26218-cwe-798-use-of-hard-coded-credentia-92b3e8bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26218%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20newbee-ltd%20newbee-mall&amp;severity=critical&amp;id=698e242ec9e1ff5ad802d088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21438-cwe-401-missing-release-of-memory-a-d1018b14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21438%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20quic-go%20webtransport-go&amp;severity=medium&amp;id=698e1d24c9e1ff5ad8febca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21435-cwe-400-uncontrolled-resource-consu-839c7a05</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21435%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20quic-go%20webtransport-go&amp;severity=medium&amp;id=698e1d24c9e1ff5ad8febca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21434-cwe-770-allocation-of-resources-wit-bab64128</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21434%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20quic-go%20webtransport-go&amp;severity=medium&amp;id=698e1d24c9e1ff5ad8febc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-reports-state-backed-hackers-using-gemini-a-87649c99</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Reports%20State-Backed%20Hackers%20Using%20Gemini%20AI%20for%20Recon%20and%20Attack%20Support&amp;severity=medium&amp;id=698e15e7c9e1ff5ad8fa95d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54519-cwe-427-uncontrolled-search-path-el-82dd3c9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54519%3A%20CWE-427%20%20Uncontrolled%20Search%20Path%20Element%20in%20AMD%20Vivado%E2%84%A2%20Documentation%20Navigator%20Installation%20(Windows)&amp;severity=high&amp;id=698e19a6c9e1ff5ad8fc8114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36319-cwe-1191-on-chip-debug-and-test-int-3f5c29d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36319%3A%20CWE-1191%20%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%3B%0D%0AAMD%20Ryzen%E2%84%A2%208040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698e1298c9e1ff5ad8f85870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52533-cwe-1191-on-chip-debug-and-test-int-189588d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52533%3A%20CWE-1191%20%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Series%20Processors&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-campaign-plants-malicious-packages-in-npm--94a891a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Campaign%20Plants%20Malicious%20Packages%20in%20npm%20and%20PyPI%20Ecosystems&amp;severity=medium&amp;id=698ed2ddc9e1ff5ad8037a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54756-cwe-1392-in-brightsign-brightsign-o-789cc207</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54756%3A%20CWE-1392%20in%20BrightSign%20BrightSign%20OS%20series%204%20players&amp;severity=high&amp;id=698e080ec9e1ff5ad8f198c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55210-cwe-270-privilege-context-switching-ded8b804</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55210%3A%20CWE-270%3A%20Privilege%20Context%20Switching%20Error%20in%20FreePBX%20api&amp;severity=low&amp;id=698e0109c9e1ff5ad8eda2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-eliminate-the-technical-debt-of-insecure-ai-9fa385dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20Eliminate%20the%20Technical%20Debt%20of%20Insecure%20AI-Assisted%20Software%20Development&amp;severity=medium&amp;id=698dfd4dc9e1ff5ad8ebf73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26217-cwe-22-improper-limitation-of-a-pat-0f89b04d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26217%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20unclecode%20Crawl4AI&amp;severity=critical&amp;id=698df67cc9e1ff5ad8e8871a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26216-cwe-94-improper-control-of-generati-09f71e54</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26216%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20unclecode%20Crawl4AI&amp;severity=critical&amp;id=698df67cc9e1ff5ad8e88716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-bought-i-saw-i-attended-a-quick-guide-to-staying-415d6e4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20bought%2C%20I%20saw%2C%20I%20attended%3A%20a%20quick%20guide%20to%20staying%20scam-free%20at%20the%20Olympics%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=698df332c9e1ff5ad8e63992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-strikes-with-new-50-version-targeting-wind-9390e947</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%20strikes%20with%20new%205.0%20version%2C%20targeting%20Windows%2C%20Linux%20and%20ESXI%20systems&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad82069be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26214-cwe-297-improper-validation-of-cert-d70804ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26214%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Xiaomi%20Technology%20Co.%2C%20Ltd.%20Galaxy%20FDS%20Android%20SDK&amp;severity=critical&amp;id=698df2f6c9e1ff5ad8e60c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1104-cwe-862-missing-authorization-in-nin-28323d66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1104%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20FastDup%20%E2%80%93%20Fastest%20WordPress%20Migration%20%26%20Duplicator&amp;severity=high&amp;id=698de86ac9e1ff5ad8e08f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14014-cwe-434-unrestricted-upload-of-file-0c2cae09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14014%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20NTN%20Information%20Processing%20Services%20Computer%20Software%20Hardware%20Industry%20and%20Trade%20Ltd.%20Co.%20Smart%20Panel&amp;severity=critical&amp;id=698de160c9e1ff5ad8dd2345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1320-cwe-79-improper-neutralization-of-in-70548f61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=high&amp;id=698de160c9e1ff5ad8dd2348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13004-cwe-639-authorization-bypass-throug-c7870814</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13004%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Farktor%20Software%20E-Commerce%20Services%20Inc.%20E-Commerce%20Package&amp;severity=medium&amp;id=698dd351c9e1ff5ad8d5dee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2007-heap-based-buffer-overflow-in-postgr-364c6713</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2007%3A%20Heap-based%20Buffer%20Overflow%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5def8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2006-improper-validation-of-array-index-i-3ae45a05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2006%3A%20Improper%20Validation%20of%20Array%20Index%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5def5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2005-heap-based-buffer-overflow-in-postgr-f6887628</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2005%3A%20Heap-based%20Buffer%20Overflow%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5def2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2004-improper-validation-of-specified-typ-7cc20198</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2004%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5deef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2003-improper-validation-of-specified-typ-fa5f154d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2003%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20PostgreSQL&amp;severity=medium&amp;id=698dd351c9e1ff5ad8d5deec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13002-cwe-79-improper-neutralization-of-i-98ae0343</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13002%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Farktor%20Software%20E-Commerce%20Services%20Inc.%20E-Commerce%20Package&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5dee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10969-cwe-89-improper-neutralization-of-s-5a43f9f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10969%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Farktor%20Software%20E-Commerce%20Services%20Inc.%20E-Commerce%20Package&amp;severity=critical&amp;id=698dd351c9e1ff5ad8d5dee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1316-cwe-79-improper-neutralization-of-in-d9728873</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=high&amp;id=698ec65ac9e1ff5ad8f7fc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1671-cwe-862-missing-authorization-in-swi-985d22a4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1671%3A%20CWE-862%20Missing%20Authorization%20in%20switcorp%20Activity%20Log%20for%20WordPress&amp;severity=medium&amp;id=698de86ac9e1ff5ad8e08f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apollomd-data-breach-impacts-626000-individuals-828dc9bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ApolloMD%20Data%20Breach%20Impacts%20626%2C000%20Individuals&amp;severity=medium&amp;id=698dc891c9e1ff5ad8cfc96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-prompt-rce-claude-0-click-r-6b5df16d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Prompt%20RCE%2C%20Claude%200-Click%2C%20RenEngine%20Loader%2C%20Auto%200-Days%20%26%2025%2B%20Stories&amp;severity=low&amp;id=698ed2ddc9e1ff5ad8037a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-enable-windows-baseline-security-with-ead898ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Enable%20%E2%80%98Windows%20Baseline%20Security%E2%80%99%20With%20New%20Runtime%20Integrity%20Safeguards&amp;severity=medium&amp;id=698dba81c9e1ff5ad8c59be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacktivists-state-actors-cybercriminals-target-glo-7203090f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacktivists%2C%20State%20Actors%2C%20Cybercriminals%20Target%20Global%20Defense%20Industry%2C%20Google%20Warns&amp;severity=medium&amp;id=698db6fdc9e1ff5ad8c36760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15574-cwe-330-use-of-insufficiently-rando-a169357c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15574%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20SolaX%20Power%20Pocket%20WiFi%203.0&amp;severity=medium&amp;id=698db73dc9e1ff5ad8c38f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15575-cwe-494-download-of-code-without-in-51eadc64</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15575%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20SolaX%20Power%20Pocket%20WiFi%203.0&amp;severity=medium&amp;id=698db73dc9e1ff5ad8c38fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15573-cwe-295-improper-certificate-valida-cc47b78d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15573%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20SolaX%20Power%20Pocket%20WiFi%203.0&amp;severity=critical&amp;id=698db3acc9e1ff5ad8c09726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/screenconnect-attack-smartscreen-bypass-and-rmm-ab-e1ad15db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ScreenConnect%20Attack%3A%20SmartScreen%20Bypass%20and%20RMM%20Abuse&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad82069ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/employee-monitoring-and-simplehelp-software-abused-52f33a69</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Employee%20Monitoring%20and%20SimpleHelp%20Software%20Abused%20in%20Ransomware%20Operations&amp;severity=medium&amp;id=698e4ad8c9e1ff5ad81db232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ctem-divide-why-84-of-security-programs-are-fa-5f888951</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20CTEM%20Divide%3A%20Why%2084%25%20of%20Security%20Programs%20Are%20Falling%20Behind&amp;severity=medium&amp;id=698ed2ddc9e1ff5ad8037a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2276-cwe-79-improper-neutralization-of-in-f88855d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wix%20web%20application&amp;severity=medium&amp;id=698daca4c9e1ff5ad8b9e267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-7-zip-downloads-are-turning-home-pcs-into-pro-81a7a0ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%207-Zip%20downloads%20are%20turning%20home%20PCs%20into%20proxy%20nodes&amp;severity=medium&amp;id=698d9e94c9e1ff5ad8b3631e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1356-cwe-918-server-side-request-forgery--e75ae6a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1356%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20mateuszgbiorczyk%20Converter%20for%20Media%20%E2%80%93%20Optimize%20images%20%7C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=698d9e94c9e1ff5ad8b36380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41117-vulnerability-in-grafana-grafanagra-1c68adff</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41117%3A%20Vulnerability%20in%20Grafana%20grafana%2Fgrafana&amp;severity=medium&amp;id=698d9b14c9e1ff5ad8b1f9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21722-vulnerability-in-grafana-grafanagra-88a5f29c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21722%3A%20Vulnerability%20in%20Grafana%20grafana%2Fgrafana&amp;severity=medium&amp;id=698d9b14c9e1ff5ad8b1f9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-ios-zero-day-exploited-in-extremely--ce2c8fe7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20iOS%20Zero-Day%20Exploited%20in%20%E2%80%98Extremely%20Sophisticated%20Attack%E2%80%99&amp;severity=medium&amp;id=698d8949c9e1ff5ad8a72548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/83-of-ivanti-epmm-exploits-linked-to-single-ip-on--5545c443</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=83%25%20of%20Ivanti%20EPMM%20Exploits%20Linked%20to%20Single%20IP%20on%20Bulletproof%20Hosting%20Infrastructure&amp;severity=medium&amp;id=698ed2ddc9e1ff5ad8037a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15577-cwe-22-improper-limitation-of-a-pat-e8c264c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15577%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Valmet%20Valmet%20DNA%20Web%20Tools&amp;severity=high&amp;id=698d860cc9e1ff5ad8a5a414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14892-cwe-269-improper-privilege-manageme-ca17fc3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14892%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Prime%20Listing%20Manager&amp;severity=critical&amp;id=698d70304b57a58fa1de47f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-fixes-exploited-zero-day-affecting-ios-macos-b32e0167</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Fixes%20Exploited%20Zero-Day%20Affecting%20iOS%2C%20macOS%2C%20and%20Other%20Devices&amp;severity=low&amp;id=698d852bc9e1ff5ad8a52186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2327-regular-expression-denial-of-service-61f28507</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2327%3A%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)%20in%20markdown-it&amp;severity=medium&amp;id=698d69274b57a58fa1db4942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2391-cwe-20-improper-input-validation-d67d2f2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2391%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=medium&amp;id=698d7606c9e1ff5ad87e3c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25676-uncontrolled-search-path-element-in-108bd32e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25676%3A%20Uncontrolled%20Search%20Path%20Element%20in%20M-Audio%20M-Track%20Duo%20HD&amp;severity=high&amp;id=698d7606c9e1ff5ad87e3c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26235-missing-authentication-for-critical-64624540</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26235%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ALBRECHT%20JUNG%20GMBH%20%26%20CO.%20KG%20JUNG%20Smart%20Visu%20Server&amp;severity=high&amp;id=698d49854b57a58fa1aa88fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26234-improper-neutralization-of-http-hea-13dc0f5b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26234%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20ALBRECHT%20JUNG%20GMBH%20%26%20CO.%20KG%20JUNG%20Smart%20Visu%20Server&amp;severity=high&amp;id=698d49854b57a58fa1aa88fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1537-cwe-862-missing-authorization-in-lat-a278a9f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1537%3A%20CWE-862%20Missing%20Authorization%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=698d49854b57a58fa1aa88f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23857-cwe-280-improper-handling-of-insuff-a6a15377</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23857%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Dell%20Update%20Package&amp;severity=high&amp;id=698d3b734b57a58fa19a91ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-seconds-to-botnet-analyzing-a-self-propagatin-71b48b77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Seconds%20to%20Botnet%20-%20Analyzing%20a%20Self%20Propagating%20SSH%20Worm%20with%20Cryptographically%20Signed%20C2%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Feb%2011th)&amp;severity=medium&amp;id=698d343e4b57a58fa1678c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23856-cwe-284-improper-access-control-in--82f0d51e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23856%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20iDRAC%20Service%20Module&amp;severity=high&amp;id=698d3b734b57a58fa19a91eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0969-cwe-94-improper-control-of-generatio-4c82d751</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0969%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(Code%20Injection)%20in%20HashiCorp%20Shared%20library&amp;severity=high&amp;id=698d3b734b57a58fa19a91e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1729-cwe-306-missing-authentication-for-c-1533b53f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1729%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20scriptsbundle%20AdForest&amp;severity=critical&amp;id=698d2d644b57a58fa132a7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-actors-exploit-notepad-supply-chain-9ebed71a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20Actors%20Exploit%20Notepad%2B%2B%20Supply%20Chain&amp;severity=medium&amp;id=698d9e94c9e1ff5ad8b362f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-12-acafb6eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-12&amp;severity=medium&amp;id=698e6dcac9e1ff5ad833f58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70092-na-509b535f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70092%3A%20n%2Fa&amp;severity=medium&amp;id=698e5564c9e1ff5ad8242570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70845-na-dec3a6fa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70845%3A%20n%2Fa&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad8206a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25828-na-1d8b46e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25828%3A%20n%2Fa&amp;severity=medium&amp;id=698e4ad9c9e1ff5ad81db30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70314-na-2e4868d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70314%3A%20n%2Fa&amp;severity=critical&amp;id=698e2eb9c9e1ff5ad808ac25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67433-na-c2b1a37a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67433%3A%20n%2Fa&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67432-na-a7592b45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67432%3A%20n%2Fa&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70981-na-0c201623</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70981%3A%20n%2Fa&amp;severity=critical&amp;id=698e0b91c9e1ff5ad8f3a8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69807-na-1ef94850</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69807%3A%20n%2Fa&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69806-na-b84e89b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69806%3A%20n%2Fa&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63421-na-d51ca972</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63421%3A%20n%2Fa&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61879-na-4f30b3e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61879%3A%20n%2Fa&amp;severity=high&amp;id=698e080ec9e1ff5ad8f198c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61880-na-79c5be27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61880%3A%20n%2Fa&amp;severity=high&amp;id=698e0109c9e1ff5ad8eda2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69752-na-7a1a3dbf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69752%3A%20n%2Fa&amp;severity=medium&amp;id=698dfd94c9e1ff5ad8ec1801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56647-na-27437016</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56647%3A%20n%2Fa&amp;severity=medium&amp;id=698dfd94c9e1ff5ad8ec17fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70886-na-ad94ba80</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70886%3A%20n%2Fa&amp;severity=high&amp;id=698df67cc9e1ff5ad8e88711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69634-na-e6863074</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69634%3A%20n%2Fa&amp;severity=critical&amp;id=698df2f6c9e1ff5ad8e60c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-12-d64c971f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-12&amp;severity=low&amp;id=698d29aa4b57a58fa1059bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20629-an-app-may-be-able-to-access-user-s-faffa851</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20629%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20644-processing-maliciously-crafted-web--df631de1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20644%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20652-a-remote-attacker-may-be-able-to-ca-62ddf32d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20652%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20Safari&amp;severity=high&amp;id=698d0dcc4b57a58fa1d960a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20605-an-app-may-be-able-to-crash-a-syste-09879c7d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20605%3A%20An%20app%20may%20be%20able%20to%20crash%20a%20system%20process%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d95121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20625-an-app-may-be-able-to-access-sensit-15e4e561</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20625%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20648-a-malicious-app-may-be-able-to-acce-aff95690</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20648%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20notifications%20from%20other%20iCloud%20devices%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d9607e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20609-processing-a-maliciously-crafted-fi-fbf812b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20609%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20a%20denial-of-service%20or%20potentially%20disclose%20memory%20contents%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d95135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20608-processing-maliciously-crafted-web--dcc1a5d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20608%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dc64b57a58fa1d9512e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20649-a-user-may-be-able-to-view-sensitiv-7238f714</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20649%3A%20A%20user%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20624-an-app-may-be-able-to-access-sensit-298c8882</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20624%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20673-turning-off-load-remote-content-in--ce3e0a93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20673%3A%20Turning%20off%20%22Load%20remote%20content%20in%20messages%E2%80%9D%20may%20not%20apply%20to%20all%20mail%20previews%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d960fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46310-an-attacker-with-root-privileges-ma-bd0f5f9f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46310%3A%20An%20attacker%20with%20root%20privileges%20may%20be%20able%20to%20delete%20protected%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d95112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20653-an-app-may-be-able-to-access-sensit-4a2d56b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20653%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20700-an-attacker-with-memory-write-capab-30065920</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20700%3A%20An%20attacker%20with%20memory%20write%20capability%20may%20be%20able%20to%20execute%20arbitrary%20code.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals%20on%20versions%20of%20iOS%20before%20iOS%2026.%20CVE-2025-14174%20and%20CVE-2025-43529%20were%20also%20issued%20in%20response%20to%20this%20report.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcf4b57a58fa1d961e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20645-an-attacker-with-physical-access-to-7f4554ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20645%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20612-an-app-may-be-able-to-access-sensit-9f0328e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20612%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20669-an-app-may-be-able-to-access-sensit-66a11fec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20669%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d960f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20628-an-app-may-be-able-to-break-out-of--e55ceda5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20628%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dca4b57a58fa1d95b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20674-an-attacker-with-physical-access-to-5d574b03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20674%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d96104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20623-an-app-may-be-able-to-access-protec-45ebaffc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20623%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20635-processing-maliciously-crafted-web--7aa6b401</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20635%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20662-an-attacker-with-physical-access-to-846a9d15</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20662%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46301-a-malicious-hid-device-may-cause-an-1d9df697</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46301%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d95098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20619-an-app-may-be-able-to-access-sensit-e1b682f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20619%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20658-an-app-may-be-able-to-gain-root-pri-6893f21b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20658%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=698d0dcc4b57a58fa1d960c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20678-an-app-may-be-able-to-access-sensit-dce1ffb8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20678%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcf4b57a58fa1d961d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20681-an-app-may-be-able-to-access-inform-89c87213</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20681%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user&apos;s%20contacts%20in%20Apple%20macOS&amp;severity=low&amp;id=698d0dcf4b57a58fa1d961db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20615-an-app-may-be-able-to-gain-root-pri-22cab454</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20615%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20642-a-person-with-physical-access-to-an-cb48007d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20642%3A%20A%20person%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20access%20photos%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=698d0dcb4b57a58fa1d96065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20654-an-app-may-be-able-to-cause-unexpec-7bab56e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20654%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20603-an-app-with-root-privileges-may-be--adf00fa5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20603%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d9511e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20602-an-app-may-be-able-to-cause-a-denia-c8cb0c3e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20602%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d95119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20655-an-attacker-with-physical-access-to-18420a98</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20655%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20614-an-app-may-be-able-to-gain-root-pri-30d49a81</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20614%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20680-a-sandboxed-app-may-be-able-to-acce-4caa5527</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20680%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcf4b57a58fa1d961d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20638-a-user-with-live-caller-id-app-exte-fbe0ce7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20638%3A%20A%20user%20with%20Live%20Caller%20ID%20app%20extensions%20turned%20off%20could%20have%20identifying%20information%20leaked%20to%20the%20extensions%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46290-a-remote-attacker-may-be-able-to-ca-a846a6ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46290%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc44b57a58fa1d9508f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20618-an-app-may-be-able-to-access-user-s-e48313d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20618%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20663-an-app-may-be-able-to-enumerate-a-u-2cb1651a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20663%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=698d0dcd4b57a58fa1d960e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43417-an-app-may-be-able-to-access-user-s-f3a9d708</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43417%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d95089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46300-a-malicious-hid-device-may-cause-an-ae7632c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46300%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d95093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20634-processing-a-maliciously-crafted-im-f96ee51f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20634%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20result%20in%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20675-processing-a-maliciously-crafted-im-be9478fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20675%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcd4b57a58fa1d96107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46303-a-malicious-hid-device-may-cause-an-862ea382</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46303%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d950a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20660-a-remote-user-may-be-able-to-write--547636dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20660%3A%20A%20remote%20user%20may%20be%20able%20to%20write%20arbitrary%20files%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20621-an-app-may-be-able-to-cause-unexpec-5108d033</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20621%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20676-a-website-may-be-able-to-track-user-791b9425</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20676%3A%20A%20website%20may%20be%20able%20to%20track%20users%20through%20Safari%20web%20extensions%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d96111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20601-an-app-may-be-able-to-monitor-keyst-f7acbbd7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20601%3A%20An%20app%20may%20be%20able%20to%20monitor%20keystrokes%20without%20user%20permission%20in%20Apple%20macOS&amp;severity=low&amp;id=698d0dc64b57a58fa1d95116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20656-an-app-may-be-able-to-access-a-user-7c5d3cac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20656%3A%20An%20app%20may%20be%20able%20to%20access%20a%20user&apos;s%20Safari%20history%20in%20Apple%20Safari&amp;severity=low&amp;id=698d0dcc4b57a58fa1d960c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20640-an-attacker-with-physical-access-to-513c36d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20640%3A%20An%20attacker%20with%20physical%20access%20to%20iPhone%20may%20be%20able%20to%20take%20and%20view%20screenshots%20of%20sensitive%20data%20from%20the%20iPhone%20during%20iPhone%20Mirroring%20with%20Mac%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20617-an-app-may-be-able-to-gain-root-pri-42394d40</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20617%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20682-an-attacker-may-be-able-to-discover-9f496858</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20682%3A%20An%20attacker%20may%20be%20able%20to%20discover%20a%20user%E2%80%99s%20deleted%20notes%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcf4b57a58fa1d961de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20616-processing-a-maliciously-crafted-us-07f8ea38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20616%3A%20Processing%20a%20maliciously%20crafted%20USD%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20641-an-app-may-be-able-to-identify-what-c3836ff2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20641%3A%20An%20app%20may%20be%20able%20to%20identify%20what%20other%20apps%20a%20user%20has%20installed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcb4b57a58fa1d9605a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20677-a-shortcut-may-be-able-to-bypass-sa-87455190</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20677%3A%20A%20shortcut%20may%20be%20able%20to%20bypass%20sandbox%20restrictions%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=698d0dcd4b57a58fa1d96117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43403-an-app-may-be-able-to-access-sensit-b57a9fe5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43403%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d95085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20620-an-attacker-may-be-able-to-cause-un-9406e86e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20620%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20636-processing-maliciously-crafted-web--87198eec</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20636%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46302-a-malicious-hid-device-may-cause-an-f3110bb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46302%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d9509d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20661-an-attacker-with-physical-access-to-0330a824</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20661%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20650-an-attacker-in-a-privileged-network-e8fc6a4b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20650%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20perform%20denial-of-service%20attack%20using%20crafted%20Bluetooth%20packets%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcc4b57a58fa1d960a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20646-a-malicious-app-may-be-able-to-read-75642868</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20646%3A%20A%20malicious%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=low&amp;id=698d0dcb4b57a58fa1d96076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20611-processing-a-maliciously-crafted-me-b7037f10</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20611%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc64b57a58fa1d95142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46305-a-malicious-hid-device-may-cause-an-f84aceb4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46305%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d950ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20666-an-app-may-be-able-to-access-sensit-c43263b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20666%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d960e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20627-an-app-may-be-able-to-access-sensit-26aa6429</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20627%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20671-an-attacker-in-a-privileged-network-c882a997</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20671%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20intercept%20network%20traffic%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=698d0dcd4b57a58fa1d960f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20626-a-malicious-app-may-be-able-to-gain-f84e5a47</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20626%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dca4b57a58fa1d95b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20630-an-app-may-be-able-to-access-protec-c2e3d770</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20630%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46304-a-malicious-hid-device-may-cause-an-bb9d8bd2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46304%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d950a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20667-an-app-may-be-able-to-break-out-of--b974edf4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20667%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcd4b57a58fa1d960ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20610-an-app-may-be-able-to-gain-root-pri-8d29f0c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20610%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=698d0dc64b57a58fa1d9513f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20647-an-app-may-be-able-to-access-sensit-a7a341d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20647%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d9607a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20606-an-app-may-be-able-to-bypass-certai-23444a98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20606%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc64b57a58fa1d95127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43537-restoring-a-maliciously-crafted-bac-28d5660f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43537%3A%20Restoring%20a%20maliciously%20crafted%20backup%20file%20may%20lead%20to%20modification%20of%20protected%20system%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=698d0dc44b57a58fa1d9508c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26215-cwe-502-deserialization-of-untruste-e3572f04</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26215%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20zyddnys%20manga-image-translator&amp;severity=critical&amp;id=698d06be4b57a58fa1d7cd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1669-cwe-73-external-control-of-file-name-d4d0c160</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1669%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Google%20Keras&amp;severity=high&amp;id=698d03334b57a58fa1d6e844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26031-cwe-863-incorrect-authorization-in--87201beb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26031%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20frappe%20lms&amp;severity=low&amp;id=698cf8a94b57a58fa1cef24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-digest-of-kasperskys-report-spam-and-phishin-dea83211</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20digest%20of%20Kaspersky%E2%80%99s%20report%20%E2%80%9CSpam%20and%20Phishing%20in%202025%E2%80%9D%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6990684ec9e1ff5ad8894f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26029-cwe-78-improper-neutralization-of-s-8fbb95dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26029%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20akutishevsky%20sf-mcp-server&amp;severity=high&amp;id=698cf8a94b57a58fa1cef249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26023-cwe-79-improper-neutralization-of-i-7a463a46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26023%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=medium&amp;id=698cf5244b57a58fa1cd8256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26021-cwe-1321-improperly-controlled-modi-92e0938f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26021%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20ahdinosaur%20set-in&amp;severity=critical&amp;id=698cf5244b57a58fa1cd8252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26012-cwe-863-incorrect-authorization-in--026fa0b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26012%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=698cf5244b57a58fa1cd8248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26019-cwe-918-server-side-request-forgery-c99b8be3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26019%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchainjs&amp;severity=medium&amp;id=698cf5244b57a58fa1cd824c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26014-cwe-200-exposure-of-sensitive-infor-48b49b39</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26014%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20pion%20dtls&amp;severity=medium&amp;id=698cf19f4b57a58fa1cc1ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26010-cwe-269-improper-privilege-manageme-5200ec47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26010%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20open-metadata%20OpenMetadata&amp;severity=high&amp;id=698cf19f4b57a58fa1cc1c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25999-cwe-285-improper-authorization-in-a-91362206</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25999%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Aiven-Open%20klaw&amp;severity=high&amp;id=698cf19f4b57a58fa1cc1c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25994-cwe-120-buffer-copy-without-checkin-aa3b3738</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25994%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pjsip%20pjproject&amp;severity=high&amp;id=698cf19f4b57a58fa1cc1c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25990-cwe-787-out-of-bounds-write-in-pyth-f41c8f1d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25990%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20python-pillow%20Pillow&amp;severity=high&amp;id=698cee1b4b57a58fa1cb0648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25935-cwe-80-improper-neutralization-of-s-4d6fb46e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25935%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=698cee1b4b57a58fa1cb0642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25759-cwe-79-improper-neutralization-of-i-4af33bb7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25759%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=698cee1b4b57a58fa1cb063d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25633-cwe-862-missing-authorization-in-st-84d4a800</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25633%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=698cea984b57a58fa1c97f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26158-external-control-of-file-name-or-pa-26ab3275</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26158%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=698cea984b57a58fa1c97f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26157-external-control-of-file-name-or-pa-b3a1be35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26157%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=698cea984b57a58fa1c97f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nevada-unveils-new-statewide-data-classification-p-46a4dc4d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nevada%20Unveils%20New%20Statewide%20Data%20Classification%20Policy%20Months%20After%20Cyberattack&amp;severity=medium&amp;id=698cdfd94b57a58fa1c07796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-everything-february-2026-wed-feb-11t-f0160db9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Everything%3A%20February%202026%2C%20(Wed%2C%20Feb%2011th)&amp;severity=medium&amp;id=698cdc554b57a58fa1bcb07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2323-inappropriate-implementation-in-goog-01052476</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2323%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce7b4b57a58fa1b3e33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2322-inappropriate-implementation-in-goog-620d75ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2322%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce7b4b57a58fa1b3e338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2321-use-after-free-in-google-chrome-12d5ff1f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2321%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce7b4b57a58fa1b3e334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2320-inappropriate-implementation-in-goog-376ab5ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2320%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce7b4b57a58fa1b3e330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2319-race-in-google-chrome-6dd4299b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2319%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce7b4b57a58fa1b3e32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2318-inappropriate-implementation-in-goog-fcfe2ea8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2318%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce794b57a58fa1b3e2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2317-inappropriate-implementation-in-goog-fa12e170</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2317%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce794b57a58fa1b3e2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2316-insufficient-policy-enforcement-in-g-04cf54f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2316%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce794b57a58fa1b3e2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2315-inappropriate-implementation-in-goog-670294ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2315%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce794b57a58fa1b3e2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2314-heap-buffer-overflow-in-google-chrom-a0a9ef60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2314%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce794b57a58fa1b3e2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2313-use-after-free-in-google-chrome-38c51714</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2313%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce794b57a58fa1b3e2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0229-cwe-754-improper-check-for-unusual-o-3f546358</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0229%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=698cc7724b57a58fa1b0b31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0228-cwe-295-improper-certificate-validat-6fdf6a10</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0228%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=low&amp;id=698cc7724b57a58fa1b0b31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2361-uncontrolled-search-path-element-in--017f4448</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2361%3A%20Uncontrolled%20Search%20Path%20Element%20in%20DALIBO%20PostgreSQL%20Anonymizer&amp;severity=high&amp;id=698cc7724b57a58fa1b0b326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2360-uncontrolled-search-path-element-in--62a2cecb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2360%3A%20Uncontrolled%20Search%20Path%20Element%20in%20DALIBO%20PostgreSQL%20Anonymizer&amp;severity=high&amp;id=698cc7724b57a58fa1b0b321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-malicious-outlook-add-in-found-stealing-4000-1d56e446</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=First%20Malicious%20Outlook%20Add-In%20Found%20Stealing%204%2C000%2B%20Microsoft%20Credentials&amp;severity=medium&amp;id=698d852bc9e1ff5ad8a52189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-game-is-over-when-free-comes-at-too-high-a-pri-58c2adc1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20game%20is%20over%3A%20when%20%E2%80%9Cfree%E2%80%9D%20comes%20at%20too%20high%20a%20price.%20What%20we%20know%20about%20RenEngine&amp;severity=medium&amp;id=698cfc2b4b57a58fa1d1eaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13391-cwe-862-missing-authorization-in-mo-f77adfb0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13391%3A%20CWE-862%20Missing%20Authorization%20in%20MooMoo%20Product%20Options%20and%20Price%20Calculation%20Formulas%20for%20WooCommerce%20%E2%80%93%20Uni%20CPO%20(Premium)&amp;severity=medium&amp;id=698cb25d4b57a58fa1a74845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24789-cwe-306-in-zlan-information-technol-50342d88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24789%3A%20CWE-306%20in%20ZLAN%20Information%20Technology%20Co.%20ZLAN5143D&amp;severity=critical&amp;id=698cb25d4b57a58fa1a74849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25084-cwe-306-missing-authentication-for--35519066</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25084%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ZLAN%20Information%20Technology%20Co.%20ZLAN5143D&amp;severity=critical&amp;id=698cb25d4b57a58fa1a7484e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25869-cwe-22-improper-limitation-of-a-pat-0151200d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25869%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MiniGal%20MiniGal%20Nano&amp;severity=medium&amp;id=698cab544b57a58fa1a4b9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25868-cwe-79-improper-neutralization-of-i-541ac945</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20MiniGal%20MiniGal%20Nano&amp;severity=medium&amp;id=698ca44a4b57a58fa1a27f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12474-cwe-908-use-of-uninitialized-resour-44b2e038</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12474%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Google%20libjxl&amp;severity=low&amp;id=698ca44a4b57a58fa1a27f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1837-cwe-805-in-google-libjxl-b9d74d66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1837%3A%20CWE-805%20in%20Google%20libjxl&amp;severity=high&amp;id=698ca44a4b57a58fa1a27f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2344-cwe-79-xss-in-plunet-plunet-business-9974f8f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2344%3A%20CWE-79%20-%20XSS%20in%20Plunet%20Plunet%20BusinessManager&amp;severity=high&amp;id=698c9d454b57a58fa19f3844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt36-and-sidecopy-launch-cross-platform-rat-campa-8c4fd7c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT36%20and%20SideCopy%20Launch%20Cross-Platform%20RAT%20Campaigns%20Against%20Indian%20Entities&amp;severity=medium&amp;id=698d852bc9e1ff5ad8a5218c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2345-cwe-346-origin-validation-error-in-p-d45d2f19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2345%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Proctorio%20Secure%20Exam%20Proctor%20Extension&amp;severity=low&amp;id=698c9d454b57a58fa19f3847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61969-cwe-732-incorrect-permission-assign-acd56dd5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61969%3A%20CWE-732%20%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20AMD%20AMD%20%C2%B5Prof&amp;severity=high&amp;id=698c99bc4b57a58fa19e33d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52541-cwe-427-uncontrolled-search-path-el-5c9796c2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52541%3A%20CWE-427%20%20Uncontrolled%20Search%20Path%20Element%20in%20AMD%20Vivado%E2%84%A2%20Installation%20(Windows)&amp;severity=high&amp;id=698c99bc4b57a58fa19e33d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48518-cwe-787-out-of-bounds-write-in-amd--257c4ddf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48518%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698c99bc4b57a58fa19e33ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36320-cwe-190-integer-overflow-or-wraparo-82cb0530</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36320%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=698c99bc4b57a58fa19e33c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36324-cwe-787-out-of-bounds-write-in-amd--f1c2dd95</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36324%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Ryzen%E2%84%A2%206000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics%3B%0D%0AAMD%20Ryzen%E2%84%A2%207035%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=698c99bc4b57a58fa19e33c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48508-cwe-1245-improper-finite-state-mach-120dee71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48508%3A%20CWE-1245%20%20Improper%20Finite%20State%20Machines%20(FSMs)%20in%20Hardware%20Logic%20in%20AMD%20AMD%20Radeon%E2%84%A2%20PRO%20V710&amp;severity=medium&amp;id=698c99bc4b57a58fa19e33cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36316-cwe-190-integer-overflow-or-wraparo-bb68436c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36316%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20AMD%20Ryzen%E2%84%A2%206000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics%3B%0D%0AAMD%20Ryzen%E2%84%A2%207035%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698c99bc4b57a58fa19e33c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48503-cwe-427-uncontrolled-search-path-el-5ef6871a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48503%3A%20CWE-427%20%20Uncontrolled%20Search%20Path%20Element%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%20(formerly%20codenamed%20%22Renoir%22)&amp;severity=high&amp;id=698c92b44b57a58fa19c0281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2249-cwe-306-missing-authentication-for-c-fba1c920</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2249%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20METIS%20Cyberspace%20Technology%20SA%20METIS%20DFS&amp;severity=critical&amp;id=698c92b44b57a58fa19c0287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2248-cwe-306-missing-authentication-for-c-139cd139</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2248%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20METIS%20Cyberspace%20Technology%20SA%20METIS%20WIC&amp;severity=critical&amp;id=698c92b44b57a58fa19c0284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2250-cwe-284-improper-access-control-in-m-a5b4fa4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2250%3A%20CWE-284%20Improper%20Access%20Control%20in%20METIS%20Cyberspace%20Technology%20SA%20METIS%20WIC&amp;severity=high&amp;id=698c92b44b57a58fa19c028a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12059-cwe-538-insertion-of-sensitive-info-9d772f79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12059%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Logo%20Software%20Industry%20and%20Trade%20Inc.%20Logo%20j-Platform&amp;severity=critical&amp;id=698c92b44b57a58fa19c027e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1226-cwe-94-improper-control-of-generatio-d91ba611</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1226%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Schneider%20Electric%20EcoStruxure%20Building%20Operation%20Workstation&amp;severity=high&amp;id=698c8bab4b57a58fa19a50d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1227-cwe-611-improper-restriction-of-xml--9a12b573</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1227%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Schneider%20Electric%20EcoStruxure%20Building%20Operation%20Workstation&amp;severity=high&amp;id=698c8bab4b57a58fa19a50d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/conduent-breach-hits-volvo-group-nearly-17000-empl-df4b5269</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Conduent%20Breach%20Hits%20Volvo%20Group%3A%20Nearly%2017%2C000%20Employees%E2%80%99%20Data%20Exposed&amp;severity=medium&amp;id=698c87f54b57a58fa1997c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8668-cwe-79-improper-neutralization-of-in-f0c655b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8668%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20E-Kalite%20Software%20Hardware%20Engineering%20Design%20and%20Internet%20Services%20Industry%20and%20Trade%20Ltd.%20Co.%20Turboard&amp;severity=critical&amp;id=698c8bab4b57a58fa19a50ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2337-cwe-79-xss-in-plunet-plunet-business-3f4da7c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2337%3A%20CWE-79%20-%20XSS%20in%20Plunet%20Plunet%20BusinessManager&amp;severity=high&amp;id=698c8bab4b57a58fa19a50d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wsl-in-the-malware-ecosystem-wed-feb-11th-dd92db7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WSL%20in%20the%20Malware%20Ecosystem%2C%20(Wed%2C%20Feb%2011th)&amp;severity=low&amp;id=698c84844b57a58fa1983b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-60-software-vendors-issue-security-fixes-acro-8605239b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2060%20Software%20Vendors%20Issue%20Security%20Fixes%20Across%20OS%2C%20Cloud%2C%20and%20Network%20Platforms&amp;severity=medium&amp;id=698d852bc9e1ff5ad8a5218f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0910-cwe-502-deserialization-of-untrusted-2b761df5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0910%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=698c84b74b57a58fa19857dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-in-the-dark-recognizing-the-signs-of-hidd-cafb76a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20in%20the%20Dark%3A%20Recognizing%20the%20Signs%20of%20Hidden%20Information&amp;severity=medium&amp;id=698c84724b57a58fa1983683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-refresh-windows-secure-boot-certifica-969efd65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Refresh%20Windows%20Secure%20Boot%20Certificates%20in%20June%202026&amp;severity=medium&amp;id=698c7d694b57a58fa196879f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56807-cwe-125-in-qnap-systems-inc-media-s-de26f974</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56807%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20Media%20Streaming%20add-on&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56808-cwe-78-in-qnap-systems-inc-media-st-5e40d552</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56808%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20Media%20Streaming%20add-on&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30266-cwe-476-in-qnap-systems-inc-qsync-c-75986e82</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30266%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30269-cwe-134-in-qnap-systems-inc-qsync-c-e7427f4b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30269%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30276-cwe-787-in-qnap-systems-inc-qsync-c-ba937a78</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30276%3A%20CWE-787%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1a4b57a58fa195cfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47205-cwe-476-in-qnap-systems-inc-qts-202fb48d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47205%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=698c7a1a4b57a58fa195cfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47209-cwe-476-in-qnap-systems-inc-qsync-c-9a669f31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47209%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48722-cwe-476-in-qnap-systems-inc-qsync-c-4ea7ca57</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48722%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48723-cwe-120-in-qnap-systems-inc-qsync-c-0480ddf1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48723%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48724-cwe-120-in-qnap-systems-inc-qsync-c-c98f3fb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48724%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48725-cwe-120-in-qnap-systems-inc-quts-he-ea84bc1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48725%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QuTS%20hero&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52868-cwe-120-in-qnap-systems-inc-qsync-c-21cf9b81</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52868%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8025-cwe-306-missing-authentication-for-c-7202156f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8025%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Dinosoft%20Business%20Solutions%20Dinosoft%20ERP&amp;severity=critical&amp;id=698c7a214b57a58fa195d100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52869-cwe-120-in-qnap-systems-inc-qsync-c-78993c96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52869%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52870-cwe-120-in-qnap-systems-inc-qsync-c-640834e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52870%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53598-cwe-476-in-qnap-systems-inc-qsync-c-7d5b3147</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53598%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54146-cwe-476-in-qnap-systems-inc-qsync-c-b16383be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54146%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54147-cwe-476-in-qnap-systems-inc-qsync-c-4086e77f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54147%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54148-cwe-476-in-qnap-systems-inc-qsync-c-3a896cd7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54148%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54149-cwe-400-in-qnap-systems-inc-qsync-c-36893fe5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54149%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1c4b57a58fa195cff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54150-cwe-400-in-qnap-systems-inc-qsync-c-eb90d82f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54150%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1c4b57a58fa195cffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54151-cwe-400-in-qnap-systems-inc-qsync-c-6f24fbac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54151%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1d4b57a58fa195d021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54152-cwe-823-in-qnap-systems-inc-qsync-c-504be840</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54152%3A%20CWE-823%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1d4b57a58fa195d024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54155-cwe-770-in-qnap-systems-inc-file-st-99e78981</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54155%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1d4b57a58fa195d027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54161-cwe-770-in-qnap-systems-inc-file-st-8216060f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54161%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1d4b57a58fa195d02a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54162-cwe-22-in-qnap-systems-inc-file-sta-9c2d275e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54162%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=698c7a1d4b57a58fa195d02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54163-cwe-476-in-qnap-systems-inc-file-st-6f8bbc87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54163%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1d4b57a58fa195d030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54169-cwe-125-in-qnap-systems-inc-file-st-5ff14bce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54169%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=698c7a1d4b57a58fa195d033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54170-cwe-125-in-qnap-systems-inc-qsync-c-9697d6f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54170%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1d4b57a58fa195d036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57707-cwe-96-in-qnap-systems-inc-file-sta-d4576711</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57707%3A%20CWE-96%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1d4b57a58fa195d039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57708-cwe-770-in-qnap-systems-inc-qsync-c-7d3223a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57708%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1d4b57a58fa195d03c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57709-cwe-122-in-qnap-systems-inc-qsync-c-7e9c4812</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57709%3A%20CWE-122%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57710-cwe-770-in-qnap-systems-inc-qsync-c-28aac456</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57710%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57711-cwe-770-in-qnap-systems-inc-qsync-c-01c433be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57711%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57713-cwe-1390-in-qnap-systems-inc-file-s-374227ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57713%3A%20CWE-1390%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1f4b57a58fa195d09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58466-cwe-457-in-qnap-systems-inc-qts-aeeead1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58466%3A%20CWE-457%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=698c7a1f4b57a58fa195d09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58467-cwe-23-in-qnap-systems-inc-qsync-ce-5da4e57c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58467%3A%20CWE-23%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58470-cwe-22-in-qnap-systems-inc-qsync-ce-0012caf3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58470%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58471-cwe-770-in-qnap-systems-inc-qsync-c-4edc7487</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58471%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58472-cwe-476-in-qnap-systems-inc-qsync-c-78b4c11b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58472%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59386-cwe-476-in-qnap-systems-inc-quts-he-7b41d4c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59386%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QuTS%20hero&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62853-cwe-22-in-qnap-systems-inc-file-sta-91623754</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62853%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=698c7a214b57a58fa195d0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62854-cwe-400-in-qnap-systems-inc-file-st-4173441a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62854%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62855-cwe-22-in-qnap-systems-inc-file-sta-06721278</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62855%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62856-cwe-22-in-qnap-systems-inc-file-sta-2f07461b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62856%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66274-cwe-476-in-qnap-systems-inc-quts-he-f5b39bcf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66274%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QuTS%20hero&amp;severity=low&amp;id=698c7a214b57a58fa195d0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66277-cwe-59-in-qnap-systems-inc-qts-27355280</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66277%3A%20CWE-59%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=critical&amp;id=698c7a214b57a58fa195d0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66278-cwe-22-in-qnap-systems-inc-file-sta-aebdcfcb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66278%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68406-cwe-22-in-qnap-systems-inc-qsync-ce-27ea0a37</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68406%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a214b57a58fa195d0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22894-cwe-22-in-qnap-systems-inc-file-sta-aaf2e280</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22894%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-patches-endpoint-manager-vulnerabilities-di-d644884a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Patches%20Endpoint%20Manager%20Vulnerabilities%20Disclosed%20in%20October%202025&amp;severity=high&amp;id=698c733e4b57a58fa19402e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10174-cwe-319-cleartext-transmission-of-s-ec217346</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10174%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Pan%20Software%20%26%20Information%20Technologies%20Ltd.%20PanCafe%20Pro&amp;severity=high&amp;id=698c6f8b4b57a58fa1932160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposed-training-open-the-door-for-crypto-mining-i-d1e06ea2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposed%20Training%20Open%20the%20Door%20for%20Crypto-Mining%20in%20Fortune%20500%20Cloud%20Environments&amp;severity=medium&amp;id=698d852bc9e1ff5ad8a52192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chipmaker-patch-tuesday-over-80-vulnerabilities-ad-681c0f45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chipmaker%20Patch%20Tuesday%3A%20Over%2080%20Vulnerabilities%20Addressed%20by%20Intel%20and%20AMD&amp;severity=medium&amp;id=698c61484b57a58fa18f2846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-59-vulnerabilities-including-six-b4833f04</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%2059%20Vulnerabilities%20Including%20Six%20Actively%20Exploited%20Zero-Days&amp;severity=critical&amp;id=698c726b4b57a58fa193ba98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sshstalker-botnet-uses-irc-c2-to-control-linux-sys-0e698cd7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SSHStalker%20Botnet%20Uses%20IRC%20C2%20to%20Control%20Linux%20Systems%20via%20Legacy%20Kernel%20Exploits&amp;severity=medium&amp;id=698c726b4b57a58fa193ba9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15096-cwe-639-authorization-bypass-throug-7d3939ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15096%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kamleshyadav%20Videospirecore%20Theme%20Plugin&amp;severity=high&amp;id=698c536b4b57a58fa18a16a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-high-severity-vulnerabilities-07bf4c77</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=698c4fb44b57a58fa188c1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2295-cwe-200-exposure-of-sensitive-inform-32b439e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2295%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpzoom%20WPZOOM%20Addons%20for%20Elementor%20%E2%80%93%20Starter%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=698c4ff54b57a58fa188e032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13651-cwe-497-exposure-of-sensitive-syste-b0f956be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13651%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Microcom%20ZeusWeb&amp;severity=medium&amp;id=698c48e04b57a58fa1864d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13650-cwe-79-improper-neutralization-of-i-26065390</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microcom%20ZeusWeb&amp;severity=medium&amp;id=698c48e04b57a58fa1864d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13649-cwe-79-improper-neutralization-of-i-59c7ab0a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microcom%20ZeusWeb&amp;severity=medium&amp;id=698c48e04b57a58fa1864d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13648-cwe-79-improper-neutralization-of-i-e506375a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13648%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microcom%20ZeusWeb&amp;severity=medium&amp;id=698c48e04b57a58fa1864cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-intel-security-audit-reveals-severe-tdx-vul-687e4135</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google-Intel%20Security%20Audit%20Reveals%20Severe%20TDX%20Vulnerability%20Allowing%20Full%20Compromise&amp;severity=low&amp;id=698c41a44b57a58fa1847dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9986-cwe-497-exposure-of-sensitive-system-8e89085f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9986%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Vadi%20Corporate%20Information%20Systems%20Ltd.%20Co.%20DIGIKENT&amp;severity=high&amp;id=698c455b4b57a58fa185634b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1827-cwe-79-improper-neutralization-of-in-212859a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1827%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20luke-alford%20IDE%20Micro%20code-editor&amp;severity=medium&amp;id=698c3e564b57a58fa1832d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0815-cwe-79-improper-neutralization-of-in-fbd40c5c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pankajanupam%20Category%20Image&amp;severity=medium&amp;id=698c3e544b57a58fa1832d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1833-cwe-862-missing-authorization-in-smr-093d51f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1833%3A%20CWE-862%20Missing%20Authorization%20in%20sm_rasmy%20WaMate%20Confirm%20%E2%80%93%20Order%20Confirmation&amp;severity=medium&amp;id=698c3e564b57a58fa1832d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1826-cwe-79-improper-neutralization-of-in-ebbfc998</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openpos%20OpenPOS%20Lite%20%E2%80%93%20Point%20of%20Sale%20for%20WooCommerce&amp;severity=medium&amp;id=698c3e544b57a58fa1832d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1560-cwe-94-improper-control-of-generatio-655d2091</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1560%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nko%20Custom%20Block%20Builder%20%E2%80%93%20Lazy%20Blocks&amp;severity=high&amp;id=698c3e544b57a58fa1832d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1786-cwe-862-missing-authorization-in-bad-0ad4d948</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1786%3A%20CWE-862%20Missing%20Authorization%20in%20badbreze%20Twitter%20posts%20to%20Blog&amp;severity=medium&amp;id=698c3e544b57a58fa1832d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1809-cwe-79-improper-neutralization-of-in-a8498af0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jhoylman%20HTML%20Shortcodes&amp;severity=medium&amp;id=698c3e544b57a58fa1832d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0724-cwe-79-improper-neutralization-of-in-44d5af48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0724%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wecodify%20WPlyr%20Media%20Block&amp;severity=medium&amp;id=698c3e544b57a58fa1832d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1748-cwe-862-missing-authorization-in-kir-06306df0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1748%3A%20CWE-862%20Missing%20Authorization%20in%20kirilkirkov%20Invoct%20%E2%80%93%20PDF%20Invoices%20%26%20Billing%20for%20WooCommerce&amp;severity=medium&amp;id=698c3e544b57a58fa1832d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1215-cwe-352-cross-site-request-forgery-c-e191d329</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1215%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20messagemetric%20MMA%20Call%20Tracking&amp;severity=medium&amp;id=698c3e544b57a58fa1832d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1853-cwe-79-improper-neutralization-of-in-dae2cdfd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digiblogger%20BuddyHolis%20ListSearch&amp;severity=medium&amp;id=698c3e564b57a58fa1832d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1804-cwe-79-improper-neutralization-of-in-9a2b3c75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20master-buldog%20WDES%20Responsive%20Popup&amp;severity=medium&amp;id=698c3e544b57a58fa1832d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1885-cwe-79-improper-neutralization-of-in-da70e811</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aumsrini%20Slideshow%20Wp&amp;severity=medium&amp;id=698c3e564b57a58fa1832da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15440-cwe-79-improper-neutralization-of-i-0e59bc16</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ione360%20iONE360%20%20configurator&amp;severity=high&amp;id=698c3e544b57a58fa1832d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10913-cwe-79-improper-neutralization-of-i-fb5e53f7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Saastech%20Cleaning%20and%20Internet%20Services%20Inc.%20TemizlikYolda&amp;severity=high&amp;id=698c3acf4b57a58fa181a0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10912-cwe-639-authorization-bypass-throug-3834804e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10912%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Saastech%20Cleaning%20and%20Internet%20Services%20Inc.%20TemizlikYolda&amp;severity=medium&amp;id=698c374b4b57a58fa17fe935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-addressed-by-sie-e2bcd2c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Addressed%20by%20Siemens%2C%20Schneider%2C%20Aveva%2C%20Phoenix%20Contact&amp;severity=medium&amp;id=698c33944b57a58fa17edb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-unc1069-uses-ai-lures-to-attack-babdf923</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Linked%20UNC1069%20Uses%20AI%20Lures%20to%20Attack%20Cryptocurrency%20Organizations&amp;severity=medium&amp;id=698c726b4b57a58fa193ba9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1235-cwe-502-deserialization-of-untrusted-67de3834</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1235%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WP%20eCommerce&amp;severity=medium&amp;id=698c1eb04b57a58fa179b72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15400-cwe-862-missing-authorization-in-pi-db24c504</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15400%3A%20CWE-862%20Missing%20Authorization%20in%20OpenPix%20for%20WooCommerce&amp;severity=medium&amp;id=698c1eb04b57a58fa179b72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1357-cwe-434-unrestricted-upload-of-file--8f35918d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1357%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpvividplugins%20WPvivid%20%E2%80%94%20Backup%2C%20Migration%20%26%20Staging&amp;severity=critical&amp;id=698c17a84b57a58fa177280b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1893-cwe-79-improper-neutralization-of-in-b4bf78e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lordspace%20Orbisius%20Random%20Name%20Generator&amp;severity=medium&amp;id=698c10a64b57a58fa174e105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26079-cwe-829-inclusion-of-functionality--f5812b77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26079%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=698c10a64b57a58fa174e10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-peek-into-muddled-libras-operational-playbook-f9bc0191</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Peek%20Into%20Muddled%20Libra&apos;s%20Operational%20Playbook&amp;severity=medium&amp;id=698c618d4b57a58fa18f34d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14541-cwe-94-improper-control-of-generati-b4b6841f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14541%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20villatheme%20Lucky%20Wheel%20Giveaway&amp;severity=high&amp;id=698bdf6c4b57a58fa14457fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13431-cwe-89-improper-neutralization-of-s-c5a38105</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13431%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=medium&amp;id=698bdf6c4b57a58fa14457f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1231-cwe-79-improper-neutralization-of-in-952da465</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=698bdf6c4b57a58fa1445802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15524-cwe-862-missing-authorization-in-fo-2667d56f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15524%3A%20CWE-862%20Missing%20Authorization%20in%20fooplugins%20Gallery%20by%20FooGallery&amp;severity=medium&amp;id=698bdf6c4b57a58fa14457fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1571-cwe-79-improper-neutralization-of-in-6884d102</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1571%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20C60%20v3&amp;severity=medium&amp;id=698bd4e04b57a58fa13e5766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26480-na-ffe73103</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26480%3A%20n%2Fa&amp;severity=high&amp;id=698d7607c9e1ff5ad87e3ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26479-na-aa875916</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26479%3A%20n%2Fa&amp;severity=medium&amp;id=698d7607c9e1ff5ad87e3ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26478-na-e8485225</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26478%3A%20n%2Fa&amp;severity=medium&amp;id=698d7607c9e1ff5ad87e3c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26477-na-21213ca4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26477%3A%20n%2Fa&amp;severity=high&amp;id=698d7607c9e1ff5ad87e3c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-11-92ce0ce0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-11&amp;severity=medium&amp;id=698d1b994b57a58fa1df33b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67135-na-57ed4fd9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67135%3A%20n%2Fa&amp;severity=critical&amp;id=698d0a3b4b57a58fa1d8b228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64074-na-cc84b61f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64074%3A%20n%2Fa&amp;severity=medium&amp;id=698d0a3b4b57a58fa1d8b224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50619-na-36cc4424</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50619%3A%20n%2Fa&amp;severity=high&amp;id=698cfc2b4b57a58fa1d1eb5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50617-na-d20ee4c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50617%3A%20n%2Fa&amp;severity=high&amp;id=698cf8a94b57a58fa1cef246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50620-na-a1921cab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50620%3A%20n%2Fa&amp;severity=high&amp;id=698ce7144b57a58fa1c6a88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50618-na-5f1d54a4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50618%3A%20n%2Fa&amp;severity=medium&amp;id=698cd9034b57a58fa1b9879a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70297-na-67da88aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70297%3A%20n%2Fa&amp;severity=medium&amp;id=698cd1fb4b57a58fa1b55bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70296-na-8c0a8a2e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70296%3A%20n%2Fa&amp;severity=medium&amp;id=698cce794b57a58fa1b3e29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69873-na-bb81f42f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69873%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20ajv.js%20ajv&amp;severity=low&amp;id=698cce794b57a58fa1b3e299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69872-na-f86d03c1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69872%3A%20n%2Fa&amp;severity=critical&amp;id=698cce794b57a58fa1b3e295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69871-na-9d3ef4e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69871%3A%20n%2Fa&amp;severity=high&amp;id=698cce794b57a58fa1b3e290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70085-na-ff8a629e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70085%3A%20n%2Fa&amp;severity=critical&amp;id=698cc7724b57a58fa1b0b315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70084-na-756b4b9d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70084%3A%20n%2Fa&amp;severity=high&amp;id=698cc7724b57a58fa1b0b30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70083-na-661c019f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70083%3A%20n%2Fa&amp;severity=high&amp;id=698cc7724b57a58fa1b0b308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70029-na-7c64998b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70029%3A%20n%2Fa&amp;severity=high&amp;id=698cc7724b57a58fa1b0b303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69874-na-4588cf43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69874%3A%20n%2Fa&amp;severity=critical&amp;id=698cc7724b57a58fa1b0b2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65480-na-25d9ca59</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65480%3A%20n%2Fa&amp;severity=high&amp;id=698cc0684b57a58fa1ac24b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65128-na-b4c76562</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65128%3A%20n%2Fa&amp;severity=high&amp;id=698cbce54b57a58fa1aace42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65127-na-de5a23b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65127%3A%20n%2Fa&amp;severity=medium&amp;id=698cb5dc4b57a58fa1a8441e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64075-na-3573219f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64075%3A%20n%2Fa&amp;severity=critical&amp;id=698cab544b57a58fa1a4b9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glibc-238-buffer-overflow-d3afe87a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=glibc%202.38%20-%20Buffer%20Overflow&amp;severity=medium&amp;id=698c72394b57a58fa193b5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-100177637009-spoofing-vulnerability-6d81f54a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2010.0.17763.7009%20-%20spoofing%20vulnerability&amp;severity=medium&amp;id=698c72394b57a58fa193b5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/motioneye-0431b4-rce-f554aa8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=motionEye%200.43.1b4%20-%20RCE&amp;severity=critical&amp;id=698c72394b57a58fa193b5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-11-8b4066d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-11&amp;severity=low&amp;id=698c0ce64b57a58fa173106d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25872-cwe-22-improper-limitation-of-a-pat-9ffd5c98</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25872%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ALBRECHT%20JUNG%20GMBH%20%26%20CO.%20KG%20JUNG%20Smart%20Panel%205.1%20KNX&amp;severity=medium&amp;id=698bb5374b57a58fa12f9f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25870-cwe-918-server-side-request-forgery-fe29ed6f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25870%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20doramart%20DoraCMS&amp;severity=medium&amp;id=698bb1b44b57a58fa12ed728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26013-cwe-918-server-side-request-forgery-e899b39d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26013%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchain&amp;severity=low&amp;id=698bae314b57a58fa12e3ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26007-cwe-345-insufficient-verification-o-aa58d03c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26007%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20pyca%20cryptography&amp;severity=high&amp;id=698ba7284b57a58fa12c897a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26006-cwe-1333-inefficient-regular-expres-7697f33c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26006%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Significant-Gravitas%20AutoGPT&amp;severity=medium&amp;id=698ba3a54b57a58fa12bb851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12699-cwe-538-insertion-of-sensitive-info-a289ec92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12699%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20ZOLL%20ZOLL%20ePCR%20IOS%20Mobile%20Application&amp;severity=medium&amp;id=698b9ca04b57a58fa12a793d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1507-cwe-248-uncaught-exception-in-aveva--0f034206</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1507%3A%20CWE-248%20Uncaught%20Exception%20in%20AVEVA%20PI%20Data%20Archive%20PI%20Server&amp;severity=high&amp;id=698b95984b57a58fa128a7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1495-cwe-532-insertion-of-sensitive-infor-fb016140</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1495%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20AVEVA%20PI%20to%20CONNECT%20Agent&amp;severity=medium&amp;id=698b95984b57a58fa128a7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1763-vulnerability-in-ge-vernova-enervist-a5f799b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1763%3A%20Vulnerability%20in%20GE%20Vernova%20Enervista&amp;severity=medium&amp;id=698b92154b57a58fa127f942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1762-cwe-23-in-ge-vernova-enervista-94d6f3cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1762%3A%20CWE-23%20in%20GE%20Vernova%20Enervista&amp;severity=low&amp;id=698b92154b57a58fa127f93f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29951-cwe-121-stack-based-buffer-overflow-0c50bbc1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29951%3A%20CWE-121%20%20Stack-based%20Buffer%20Overflow%20in%20AMD%20AMD%20Athlon%E2%84%A2%203000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=698b8e904b57a58fa1272708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36311-cwe-367-time-of-check-time-of-use-t-fe1ed3d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36311%3A%20CWE-367%20%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207045%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698b8e904b57a58fa1272702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48515-cwe-190-integer-overflow-or-wraparo-b6cea696</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48515%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698b8e904b57a58fa127270b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29949-cwe-787-out-of-bounds-write-in-amd--9eb7bd3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29949%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698b8e904b57a58fa1272705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21349-out-of-bounds-write-cwe-787-in-adob-416fb734</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21349%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Lightroom%20Desktop&amp;severity=high&amp;id=698b8e904b57a58fa1272711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21348-out-of-bounds-read-cwe-125-in-adobe-fc7b7935</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21348%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=698b8e904b57a58fa127270e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/6-actively-exploited-zero-days-patched-by-microsof-0f09ad88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=6%20Actively%20Exploited%20Zero-Days%20Patched%20by%20Microsoft%20With%20February%202026%20Updates&amp;severity=medium&amp;id=698b87504b57a58fa125b7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36355-cwe-787-out-of-bounds-write-in-amd--2429e3e3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36355%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=high&amp;id=698b8b0b4b57a58fa1266760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36310-cwe-124-buffer-underwrite-buffer-un-6a0e7ccf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36310%3A%20CWE-124%20%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa126675b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29946-cwe-1301-insufficient-or-incomplete-3dcdfadc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29946%3A%20CWE-1301%20%20Insufficient%20or%20Incomplete%20Data%20Removal%20within%20Hardware%20Component%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa1266772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0029-cwe-390-detection-of-error-condition-67b69e6a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0029%3A%20CWE-390%20%20Detection%20of%20Error%20Condition%20Without%20Action%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=low&amp;id=698b8b0b4b57a58fa1266769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0031-cwe-416-use-after-free-in-amd-amd-ep-c4a4ee9d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0031%3A%20CWE-416%20%20Use%20After%20Free%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa126676c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48514-cwe-1220-insufficient-granularity-o-126f67a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48514%3A%20CWE-1220%20%20Insufficient%20Granularity%20of%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54514-cwe-1189-improper-isolation-of-shar-a13ef11f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54514%3A%20CWE-1189%20%20Improper%20Isolation%20of%20Shared%20Resources%20on%20System-on-a-Chip%20(SoC)%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48509-cwe-665-improper-initialization-in--13cdb17f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48509%3A%20CWE-665%20%20Improper%20Initialization%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=low&amp;id=698b8b0c4b57a58fa12667bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52534-cwe-1284-improper-validation-of-spe-57274411</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52534%3A%20CWE-1284%20%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0012-cwe-1260-improper-handling-of-overla-f76c15f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0012%3A%20CWE-1260%20%20Improper%20Handling%20of%20Overlap%20Between%20Protected%20Memory%20Ranges%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa1266766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29939-cwe-284-improper-access-control-in--59c3c267</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29939%3A%20CWE-284%20%20Improper%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa126676f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21953-cwe-1284-improper-validation-of-spe-eca65f76</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21953%3A%20CWE-1284%20%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa1266756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29950-cwe-1274-improper-access-control-fo-25abe6c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29950%3A%20CWE-1274%20%20Improper%20Access%20Control%20for%20Volatile%20Memory%20Containing%20Boot%20Code%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=high&amp;id=698b8b0b4b57a58fa1266778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29952-cwe-457-use-of-uninitialized-variab-fe3609da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29952%3A%20CWE-457%20%20Use%20of%20Uninitialized%20Variable%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52536-cwe-1231-improper-prevention-of-loc-358a355e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52536%3A%20CWE-1231%20%20Improper%20Prevention%20of%20Lock%20Bit%20Modification%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48517-cwe-1220-insufficient-granularity-o-7bb161fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48517%3A%20CWE-1220%20%20Insufficient%20Granularity%20of%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29948-cwe-1260-improper-handling-of-overl-2b0a3d52</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29948%3A%20CWE-1260%20%20Improper%20Handling%20of%20Overlap%20Between%20Protected%20Memory%20Ranges%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa1266775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-january-2026-tue-feb-10th-86635a1f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20-%20February%202026%2C%20(Tue%2C%20Feb%2010th)&amp;severity=critical&amp;id=698b79404b57a58fa1219c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2303-cwe-183-permissive-list-of-allowed-i-e24fff4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2303%3A%20CWE-183%20Permissive%20List%20of%20Allowed%20Inputs%20in%20MongoDB%20Inc%20MongoDB%20Go%20Driver&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2302-183-in-mongodb-inc-mongodb-ruby-driv-24518ade</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2302%3A%20183%20in%20MongoDB%20Inc%20MongoDB%20Ruby%20Driver&amp;severity=medium&amp;id=698b8b0e4b57a58fa1266823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26009-cwe-78-improper-neutralization-of-s-ff7845bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26009%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20karutoil%20catalyst&amp;severity=critical&amp;id=698b8b0e4b57a58fa126681f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25506-cwe-787-out-of-bounds-write-in-dun--f36c0150</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25506%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20dun%20munge&amp;severity=high&amp;id=698b8b0e4b57a58fa1266817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25613-cwe-704-incorrect-type-conversion-o-ed12d22d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25613%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b8b0e4b57a58fa126681c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1849-cwe-674-uncontrolled-recursion-in-mo-6564e772</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1849%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b8b0c4b57a58fa12667d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1850-cwe-770-allocation-of-resources-with-3294391e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1850%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b8b0c4b57a58fa12667d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25609-cwe-862-missing-authorization-in-mo-e71d857e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25609%3A%20CWE-862%20Missing%20Authorization%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=698b8e904b57a58fa1272714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21352-out-of-bounds-write-cwe-787-in-adob-09e05894</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21352%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=698b7cf94b57a58fa12364ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21354-integer-overflow-or-wraparound-cwe--2ca7577c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21354%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=698b7cfb4b57a58fa1236d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21353-integer-overflow-or-wraparound-cwe--b32757ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21353%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=698b7cfb4b57a58fa1236d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21355-out-of-bounds-read-cwe-125-in-adobe-f5bdc89e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21355%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=698b7cfb4b57a58fa1236d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25610-cwe-617-reachable-assertion-in-mong-a911ba01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25610%3A%20CWE-617%20Reachable%20Assertion%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b7cfb4b57a58fa1236d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21346-out-of-bounds-write-cwe-787-in-adob-00924c74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21346%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=698b7cf94b57a58fa12364e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21347-integer-overflow-or-wraparound-cwe--213c12c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21347%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=698b7cf94b57a58fa12364e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1848-cwe-770-allocation-of-resources-with-1398a448</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1848%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b7cf94b57a58fa12364c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21344-out-of-bounds-read-cwe-125-in-adobe-ead62b7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21344%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21343-out-of-bounds-read-cwe-125-in-adobe-1882fd40</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21343%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21341-out-of-bounds-write-cwe-787-in-adob-54edf7b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21341%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21345-out-of-bounds-read-cwe-125-in-adobe-7448682f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21345%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21342-out-of-bounds-write-cwe-787-in-adob-4304a6e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21342%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1847-cwe-770-allocation-of-resources-with-0e0a3fb1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1847%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b7cf94b57a58fa12364c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21337-out-of-bounds-read-cwe-125-in-adobe-3fd61a7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21337%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76034b57a58fa120a0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21335-out-of-bounds-write-cwe-787-in-adob-729b2edf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21335%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=698b76034b57a58fa120a0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21339-out-of-bounds-read-cwe-125-in-adobe-94a153b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21339%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76054b57a58fa120a661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21334-out-of-bounds-write-cwe-787-in-adob-ea179140</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21334%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=698b76034b57a58fa120a0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21338-null-pointer-dereference-cwe-476-in-aecc2842</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21338%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76054b57a58fa120a65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21340-out-of-bounds-read-cwe-125-in-adobe-27a8904a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21340%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76054b57a58fa120a664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21336-null-pointer-dereference-cwe-476-in-838ebf90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21336%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76034b57a58fa120a0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25612-cwe-412-unrestricted-externally-acc-d88a4026</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25612%3A%20CWE-412%20Unrestricted%20Externally%20Accessible%20Lock%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b76074b57a58fa120a6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21358-heap-based-buffer-overflow-cwe-122--7c3039ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21358%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=698b76054b57a58fa120a670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21332-out-of-bounds-read-cwe-125-in-adobe-8fbe4a55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21332%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=698b76034b57a58fa120a0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21357-heap-based-buffer-overflow-cwe-122--77a0fac6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21357%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=698b76054b57a58fa120a66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1997-cwe-346-in-hp-inc-hp-officejet-pro-8-83ab6145</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1997%3A%20CWE-346%20in%20HP%20Inc%20HP%20OfficeJet%20Pro%208730%20All-in-One%20Printer&amp;severity=medium&amp;id=698b75fd4b57a58fa1209f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21329-use-after-free-cwe-416-in-adobe-aft-b64310f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21329%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21323-use-after-free-cwe-416-in-adobe-aft-6fbcc82d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21323%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21324-out-of-bounds-read-cwe-125-in-adobe-bd7a5d57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21324%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21326-use-after-free-cwe-416-in-adobe-aft-7c4379da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21326%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21322-out-of-bounds-read-cwe-125-in-adobe-4ca2f89a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21322%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21318-out-of-bounds-write-cwe-787-in-adob-67f952e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21318%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21328-out-of-bounds-write-cwe-787-in-adob-97a21ada</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21328%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21319-out-of-bounds-read-cwe-125-in-adobe-2d8062bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21319%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=698b76024b57a58fa120a07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21350-null-pointer-dereference-cwe-476-in-ee534c5a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21350%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=698b76054b57a58fa120a667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21330-access-of-resource-using-incompatib-c0b7956b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21330%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20(CWE-843)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21325-out-of-bounds-read-cwe-125-in-adobe-c9fd0607</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21325%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21327-out-of-bounds-write-cwe-787-in-adob-2556375a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21327%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21320-use-after-free-cwe-416-in-adobe-aft-64c2ca36</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21320%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21321-integer-overflow-or-wraparound-cwe--8f1e2ba8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21321%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21351-use-after-free-cwe-416-in-adobe-aft-57a85fff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21351%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76054b57a58fa120a66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25611-cwe-405-asymmetric-resource-consump-a2fae2d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25611%3A%20CWE-405%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b76074b57a58fa120a6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26003-cwe-601-url-redirection-to-untruste-b1b1f630</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26003%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=698b76084b57a58fa120a6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20841-cwe-77-improper-neutralization-of-s-ec3b97e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20841%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Windows%20Notepad&amp;severity=high&amp;id=698b75fd4b57a58fa1209f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20846-cwe-126-buffer-over-read-in-microso-f2951141</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20846%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=698b75fd4b57a58fa1209f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21222-cwe-532-insertion-of-sensitive-info-d463c6dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21222%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=698b75fd4b57a58fa1209fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21228-cwe-295-improper-certificate-valida-42307d9c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21228%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Microsoft%20Azure%20Local&amp;severity=high&amp;id=698b75fd4b57a58fa1209fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21231-cwe-362-concurrent-execution-using--b653a6f9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21231%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75fd4b57a58fa1209fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21232-cwe-822-untrusted-pointer-dereferen-29f52b17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21232%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=698b75fd4b57a58fa1209faf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21237-cwe-362-concurrent-execution-using--c67d91bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21237%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=698b75ff4b57a58fa1209fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21238-cwe-284-improper-access-control-in--9d2f4553</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21238%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75ff4b57a58fa1209fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21239-cwe-122-heap-based-buffer-overflow--2b1ff487</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21239%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75ff4b57a58fa1209fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21241-cwe-416-use-after-free-in-microsoft-31a63962</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21241%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=698b75ff4b57a58fa1209fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21240-cwe-367-time-of-check-time-of-use-t-912190b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21240%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=698b75ff4b57a58fa1209fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21243-cwe-476-null-pointer-dereference-in-95b1bfcb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21243%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=698b75ff4b57a58fa1209ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21244-cwe-122-heap-based-buffer-overflow--12cc8274</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21244%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21245-cwe-122-heap-based-buffer-overflow--be095a8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21245%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=698b76004b57a58fa120a015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21249-cwe-73-external-control-of-file-nam-495288bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21249%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=low&amp;id=698b76004b57a58fa120a029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21250-cwe-822-untrusted-pointer-dereferen-d6029a12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21250%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=698b76004b57a58fa120a02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21251-cwe-416-use-after-free-in-microsoft-2a8f2aee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21251%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=698b76004b57a58fa120a031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21253-cwe-416-use-after-free-in-microsoft-9583f378</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21253%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21255-cwe-284-improper-access-control-in--4a3cbcd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21255%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21256-cwe-77-improper-neutralization-of-s-bd386709</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21256%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.14&amp;severity=high&amp;id=698b76014b57a58fa120a04d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21257-cwe-77-improper-neutralization-of-s-eef2bf37</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21257%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.14&amp;severity=high&amp;id=698b76014b57a58fa120a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21261-cwe-125-out-of-bounds-read-in-micro-d42832b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21261%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=698b76014b57a58fa120a05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21508-cwe-287-improper-authentication-in--39516ca7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21508%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76054b57a58fa120a673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21511-cwe-502-deserialization-of-untruste-c7e00f0a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21511%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=698b76054b57a58fa120a679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21516-cwe-77-improper-neutralization-of-s-7c142c32</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21516%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20GitHub%20Copilot%20Plugin%20for%20JetBrains%20IDEs&amp;severity=high&amp;id=698b76064b57a58fa120a68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21525-cwe-476-null-pointer-dereference-in-924c36f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21525%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=698b76064b57a58fa120a6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21514-cwe-807-reliance-on-untrusted-input-48133edc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21514%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=698b76064b57a58fa120a68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21529-cwe-79-improper-neutralization-of-i-86f49936</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21529%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20HDInsight&amp;severity=medium&amp;id=698b76074b57a58fa120a6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21537-cwe-94-improper-control-of-generati-a6d4f39d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21537%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Linux&amp;severity=high&amp;id=698b76074b57a58fa120a6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21510-cwe-693-protection-mechanism-failur-d50ef400</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21510%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76054b57a58fa120a676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21531-cwe-502-deserialization-of-untruste-4a5578f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21531%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20AI%20Language%20Authoring&amp;severity=critical&amp;id=698b76074b57a58fa120a6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21528-cwe-1327-binding-to-an-unrestricted-33112f9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21528%3A%20CWE-1327%3A%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=medium&amp;id=698b76074b57a58fa120a6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21527-cwe-451-user-interface-ui-misrepres-8ff3c3ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21527%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=698b76074b57a58fa120a6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21522-cwe-77-improper-neutralization-of-s-ccf54b9e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21522%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=698b76064b57a58fa120a69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21513-cwe-693-protection-mechanism-failur-25c7912e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21513%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76064b57a58fa120a689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21533-cwe-269-improper-privilege-manageme-65b76e18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21533%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76074b57a58fa120a6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21229-cwe-20-improper-input-validation-in-3f06c1ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21229%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Power%20BI%20Report%20Server&amp;severity=high&amp;id=698b75fd4b57a58fa1209fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21523-cwe-367-time-of-check-time-of-use-t-5b40cf76</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21523%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=high&amp;id=698b76064b57a58fa120a69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23655-cwe-312-cleartext-storage-of-sensit-97250209</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23655%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=698b76074b57a58fa120a6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21218-cwe-166-improper-handling-of-missin-03931b56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21218%3A%20CWE-166%3A%20Improper%20Handling%20of%20Missing%20Special%20Element%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=698b75fd4b57a58fa1209fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21236-cwe-122-heap-based-buffer-overflow--a186cc7c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21236%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75ff4b57a58fa1209fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21234-cwe-362-concurrent-execution-using--8598588f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21234%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=698b75ff4b57a58fa1209fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21235-cwe-416-use-after-free-in-microsoft-104050b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21235%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75ff4b57a58fa1209fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21242-cwe-416-use-after-free-in-microsoft-64c0667f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21242%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=698b75ff4b57a58fa1209ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21246-cwe-122-heap-based-buffer-overflow--31ad794b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21246%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21247-cwe-20-improper-input-validation-in-f96e7b2c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21247%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21248-cwe-122-heap-based-buffer-overflow--3bd56463</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21248%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21260-cwe-200-exposure-of-sensitive-infor-f7507e93</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21260%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=698b76014b57a58fa120a059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21258-cwe-20-improper-input-validation-in-46ce14ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21258%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=698b76014b57a58fa120a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21259-cwe-122-heap-based-buffer-overflow--95804ee6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21259%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=698b76014b57a58fa120a056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21512-cwe-918-server-side-request-forgery-cc85b290</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21512%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20DevOps%20Server%202022&amp;severity=medium&amp;id=698b76064b57a58fa120a686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21517-cwe-59-improper-link-resolution-bef-9e8195aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21517%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%20App%20for%20Mac&amp;severity=medium&amp;id=698b76064b57a58fa120a692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21518-cwe-77-improper-neutralization-of-s-865ead57</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21518%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=high&amp;id=698b76064b57a58fa120a695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21519-cwe-843-access-of-resource-using-in-3238adbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21519%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76064b57a58fa120a698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25992-cwe-22-improper-limitation-of-a-pat-3ff8a161</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25992%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=698b76074b57a58fa120a6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-dissecting-an-ai-generated-c2-implant-d0d44f0d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%3A%20Dissecting%20an%20AI-Generated%20C2%20Implant&amp;severity=medium&amp;id=698c4ff54b57a58fa188e028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21316-access-of-memory-location-after-end-2a08e8da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21316%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76024b57a58fa120a075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21312-out-of-bounds-write-cwe-787-in-adob-415a7d98</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21312%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Audition&amp;severity=high&amp;id=698b76014b57a58fa120a05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21315-out-of-bounds-read-cwe-125-in-adobe-8b73d190</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21315%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76014b57a58fa120a068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21313-out-of-bounds-read-cwe-125-in-adobe-4d37b63b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21313%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76014b57a58fa120a062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21317-out-of-bounds-read-cwe-125-in-adobe-94a6cd01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21317%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76024b57a58fa120a078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21314-out-of-bounds-read-cwe-125-in-adobe-3f3f4719</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21314%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76014b57a58fa120a065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprk-operatives-impersonate-professionals-on-linke-66307456</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK%20Operatives%20Impersonate%20Professionals%20on%20LinkedIn%20to%20Infiltrate%20Companies&amp;severity=medium&amp;id=698c726b4b57a58fa193baa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25993-cwe-89-improper-neutralization-of-s-6994a1ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25993%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20evershopcommerce%20evershop&amp;severity=critical&amp;id=698b76084b57a58fa120a6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patch-tuesday-adobe-fixes-44-vulnerabilities-in-cr-7d6cb550</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patch%20Tuesday%3A%20Adobe%20Fixes%2044%20Vulnerabilities%20in%20Creative%20Apps&amp;severity=critical&amp;id=698b6eb44b57a58fa11cf919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1996-cwe-703-in-hp-inc-hp-officejet-pro-8-f3d8e306</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1996%3A%20CWE-703%20in%20HP%20Inc%20HP%20OfficeJet%20Pro%208710%20All-in-One%20Printer%20series&amp;severity=medium&amp;id=698b6f014b57a58fa11d3750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0651-cwe-22-improper-limitation-of-a-path-aef40ad6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0651%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C260%20v1&amp;severity=medium&amp;id=698b6f014b57a58fa11d3741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25805-cwe-356-product-ui-does-not-warn-us-a2e7b65f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25805%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20zed-industries%20zed&amp;severity=medium&amp;id=698b6f014b57a58fa11d3753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0652-cwe-78-improper-neutralization-of-sp-b7dc0c67</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0652%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C260%20v1&amp;severity=high&amp;id=698b6f014b57a58fa11d3746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0653-cwe-284-improper-access-control-in-t-92cb4120</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0653%3A%20CWE-284%20Improper%20Access%20Control%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C260%20v1&amp;severity=high&amp;id=698b6f014b57a58fa11d374b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25728-cwe-367-time-of-check-time-of-use-t-e51843d7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25728%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MacWarrior%20clipbucket-v5&amp;severity=critical&amp;id=698b6b654b57a58fa11c68af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25646-cwe-122-heap-based-buffer-overflow--d5d2a3eb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25646%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pnggroup%20libpng&amp;severity=high&amp;id=698b6b654b57a58fa11c68ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25577-cwe-248-uncaught-exception-in-emmet-9048927c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25577%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20emmett-framework%20core&amp;severity=high&amp;id=698b6b654b57a58fa11c68a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36522-escalation-of-privilege-in-intelr-c-b7487ad3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36522%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Chipset%20Software&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36511-escalation-of-privilege-in-intelr-m-948f9e8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36511%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Memory%20and%20Storage%20Tool&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35999-escalation-of-privilege-in-system-f-008bd0c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35999%3A%20Escalation%20of%20Privilege%20in%20System%20Firmware%20Update%20Utility%20(SysFwUpdt)%20for%20Intel(R)%20Server%20Boards%20and%20Intel(R)%20Server%20Systems%20Based&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35998-escalation-of-privilege-in-intelr-p-9148e8d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35998%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Platforms&amp;severity=high&amp;id=698b5d5f4b57a58fa119cfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35992-denial-of-service-in-intelr-npu-dri-d8073a39</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35992%3A%20Denial%20of%20Service%20in%20Intel(R)%20NPU%20Drivers&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33030-escalation-of-privilege-in-intelr-n-d5223770</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33030%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20NPU%20Drivers&amp;severity=low&amp;id=698b5d5e4b57a58fa119cf83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32739-denial-of-service-in-intelr-graphic-82e325da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32739%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers%20and%20Intel%20LTS%20kernels&amp;severity=low&amp;id=698b5d5e4b57a58fa119cf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32735-denial-of-service-in-intelr-npu-dri-424292a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32735%3A%20Denial%20of%20Service%20in%20Intel(R)%20NPU%20Drivers&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32467-information-disclosure-in-tdx-modul-7524f617</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32467%3A%20Information%20Disclosure%20in%20TDX%20Module&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32453-escalation-of-privilege-in-intelr-g-e147acbb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32453%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20software&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32452-escalation-of-privilege-in-ai-playg-3ebcad13</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32452%3A%20Escalation%20of%20Privilege%20in%20AI%20Playground&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32092-escalation-of-privilege-in-intelr-g-c299a9c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32092%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Software&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32008-denial-of-service-in-intelr-amt-and-de4fe5f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32008%3A%20Denial%20of%20Service%20in%20Intel(R)%20AMT%20and%20Intel(R)%20Standard%20Manageability&amp;severity=high&amp;id=698b5d5e4b57a58fa119cf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32007-information-disclosure-in-tdx-deca45cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32007%3A%20Information%20Disclosure%20in%20TDX&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32003-denial-of-service-in-100gbe-intelr--16d7908c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32003%3A%20Denial%20of%20Service%20in%20100GbE%20Intel(R)%20Ethernet%20Network%20Adapter%20E810&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31944-denial-of-service-in-tdx-module-5e872e46</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31944%3A%20Denial%20of%20Service%20in%20TDX%20Module&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31655-escalation-of-privilege-in-intelr-b-d7fa739c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31655%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Battery%20Life%20Diagnostic%20Tool&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31648-escalation-of-privilege-in-intelr-p-857c9fde</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31648%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processor%20Family%20may%20allow%20an%20escalation%20of%20privilege.%20Startup%20code%20and%20smm%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20with%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(low)%2C%20integrity%20(low)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(low)%2C%20integrity%20(low)%20and%20availability%20(none)%20impacts.&amp;severity=low&amp;id=698b5d5d4b57a58fa119cf4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30513-escalation-of-privilege-in-tdx-modu-eda181f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30513%3A%20Escalation%20of%20Privilege%20in%20TDX%20Module&amp;severity=high&amp;id=698b5d5d4b57a58fa119cf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30508-denial-of-service-in-intelr-platfor-18adcc71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30508%3A%20Denial%20of%20Service%20in%20Intel(R)%20Platforms&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27940-information-disclosure-in-tdx-modul-cf81ef2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27940%3A%20Information%20Disclosure%20in%20TDX%20Module&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27708-information-disclosure-in-intelr-co-cdfb820d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27708%3A%20Information%20Disclosure%20in%20Intel(R)%20Converged%20Security%20and%20Management%20Engine%20(CSME)%20Firmware%20(FW)&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27572-information-disclosure-in-tdx-ae07f705</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27572%3A%20Information%20Disclosure%20in%20TDX&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27560-denial-of-service-in-intelr-platfor-6d7aa8bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27560%3A%20Denial%20of%20Service%20in%20Intel(R)%20Platform&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27535-denial-of-service-in-intelr-etherne-06c3edd0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27535%3A%20Denial%20of%20Service%20in%20Intel(R)%20Ethernet%20Connection%20E825-C.&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27243-denial-of-service-in-intelr-etherne-f8203407</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27243%3A%20Denial%20of%20Service%20in%20Intel(R)%20Ethernet%20Controller%20E810&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25210-escalation-of-privilege-in-server-f-5e1830d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25210%3A%20Escalation%20of%20Privilege%20in%20Server%20Firmware%20Update%20Utility(SysFwUpdt)&amp;severity=high&amp;id=698b5d5c4b57a58fa119cf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25058-information-disclosure-in-intelr-et-b57b7854</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25058%3A%20Information%20Disclosure%20in%20Intel(R)%20Ethernet%20800-Series&amp;severity=low&amp;id=698b5d5c4b57a58fa119cf13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24851-denial-of-service-in-100gbe-intelr--830c5430</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24851%3A%20Denial%20of%20Service%20in%20100GbE%20Intel(R)%20Ethernet%20Controller%20E810&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22885-escalation-of-privilege-in-tdx-modu-198b7450</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22885%3A%20Escalation%20of%20Privilege%20in%20TDX%20Module%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(low)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22849-escalation-of-privilege-in-intelr-o-2e9bef72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22849%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Optane(TM)%20PMem%20management%20software&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22453-escalation-of-privilege-in-server-f-e97973f6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22453%3A%20Escalation%20of%20Privilege%20in%20Server%20Firmware%20Update%20Utility(SysFwUpdt)&amp;severity=high&amp;id=698b5d5c4b57a58fa119cf07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20106-escalation-of-privilege-in-vtunetm--e2f201ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20106%3A%20Escalation%20of%20Privilege%20in%20VTune(TM)%20Profiler%20software%20and%20Intel(R)%20oneAPI%20Base%20Toolkits&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20080-denial-of-service-in-intelr-amt-and-20221750</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20080%3A%20Denial%20of%20Service%20in%20Intel(R)%20AMT%20and%20Intel(R)%20Standard%20Manageability&amp;severity=high&amp;id=698b5d5c4b57a58fa119cf01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20070-escalation-of-privilege-in-intelr-o-69ec1adf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20070%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Optane(TM)%20PMem%20management%20software&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62439-improper-access-control-in-fortinet-420d0f3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62439%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=698c57814b57a58fa18c033c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62676-escalation-of-privilege-in-fortinet-abf0bc48</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62676%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=698b645c4b57a58fa11b308f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68686-information-disclosure-in-fortinet--c42d11a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68686%3A%20Information%20disclosure%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=698c57814b57a58fa18c0343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64157-execute-unauthorized-code-or-comman-7e15788e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64157%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55018-execute-unauthorized-code-or-comman-c15fa17d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55018%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=698c57814b57a58fa18c0335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22153-improper-access-control-in-fortinet-f6881411</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22153%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=698c10a64b57a58fa174e118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21743-improper-access-control-in-fortinet-d471391c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21743%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAuthenticator&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52436-execute-unauthorized-code-or-comman-a9cbd23a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52436%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=698c10a64b57a58fa174e115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15572-memory-leak-in-wasm3-4095fc40</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15572%3A%20Memory%20Leak%20in%20wasm3&amp;severity=medium&amp;id=698b52ca4b57a58fa117f4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11004-cwe-79-improper-neutralization-of-i-6648915e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11004%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20silabs.com%20Simplicity%20Device%20Manager&amp;severity=high&amp;id=698b52ca4b57a58fa117f4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1603-cwe-288-authentication-bypass-using--5ffa4ac6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1603%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=698b52ca4b57a58fa117f4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1602-cwe-89-improper-neutralization-of-sp-5dd70a84</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1602%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=698b52ca4b57a58fa117f4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-crm-s4hana-netweaver-vulnerab-a693d3a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20CRM%2C%20S%2F4HANA%2C%20NetWeaver%20Vulnerabilities&amp;severity=critical&amp;id=698b48094b57a58fa115bebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-openclaw-ai-agent-found-unsafe-for-use-kaspers-49b2d742</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20OpenClaw%20AI%20agent%20found%20unsafe%20for%20use%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=698b48884b57a58fa115db38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reynolds-ransomware-embeds-byovd-driver-to-disable-556e596f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reynolds%20Ransomware%20Embeds%20BYOVD%20Driver%20to%20Disable%20EDR%20Security%20Tools&amp;severity=medium&amp;id=698c726b4b57a58fa193baa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15571-null-pointer-dereference-in-ckoliva-45a327b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15571%3A%20NULL%20Pointer%20Dereference%20in%20ckolivas%20lrzip&amp;severity=medium&amp;id=698b44b84b57a58fa114e1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7636-cwe-89-improper-neutralization-of-sp-1c4a1248</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7636%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ergosis%20Security%20Systems%20Computer%20Industry%20and%20Trade%20Inc.%20ZEUS%20PDKS&amp;severity=high&amp;id=698b44b84b57a58fa114e1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7347-cwe-639-authorization-bypass-through-1a11bc39</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7347%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dinibh%20Puzzle%20Software%20Solutions%20Dinibh%20Patrol%20Tracking%20System&amp;severity=high&amp;id=698b44b84b57a58fa114e1f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-ransomware-to-residency-inside-the-rise-of-th-d5ff902f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Ransomware%20to%20Residency%3A%20Inside%20the%20Rise%20of%20the%20Digital%20Parasite&amp;severity=medium&amp;id=698c726b4b57a58fa193baa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6967-cwe-698-execution-after-redirect-ear-b7408bcf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6967%3A%20CWE-698%20Execution%20After%20Redirect%20(EAR)%20in%20Sarman%20Soft%20Software%20and%20Technology%20Services%20Industry%20and%20Trade%20Ltd.%20Co.%20CMS&amp;severity=high&amp;id=698b3db44b57a58fa112edc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-sqli-flaw-enabling-unaut-7ad21464</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20SQLi%20Flaw%20Enabling%20Unauthenticated%20Code%20Execution&amp;severity=critical&amp;id=698b13994b57a58fa1ff12fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15570-use-after-free-in-ckolivas-lrzip-acde4ab8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15570%3A%20Use%20After%20Free%20in%20ckolivas%20lrzip&amp;severity=medium&amp;id=698b36a84b57a58fa10fe57f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sshstalker-linux-botnet-uses-old-techniques-de133a8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98SSHStalker%E2%80%99%20Linux%20Botnet%20Uses%20Old%20Techniques&amp;severity=medium&amp;id=698b2be94b57a58fa1054174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zastai-raises-6m-pre-a-to-scale-zero-false-positiv-8cb789bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZAST.AI%20Raises%20%246M%20Pre-A%20to%20Scale%20%22Zero%20False%20Positive%22%20AI-Powered%20Code%20Security&amp;severity=high&amp;id=698c726b4b57a58fa193baaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-patches-critical-rce-vulnerability-ce25850e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Patches%20Critical%20RCE%20Vulnerability&amp;severity=critical&amp;id=698b16d34b57a58fa1ffe8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11537-improper-output-neutralization-for--d502f72e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11537%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=698b13804b57a58fa1ff0ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warlock-ransomware-breaches-smartertools-through-u-d0491041</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warlock%20Ransomware%20Breaches%20SmarterTools%20Through%20Unpatched%20SmarterMail%20Server&amp;severity=medium&amp;id=698c726b4b57a58fa193baad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/singapore-rootkits-zero-day-used-in-chinese-attack-bf1bac90</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Singapore%3A%20Rootkits%2C%20Zero-Day%20Used%20in%20Chinese%20Attack%20on%20Major%20Telecom%20Firms&amp;severity=medium&amp;id=698b053d4b57a58fa1fad507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15569-uncontrolled-search-path-in-artifex-c7cba49b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15569%3A%20Uncontrolled%20Search%20Path%20in%20Artifex%20MuPDF&amp;severity=high&amp;id=698b08f34b57a58fa1fbed10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25656-cwe-427-uncontrolled-search-path-el-5f7fcb0d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25656%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=698b05e84b57a58fa1fb4535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25655-cwe-427-uncontrolled-search-path-el-d8eecefc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25655%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=698b05e84b57a58fa1fb450d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23720-cwe-125-out-of-bounds-read-in-sieme-110c9539</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23720%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb4507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23719-cwe-122-heap-based-buffer-overflow--8707b5c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23719%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb4501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23718-cwe-125-out-of-bounds-read-in-sieme-03ca3b75</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23718%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb44fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23717-cwe-125-out-of-bounds-read-in-sieme-e4ef4a55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23717%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb44f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23716-cwe-125-out-of-bounds-read-in-sieme-0be2115c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23716%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb44ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23715-cwe-787-out-of-bounds-write-in-siem-bde2d93a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23715%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb44e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22923-cwe-121-stack-based-buffer-overflow-02a96a6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22923%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20NX&amp;severity=high&amp;id=698b05e84b57a58fa1fb44e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40587-cwe-79-improper-neutralization-of-i-64fada5f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40587%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Siemens%20Polarion%20V2404&amp;severity=high&amp;id=698b05e84b57a58fa1fb44dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52334-cwe-261-weak-encoding-for-password--c5d97ffa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52334%3A%20CWE-261%3A%20Weak%20Encoding%20for%20Password%20in%20Siemens%20syngo.plaza%20VB30E&amp;severity=medium&amp;id=698b05e84b57a58fa1fb44d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24343-cwe-643-improper-neutralization-of--6c783d29</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24343%3A%20CWE-643%20Improper%20Neutralization%20of%20Data%20within%20XPath%20Expressions%20(&apos;XPath%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20HertzBeat&amp;severity=high&amp;id=698afe6e4b57a58fa1f90111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23906-cwe-287-improper-authentication-in--42f1177b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23906%3A%20CWE-287%20Improper%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20Druid&amp;severity=critical&amp;id=698afe6e4b57a58fa1f9010e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14895-cwe-862-missing-authorization-in-ro-64edcef3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14895%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=medium&amp;id=698afe6e4b57a58fa1f900f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1922-cwe-79-improper-neutralization-of-in-90ceb130</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1922%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brianhogg%20The%20Events%20Calendar%20Shortcode%20%26%20Block&amp;severity=medium&amp;id=698afe6e4b57a58fa1f90105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1866-cwe-79-improper-neutralization-of-in-d7a88772</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeroenpeters1986%20Name%20Directory&amp;severity=high&amp;id=698afe6e4b57a58fa1f900fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2268-cwe-200-exposure-of-sensitive-inform-aa32ef04</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2268%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=high&amp;id=698afe6e4b57a58fa1f90114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23901-cwe-208-observable-timing-discrepan-19a39b16</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23901%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Apache%20Software%20Foundation%20Apache%20Shiro&amp;severity=low&amp;id=698afe6e4b57a58fa1f9010b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-push-traffic-origin-data-combined-with-resi-28c53a89</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Push%20Traffic%20Origin%20Data%20Combined%20with%20Residential%20Proxy%20Data%20Uncovers%20Suspicious%20Chinese%20VPN&amp;severity=medium&amp;id=698b053e4b57a58fa1fad57f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11242-cwe-918-server-side-request-forgery-31b927d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11242%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Teknolist%20Computer%20Systems%20Software%20Publishing%20Industry%20and%20Trade%20Inc.%20Okulistik&amp;severity=critical&amp;id=698af7604b57a58fa1f6ec18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-authorities-confirm-ivanti-zero-day-exploit--8334b47d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20Authorities%20Confirm%20Ivanti%20Zero-Day%20Exploit%20Exposed%20Employee%20Contact%20Data&amp;severity=medium&amp;id=698b13994b57a58fa1ff12f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rsac-releases-quantickle-open-source-threat-intell-30291b77</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RSAC%20Releases%20Quantickle%20Open%20Source%20Threat%20Intelligence%20Visualization%20Tool&amp;severity=medium&amp;id=698ade914b57a58fa1edc53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1722-cwe-862-missing-authorization-in-wcl-7f2fe052</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1722%3A%20CWE-862%20Missing%20Authorization%20in%20wclovers%20WCFM%20Marketplace%20%E2%80%93%20Multivendor%20Marketplace%20for%20WooCommerce&amp;severity=medium&amp;id=698ae2484b57a58fa1eeadc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2099-cwe-79-improper-neutralization-of-in-96253298</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2099%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flowring%20AgentFlow&amp;severity=medium&amp;id=698adb404b57a58fa1eccffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2098-cwe-79-improper-neutralization-of-in-6f123170</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2098%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flowring%20AgentFlow&amp;severity=medium&amp;id=698adb404b57a58fa1eccff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2097-cwe-434-unrestricted-upload-of-file--ba0b3f5c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2097%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Flowring%20Agentflow&amp;severity=high&amp;id=698adb404b57a58fa1eccff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2096-cwe-288-authentication-bypass-using--10f90ea1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2096%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Flowring%20Agentflow&amp;severity=critical&amp;id=698adb404b57a58fa1eccfed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2095-cwe-288-authentication-bypass-using--1f37d3de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2095%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Flowring%20Agentflow&amp;severity=critical&amp;id=698adb404b57a58fa1eccfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2094-cwe-89-improper-neutralization-of-sp-15f4d34d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2094%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Flowring%20Docpedia&amp;severity=high&amp;id=698adb404b57a58fa1eccfe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2093-cwe-89-improper-neutralization-of-sp-a4a4780d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2093%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Flowring%20Docpedia&amp;severity=high&amp;id=698adb404b57a58fa1eccfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12063-cwe-639-authorization-bypass-throug-604c5572</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12063%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=698ad0b34b57a58fa1e8b07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12757-cwe-22-improper-limitation-of-a-pat-14965a52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12757%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=698ac9b04b57a58fa1e63de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13064-cwe-248-uncaught-exception-in-axis--32530aec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13064%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=698ac9b04b57a58fa1e63dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11547-cwe-532-insertion-of-sensitive-info-252f9fc3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11547%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=high&amp;id=698ac9b04b57a58fa1e63de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11142-cwe-78-improper-neutralization-of-s-8652aae4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11142%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=high&amp;id=698ac9b04b57a58fa1e63de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0996-cwe-79-improper-neutralization-of-in-2dac7514</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0996%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=698ac9b04b57a58fa1e63df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24328-cwe-601-url-redirection-to-untruste-5304d931</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24328%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20Business%20Server%20Pages%20Application%20(TAF_APPLAUNCHER)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24327-cwe-862-missing-authorization-in-sa-e7483346</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24327%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Strategic%20Enterprise%20Management%20(Balanced%20Scorecard%20in%20BSP%20Application)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24326-cwe-862-missing-authorization-in-sa-5ec24ceb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24326%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20Defense%20%26%20Security%20(Disconnected%20Operations)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24325-cwe-79-improper-neutralization-of-i-4ade4e67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24325%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20BusinessObjects%20Enterprise%20(Central%20Management%20Console)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24324-cwe-405-asymmetric-resource-consump-ac448fa8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24324%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform%20(AdminTools)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24323-cwe-601-url-redirection-to-untruste-bc9f77e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24323%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20Document%20Management%20System&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24322-cwe-862-missing-authorization-in-sa-73737ee7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24322%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Solution%20Tools%20Plug-In%20(ST-PI)&amp;severity=high&amp;id=698aaa0b4b57a58fa1c64d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24321-cwe-359-exposure-of-private-persona-4c72729a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24321%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20SAP_SE%20SAP%20Commerce%20Cloud&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24320-cwe-113-improper-neutralization-of--cd28a221</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24320%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20in%20SAP_SE%20SAP%20NetWeaver%20and%20ABAP%20Platform%20(Application%20Server%20ABAP)&amp;severity=low&amp;id=698aaa0b4b57a58fa1c64d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24319-cwe-316-cleartext-storage-of-sensit-d9d71bc9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24319%3A%20CWE-316%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20SAP_SE%20SAP%20Business%20One%20(B1%20Client%20Memory%20Dump%20Files)&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24312-cwe-862-missing-authorization-in-sa-d8c48f91</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24312%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Workflow&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23689-cwe-606-unchecked-input-for-loop-co-fcc10474</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23689%3A%20CWE-606%3A%20Unchecked%20Input%20for%20Loop%20Condition%20in%20SAP_SE%20SAP%20Supply%20Chain%20Management&amp;severity=high&amp;id=698aaa0b4b57a58fa1c64d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23688-cwe-862-missing-authorization-in-sa-008ebf09</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23688%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Fiori%20App%20(Manage%20Service%20Entry%20Sheets%20-%20Lean%20Services)&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23687-cwe-347-improper-verification-of-cr-3a7c3b5d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23687%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAP_SE%20SAP%20NetWeaver%20AS%20ABAP%20and%20ABAP%20Platform&amp;severity=high&amp;id=698aaa0b4b57a58fa1c64d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23686-cwe-113-improper-neutralization-of--8850b399</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23686%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java&amp;severity=low&amp;id=698aaa0b4b57a58fa1c64d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23685-cwe-502-deserialization-of-untruste-7cb9f0ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23685%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20(JMS%20service)&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23684-cwe-366-race-condition-within-a-thr-7e7b6ae6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23684%3A%20CWE-366%3A%20Race%20Condition%20within%20a%20Thread%20in%20SAP_SE%20SAP%20Commerce%20Cloud&amp;severity=medium&amp;id=698aaa094b57a58fa1c64cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2260-os-command-injection-in-d-link-dcs-9-9a67af74</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2260%3A%20OS%20Command%20Injection%20in%20D-Link%20DCS-931L&amp;severity=high&amp;id=698aaa0c4b57a58fa1c64d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23681-cwe-862-missing-authorization-in-sa-3f5d65c5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23681%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Support%20Tools%20Plug-In&amp;severity=medium&amp;id=698aaa094b57a58fa1c64cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0509-cwe-862-missing-authorization-in-sap-3bdb181d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0509%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=critical&amp;id=698aaa094b57a58fa1c64cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0508-cwe-601-url-redirection-to-untrusted-0338bc06</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0508%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=high&amp;id=698aaa094b57a58fa1c64cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0505-cwe-79-improper-neutralization-of-in-540ed851</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0505%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Document%20Management%20System&amp;severity=medium&amp;id=698aaa094b57a58fa1c64ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0490-cwe-862-missing-authorization-in-sap-459ce6f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0490%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20BusinessObjects%20BI%20Platform&amp;severity=high&amp;id=698aaa094b57a58fa1c64ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0488-cwe-862-missing-authorization-in-sap-cae5a650</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0488%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20CRM%20and%20SAP%20S%2F4HANA%20(Scripting%20Editor)&amp;severity=critical&amp;id=698aaa094b57a58fa1c64ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0486-cwe-862-missing-authorization-in-sap-2d43e29e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0486%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20ABAP%20based%20SAP%20systems&amp;severity=medium&amp;id=698aaa094b57a58fa1c64c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0485-cwe-405-asymmetric-resource-consumpt-1576c846</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0485%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAP%20BusinessObjects%20BI%20Platform&amp;severity=high&amp;id=698aaa094b57a58fa1c64c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0484-cwe-601-url-redirection-to-untrusted-44a6b1e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0484%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20SAP%20S%2F4HANA&amp;severity=medium&amp;id=698aaa094b57a58fa1c64c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2259-memory-corruption-in-aardappel-lobst-79ad5913</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2259%3A%20Memory%20Corruption%20in%20aardappel%20lobster&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2258-memory-corruption-in-aardappel-lobst-b00f3d42</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2258%3A%20Memory%20Corruption%20in%20aardappel%20lobster&amp;severity=medium&amp;id=698a78d04b57a58fa17ae5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-10-1709a628</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-10&amp;severity=medium&amp;id=698bca194b57a58fa1348b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70347-na-77c1cb2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70347%3A%20n%2Fa&amp;severity=medium&amp;id=698b92154b57a58fa127f949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54192-na-3759a40f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54192%3A%20n%2Fa&amp;severity=medium&amp;id=698b92154b57a58fa127f945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-10-261f06d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-10&amp;severity=low&amp;id=698af0234b57a58fa1f32c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15147-cwe-639-authorization-bypass-throug-fff7384a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15147%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wclovers%20WCFM%20Membership%20%E2%80%93%20WooCommerce%20Memberships%20for%20Multivendor%20Marketplace&amp;severity=medium&amp;id=698a6e434b57a58fa1785551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0845-cwe-862-missing-authorization-in-wcl-018676c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0845%3A%20CWE-862%20Missing%20Authorization%20in%20wclovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce&amp;severity=high&amp;id=698a6e434b57a58fa1785556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15314-improper-link-resolution-before-fil-c0454d22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15314%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20end-user-cx&amp;severity=medium&amp;id=698a6abf4b57a58fa177cfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15313-improper-link-resolution-before-fil-d5322d91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15313%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Tanium%20EUSS&amp;severity=medium&amp;id=698a6abf4b57a58fa177cfb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15310-improper-link-resolution-before-fil-253a4c0f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15310%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Patch%20Endpoint%20Tools&amp;severity=high&amp;id=698a6abf4b57a58fa177cfb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15318-improper-link-resolution-before-fil-3173e891</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15318%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20End-User%20Notifications%20Endpoint%20Tools&amp;severity=medium&amp;id=698a673b4b57a58fa1774ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15319-improper-link-resolution-before-fil-6d3cb710</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15319%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Patch%20Endpoint%20Tools&amp;severity=high&amp;id=698a673b4b57a58fa1774cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25958-cwe-807-reliance-on-untrusted-input-6bd12c4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25958%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20cube-js%20cube&amp;severity=high&amp;id=698a673b4b57a58fa1774cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25957-cwe-755-improper-handling-of-except-a42524a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25957%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20cube-js%20cube&amp;severity=medium&amp;id=698a673b4b57a58fa1774cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25895-cwe-22-improper-limitation-of-a-pat-61293111</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25895%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a63b84b57a58fa17688da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25894-cwe-321-use-of-hard-coded-cryptogra-a10e5fe5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25894%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a63b84b57a58fa17688d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25893-cwe-285-improper-authorization-in-f-a5914f35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25893%3A%20CWE-285%3A%20Improper%20Authorization%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a63b84b57a58fa17688d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25951-cwe-22-improper-limitation-of-a-pat-343cbba3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25951%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20frangoteam%20FUXA&amp;severity=high&amp;id=698a63b84b57a58fa17688df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25939-cwe-862-missing-authorization-in-fr-75e34d8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25939%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a60344b57a58fa175ce08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25938-cwe-290-authentication-bypass-by-sp-543651d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25938%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a60344b57a58fa175ce03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25931-cwe-276-incorrect-default-permissio-91eb9b5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25931%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20streetsidesoftware%20vscode-spell-checker&amp;severity=high&amp;id=698a60344b57a58fa175cdfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25925-cwe-502-deserialization-of-untruste-9527a485</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25925%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20modery%20PowerDocu&amp;severity=high&amp;id=698a5caf4b57a58fa174d53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25923-cwe-434-unrestricted-upload-of-file-c3e3a82e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25923%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20My-Little-Forum%20mylittleforum&amp;severity=high&amp;id=698a5caf4b57a58fa174d539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25808-cwe-862-missing-authorization-in-fe-66888cd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25808%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fedify-dev%20hollo&amp;severity=high&amp;id=698a592c4b57a58fa173fd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15315-improper-neutralization-of-argument-c4bc1745</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15315%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Tanium%20Tanium%20Module%20Server&amp;severity=medium&amp;id=698a592c4b57a58fa173fd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15316-improper-neutralization-of-argument-76cc03f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15316%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Tanium%20Tanium%20Server&amp;severity=medium&amp;id=698a592c4b57a58fa173fd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25807-cwe-94-improper-control-of-generati-87c44d84</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25807%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20TaklaXBR%20zai-shell&amp;severity=high&amp;id=698a592c4b57a58fa173fd9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15317-allocation-of-resources-without-lim-a7a03743</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15317%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Tanium%20Tanium%20Server&amp;severity=medium&amp;id=698a592c4b57a58fa173fd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25961-cwe-295-improper-certificate-valida-57d25293</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25961%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=high&amp;id=698a55a74b57a58fa1734045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25920-cwe-125-out-of-bounds-read-in-sumat-3b2bbce2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25920%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=medium&amp;id=698a55a74b57a58fa1734040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25918-cwe-532-insertion-of-sensitive-info-39d8e9fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25918%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20RageAgainstThePixel%20unity-cli&amp;severity=medium&amp;id=698a55a74b57a58fa173403a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25892-cwe-20-improper-input-validation-in-580634c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25892%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vrana%20adminer&amp;severity=high&amp;id=698a55a74b57a58fa1734034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25885-cwe-285-improper-authorization-in-p-5fce425d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25885%3A%20CWE-285%3A%20Improper%20Authorization%20in%20polarnl%20PolarLearn&amp;severity=critical&amp;id=698a52254b57a58fa1728466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25881-cwe-1321-improperly-controlled-modi-02093bcc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25881%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=698a52254b57a58fa1728462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25880-cwe-426-untrusted-search-path-in-su-ccd09e57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25880%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=high&amp;id=698a52254b57a58fa172845f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25875-cwe-863-incorrect-authorization-in--a76e9c2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25875%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=critical&amp;id=698a52254b57a58fa172845c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25814-cwe-74-improper-neutralization-of-s-12194afe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25814%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Praskla-Technology%20assessment-placipy&amp;severity=critical&amp;id=698a52254b57a58fa1728459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25813-cwe-532-insertion-of-sensitive-info-26701139</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25813%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Praskla-Technology%20assessment-placipy&amp;severity=high&amp;id=698a52254b57a58fa1728456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25812-cwe-352-cross-site-request-forgery--3e79817d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25812%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Praskla-Technology%20assessment-placipy&amp;severity=critical&amp;id=698a52254b57a58fa1728453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25811-cwe-863-incorrect-authorization-in--82293d19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25811%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698a52254b57a58fa1728450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25809-cwe-285-improper-authorization-in-p-3c443f62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25809%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698b05e84b57a58fa1fb453b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25878-cwe-306-missing-authentication-for--8494af2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25878%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FriendsOfShopware%20FroshPlatformAdminer&amp;severity=medium&amp;id=698b05e84b57a58fa1fb4544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25806-cwe-862-missing-authorization-in-pr-dd558da3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25806%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698b05e84b57a58fa1fb4538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25810-cwe-862-missing-authorization-in-pr-4371736f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25810%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698b05e84b57a58fa1fb453e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25876-cwe-862-missing-authorization-in-pr-92ab8419</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25876%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698b05e84b57a58fa1fb4541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25791-cwe-306-missing-authentication-for--d6be490b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25791%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20BishopFox%20sliver&amp;severity=high&amp;id=698a47984b57a58fa1702e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25765-cwe-918-server-side-request-forgery-aa34ec38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25765%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lostisland%20faraday&amp;severity=medium&amp;id=698a47984b57a58fa1702e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25740-cwe-250-execution-with-unnecessary--c037db11</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25740%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20NixOS%20nixpkgs&amp;severity=medium&amp;id=698a44144b57a58fa16f3275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25528-cwe-918-server-side-request-forgery-df952e2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25528%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langsmith-sdk&amp;severity=medium&amp;id=698a44144b57a58fa16f3272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25498-cwe-470-use-of-externally-controlle-bb4bbc61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25498%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=698a408f4b57a58fa16e1631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25497-cwe-639-authorization-bypass-throug-027976b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25497%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=high&amp;id=698a3d0c4b57a58fa16d39e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25496-cwe-79-improper-neutralization-of-i-395ed0bf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25496%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25495-cwe-89-improper-neutralization-of-s-654416fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25495%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=698a3d0c4b57a58fa16d39dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25494-cwe-918-server-side-request-forgery-0ab124c1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25494%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25493-cwe-918-server-side-request-forgery-a0e46f28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25493%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25492-cwe-918-server-side-request-forgery-4dbb90e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25492%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2246-memory-corruption-in-aprilrobotics-a-970766f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2246%3A%20Memory%20Corruption%20in%20AprilRobotics%20apriltag&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptocurrency-sector-targeted-with-new-tooling-an-c14e047c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC1069%20Targets%20Cryptocurrency%20Sector%20with%20New%20Tooling%20and%20AI-Enabled%20Social%20Engineering&amp;severity=medium&amp;id=698a44134b57a58fa16f31b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25491-cwe-79-improper-neutralization-of-i-3459c577</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25491%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=low&amp;id=698a36084b57a58fa16ab205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25057-cwe-23-relative-path-traversal-in-m-5548e007</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25057%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20MarkUsProject%20Markus&amp;severity=critical&amp;id=698a36074b57a58fa16ab1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-guloader-obfuscation-techniq-53e14a11</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20GuLoader%20Obfuscation%20Techniques&amp;severity=medium&amp;id=698a44134b57a58fa16f31df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2245-out-of-bounds-read-in-ccextractor-33eb7398</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2245%3A%20Out-of-Bounds%20Read%20in%20CCExtractor&amp;severity=medium&amp;id=698a36084b57a58fa16ab20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25598-cwe-778-insufficient-logging-in-ste-2804f268</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25598%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=698a36084b57a58fa16ab20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14778-incorrect-privilege-assignment-in-r-19fc6c86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14778%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=698a36074b57a58fa16ab1b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25480-cwe-176-improper-handling-of-unicod-2f593a42</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25480%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20litestar-org%20litestar&amp;severity=medium&amp;id=698a36074b57a58fa16ab1e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25479-cwe-185-incorrect-regular-expressio-bc68cd37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25479%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20litestar-org%20litestar&amp;severity=medium&amp;id=698a36074b57a58fa16ab1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25478-cwe-942-permissive-cross-domain-pol-f5faed08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25478%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20litestar-org%20litestar&amp;severity=high&amp;id=698a36074b57a58fa16ab1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24900-cwe-639-authorization-bypass-throug-2ecae0e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24900%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MarkUsProject%20Markus&amp;severity=medium&amp;id=698a36074b57a58fa16ab1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1529-improper-verification-of-cryptograph-4c2c244f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1529%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=698a36074b57a58fa16ab1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1486-improperly-implemented-security-chec-7c4b399b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1486%3A%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=high&amp;id=698a36074b57a58fa16ab1b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25231-cwe-284-improper-access-control-in--66a1eb8c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25231%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20error311%20FileRise&amp;severity=high&amp;id=698a36074b57a58fa16ab1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25230-cwe-79-improper-neutralization-of-i-0eaa64a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25230%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20error311%20FileRise&amp;severity=medium&amp;id=698a36074b57a58fa16ab1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24777-cwe-862-missing-authorization-in-op-6009884e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24777%3A%20CWE-862%3A%20Missing%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=698a2b784b57a58fa167fcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66630-cwe-338-use-of-cryptographically-we-73e9741e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66630%3A%20CWE-338%3A%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20gofiber%20fiber&amp;severity=critical&amp;id=698a24714b57a58fa1662675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2242-out-of-bounds-read-in-janet-lang-jan-d199ab8e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2242%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=698a19e84b57a58fa162a84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21419-cwe-59-improper-link-resolution-bef-74c953b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21419%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Display%20and%20Peripheral%20Manager%20(Windows)&amp;severity=medium&amp;id=698a19e84b57a58fa162a84b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-unc3886-targets-singapore-telecom-sec-897fc327</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20UNC3886%20Targets%20Singapore%20Telecom%20Sector%20in%20Cyber%20Espionage%20Campaign&amp;severity=medium&amp;id=698b13994b57a58fa1ff12fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7432-cwe-331-insufficient-entropy-in-sila-747141dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7432%3A%20CWE-331%20Insufficient%20Entropy%20in%20silabs.com%20Simplicity%20SDK&amp;severity=low&amp;id=698a0bd54b57a58fa15e776c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2241-out-of-bounds-read-in-janet-lang-jan-d51ea6cc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2241%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=698a0bd54b57a58fa15e776f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2240-out-of-bounds-read-in-janet-lang-jan-2be03f13</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2240%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=698a04d04b57a58fa15c44d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24095-cwe-862-missing-authorization-in-ch-88cb5ac1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24095%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=698a04d04b57a58fa15c44e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigation-on-the-emeditor-supply-chain-cyberat-ab1804a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigation%20on%20the%20EmEditor%20Supply%20Chain%20Cyberattack&amp;severity=medium&amp;id=698a44134b57a58fa16f31e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14831-inefficient-algorithmic-complexity--ca1ed9c1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14831%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6989fa464b57a58fa15923dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59024-insufficient-verification-of-data-a-91d349d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59024%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=6989fa464b57a58fa15923e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59023-insufficient-verification-of-data-a-e1c2d96a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59023%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20PowerDNS%20Recursor&amp;severity=high&amp;id=6989fa464b57a58fa15923e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-web-help-desk-exploited-for-rce-in-mult-e75d2ab7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Web%20Help%20Desk%20Exploited%20for%20RCE%20in%20Multi-Stage%20Attacks%20on%20Exposed%20Servers&amp;severity=high&amp;id=698b13994b57a58fa1ff1300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-groups-may-pivot-back-to-encryption-as--63c17323</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Groups%20May%20Pivot%20Back%20to%20Encryption%20as%20Data%20Theft%20Tactics%20Falter&amp;severity=medium&amp;id=6989f3054b57a58fa1569104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24027-insufficient-control-of-network-mes-77e6ac15</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24027%3A%20Insufficient%20Control%20of%20Network%20Message%20Volume%20(Network%20Amplification)%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=6989f3484b57a58fa156b619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0398-allocation-of-resources-without-limi-3e960007</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0398%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=6989efb44b57a58fa1554a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-ai-skill-malware-31tbps-ddos-notepad--9762e0ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20AI%20Skill%20Malware%2C%2031Tbps%20DDoS%2C%20Notepad%2B%2B%20Hack%2C%20LLM%20Backdoors%20and%20More&amp;severity=low&amp;id=698b13994b57a58fa1ff1303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10465-cwe-434-unrestricted-upload-of-file-94c4de0a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10465%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Birtech%20Information%20Technologies%20Industry%20and%20Trade%20Ltd.%20Co.%20Sensaway&amp;severity=high&amp;id=6989e1a74b57a58fa150c5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/9th-february-threat-intelligence-report-caf6f41f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=9th%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6989da9c4b57a58fa14eff48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10464-cwe-922-insecure-storage-of-sensiti-beb9bf87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10464%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Birtech%20Information%20Technologies%20Industry%20and%20Trade%20Ltd.%20Co.%20Senseway&amp;severity=medium&amp;id=6989da9b4b57a58fa14eff3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-solarwinds-flaws-potentially-exploited-as-z-fc2f5064</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20SolarWinds%20Flaws%20Potentially%20Exploited%20as%20Zero-Days&amp;severity=medium&amp;id=6989d6e54b57a58fa14dea2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10463-cwe-287-improper-authentication-in--ca3897ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10463%3A%20CWE-287%20Improper%20Authentication%20in%20Birtech%20Information%20Technologies%20Industry%20and%20Trade%20Ltd.%20Co.%20Senseway&amp;severity=high&amp;id=6989d0204b57a58fa14b2a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartertools-hit-by-ransomware-via-vulnerability-i-0f5ab2d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmarterTools%20Hit%20by%20Ransomware%20via%20Vulnerability%20in%20Its%20Own%20Product&amp;severity=medium&amp;id=6989cfdd4b57a58fa14b21ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7708-cwe-201-insertion-of-sensitive-infor-65d7317b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7708%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Atlas%20Educational%20Software%20Industry%20Ltd.%20Co.%20k12net&amp;severity=medium&amp;id=6989cc8b4b57a58fa14a189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-howto-extract-urls-from-rtf-files-mon-feb-9t-6cacc95b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20Howto%3A%20Extract%20URLs%20from%20RTF%20files%2C%20(Mon%2C%20Feb%209th)&amp;severity=medium&amp;id=6989c8d84b57a58fa148ec42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0632-cwe-918-server-side-request-forgery--732105b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0632%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=medium&amp;id=6989c9094b57a58fa148f1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6830-cwe-89-improper-neutralization-of-sp-5ed972bc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6830%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Xpoda%20T%C3%BCrkiye%20Information%20Technology%20Inc.%20Password%20Module&amp;severity=critical&amp;id=6989c9094b57a58fa148f1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bloody-wolf-targets-uzbekistan-russia-using-netsup-3ff6525c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bloody%20Wolf%20Targets%20Uzbekistan%2C%20Russia%20Using%20NetSupport%20RAT%20in%20Spear-Phishing%20Campaign&amp;severity=medium&amp;id=6989bfb04b57a58fa1460075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25848-cwe-306-in-jetbrains-hub-516ea109</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25848%3A%20CWE-306%20in%20JetBrains%20Hub&amp;severity=critical&amp;id=6989be7b4b57a58fa145bd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25847-cwe-79-in-jetbrains-pycharm-78c95cdc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25847%3A%20CWE-79%20in%20JetBrains%20PyCharm&amp;severity=high&amp;id=6989be7b4b57a58fa145bd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25846-cwe-532-in-jetbrains-youtrack-3ac80398</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25846%3A%20CWE-532%20in%20JetBrains%20YouTrack&amp;severity=medium&amp;id=6989be7b4b57a58fa145bd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22922-cwe-648-incorrect-use-of-privileged-9ee633eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22922%3A%20CWE-648%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=6989be7b4b57a58fa145bd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24098-cwe-200-exposure-of-sensitive-infor-186a34d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24098%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=6989be7b4b57a58fa145bd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-security-alert-regarding-apt-c-28-scarcruft-usin-773bbda4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20security%20alert%20regarding%20APT-C-28%20(ScarCruft)%20using%20MiradorShell%20to%20launch%20a%20cyberattack.&amp;severity=medium&amp;id=6989baf74b57a58fa144434a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2227-command-injection-in-d-link-dcs-931l-c3756b7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2227%3A%20Command%20Injection%20in%20D-Link%20DCS-931L&amp;severity=medium&amp;id=6989b3ef4b57a58fa1421850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2226-unrestricted-upload-in-douphp-463363d8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2226%3A%20Unrestricted%20Upload%20in%20DouPHP&amp;severity=medium&amp;id=6989ace74b57a58fa13edb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23903-cwe-289-authentication-bypass-by-al-8c206734</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23903%3A%20CWE-289%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Apache%20Software%20Foundation%20Apache%20Shiro&amp;severity=medium&amp;id=6989ace74b57a58fa13edb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-paper-and-tool-help-security-teams-move-beyond-efca9381</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Paper%20and%20Tool%20Help%20Security%20Teams%20Move%20Beyond%20Blind%20Reliance%20on%20CISA%E2%80%99s%20KEV%20Catalog&amp;severity=medium&amp;id=6989a5ac4b57a58fa13b9702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2225-sql-injection-in-itsourcecode-news-p-9e323cdf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2225%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=6989a5ef4b57a58fa13baa26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25905-cwe-653-improper-isolation-or-compa-51b8b4d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25905%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization&amp;severity=medium&amp;id=6989a5ef4b57a58fa13baa23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25904-cwe-918-server-side-request-forgery-fbd95310</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25904%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=medium&amp;id=6989a2774b57a58fa13a5753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-worm-exploits-cloud-infrastructure-to-buil-27364f5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Worm%20Exploits%20Cloud%20Infrastructure%20to%20Build%20Criminal%20Infrastructure&amp;severity=low&amp;id=6989bfb04b57a58fa1460078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2224-cross-site-scripting-in-code-project-0ed5a829</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2224%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=6989a2774b57a58fa13a5756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25916-cwe-420-unprotected-alternate-chann-1d2e3763</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25916%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69899b534b57a58fa1382738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7799-cwe-79-improper-neutralization-of-in-0c259e86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zirve%20Information%20Technologies%20Inc.%20e-Taxpayer%20Accounting%20Website&amp;severity=high&amp;id=69899b534b57a58fa1382735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-commission-investigating-cyberattack-69fc77ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Commission%20Investigating%20Cyberattack&amp;severity=medium&amp;id=6989979c4b57a58fa1362e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-fixes-critical-pre-auth-rce-vulnerabil-0ae0cb0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Fixes%20Critical%20Pre-Auth%20RCE%20Vulnerability%20in%20Remote%20Support%20and%20PRA&amp;severity=critical&amp;id=6989bfb04b57a58fa146007b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2223-sql-injection-in-code-projects-onlin-37e26188</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2223%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698997e24b57a58fa1363d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22906-cwe-321-use-of-hard-coded-cryptogra-e9045210</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22906%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20WAGO%200852-1322&amp;severity=critical&amp;id=6989944b4b57a58fa134d4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22905-cwe-22-improper-limitation-of-a-pat-e3a62789</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22905%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WAGO%200852-1322&amp;severity=high&amp;id=6989944b4b57a58fa134d4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22904-cwe-121-stack-based-buffer-overflow-f7b2d93e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22904%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WAGO%200852-1322&amp;severity=critical&amp;id=6989944b4b57a58fa134d4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22903-cwe-121-stack-based-buffer-overflow-53b0bab5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22903%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WAGO%200852-1322&amp;severity=critical&amp;id=6989944b4b57a58fa134d4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2222-cross-site-scripting-in-code-project-1faba2de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2222%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698990c74b57a58fa133ba92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2236-cwe-89-improper-neutralization-of-sp-cff86a22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2236%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HGiga%20C%26Cm%40il%20package%20olln-base&amp;severity=high&amp;id=698990c74b57a58fa133baa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2235-cwe-89-improper-neutralization-of-sp-1bfc1044</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2235%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HGiga%20C%26Cm%40il%20package%20olln-base&amp;severity=high&amp;id=698990c74b57a58fa133ba9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2234-cwe-306-missing-authentication-for-c-d21fa761</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2234%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HGiga%20C%26Cm%40il%20%20package%20olln-base&amp;severity=critical&amp;id=698990c74b57a58fa133ba99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2221-sql-injection-in-code-projects-onlin-a04655ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2221%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698989bf4b57a58fa13168bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24466-unquoted-search-path-or-element-in--cbb2d1f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24466%3A%20Unquoted%20search%20path%20or%20element%20in%20Oki%20Electric%20Industry%20Co.%2C%20Ltd.%20See%20%22References%22%20section&amp;severity=medium&amp;id=698989bf4b57a58fa13168b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1868-cwe-1336-improper-neutralization-of--f5bf4abe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1868%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20GitLab%20GitLab%20AI%20Gateway&amp;severity=critical&amp;id=698982b74b57a58fa12ef2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2220-sql-injection-in-code-projects-onlin-98adb77f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2220%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698982b74b57a58fa12ef2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0870-cwe-250-execution-with-unnecessary-p-ded42670</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0870%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20GIGABYTE%20MacroHub&amp;severity=high&amp;id=698982b74b57a58fa12ef2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2218-command-injection-in-d-link-dcs-933l-acb9f68a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2218%3A%20Command%20Injection%20in%20D-Link%20DCS-933L&amp;severity=medium&amp;id=69897baf4b57a58fa12c1f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22613-cwe-295-improper-certificate-valida-325d563b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22613%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Eaton%20Network%20M3&amp;severity=medium&amp;id=69897baf4b57a58fa12c1f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2217-sql-injection-in-itsourcecode-event--c38204db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2217%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=698974a74b57a58fa1284a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2216-path-traversal-in-rachelos-werss-we--a945c412</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2216%3A%20Path%20Traversal%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=698974a74b57a58fa1284a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1615-arbitrary-code-injection-in-jsonpath-a64ac077</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1615%3A%20Arbitrary%20Code%20Injection%20in%20jsonpath&amp;severity=critical&amp;id=69896dc24b57a58fa125bde1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2215-use-of-default-cryptographic-key-in--c7f269e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2215%3A%20Use%20of%20Default%20Cryptographic%20Key%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=69896dc24b57a58fa125bde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2214-cross-site-scripting-in-code-project-a5d3b284</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2214%3A%20Cross%20Site%20Scripting%20in%20code-projects%20for%20Plugin&amp;severity=medium&amp;id=698963134b57a58fa121384c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66594-cwe-209-generation-of-error-message-31950b35</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66594%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698963134b57a58fa1213836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66595-cwe-352-cross-site-request-forgery--ae40aa6a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66595%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698963134b57a58fa1213839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66596-cwe-601-url-redirection-to-untruste-2d3d37c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66596%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698963134b57a58fa121383c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2213-unrestricted-upload-in-code-projects-33365f29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2213%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=698963134b57a58fa1213845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66597-cwe-327-use-of-a-broken-or-risky-cr-01f86823</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66597%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=high&amp;id=698963134b57a58fa121383f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66598-cwe-327-use-of-a-broken-or-risky-cr-396922de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66598%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=high&amp;id=698963134b57a58fa1213842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66599-cwe-497-in-yokogawa-electric-corpor-67812000</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66599%3A%20CWE-497%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698955034b57a58fa1ffc953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66600-cwe-358-in-yokogawa-electric-corpor-22d483ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66600%3A%20CWE-358%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=high&amp;id=698955034b57a58fa1ffc956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66601-cwe-358-in-yokogawa-electric-corpor-af4e632e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66601%3A%20CWE-358%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698955034b57a58fa1ffc959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66602-cwe-291-in-yokogawa-electric-corpor-5ed93e73</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66602%3A%20CWE-291%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698955034b57a58fa1ffc95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66603-cwe-358-in-yokogawa-electric-corpor-1fdc73b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66603%3A%20CWE-358%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=low&amp;id=698955034b57a58fa1ffc95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66604-cwe-319-cleartext-transmission-of-s-faac7ee5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66604%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=low&amp;id=698955034b57a58fa1ffc962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66605-cwe-359-in-yokogawa-electric-corpor-1d5f1c27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66605%3A%20CWE-359%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=low&amp;id=698955034b57a58fa1ffc965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66608-cwe-29-in-yokogawa-electric-corpora-c44d1dab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66608%3A%20CWE-29%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=high&amp;id=698955034b57a58fa1ffc96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66607-cwe-358-in-yokogawa-electric-corpor-8ee1b437</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66607%3A%20CWE-358%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698955034b57a58fa1ffc96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66606-cwe-86-in-yokogawa-electric-corpora-c5b47c11</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66606%3A%20CWE-86%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=low&amp;id=698955034b57a58fa1ffc968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2212-sql-injection-in-code-projects-onlin-7f86cd97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2212%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=698955054b57a58fa1ffc98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2211-sql-injection-in-code-projects-onlin-ce4e0f75</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2211%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=698955054b57a58fa1ffc985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2210-os-command-injection-in-d-link-dir-8-a510703e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2210%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=698946f34b57a58fa1f4d9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2203-buffer-overflow-in-tenda-ac8-23b5fa92</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2203%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=698946f34b57a58fa1f4d9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2202-buffer-overflow-in-tenda-ac8-e8c278de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2202%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=698946f34b57a58fa1f4d9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2201-cross-site-scripting-in-zerowdd-stud-9895ddc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2201%3A%20Cross%20Site%20Scripting%20in%20ZeroWdd%20studentmanager&amp;severity=medium&amp;id=69893c684b57a58fa1f0defe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2200-cross-site-scripting-in-heyewei-jfin-25699fc3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2200%3A%20Cross%20Site%20Scripting%20in%20heyewei%20JFinalCMS&amp;severity=medium&amp;id=69893c684b57a58fa1f0def8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2199-sql-injection-in-code-projects-onlin-221a3256</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2199%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698931db4b57a58fa1e6f5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2198-sql-injection-in-code-projects-onlin-84785075</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2198%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698931db4b57a58fa1e6f5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2197-sql-injection-in-code-projects-onlin-5a7ff2a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2197%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=69892ad34b57a58fa1e0cc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2196-sql-injection-in-code-projects-onlin-521b2058</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2196%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=69892ad34b57a58fa1e0cc8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-09-7838bdc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-09&amp;severity=medium&amp;id=698a78994b57a58fa17a85c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63354-na-1368ce6a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63354%3A%20n%2Fa&amp;severity=medium&amp;id=6989fa464b57a58fa15923e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-09-5af1a3c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-09&amp;severity=low&amp;id=6989d35e4b57a58fa14c3f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2195-sql-injection-in-code-projects-onlin-a1957e30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2195%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698923cd4b57a58fa1dc4da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2194-command-injection-in-d-link-di-7100g-aad9a2bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2194%3A%20Command%20Injection%20in%20D-Link%20DI-7100G%20C1&amp;severity=medium&amp;id=698923cd4b57a58fa1dc4da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2193-command-injection-in-d-link-di-7100g-d80401b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2193%3A%20Command%20Injection%20in%20D-Link%20DI-7100G%20C1&amp;severity=medium&amp;id=6989193f4b57a58fa1d8c2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2192-stack-based-buffer-overflow-in-tenda-017bd58d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2192%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=6989193f4b57a58fa1d8c2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2191-stack-based-buffer-overflow-in-tenda-65760e1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2191%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=698912394b57a58fa1d5d42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2190-sql-injection-in-itsourcecode-school-e4e0476a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2190%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=698912394b57a58fa1d5d424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2189-sql-injection-in-itsourcecode-school-16a78f0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2189%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=69890b2f4b57a58fa1d35e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2188-os-command-injection-in-utt-521g-2dda2a09</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2188%3A%20OS%20Command%20Injection%20in%20UTT%20%E8%BF%9B%E5%8F%96%20521G&amp;severity=high&amp;id=698904274b57a58fa1d0a686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2187-stack-based-buffer-overflow-in-tenda-a2f52fd0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2187%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988fd204b57a58fa1ce2187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2186-stack-based-buffer-overflow-in-tenda-02d1b976</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2186%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988fd204b57a58fa1ce2180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2185-stack-based-buffer-overflow-in-tenda-5922d2b2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2185%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988f6174b57a58fa1cbbd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2184-os-command-injection-in-great-develo-c68f08e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2184%3A%20OS%20Command%20Injection%20in%20Great%20Developers%20Certificate%20Generation%20System&amp;severity=medium&amp;id=6988f6174b57a58fa1cbbd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2183-unrestricted-upload-in-great-develop-b27ad893</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2183%3A%20Unrestricted%20Upload%20in%20Great%20Developers%20Certificate%20Generation%20System&amp;severity=medium&amp;id=6988ef104b57a58fa1c9fb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2182-command-injection-in-utt-521g-ccd9a731</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2182%3A%20Command%20Injection%20in%20UTT%20%E8%BF%9B%E5%8F%96%20521G&amp;severity=high&amp;id=6988ef104b57a58fa1c9fb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2181-stack-based-buffer-overflow-in-tenda-ba1c013f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2181%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988e8074b57a58fa1c5ca8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2180-stack-based-buffer-overflow-in-tenda-26cba744</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2180%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988e8074b57a58fa1c5ca88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2179-sql-injection-in-phpgurukul-hospital-63fc3206</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2179%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=6988e8074b57a58fa1c5ca80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2178-command-injection-in-r-huijts-xcode--e3b31376</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2178%3A%20Command%20Injection%20in%20r-huijts%20xcode-mcp-server&amp;severity=medium&amp;id=6988e0ff4b57a58fa1c2c109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2177-session-fixiation-in-sourcecodester--c798eb6e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2177%3A%20Session%20Fixiation%20in%20SourceCodester%20Prison%20Management%20System&amp;severity=medium&amp;id=6988e0ff4b57a58fa1c2c102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2176-sql-injection-in-code-projects-conta-96625a3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2176%3A%20SQL%20Injection%20in%20code-projects%20Contact%20Management%20System&amp;severity=medium&amp;id=6988e0ff4b57a58fa1c2c0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2175-os-command-injection-in-d-link-dir-8-2593454d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2175%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=6988dd7b4b57a58fa1c1b04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2174-improper-authentication-in-code-proj-2e24bba5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2174%3A%20Improper%20Authentication%20in%20code-projects%20Contact%20Management%20System&amp;severity=medium&amp;id=6988dd7b4b57a58fa1c1b046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2173-sql-injection-in-code-projects-onlin-4c8a3584</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2173%3A%20SQL%20Injection%20in%20code-projects%20Online%20Examination%20System&amp;severity=medium&amp;id=6988dd7b4b57a58fa1c1b040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2172-sql-injection-in-code-projects-onlin-2fae6bd2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2172%3A%20SQL%20Injection%20in%20code-projects%20Online%20Application%20System%20for%20Admission&amp;severity=medium&amp;id=6988d6734b57a58fa1bfa5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2171-sql-injection-in-code-projects-onlin-8ac324e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2171%3A%20SQL%20Injection%20in%20code-projects%20Online%20Student%20Management%20System&amp;severity=medium&amp;id=6988d6734b57a58fa1bfa5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2169-command-injection-in-d-link-dwr-m921-36bfe2c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2169%3A%20Command%20Injection%20in%20D-Link%20DWR-M921&amp;severity=medium&amp;id=6988cbe84b57a58fa1bb3c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2168-command-injection-in-d-link-dwr-m921-f87dbd6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2168%3A%20Command%20Injection%20in%20D-Link%20DWR-M921&amp;severity=medium&amp;id=6988cbe84b57a58fa1bb3c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2167-os-command-injection-in-totolink-wa3-c6030528</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2167%3A%20OS%20Command%20Injection%20in%20Totolink%20WA300&amp;severity=medium&amp;id=6988c4df4b57a58fa1b81884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2166-sql-injection-in-code-projects-onlin-1bb815b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2166%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=6988c4df4b57a58fa1b8187c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2165-missing-authentication-in-detronetdi-8229ecf4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2165%3A%20Missing%20Authentication%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6988c15b4b57a58fa1b5b3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2164-unrestricted-upload-in-detronetdip-e-eac221b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2164%3A%20Unrestricted%20Upload%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6988c15b4b57a58fa1b5b39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2163-command-injection-in-d-link-dir-600-3f3c8faa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2163%3A%20Command%20Injection%20in%20D-Link%20DIR-600&amp;severity=medium&amp;id=6988c15b4b57a58fa1b5b391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2162-sql-injection-in-itsourcecode-news-p-33809204</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2162%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=6988b6cf4b57a58fa1b0bc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2161-sql-injection-in-itsourcecode-direct-dd379f76</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2161%3A%20SQL%20Injection%20in%20itsourcecode%20Directory%20Management%20System&amp;severity=medium&amp;id=6988b6cf4b57a58fa1b0bc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2160-cross-site-scripting-in-sourcecodest-8c400c19</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2160%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=6988afc74b57a58fa1ab2017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2159-cross-site-scripting-in-sourcecodest-4c3ce75a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2159%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=6988afc74b57a58fa1ab2010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2158-sql-injection-in-code-projects-stude-90e5a284</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2158%3A%20SQL%20Injection%20in%20code-projects%20Student%20Web%20Portal&amp;severity=medium&amp;id=6988a8bf4b57a58fa1a60a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2157-os-command-injection-in-d-link-dir-8-f7732c6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2157%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=6988a8bf4b57a58fa1a60a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2156-cross-site-scripting-in-code-project-13afde6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2156%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Student%20Management%20System&amp;severity=medium&amp;id=6988a53b4b57a58fa1a3d491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2155-os-command-injection-in-d-link-dir-8-3a93a385</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2155%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=69889aaf4b57a58fa19cfd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2154-cross-site-scripting-in-sourcecodest-62e64ca2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2154%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=6988972b4b57a58fa19a8271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2153-open-redirect-in-mwielgoszewski-door-11ffaf40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2153%3A%20Open%20Redirect%20in%20mwielgoszewski%20doorman&amp;severity=medium&amp;id=69888c9f4b57a58fa1909435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2152-os-command-injection-in-d-link-dir-6-1ad93e00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2152%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=698885974b57a58fa18a8291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2151-os-command-injection-in-d-link-dir-6-3276f328</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2151%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=69887e8f4b57a58fa183ef77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2150-cross-site-scripting-in-sourcecodest-37415e92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2150%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=698877874b57a58fa17decd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2149-cross-site-scripting-in-sourcecodest-5edcbd7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2149%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=6988707f4b57a58fa1799fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2148-information-disclosure-in-tenda-ac21-24a72697</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2148%3A%20Information%20Disclosure%20in%20Tenda%20AC21&amp;severity=medium&amp;id=69886cfc4b57a58fa161c44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2147-information-disclosure-in-tenda-ac21-fe01c565</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2147%3A%20Information%20Disclosure%20in%20Tenda%20AC21&amp;severity=medium&amp;id=698862794b57a58fa14f79d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2146-unrestricted-upload-in-guchengwuyue--a465a2fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2146%3A%20Unrestricted%20Upload%20in%20guchengwuyue%20yshopmall&amp;severity=medium&amp;id=69885b28f9fa50a62fa1ee37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2145-cross-site-scripting-in-cym1102-ngin-3fa41c03</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2145%3A%20Cross%20Site%20Scripting%20in%20cym1102%20nginxWebUI&amp;severity=medium&amp;id=69885421f9fa50a62f9cba74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2143-os-command-injection-in-d-link-dir-8-43a9e1df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2143%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=69884d18f9fa50a62f96e2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2142-os-command-injection-in-d-link-dir-8-a1ababaf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2142%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=69884610f9fa50a62f93b8fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2141-improper-authorization-in-wukongopen-2bac3656</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2141%3A%20Improper%20Authorization%20in%20WuKongOpenSource%20WukongCRM&amp;severity=medium&amp;id=69884451f9fa50a62f927d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-integrates-virustotal-scanning-to-detect--2871641f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Integrates%20VirusTotal%20Scanning%20to%20Detect%20Malicious%20ClawHub%20Skills&amp;severity=medium&amp;id=69884ba0f9fa50a62f95d60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2140-buffer-overflow-in-tenda-tx9-09ab607e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2140%3A%20Buffer%20Overflow%20in%20Tenda%20TX9&amp;severity=high&amp;id=69883800f9fa50a62f7bac16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2139-buffer-overflow-in-tenda-tx9-9b5ff729</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2139%3A%20Buffer%20Overflow%20in%20Tenda%20TX9&amp;severity=high&amp;id=6988347bf9fa50a62f780bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2138-buffer-overflow-in-tenda-tx9-32011e56</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2138%3A%20Buffer%20Overflow%20in%20Tenda%20TX9&amp;severity=high&amp;id=698829f0f9fa50a62f667bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2137-buffer-overflow-in-tenda-tx3-7163aefa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2137%3A%20Buffer%20Overflow%20in%20Tenda%20TX3&amp;severity=high&amp;id=6988266bf9fa50a62f64201d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2136-sql-injection-in-projectworlds-onlin-1e2048a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2136%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69881f64f9fa50a62f5cc98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2135-command-injection-in-utt-hiper-810-605fbaac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2135%3A%20Command%20Injection%20in%20UTT%20HiPER%20810&amp;severity=medium&amp;id=698814dbf9fa50a62f3465a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2134-sql-injection-in-phpgurukul-hospital-5501caae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2134%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=698814dbf9fa50a62f34659c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2133-unrestricted-upload-in-code-projects-09f955a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2133%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69880a4bf9fa50a62f2aa4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2132-sql-injection-in-code-projects-onlin-1e8dc808</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2132%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69880a4bf9fa50a62f2aa4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2131-os-command-injection-in-xixianliang--0930d004</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2131%3A%20OS%20Command%20Injection%20in%20XixianLiang%20HarmonyOS-mcp-server&amp;severity=medium&amp;id=6987fc3cf9fa50a62f1fd1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2130-command-injection-in-burtthecoder-mc-b01622ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2130%3A%20Command%20Injection%20in%20BurtTheCoder%20mcp-maigret&amp;severity=medium&amp;id=6987fc3cf9fa50a62f1fd1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2129-os-command-injection-in-d-link-dir-8-54513fc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2129%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=6987ee2cf9fa50a62f16ff9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15100-cwe-269-improper-privilege-manageme-b92c305c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15100%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20jayarsiech%20JAY%20Login%20%26%20Register&amp;severity=high&amp;id=6987ee2cf9fa50a62f16ff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15027-cwe-269-improper-privilege-manageme-d7a40bd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15027%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20jayarsiech%20JAY%20Login%20%26%20Register&amp;severity=critical&amp;id=6987ee2cf9fa50a62f16ff95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2209-improper-authorization-in-wekan-2009476e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2209%3A%20Improper%20Authorization%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2208-missing-authorization-in-wekan-9d5fea75</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2208%3A%20Missing%20Authorization%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2207-information-disclosure-in-wekan-88993d85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2207%3A%20Information%20Disclosure%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2206-improper-access-controls-in-wekan-b5810efa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2206%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2205-information-disclosure-in-wekan-4a689cb7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2205%3A%20Information%20Disclosure%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2122-sql-injection-in-xiaopi-panel-d0d38438</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2122%3A%20SQL%20Injection%20in%20Xiaopi%20Panel&amp;severity=medium&amp;id=6987e3a0f9fa50a62f01e2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2120-os-command-injection-in-d-link-dir-8-eb87b902</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2120%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=6987e3a0f9fa50a62f01e2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2118-command-injection-in-utt-hiper-810-667d5923</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2118%3A%20Command%20Injection%20in%20UTT%20HiPER%20810&amp;severity=high&amp;id=69884451f9fa50a62f927d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-08-c1b2c1f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-08&amp;severity=medium&amp;id=698927194b57a58fa1dddc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-08-dd47ba85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-08&amp;severity=low&amp;id=69882636f9fa50a62f63e239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2117-sql-injection-in-itsourcecode-societ-33057233</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2117%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=69884451f9fa50a62f927dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2116-sql-injection-in-itsourcecode-societ-06a6e772</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2116%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=69884451f9fa50a62f927dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2115-sql-injection-in-itsourcecode-societ-16a1058e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2115%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=6987c078f9fa50a62fe1e268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2114-sql-injection-in-itsourcecode-societ-eb8b7956</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2114%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=6987b98bf9fa50a62fdbd7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25858-cwe-640-weak-password-recovery-mech-3ff06a38</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25858%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20macrozheng%20mall&amp;severity=critical&amp;id=6987b5ecf9fa50a62fd2db09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25857-cwe-78-improper-neutralization-of-s-97d5f696</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25857%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Tenda%20G300-F&amp;severity=high&amp;id=6987b5ecf9fa50a62fd2db04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15564-divide-by-zero-in-mapnik-aacffcb6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15564%3A%20Divide%20By%20Zero%20in%20Mapnik&amp;severity=medium&amp;id=6987b268f9fa50a62fcfb4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2113-deserialization-in-yuan1994-tpadmin-4e1abf95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2113%3A%20Deserialization%20in%20yuan1994%20tpadmin&amp;severity=medium&amp;id=6987ab60f9fa50a62fbec76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2111-path-traversal-in-jeecgboot-bc98413a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2111%3A%20Path%20Traversal%20in%20JeecgBoot&amp;severity=medium&amp;id=6987a478f9fa50a62fad9688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2110-improper-restriction-of-excessive-au-b5bc8c2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2110%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Tasin1025%20SwiftBuy&amp;severity=medium&amp;id=69879d53f9fa50a62f9cb19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2109-improper-authorization-in-jsbroks-co-99c0d3fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2109%3A%20Improper%20Authorization%20in%20jsbroks%20COCO%20Annotator&amp;severity=medium&amp;id=69879649f9fa50a62f8fd9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2108-denial-of-service-in-jsbroks-coco-an-a3e76d97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2108%3A%20Denial%20of%20Service%20in%20jsbroks%20COCO%20Annotator&amp;severity=medium&amp;id=69878f40f9fa50a62f7c5181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2107-improper-authorization-in-yeqifu-war-66dc9ff5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2107%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=69878bc3f9fa50a62f720652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2106-improper-authorization-in-yeqifu-war-de67b0b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2106%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=69877a28f9fa50a62f44035c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2105-improper-authorization-in-yeqifu-war-65dc7481</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2105%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6987732cf9fa50a62f350edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2090-sql-injection-in-sourcecodester-onli-b2f3d215</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2090%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Class%20Record%20System&amp;severity=medium&amp;id=69875e09f9fa50a62f002962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2089-sql-injection-in-sourcecodester-onli-b9831b34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2089%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Class%20Record%20System&amp;severity=medium&amp;id=69875704f9fa50a62fe92680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2088-sql-injection-in-phpgurukul-beauty-p-a061ef90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2088%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=69874ff5f9fa50a62fd81230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2087-sql-injection-in-sourcecodester-onli-c23f40fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2087%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Class%20Record%20System&amp;severity=medium&amp;id=698748edf9fa50a62fcc96f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2086-buffer-overflow-in-utt-hiper-810g-43cb38da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2086%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=6987456bf9fa50a62fc698ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-urged-to-replace-discontinued-edge-d-94e482f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Urged%20to%20Replace%20Discontinued%20Edge%20Devices&amp;severity=medium&amp;id=69873aaaf9fa50a62fa478cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2085-command-injection-in-d-link-dwr-m921-034526b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2085%3A%20Command%20Injection%20in%20D-Link%20DWR-M921&amp;severity=high&amp;id=69872ccdf9fa50a62f8287cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2084-os-command-injection-in-d-link-dir-8-560ed943</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2084%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=698725c5f9fa50a62f79ed58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/german-agencies-warn-of-signal-phishing-targeting--ecb729e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=German%20Agencies%20Warn%20of%20Signal%20Phishing%20Targeting%20Politicians%2C%20Military%2C%20Journalists&amp;severity=high&amp;id=69884ba0f9fa50a62f95d611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2083-sql-injection-in-code-projects-socia-c32b6297</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2083%3A%20SQL%20Injection%20in%20code-projects%20Social%20Networking%20Site&amp;severity=medium&amp;id=698717b8f9fa50a62f57d826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2082-os-command-injection-in-d-link-dir-8-f5d76b84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2082%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=698710adf9fa50a62f4418a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2081-os-command-injection-in-d-link-dir-8-8c7532c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2081%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=69884451f9fa50a62f927de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2080-command-injection-in-utt-hiper-810-4880f054</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2080%3A%20Command%20Injection%20in%20UTT%20HiPER%20810&amp;severity=high&amp;id=6987029df9fa50a62f2ac5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2079-improper-authorization-in-yeqifu-war-a0d27384</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2079%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986fba7f9fa50a62f1d38e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15476-cwe-862-missing-authorization-in-si-3325d96d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15476%3A%20CWE-862%20Missing%20Authorization%20in%20simonfairbairn%20The%20Bucketlister&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15477-cwe-89-improper-neutralization-of-s-504a0a25</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15477%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20simonfairbairn%20The%20Bucketlister&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1573-cwe-79-improper-neutralization-of-in-e20b42a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1573%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omi-mexico%20OMIGO&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1613-cwe-79-improper-neutralization-of-in-ed9446e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrlister1%20Wonka%20Slide&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1611-cwe-79-improper-neutralization-of-in-e9163cba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jmrukkers%20Wikiloops%20Track%20Player&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1082-cwe-352-cross-site-request-forgery-c-1f5478bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1082%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20arkapravamajumder%20TITLE%20ANIMATOR&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1608-cwe-79-improper-neutralization-of-in-0c54e4f3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tigor4eg%20Video%20Onclick&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1634-cwe-79-improper-neutralization-of-in-6148d308</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1634%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexdtn%20Subitem%20AL%20Slider&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1675-cwe-1188-initialization-of-a-resourc-7aea86a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1675%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20brstefanovic%20Advanced%20Country%20Blocker&amp;severity=medium&amp;id=6986fba7f9fa50a62f1d38df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1643-cwe-79-improper-neutralization-of-in-0989d4a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ariagle%20MP-Ukagaka&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1570-cwe-79-improper-neutralization-of-in-7a811be0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1570%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dannycarlton%20Simple%20Bible%20Verse%20via%20Shortcode&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2078-improper-authorization-in-yeqifu-war-e88310cb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2078%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986f48df9fa50a62f1325cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2077-improper-authorization-in-yeqifu-war-bf20ebb4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2077%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986ed85f9fa50a62f0d9a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2076-improper-authorization-in-yeqifu-war-586b676f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2076%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986df75f9fa50a62ff9d900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15491-cwe-22-improper-limitation-of-a-pat-12c4fc96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15491%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Post%20Slides&amp;severity=medium&amp;id=6986d86df9fa50a62ff27dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12159-cwe-79-improper-neutralization-of-i-4a178663</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12159%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6986d4e8f9fa50a62fed3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13463-cwe-79-improper-neutralization-of-i-19c83847</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13463%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6986d4e8f9fa50a62fed3fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12803-cwe-80-improper-neutralization-of-s-f0081867</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12803%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6986d4e8f9fa50a62fed3fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15267-cwe-79-improper-neutralization-of-i-cbea20b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6986d4e8f9fa50a62fed3fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2075-improper-access-controls-in-yeqifu-w-62e8168e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2075%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986cde0f9fa50a62fe7f048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2074-xml-external-entity-reference-in-o2o-1cb33d44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2074%3A%20XML%20External%20Entity%20Reference%20in%20O2OA&amp;severity=medium&amp;id=6986f13ef9fa50a62f11d4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2073-sql-injection-in-itsourcecode-school-69180f85</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2073%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=6986b8cbf9fa50a62fc21ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31990-cwe-770-allocation-of-resources-wit-e646bfe0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31990%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HCLSoftware%20HCL%20DevOps%20Velocity&amp;severity=medium&amp;id=6986b8c9f9fa50a62fc1f7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2071-buffer-overflow-in-utt-520w-3febf7b7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2071%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69868e99f9fa50a62f47a432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-07-4537ec57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-07&amp;severity=medium&amp;id=6987d55af9fa50a62fea2824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-07-c4fc9685</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-07&amp;severity=low&amp;id=69870cf3f9fa50a62f3b7843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25804-cwe-287-improper-authentication-in--ae440bf0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25804%3A%20CWE-287%3A%20Improper%20Authentication%20in%20antrea-io%20antrea&amp;severity=high&amp;id=69867278f9fa50a62f39d4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25793-cwe-347-improper-verification-of-cr-74cda0bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25793%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20slackhq%20nebula&amp;severity=high&amp;id=69867278f9fa50a62f39d4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25803-cwe-798-use-of-hard-coded-credentia-52e7d009</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25803%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20denpiligrim%203dp-manager&amp;severity=critical&amp;id=69867278f9fa50a62f39d4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25762-cwe-400-uncontrolled-resource-consu-3125f3ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25762%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20adonisjs%20core&amp;severity=high&amp;id=69867278f9fa50a62f39d4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25754-cwe-1321-improperly-controlled-modi-c71bc36b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25754%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20adonisjs%20core&amp;severity=high&amp;id=69867278f9fa50a62f39d4fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25644-cwe-295-improper-certificate-valida-a24dce7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25644%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20datahub-project%20datahub&amp;severity=high&amp;id=69867278f9fa50a62f39d4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2070-buffer-overflow-in-utt-520w-294d40cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2070%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69866ef5f9fa50a62f393798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25763-cwe-78-improper-neutralization-of-s-f2d1f8d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25763%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=698667edf9fa50a62f37ce33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25764-cwe-80-improper-neutralization-of-s-485b1a84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25764%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20opf%20openproject&amp;severity=low&amp;id=698667edf9fa50a62f37ce38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2069-stack-based-buffer-overflow-in-ggml--8180fc5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2069%3A%20Stack-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=medium&amp;id=698667edf9fa50a62f37ce3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1731-cwe-78-improper-neutralization-of-sp-066ed5de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1731%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BeyondTrust%20Remote%20Support(RS)%20%26%20Privileged%20Remote%20Access(PRA)&amp;severity=critical&amp;id=69866468f9fa50a62f36cd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1727-cwe-200-exposure-of-sensitive-inform-c82534e3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1727%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Google%20Cloud%20Gemini%20Enterprise%20(formerly%20Agentspace)&amp;severity=critical&amp;id=69866468f9fa50a62f36cd1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25760-cwe-22-improper-limitation-of-a-pat-683be2f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25760%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69866468f9fa50a62f36cd1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2068-buffer-overflow-in-utt-520w-b92250f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2068%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69866468f9fa50a62f36cd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68621-cwe-208-observable-timing-discrepan-4a8d1703</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68621%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20TriliumNext%20Trilium&amp;severity=high&amp;id=6986f13ef9fa50a62f11d4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25123-cwe-918-server-side-request-forgery-de1289dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25123%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=6986f13ef9fa50a62f11d4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25533-cwe-835-loop-with-unreachable-exit--a378a04d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25533%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20agentfront%20enclave&amp;severity=medium&amp;id=6986f13ef9fa50a62f11d4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25516-cwe-79-improper-neutralization-of-i-42af5635</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25516%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69865d61f9fa50a62f35a6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25732-cwe-22-improper-limitation-of-a-pat-324d0834</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25732%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zauberzeug%20nicegui&amp;severity=high&amp;id=69865d61f9fa50a62f35a6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25544-cwe-89-improper-neutralization-of-s-972c134b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25544%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20payloadcms%20payload&amp;severity=critical&amp;id=69865d61f9fa50a62f35a6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25574-cwe-639-authorization-bypass-throug-7a20b4b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25574%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20payloadcms%20payload&amp;severity=medium&amp;id=69865d61f9fa50a62f35a6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2067-buffer-overflow-in-utt-520w-0003a5fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2067%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=698659ddf9fa50a62f342a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25580-cwe-918-server-side-request-forgery-f5772752</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25580%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pydantic%20pydantic-ai&amp;severity=high&amp;id=698659ddf9fa50a62f342a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25581-cwe-79-improper-neutralization-of-i-0ce012fa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25581%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samclarke%20SCEditor&amp;severity=medium&amp;id=698659ddf9fa50a62f342a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25592-cwe-22-improper-limitation-of-a-pat-e2f967bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25592%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20microsoft%20semantic-kernel&amp;severity=critical&amp;id=69865658f9fa50a62f32f7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25631-cwe-20-improper-input-validation-in-6b3e6e3a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25631%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69865658f9fa50a62f32f7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2066-buffer-overflow-in-utt-520w-62586b70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2066%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=698652d6f9fa50a62f31f1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25729-cwe-863-incorrect-authorization-in--cfcb0bb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25729%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20lintsinghua%20DeepAudit&amp;severity=low&amp;id=698652d6f9fa50a62f31f19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25632-cwe-502-deserialization-of-untruste-d8f5be65</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25632%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20WaterFutures%20EPyT-Flow&amp;severity=critical&amp;id=698652d6f9fa50a62f31f193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25634-cwe-119-improper-restriction-of-ope-9d9256c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25634%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=698652d6f9fa50a62f31f198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25731-cwe-1336-improper-neutralization-of-7ae283af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25731%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69864f52f9fa50a62f30f2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25635-cwe-22-improper-limitation-of-a-pat-59dcea01</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25635%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69864f52f9fa50a62f30f2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25636-cwe-22-improper-limitation-of-a-pat-e3fddcc9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25636%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69864f52f9fa50a62f30f2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2065-missing-authentication-in-flycatcher-167e45e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2065%3A%20Missing%20Authentication%20in%20Flycatcher%20Toys%20smART%20Pixelator&amp;severity=medium&amp;id=69864bcdf9fa50a62f2f48aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25640-cwe-22-improper-limitation-of-a-pat-d35b43b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25640%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pydantic%20pydantic-ai&amp;severity=high&amp;id=69864bcdf9fa50a62f2f48a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25586-cwe-74-improper-neutralization-of-s-3231fe20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25586%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69864849f9fa50a62f2e0357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25520-cwe-74-improper-neutralization-of-s-02efb643</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25520%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69864849f9fa50a62f2e0353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25587-cwe-94-improper-control-of-generati-62d69156</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25587%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69864849f9fa50a62f2e035b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25641-cwe-367-time-of-check-time-of-use-t-bbaa079a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25641%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69864849f9fa50a62f2e035f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2064-cross-site-scripting-in-portabilis-i-c65cf604</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2064%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=698644c6f9fa50a62f2bebfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25727-cwe-121-stack-based-buffer-overflow-3730143c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25727%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20time-rs%20time&amp;severity=medium&amp;id=69864142f9fa50a62f2a749a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15320-multiple-binds-to-the-same-port-in--556db5fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15320%3A%20Multiple%20Binds%20to%20the%20Same%20Port%20in%20Tanium%20Tanium%20Client&amp;severity=low&amp;id=69864142f9fa50a62f2a748b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25643-cwe-78-improper-neutralization-of-s-d503d67d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25643%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20blakeblackshear%20frigate&amp;severity=critical&amp;id=69864142f9fa50a62f2a7496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1709-key-exchange-without-entity-authenti-a891ad25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1709%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=critical&amp;id=69864142f9fa50a62f2a748e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25751-cwe-306-missing-authentication-for--0cffd6e6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25751%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=69863dc0f9fa50a62f29294f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25752-cwe-862-missing-authorization-in-fr-8a87669a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25752%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=69863dc0f9fa50a62f292953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25647-cwe-79-improper-neutralization-of-i-e4e851f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25647%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69863dc0f9fa50a62f292942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2063-os-command-injection-in-d-link-dir-8-a774c187</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2063%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=69863dc0f9fa50a62f29295a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25753-cwe-259-use-of-hard-coded-password--a874149c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25753%3A%20CWE-259%3A%20Use%20of%20Hard-coded%20Password%20in%20Praskla-Technology%20assessment-placipy&amp;severity=critical&amp;id=69863dc0f9fa50a62f292957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25650-cwe-200-exposure-of-sensitive-infor-ff59f3f8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25650%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20smn2gnt%20MCP-Salesforce&amp;severity=medium&amp;id=69863dc0f9fa50a62f292946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25651-cwe-601-url-redirection-to-untruste-9fd151ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25651%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20tgies%20client-certificate-auth&amp;severity=medium&amp;id=69863dc0f9fa50a62f29294b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2062-null-pointer-dereference-in-open5gs-d8fae311</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2062%3A%20NULL%20Pointer%20Dereference%20in%20Open5GS&amp;severity=medium&amp;id=69863a39f9fa50a62f278f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23989-cwe-863-incorrect-authorization-in--a5bf8855</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23989%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20opencloud-eu%20reva&amp;severity=high&amp;id=69863a39f9fa50a62f278f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69212-cwe-78-improper-neutralization-of-s-157548d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69212%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=critical&amp;id=69863332f9fa50a62f26379e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69214-cwe-89-improper-neutralization-of-s-8f7e3535</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69214%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69216-cwe-89-improper-neutralization-of-s-8ea4f4d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69216%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24416-cwe-89-improper-neutralization-of-s-67aa0e3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24416%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24417-cwe-89-improper-neutralization-of-s-241acae0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24417%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24418-cwe-89-improper-neutralization-of-s-c07ba405</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24418%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24419-cwe-89-improper-neutralization-of-s-7399c992</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24419%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69862fadf9fa50a62f2569ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2061-os-command-injection-in-d-link-dir-8-6024a112</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2061%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=69862fadf9fa50a62f2569be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24776-cwe-639-authorization-bypass-throug-2b34271e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24776%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20opf%20openproject&amp;severity=medium&amp;id=69862fadf9fa50a62f2569ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25725-cwe-501-trust-boundary-violation-in-2fdc4d3b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25725%3A%20CWE-501%3A%20Trust%20Boundary%20Violation%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69862fadf9fa50a62f2569bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25724-cwe-61-unix-symbolic-link-symlink-f-23f60526</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25724%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20anthropics%20claude-code&amp;severity=low&amp;id=69862fadf9fa50a62f2569b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25723-cwe-20-improper-input-validation-in-9f234855</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25723%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69862fadf9fa50a62f2569b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25722-cwe-20-improper-input-validation-in-cc4c5e6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25722%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69862fadf9fa50a62f2569b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24903-cwe-79-improper-neutralization-of-i-4bd86924</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24903%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AlgoNetLab%20OrcaStatLLM-Researcher&amp;severity=medium&amp;id=69862c29f9fa50a62f24b16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2060-sql-injection-in-code-projects-simpl-e2b121ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2060%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Blood%20Donor%20Management%20System&amp;severity=medium&amp;id=69862c29f9fa50a62f24b172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1769-cwe-79-improper-neutralization-of-in-28d7e798</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Xerox%20CentreWare&amp;severity=medium&amp;id=698628a5f9fa50a62f2311af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2059-sql-injection-in-sourcecodester-medi-b6c6ea64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2059%3A%20SQL%20Injection%20in%20SourceCodester%20Medical%20Center%20Portal%20Management%20System&amp;severity=medium&amp;id=6986219df9fa50a62f204ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2058-sql-injection-in-mathurvishal-cloudc-cd0c1b86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2058%3A%20SQL%20Injection%20in%20mathurvishal%20CloudClassroom-PHP-Project&amp;severity=medium&amp;id=69861a9bf9fa50a62f1c9098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2103-cwe-321-in-infor-syteline-erp-b46bd226</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2103%3A%20CWE-321%20in%20Infor%20SyteLine%20ERP&amp;severity=high&amp;id=69861a9bf9fa50a62f1c909f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25556-cwe-415-double-free-in-artifex-soft-dcf4f997</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25556%3A%20CWE-415%20Double%20Free%20in%20Artifex%20Software%20MuPDF&amp;severity=medium&amp;id=69861711f9fa50a62f1b4d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13523-cwe-79-improper-neutralization-of-i-f8a6390e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13523%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=high&amp;id=69861a9bf9fa50a62f1c90a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2057-sql-injection-in-sourcecodester-medi-4c938f79</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2057%3A%20SQL%20Injection%20in%20SourceCodester%20Medical%20Center%20Portal%20Management%20System&amp;severity=medium&amp;id=69860c85f9fa50a62f179c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-dknife-aitm-framework-targets-routers-d9cd4734</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20DKnife%20AitM%20Framework%20Targets%20Routers%20for%20Traffic%20Hijacking%2C%20Malware%20Delivery&amp;severity=medium&amp;id=6986fa66f9fa50a62f1ad180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2056-information-disclosure-in-d-link-dir-00e936e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2056%3A%20Information%20Disclosure%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=6985f76df9fa50a62f0e885b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-orders-removal-of-unsupported-edge-devices-to-2a1f9a00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Orders%20Removal%20of%20Unsupported%20Edge%20Devices%20to%20Reduce%20Federal%20Network%20Risk&amp;severity=medium&amp;id=6986fa66f9fa50a62f1ad183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13818-cwe-367-time-of-check-time-of-use-t-6c7110b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13818%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20ESET%20spol%20s.r.o.%20ESET%20Management%20Agent&amp;severity=high&amp;id=6985f065f9fa50a62f0bfdc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1337-cwe-117-improper-output-neutralizati-6f7d504c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1337%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=6985f065f9fa50a62f0bfdca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2055-information-disclosure-in-d-link-dir-28ce1991</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2055%3A%20Information%20Disclosure%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=6985e95cf9fa50a62f09632e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2054-information-disclosure-in-d-link-dir-88a5a513</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2054%3A%20Information%20Disclosure%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=6985e254f9fa50a62f069c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asian-state-backed-group-tgr-sta-1030-breaches-70--3a49f48b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asian%20State-Backed%20Group%20TGR-STA-1030%20Breaches%2070%20Government%2C%20Infrastructure%20Entities&amp;severity=critical&amp;id=6986fa66f9fa50a62f1ad186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2018-sql-injection-in-itsourcecode-school-8f784e6a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2018%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=6985ded1f9fa50a62f04f209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flickr-security-incident-tied-to-third-party-email-c41dc4c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flickr%20Security%20Incident%20Tied%20to%20Third-Party%20Email%20System&amp;severity=medium&amp;id=6985db1df9fa50a62f039236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/living-off-the-ai-the-next-evolution-of-attacker-t-8c48b37d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Living%20off%20the%20AI%3A%20The%20Next%20Evolution%20of%20Attacker%20Tradecraft&amp;severity=medium&amp;id=6985db1df9fa50a62f039239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-record-ddos-epsteins-hacker-eset-pro-e53f8d51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Record%20DDoS%2C%20Epstein%E2%80%99s%20Hacker%2C%20ESET%20Product%20Vulnerabilities&amp;severity=medium&amp;id=6985c986f9fa50a62ffbec3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-yourself-from-deepfake-scammers-and-0d63323e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20yourself%20from%20deepfake%20scammers%20and%20save%20your%20money%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6985d481f9fa50a62f005b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2017-stack-based-buffer-overflow-in-ip-co-6f3eb53a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2017%3A%20Stack-based%20Buffer%20Overflow%20in%20IP-COM%20W30AP&amp;severity=critical&amp;id=6985d445f9fa50a62f00465c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1293-cwe-79-improper-neutralization-of-in-ca10b6b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1293%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yoast%20Yoast%20SEO%20%E2%80%93%20Advanced%20SEO%20with%20real-time%20guidance%20and%20built-in%20AI&amp;severity=medium&amp;id=6985d445f9fa50a62f004656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2016-stack-based-buffer-overflow-in-happy-f72e311c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2016%3A%20Stack-based%20Buffer%20Overflow%20in%20happyfish100%20libfastcommon&amp;severity=medium&amp;id=6985d0c1f9fa50a62ffef782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2015-improper-authorization-in-portabilis-61cc936b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2015%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=6985c646f9fa50a62ffa8bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-samsung-knox-helps-stop-your-network-security--916665d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Samsung%20Knox%20Helps%20Stop%20Your%20Network%20Security%20Breach&amp;severity=medium&amp;id=6985c600f9fa50a62ffa4773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2014-sql-injection-in-itsourcecode-studen-b8b04a23</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2014%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6985bf2df9fa50a62ff79b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2013-sql-injection-in-itsourcecode-studen-96f5b5b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2013%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6985b828f9fa50a62ff43b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24928-cwe-680-integer-overflow-to-buffer--cedc569c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24928%3A%20CWE-680%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b4a0f9fa50a62ff2b5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24927-cwe-416-use-after-free-in-huawei-ha-d41614a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24927%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b4a0f9fa50a62ff2b5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24924-cwe-264-permissions-privileges-and--d7ebb004</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24924%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b4a0f9fa50a62ff2b5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24920-cwe-264-permissions-privileges-and--95c935c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24920%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b4a0f9fa50a62ff2b5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2012-sql-injection-in-itsourcecode-studen-85504d22</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2012%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24919-cwe-787-out-of-bounds-write-in-huaw-c1f5ecf7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24919%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24917-cwe-416-use-after-free-in-huawei-ha-c6b3a27c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24917%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dknife-implant-used-by-chinese-threat-actor-for-ad-85eb9b68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98DKnife%E2%80%99%20Implant%20Used%20by%20Chinese%20Threat%20Actor%20for%20Adversary-in-the-Middle%20Attacks&amp;severity=medium&amp;id=6985ac17f9fa50a62feef9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24916-cwe-200-exposure-of-sensitive-infor-5d1aff9f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24916%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24931-cwe-264-permissions-privileges-and--51f9960f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24931%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24930-cwe-362-concurrent-execution-using--1df2f85f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24930%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6985aa18f9fa50a62fee14da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24929-cwe-476-null-pointer-dereference-in-b2f28f2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24929%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee14a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-dydx-npm-and-pypi-packages-deliver-wal-b48b6b06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20dYdX%20npm%20and%20PyPI%20Packages%20Deliver%20Wallet%20Stealers%20and%20RAT%20Malware&amp;severity=critical&amp;id=6986fa66f9fa50a62f1ad189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24923-cwe-264-permissions-privileges-and--bd9abb0b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24923%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee14a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24922-cwe-122-heap-based-buffer-overflow--81258aa2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24922%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee149e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2011-sql-injection-in-itsourcecode-studen-12ce78e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2011%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6985aa18f9fa50a62fee14de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24921-cwe-125-out-of-bounds-read-in-huawe-35a79110</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24921%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee1499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24918-cwe-476-null-pointer-dereference-in-e8be9952</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24918%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee1493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24915-cwe-125-out-of-bounds-read-in-huawe-944f6a8d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24915%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee148d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24914-cwe-416-use-after-free-in-huawei-ha-f2761965</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24914%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee1488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1252-cwe-79-improper-neutralization-of-in-58f0ff5f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1252%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Events%20Listing%20Widget&amp;severity=medium&amp;id=6985aa16f9fa50a62fee146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1785-cwe-352-cross-site-request-forgery-c-8f414448</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1785%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codesnippetspro%20Code%20Snippets&amp;severity=medium&amp;id=6985aa16f9fa50a62fee1480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1499-cwe-862-missing-authorization-in-rev-14b5cd1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1499%3A%20CWE-862%20Missing%20Authorization%20in%20revmakx%20WP%20Duplicate%20%E2%80%93%20WordPress%20Migration%20Plugin&amp;severity=high&amp;id=6985aa16f9fa50a62fee1475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21643-execute-unauthorized-code-or-comman-8dd9adbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21643%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=critical&amp;id=6985a694f9fa50a62fec94b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24926-cwe-787-out-of-bounds-write-in-huaw-9b1e0a43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24926%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6985a694f9fa50a62fec94b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24925-cwe-122-heap-based-buffer-overflow--c04eedde</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24925%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6985a694f9fa50a62fec94b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2010-improper-authorization-in-sanluan-pu-cb9ffd81</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2010%3A%20Improper%20Authorization%20in%20Sanluan%20PublicCMS&amp;severity=low&amp;id=6985a30df9fa50a62feb0263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-smartermail-vulnerability-exploited-in-ra-79702390</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20SmarterMail%20Vulnerability%20Exploited%20in%20Ransomware%20Attacks&amp;severity=critical&amp;id=69859f56f9fa50a62fe96c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21626-cwe-200-exposure-of-sensitive-infor-9420fb85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21626%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Stackideas.com%20EasyDiscuss%20extension%20for%20Joomla&amp;severity=critical&amp;id=69859f99f9fa50a62fe9b84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2009-improper-access-controls-in-sourceco-e91a29fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2009%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Gas%20Agency%20Management%20System&amp;severity=medium&amp;id=69859c04f9fa50a62fe7fff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1279-cwe-79-improper-neutralization-of-in-63248df4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1279%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberlord92%20Employee%20Directory%20%E2%80%93%20Staff%20Directory%20and%20Listing&amp;severity=medium&amp;id=69859c04f9fa50a62fe7fff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2008-code-injection-in-abhiphile-fermat-m-bc737cbc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2008%3A%20Code%20Injection%20in%20abhiphile%20fermat-mcp&amp;severity=medium&amp;id=698594fdf9fa50a62fe4ff60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1401-cwe-79-improper-neutralization-of-in-0602bdf2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1401%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Tune%20Library&amp;severity=medium&amp;id=69859179f9fa50a62fe3ac95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1909-cwe-79-improper-neutralization-of-in-60807293</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1909%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20x-raym%20WaveSurfer-WP&amp;severity=medium&amp;id=69859179f9fa50a62fe3aca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10753-cwe-862-missing-authorization-in-cy-1fb1bc43</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10753%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20OAuth%20Single%20Sign%20On%20%E2%80%93%20SSO%20(OAuth%20Client)&amp;severity=medium&amp;id=69859179f9fa50a62fe3ac90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1808-cwe-79-improper-neutralization-of-in-4758efaf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ravanh%20Orange%20Comfort%2B%20accessibility%20toolbar%20for%20WordPress&amp;severity=medium&amp;id=69859179f9fa50a62fe3ac9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1888-cwe-79-improper-neutralization-of-in-c37efb99</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20Docus%20%E2%80%93%20YouTube%20Video%20Playlist&amp;severity=medium&amp;id=69859179f9fa50a62fe3aca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2000-command-injection-in-dcn-dcme-320-dd565023</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2000%3A%20Command%20Injection%20in%20DCN%20DCME-320&amp;severity=medium&amp;id=69859179f9fa50a62fe3acae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0521-cwe-79-improper-neutralization-of-in-78e4886a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TYDAC%20AG%20MAP%2B&amp;severity=medium&amp;id=69858a71f9fa50a62fe12635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1998-memory-corruption-in-micropython-de7944de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1998%3A%20Memory%20Corruption%20in%20micropython&amp;severity=medium&amp;id=69858a71f9fa50a62fe12639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-opus-46-finds-500-high-severity-flaws-acros-a52ee154</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Opus%204.6%20Finds%20500%2B%20High-Severity%20Flaws%20Across%20Major%20Open-Source%20Libraries&amp;severity=high&amp;id=6985ab7ef9fa50a62feebb3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0598-unverified-ownership-in-red-hat-red--f43d1151</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0598%3A%20Unverified%20Ownership%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=medium&amp;id=698586ecf9fa50a62fdfc3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1991-null-pointer-dereference-in-libuvc-69eef9e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1991%3A%20NULL%20Pointer%20Dereference%20in%20libuvc&amp;severity=medium&amp;id=69857fe4f9fa50a62fdb49fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/questions-raised-over-cisas-silent-ransomware-upda-58d91f96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Concerns%20Raised%20Over%20CISA%E2%80%99s%20Silent%20Ransomware%20Updates%20in%20KEV%20Catalog&amp;severity=medium&amp;id=69857c2ef9fa50a62fd7fa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1990-null-pointer-dereference-in-oatpp-d9a99a9a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1990%3A%20NULL%20Pointer%20Dereference%20in%20oatpp&amp;severity=medium&amp;id=698578ddf9fa50a62fd6124f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1979-use-after-free-in-mruby-8dcbc7ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1979%3A%20Use%20After%20Free%20in%20mruby&amp;severity=medium&amp;id=698571d4f9fa50a62fd2f1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1978-direct-request-in-kalyan02-nanocms-1f2f6f1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1978%3A%20Direct%20Request%20in%20kalyan02%20NanoCMS&amp;severity=medium&amp;id=698571d4f9fa50a62fd2f1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1977-code-injection-in-isaacwasserman-mcp-e165d2f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1977%3A%20Code%20Injection%20in%20isaacwasserman%20mcp-vegalite-server&amp;severity=medium&amp;id=69856acdf9fa50a62fd0a378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15566-cwe-20-improper-input-validation-in-13d5f4d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15566%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69856acdf9fa50a62fd0a375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1976-null-pointer-dereference-in-free5gc-f38e3daa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1976%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC&amp;severity=medium&amp;id=69855cbcf9fa50a62fab62bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1975-null-pointer-dereference-in-free5gc-55cfdd29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1975%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC&amp;severity=medium&amp;id=69855cbcf9fa50a62fab62b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1228-cwe-639-authorization-bypass-through-8f359c4d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1228%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20bplugins%20Timeline%20Block%20%E2%80%93%20Beautiful%20Timeline%20Builder%20for%20WordPress%20(Vertical%20%26%20Horizontal%20Timelines)&amp;severity=medium&amp;id=69855cbcf9fa50a62fab62af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1974-denial-of-service-in-free5gc-b15fdc8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1974%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69854eadf9fa50a62f861452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1973-null-pointer-dereference-in-free5gc-f3729069</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1973%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC&amp;severity=medium&amp;id=69854eadf9fa50a62f861449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1972-use-of-default-credentials-in-edimax-9d49fcd2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1972%3A%20Use%20of%20Default%20Credentials%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=69854420f9fa50a62f6d5e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1971-cross-site-scripting-in-edimax-br-62-8f3ccaeb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1971%3A%20Cross%20Site%20Scripting%20in%20Edimax%20BR-6288ACL&amp;severity=medium&amp;id=69853611f9fa50a62f554b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-06-662f18a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-06&amp;severity=medium&amp;id=698683d6f9fa50a62f3de56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70963-na-736a7259</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70963%3A%20n%2Fa&amp;severity=high&amp;id=69862c29f9fa50a62f24b16c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-06-c30c479b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-06&amp;severity=low&amp;id=6985f02ff9fa50a62f0bc28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23623-cwe-285-improper-authorization-in-c-6b31744d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23623%3A%20CWE-285%3A%20Improper%20Authorization%20in%20CollaboraOnline%20online&amp;severity=medium&amp;id=69852b85f9fa50a62f4b244c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32393-cwe-770-allocation-of-resources-wit-1d72a91f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32393%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Significant-Gravitas%20AutoGPT&amp;severity=high&amp;id=6985247ef9fa50a62f494945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0391-cwe-451-user-interface-ui-misreprese-94d23b62</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0391%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=698519f1f9fa50a62f46352c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24300-cwe-284-improper-access-control-in--cef48617</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24300%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Front%20Door&amp;severity=critical&amp;id=698519f1f9fa50a62f463532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21532-cwe-200-exposure-of-sensitive-infor-3d224926</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21532%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Functions&amp;severity=high&amp;id=698519f1f9fa50a62f46352f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24302-cwe-284-improper-access-control-in--330d1a07</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24302%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20ARC&amp;severity=high&amp;id=698519f1f9fa50a62f463535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1970-open-redirect-in-edimax-br-6258n-0817e1aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1970%3A%20Open%20Redirect%20in%20Edimax%20BR-6258n&amp;severity=medium&amp;id=6985166df9fa50a62f44dae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1964-improper-access-controls-in-wekan-2d192d3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1964%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=69850f65f9fa50a62f416c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25815-cwe-1394-use-of-default-cryptograph-6fea7ca2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25815%3A%20CWE-1394%20Use%20of%20Default%20Cryptographic%20Key%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=69850be1f9fa50a62f3fbedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1963-improper-access-controls-in-wekan-fe2f298c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1963%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6985085df9fa50a62f3df52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1962-improper-access-controls-in-wekan-c2fef78b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1962%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=69850155f9fa50a62f38ceec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0106-elevation-of-privilege-in-google-and-6d6e3412</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0106%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=6984fdd1f9fa50a62f37f349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/knife-cutting-the-edge-disclosing-a-china-nexus-ga-66cd80c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Knife%20Cutting%20the%20Edge%3A%20Disclosing%20a%20China-nexus%20gateway-monitoring%20AitM%20framework&amp;severity=medium&amp;id=69850155f9fa50a62f38cca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-marco-stealer-93f02107</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20Marco%20Stealer&amp;severity=medium&amp;id=698504d9f9fa50a62f3b1692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12131-cwe-20-improper-input-validation-in-0987bcd4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12131%3A%20CWE-20%20Improper%20Input%20Validation%20in%20silabs.com%20Simplicity%20SDK&amp;severity=medium&amp;id=6984fa4df9fa50a62f36955a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-clickfix-variant-crashfix-deploying-python-rem-f058ad59</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Clickfix%20variant%20&apos;CrashFix&apos;%20deploying%20Python%20Remote%20Access%20Trojan&amp;severity=medium&amp;id=698504d9f9fa50a62f3b1681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1301-cwe-787-out-of-bounds-write-in-o6-au-879560eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1301%3A%20CWE-787%20Out-of-bounds%20Write%20in%20o6%20Automation%20GmbH%20Open62541&amp;severity=medium&amp;id=6984ec3ef9fa50a62f33cd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15311-improper-neutralization-of-escape-m-edc8b66a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15311%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Tanium%20Tanium%20Appliance&amp;severity=high&amp;id=69859ff5f9fa50a62fe9e7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15312-improper-encoding-or-escaping-of-ou-51c043ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15312%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Tanium%20Tanium%20Appliance&amp;severity=medium&amp;id=69859ff5f9fa50a62fe9e7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15324-improper-link-resolution-before-fil-8f546f57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15324%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Engage&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15325-improper-neutralization-of-special--d3b59607</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15325%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tanium%20Discover&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15326-missing-authorization-in-tanium-pat-414d9d45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15326%3A%20Missing%20Authorization%20in%20Tanium%20Patch&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15327-missing-authorization-in-tanium-dep-e25b6408</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15327%3A%20Missing%20Authorization%20in%20Tanium%20Deploy&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15328-improper-link-resolution-before-fil-fed71ada</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15328%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Enforce&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15330-missing-authorization-in-tanium-dep-f1311ee9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15330%3A%20Missing%20Authorization%20in%20Tanium%20Deploy&amp;severity=high&amp;id=69859ff7f9fa50a62fe9e81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15331-incomplete-cleanup-in-tanium-connec-a0456176</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15331%3A%20Incomplete%20Cleanup%20in%20Tanium%20Connect&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15329-insertion-of-sensitive-information--a9ee4527</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15329%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15332-insertion-of-sensitive-information--9ebb3c07</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15332%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15321-untrusted-search-path-in-tanium-tan-778dfdad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15321%3A%20Untrusted%20Search%20Path%20in%20Tanium%20Tanium%20Appliance&amp;severity=low&amp;id=69859ff5f9fa50a62fe9e7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15333-incorrect-default-permissions-in-ta-8213b994</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15333%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15334-incorrect-default-permissions-in-ta-8e0ea7cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15334%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e82b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15335-incorrect-default-permissions-in-ta-55fe72a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15335%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15341-incorrect-default-permissions-in-ta-c307931a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15341%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Benchmark&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15339-incorrect-default-permissions-in-ta-ed061b0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15339%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Discover&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15340-incorrect-default-permissions-in-ta-53caca46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15340%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Comply&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15338-incorrect-default-permissions-in-ta-35644461</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15338%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Partner%20Integration&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15336-incorrect-default-permissions-in-ta-f7cef522</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15336%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Performance&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15337-incorrect-default-permissions-in-ta-7727e3bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15337%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Patch&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15342-incorrect-authorization-in-tanium-r-0a706410</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15342%3A%20Incorrect%20Authorization%20in%20Tanium%20Reputation&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15323-improper-certificate-validation-in--7af141c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15323%3A%20Improper%20Certificate%20Validation%20in%20Tanium%20Tanium%20Appliance&amp;severity=low&amp;id=69859ff5f9fa50a62fe9e7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15343-incorrect-default-permissions-in-ta-7bf47121</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15343%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Enforce&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15289-missing-authorization-in-tanium-int-9de1c362</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15289%3A%20Missing%20Authorization%20in%20Tanium%20Interact&amp;severity=low&amp;id=69859ff5f9fa50a62fe9e7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58190-cwe-835-loop-with-unreachable-exit--10f3d197</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58190%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhtml&amp;severity=medium&amp;id=6984daa9f9fa50a62f30a64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47911-cwe-400-uncontrolled-resource-consu-5f96479a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47911%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhtml&amp;severity=medium&amp;id=6984daa9f9fa50a62f30a649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68121-cwe-295-improper-certificate-valida-798631b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68121%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Ftls&amp;severity=critical&amp;id=6984daa9f9fa50a62f30a655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15557-cwe-295-improper-certificate-valida-281f9df0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15557%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20H100%20v1&amp;severity=high&amp;id=6984daa9f9fa50a62f30a642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1707-vulnerability-in-pgadminorg-pgadmin--2ba0871a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1707%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=high&amp;id=6984daa9f9fa50a62f30a65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisurukimwolf-botnet-launches-record-setting-314-t-1f31ee95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AISURU%2FKimwolf%20Botnet%20Launches%20Record-Setting%2031.4%20Tbps%20DDoS%20Attack&amp;severity=medium&amp;id=6985ab7ef9fa50a62feebb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15551-cwe-95-improper-neutralization-of-d-7e26fcea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15551%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20MR200%20v5.2&amp;severity=medium&amp;id=69850155f9fa50a62f38cef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0715-cwe-522-insufficiently-protected-cre-a4864c39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0715%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Moxa%20UC-1200A%20Series&amp;severity=high&amp;id=6984d01df9fa50a62f2f1648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0714-cwe-319-cleartext-transmission-of-se-2a690fab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0714%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Moxa%20UC-1200A%20Series&amp;severity=high&amp;id=6984d01df9fa50a62f2f1645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/siem-rules-for-detecting-exploitation-of-vulnerabi-6ead71e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SIEM%20Rules%20for%20detecting%20exploitation%20of%20vulnerabilities%20in%20FortiCloud%20SSO&amp;severity=medium&amp;id=6984bec7f9fa50a62f2b18a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/substack-discloses-security-incident-after-hacker--8fa2c08d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Substack%20Discloses%20Security%20Incident%20After%20Hacker%20Leaks%20Data&amp;severity=medium&amp;id=6984b3caf9fa50a62f28d1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14150-cwe-497-exposure-of-sensitive-syste-e1ebc8d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14150%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20webMethods%20Integration%20(on%20prem)%20-%20Integration%20Server&amp;severity=medium&amp;id=6984a5fef9fa50a62f25cb61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-network-of-150-cloned-law-firm--46ad764a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20Network%20of%20150%20Cloned%20Law%20Firm%20Websites%20in%20AI-Powered%20Scam%20Campaign&amp;severity=medium&amp;id=6984a5baf9fa50a62f25b16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13491-cwe-426-untrusted-search-path-in-ib-3dfcb3be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13491%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20IBM%20App%20Connect%20Enterprise%20Certified%20Container&amp;severity=medium&amp;id=6984a5fef9fa50a62f25cb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vs-code-configs-expose-github-codespaces-to-attack-1a4b3777</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VS%20Code%20Configs%20Expose%20GitHub%20Codespaces%20to%20Attacks&amp;severity=medium&amp;id=69849eb2f9fa50a62f23904d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13379-cwe-89-improper-neutralization-of-s-12712165</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13379%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Aspera%20Console&amp;severity=high&amp;id=69849ef7f9fa50a62f23a791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1927-cwe-862-missing-authorization-in-wps-78170b4f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1927%3A%20CWE-862%20Missing%20Authorization%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69849ef7f9fa50a62f23a797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1523-cwe-22-improper-limitation-of-a-path-7d7ad643</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1523%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PRIMION%20DIGITEK%20Digitek%20ADT1100&amp;severity=high&amp;id=69849ef7f9fa50a62f23a794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-codespaces-rce-asyncrat-c2-byo-685fa61c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Codespaces%20RCE%2C%20AsyncRAT%20C2%2C%20BYOVD%20Abuse%2C%20AI%20Cloud%20Intrusions%20%26%2015%2B%20Stories&amp;severity=low&amp;id=6985ab7ef9fa50a62feebb45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italy-averted-russian-linked-cyberattacks-targetin-10aca99a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italy%20Averted%20Russian-Linked%20Cyberattacks%20Targeting%20Winter%20Olympics%20Websites%2C%20Foreign%20Minister%20Says&amp;severity=medium&amp;id=698490a2f9fa50a62f2021f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/systembc-infects-10000-devices-after-defying-law-e-c29c0853</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SystemBC%20Infects%2010%2C000%20Devices%20After%20Defying%20Law%20Enforcement%20Takedown&amp;severity=medium&amp;id=69848d1ef9fa50a62f1f7106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1517-sql-injection-in-iomad-e7db11b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1517%3A%20SQL%20Injection%20in%20iomad&amp;severity=medium&amp;id=698489cef9fa50a62f1eaebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23572-cwe-863-incorrect-authorization-in--f5067c5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23572%3A%20CWE-863%20Incorrect%20Authorization%20in%20TeamViewer%20Remote&amp;severity=high&amp;id=69848649f9fa50a62f1d4e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1966-cwe-522-insufficiently-protected-cre-7d986d08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1966%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20YugabyteDB%20Inc%20YugabyteDB%20Anywhere&amp;severity=low&amp;id=69848649f9fa50a62f1d4e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-buyers-guide-to-ai-usage-control-76920303</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Buyer%E2%80%99s%20Guide%20to%20AI%20Usage%20Control&amp;severity=low&amp;id=6984828ff9fa50a62f1c6281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-sandbox-escape-could-lead-to-server-c-739fc28e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20N8n%20Sandbox%20Escape%20Could%20Lead%20to%20Server%20Compromise&amp;severity=critical&amp;id=69847f0ef9fa50a62f1b982d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23796-cwe-384-session-fixation-in-opensol-5a040fac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23796%3A%20CWE-384%20Session%20Fixation%20in%20OpenSolution%20Quick.Cart&amp;severity=medium&amp;id=69847f53f9fa50a62f1bc7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23797-cwe-256-plaintext-storage-of-a-pass-797f620f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23797%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20OpenSolution%20Quick.Cart&amp;severity=medium&amp;id=69847f53f9fa50a62f1bc7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberspy-group-hacked-governments-and-critical-inf-ddda7236</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberspy%20Group%20Hacked%20Governments%20and%20Critical%20Infrastructure%20in%2037%20Countries&amp;severity=critical&amp;id=69847b8af9fa50a62f1a5253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infy-hackers-resume-operations-with-new-c2-servers-f9e8ec27</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infy%20Hackers%20Resume%20Operations%20with%20New%20C2%20Servers%20After%20Iran%20Internet%20Blackout%20Ends&amp;severity=medium&amp;id=6985ab7ef9fa50a62feebb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-f5-patch-high-severity-vulnerabilities-fcc1c1e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%2C%20F5%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=698469f7f9fa50a62f161065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1654-cwe-79-improper-neutralization-of-in-8981f875</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1654%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pkthree%20Peter%E2%80%99s%20Date%20Countdown&amp;severity=medium&amp;id=69846323f9fa50a62f145d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1294-cwe-918-server-side-request-forgery--60483ee7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1294%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20All%20In%20One%20Image%20Viewer%20Block%20%E2%80%93%20Gutenberg%20block%20to%20create%20image%20viewer%20with%20hyperlink&amp;severity=high&amp;id=69846323f9fa50a62f145d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1271-cwe-639-authorization-bypass-through-4771f187</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1271%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69846323f9fa50a62f145d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14079-cwe-862-missing-authorization-in-el-9c52dc68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14079%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=69846323f9fa50a62f145d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/broken-phishing-urls-thu-feb-5th-91a9e90a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Broken%20Phishing%20URLs%2C%20(Thu%2C%20Feb%205th)&amp;severity=medium&amp;id=69845f80f9fa50a62f1386ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13416-cwe-862-missing-authorization-in-me-210f4d44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13416%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69845894f9fa50a62f0ebbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1319-cwe-79-improper-neutralization-of-in-fa48ce32</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1319%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Robin%20Image%20Optimizer%20%E2%80%93%20Unlimited%20Image%20Optimization%20%26%20WebP%20Converter&amp;severity=medium&amp;id=69845894f9fa50a62f0ebbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-script-delivering-more-maliciousness-wed-c446b82d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Script%20Delivering%20More%20Maliciousness%2C%20(Wed%2C%20Feb%204th)&amp;severity=medium&amp;id=69831349f9fa50a62f7d42ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10258-vulnerability-in-nokia-infinera-dna-360ae349</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10258%3A%20Vulnerability%20in%20Nokia%20Infinera%20DNA&amp;severity=medium&amp;id=69844701f9fa50a62f0a303c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1268-cwe-79-improper-neutralization-of-in-5304465d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20Dynamic%20Widget%20Content&amp;severity=medium&amp;id=69843ff8f9fa50a62f08b1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0867-cwe-79-improper-neutralization-of-in-840f2989</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catchthemes%20Essential%20Widgets&amp;severity=medium&amp;id=69843ff8f9fa50a62f08b1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1246-cwe-22-improper-limitation-of-a-path-526d43a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1246%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20shortpixel%20ShortPixel%20Image%20Optimizer%20%E2%80%93%20Optimize%20Images%2C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=69843ff8f9fa50a62f08b1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-flaw-cve-2026-25049-enables-system-co-cf711cd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20n8n%20Flaw%20CVE-2026-25049%20Enables%20System%20Command%20Execution%20via%20Malicious%20Workflows&amp;severity=critical&amp;id=698438bcf9fa50a62f070048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15080-cwe-1284-improper-validation-of-spe-9add849f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15080%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-R%20Series%20R08PCPU&amp;severity=high&amp;id=69842e66f9fa50a62f04ce53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-nginx-configurations-enable-large-scale--da34b7ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20NGINX%20Configurations%20Enable%20Large-Scale%20Web%20Traffic%20Hijacking%20Campaign&amp;severity=medium&amp;id=69845e9ff9fa50a62f0ff3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61732-cwe-94-improper-control-of-generati-4ad2de62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61732%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Go%20toolchain%20cmd%2Fcgo&amp;severity=high&amp;id=6984194cf9fa50a62fffe422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10314-cwe-276-incorrect-default-permissio-cfc47e0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10314%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Mitsubishi%20Electric%20Corporation%20FREQSHIP-mini%20for%20Windows&amp;severity=high&amp;id=69840b3cf9fa50a62fd8cac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11730-cwe-78-improper-neutralization-of-s-b9faa684</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11730%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=high&amp;id=6983fd2df9fa50a62fcc4d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1898-improper-access-controls-in-wekan-b728455b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1898%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6983eb98f9fa50a62fbfb9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1897-missing-authorization-in-wekan-ec8a41f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1897%3A%20Missing%20Authorization%20in%20WeKan&amp;severity=medium&amp;id=6983eb98f9fa50a62fbfb9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69619-na-78246a2d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69619%3A%20n%2Fa&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70073-na-3ff827a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70073%3A%20n%2Fa&amp;severity=high&amp;id=69859ff8f9fa50a62fe9e87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-05-a9f0df41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-05&amp;severity=medium&amp;id=69853256f9fa50a62f4cfaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70792-na-c3cfa596</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70792%3A%20n%2Fa&amp;severity=medium&amp;id=6984d01df9fa50a62f2f1641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70791-na-0ebc3c51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70791%3A%20n%2Fa&amp;severity=medium&amp;id=6984d01df9fa50a62f2f163d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69906-na-a2be4139</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69906%3A%20n%2Fa&amp;severity=high&amp;id=6984c591f9fa50a62f2cfd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68723-na-6404ef74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68723%3A%20n%2Fa&amp;severity=critical&amp;id=6984c591f9fa50a62f2cfd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68643-na-8681c687</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68643%3A%20n%2Fa&amp;severity=medium&amp;id=6984c591f9fa50a62f2cfd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68722-na-8485241c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68722%3A%20n%2Fa&amp;severity=high&amp;id=6984c20ef9fa50a62f2c40b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68721-na-c787cafc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68721%3A%20n%2Fa&amp;severity=high&amp;id=6984c20ef9fa50a62f2c40b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-05-941c64b9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-05&amp;severity=low&amp;id=69844347f9fa50a62f09474c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1896-improper-access-controls-in-wekan-f79ae18a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1896%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6983da05f9fa50a62fb4deb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13192-cwe-89-improper-neutralization-of-s-c321160a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13192%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=high&amp;id=6983d681f9fa50a62fb4242b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22873-cwe-23-relative-path-traversal-in-g-9adb9cb5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22873%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Go%20standard%20library%20os&amp;severity=low&amp;id=6983d2fdf9fa50a62fb3480c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1895-improper-access-controls-in-wekan-cd94eaae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1895%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6983d2fdf9fa50a62fb34813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1894-improper-authorization-in-wekan-9480052e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1894%3A%20Improper%20Authorization%20in%20WeKan&amp;severity=medium&amp;id=6983cbf5f9fa50a62fb21043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62616-cwe-918-server-side-request-forgery-1eb6646c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62616%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Significant-Gravitas%20AutoGPT&amp;severity=critical&amp;id=6983cbf5f9fa50a62fb21040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62615-cwe-918-server-side-request-forgery-8957beac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62615%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Significant-Gravitas%20AutoGPT&amp;severity=critical&amp;id=6983cbf5f9fa50a62fb2103d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22038-cwe-532-insertion-of-sensitive-info-0f9ba13b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22038%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Significant-Gravitas%20AutoGPT&amp;severity=high&amp;id=6983cbf5f9fa50a62fb2104b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25585-cwe-119-improper-restriction-of-ope-44587225</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25585%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6983c871f9fa50a62fb141d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25584-cwe-119-improper-restriction-of-ope-1b3a9c09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25584%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6983c4edf9fa50a62fb05c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25583-cwe-119-improper-restriction-of-ope-469bbf3b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25583%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6983c4edf9fa50a62fb05c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25582-cwe-122-heap-based-buffer-overflow--03f3cc92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25582%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6983c4edf9fa50a62fb05c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25541-cwe-680-integer-overflow-to-buffer--6663e742</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25541%3A%20CWE-680%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20tokio-rs%20bytes&amp;severity=medium&amp;id=6983c4edf9fa50a62fb05c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1892-improper-authorization-in-wekan-3f983994</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1892%3A%20Improper%20Authorization%20in%20WeKan&amp;severity=low&amp;id=6983c4edf9fa50a62fb05c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25575-cwe-23-relative-path-traversal-in-t-324d75da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25575%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20TUM-Dev%20NavigaTUM&amp;severity=high&amp;id=69844e6bf9fa50a62f0c7c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25547-cwe-1333-inefficient-regular-expres-7c6a0894</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25547%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20isaacs%20brace-expansion&amp;severity=critical&amp;id=6983c169f9fa50a62faf7b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25546-cwe-78-improper-neutralization-of-s-053c9612</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25546%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Coding-Solo%20godot-mcp&amp;severity=high&amp;id=6983c169f9fa50a62faf7b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25543-cwe-116-improper-encoding-or-escapi-f7cedb9f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25543%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20mganss%20HtmlSanitizer&amp;severity=medium&amp;id=6983c169f9fa50a62faf7afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25539-cwe-22-improper-limitation-of-a-pat-e66d7a68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25539%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=6983c169f9fa50a62faf7af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25538-cwe-862-missing-authorization-in-de-5e832b37</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25538%3A%20CWE-862%3A%20Missing%20Authorization%20in%20devtron-labs%20devtron&amp;severity=high&amp;id=6983bde5f9fa50a62fae8c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1884-server-side-request-forgery-in-zenta-c814586e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1884%3A%20Server-Side%20Request%20Forgery%20in%20ZenTao&amp;severity=medium&amp;id=6983bde5f9fa50a62fae8c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25537-cwe-843-access-of-resource-using-in-8491fb8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25537%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Keats%20jsonwebtoken&amp;severity=medium&amp;id=6983bde5f9fa50a62fae8c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25536-cwe-362-concurrent-execution-using--bd6c4c0a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25536%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20modelcontextprotocol%20typescript-sdk&amp;severity=high&amp;id=6983bde5f9fa50a62fae8c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25526-cwe-1336-improper-neutralization-of-c4a73d18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25526%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20HubSpot%20jinjava&amp;severity=critical&amp;id=6983bde5f9fa50a62fae8c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25523-cwe-200-exposure-of-sensitive-infor-e8d82368</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25523%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20OpenMage%20magento-lts&amp;severity=medium&amp;id=6983ba62f9fa50a62fae1dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51451-cwe-644-improper-neutralization-of--1ba86212</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51451%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Concert&amp;severity=medium&amp;id=6983ba62f9fa50a62fae1db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25521-cwe-1321-improperly-controlled-modi-dba4704a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25521%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20locutusjs%20locutus&amp;severity=critical&amp;id=6983ba62f9fa50a62fae1db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43181-cwe-613-insufficient-session-expira-5718473a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43181%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Concert&amp;severity=medium&amp;id=6983ba62f9fa50a62fae1db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40685-cwe-352-cross-site-request-forgery--0f2bbc2e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40685%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20Operations%20Analytics%20-%20Log%20Analysis&amp;severity=medium&amp;id=6983ba62f9fa50a62fae1dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2134-cwe-410-in-ibm-jazz-reporting-servic-2546c7b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2134%3A%20CWE-410%20in%20IBM%20Jazz%20Reporting%20Service&amp;severity=low&amp;id=6983b6ddf9fa50a62fad2903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27550-cwe-497-in-ibm-jazz-reporting-servi-3ce4912c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27550%3A%20CWE-497%20in%20IBM%20Jazz%20Reporting%20Service&amp;severity=low&amp;id=6983b6ddf9fa50a62fad2900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1823-cwe-770-allocation-of-resources-with-2af56f7f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1823%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Jazz%20Reporting%20Service&amp;severity=low&amp;id=6983b6ddf9fa50a62fad28fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39724-cwe-770-allocation-of-resources-wit-145a8136</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39724%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20Big%20SQL%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=6983b359f9fa50a62fac7189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25511-cwe-918-server-side-request-forgery-0d29fa11</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25511%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Intermesh%20groupoffice&amp;severity=high&amp;id=6983afd6f9fa50a62fabdb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25512-cwe-78-improper-neutralization-of-s-02b8f466</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25512%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=6983afd7f9fa50a62fabdb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15555-stack-based-buffer-overflow-in-open-9dbf52dc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15555%3A%20Stack-based%20Buffer%20Overflow%20in%20Open5GS&amp;severity=medium&amp;id=6983afd5f9fa50a62fabdb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25499-cwe-1188-insecure-default-initializ-781502b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25499%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20bpg%20terraform-provider-proxmox&amp;severity=high&amp;id=6983afd6f9fa50a62fabdb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13375-cwe-250-in-ibm-common-cryptographic-53b57f31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13375%3A%20CWE-250%20in%20IBM%20Common%20Cryptographic%20Architecture&amp;severity=critical&amp;id=6983afd5f9fa50a62fabdb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1554-cwe-91-xml-injection-aka-blind-xpath-e4a16966</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1554%3A%20CWE-91%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20Drupal%20Central%20Authentication%20System%20(CAS)%20Server&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1553-cwe-863-incorrect-authorization-in-d-5b55da28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1553%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Drupal%20Canvas&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0948-cwe-288-authentication-bypass-using--9cc423e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0948%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Microsoft%20Entra%20ID%20SSO%20Login&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0947-cwe-79-improper-neutralization-of-in-c4082b1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0947%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20AT%20Internet%20Piano%20Analytics&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0946-cwe-79-improper-neutralization-of-in-fc20a16b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0946%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20AT%20Internet%20SmartTag&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0945-cwe-267-privilege-defined-with-unsaf-13a0d9ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0945%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Drupal%20Role%20Delegation&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0944-cwe-754-improper-check-for-unusual-o-604f67c0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0944%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Drupal%20Group%20invite&amp;severity=medium&amp;id=6983ac51f9fa50a62faacb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/they-got-in-through-sonicwall-then-they-tried-to-k-d2ba1a4c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=They%20Got%20In%20Through%20SonicWall.%20Then%20They%20Tried%20to%20Kill%20Every%20Security%20Tool&amp;severity=medium&amp;id=69847bd0f9fa50a62f1a71f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25505-cwe-306-missing-authentication-for--d2caa7ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25505%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20maziggy%20bambuddy&amp;severity=critical&amp;id=6983a8cef9fa50a62fa9fe88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25513-cwe-89-improper-neutralization-of-s-b2b7666b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25513%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NeoRazorX%20facturascripts&amp;severity=high&amp;id=6983a8cef9fa50a62fa9fe8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25514-cwe-20-improper-input-validation-in-d581a1b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25514%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20NeoRazorX%20facturascripts&amp;severity=high&amp;id=6983a8cef9fa50a62fa9fe91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25161-cwe-22-improper-limitation-of-a-pat-7235ac0e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25161%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AlistGo%20alist&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25160-cwe-295-improper-certificate-valida-d1ead323</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25160%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20AlistGo%20alist&amp;severity=critical&amp;id=6983a549f9fa50a62fa8d0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24884-cwe-59-improper-link-resolution-bef-fb097a83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24884%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20node-modules%20compressing&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25145-cwe-22-improper-limitation-of-a-pat-2199e198</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25145%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=6983a549f9fa50a62fa8d0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25143-cwe-78-improper-neutralization-of-s-4f8716d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25143%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chainguard-dev%20melange&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24844-cwe-78-improper-neutralization-of-s-1f9ed088</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24844%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chainguard-dev%20melange&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24843-cwe-22-improper-limitation-of-a-pat-9bfd519a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24843%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20melange&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23897-cwe-1333-inefficient-regular-expres-a642da5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23897%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20apollographql%20apollo-server&amp;severity=high&amp;id=69839e42f9fa50a62fa72d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25140-cwe-400-uncontrolled-resource-consu-960ed904</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25140%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20chainguard-dev%20apko&amp;severity=high&amp;id=69839abdf9fa50a62fa5f777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25121-cwe-23-relative-path-traversal-in-c-c53a6503</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25121%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20chainguard-dev%20apko&amp;severity=high&amp;id=69839abdf9fa50a62fa5f76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25122-cwe-400-uncontrolled-resource-consu-2aca803e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25122%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20chainguard-dev%20apko&amp;severity=medium&amp;id=69839abdf9fa50a62fa5f773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0536-cwe-787-out-of-bounds-write-in-autod-89def5dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0536%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69839031f9fa50a62fa26932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25508-cwe-125-out-of-bounds-read-in-espre-1863452a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25508%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=69838cacf9fa50a62fa09397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25507-cwe-416-use-after-free-in-espressif-c761e816</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25507%3A%20CWE-416%3A%20Use%20After%20Free%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=69838cacf9fa50a62fa0938d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25532-cwe-191-integer-underflow-wrap-or-w-0c7438cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25532%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=69838cacf9fa50a62fa093a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-develops-scanner-to-detect-backdoors-in--63166ba0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Develops%20Scanner%20to%20Detect%20Backdoors%20in%20Open-Weight%20Large%20Language%20Models&amp;severity=low&amp;id=69845e9ff9fa50a62f0ff3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25139-cwe-125-out-of-bounds-read-in-riot--c8e77efd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25139%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20RIOT-OS%20RIOT&amp;severity=high&amp;id=6983892af9fa50a62fa00a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69215-cwe-89-improper-neutralization-of-s-8b59e75a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69215%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=6983892af9fa50a62fa00a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69213-cwe-89-improper-neutralization-of-s-274b91ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69213%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=6983892af9fa50a62fa00a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21893-cwe-78-improper-neutralization-of-s-384e4de1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21893%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=6983892af9fa50a62fa00a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64712-cwe-22-improper-limitation-of-a-pat-2ced3a68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64712%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unstructured-IO%20unstructured&amp;severity=critical&amp;id=6983892af9fa50a62fa00a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deadvax-malware-campaign-deploys-asyncrat-via-ipfs-11135850</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DEAD%23VAX%20Malware%20Campaign%20Deploys%20AsyncRAT%20via%20IPFS-Hosted%20VHD%20Phishing%20Files&amp;severity=medium&amp;id=69845e9ff9fa50a62f0ff3af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22044-cwe-89-improper-neutralization-of-s-10a87eb9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22044%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69838221f9fa50a62f9dc5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23624-cwe-384-session-fixation-in-glpi-pr-c85ebecb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23624%3A%20CWE-384%3A%20Session%20Fixation%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69838221f9fa50a62f9dc5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22247-cwe-918-server-side-request-forgery-ef065731</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22247%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69838221f9fa50a62f9dc5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25115-cwe-693-protection-mechanism-failur-a8a0d342</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25115%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25056-cwe-434-unrestricted-upload-of-file-ac0e62a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25056%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25055-cwe-22-improper-limitation-of-a-pat-ef87be5f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25055%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69837ea2f9fa50a62f9d191e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25054-cwe-80-improper-neutralization-of-s-f40600b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25054%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69837ea2f9fa50a62f9d191a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25053-cwe-78-improper-neutralization-of-s-73c200fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25053%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25052-cwe-367-time-of-check-time-of-use-t-93438876</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25052%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25051-cwe-79-improper-neutralization-of-i-cbd425cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25051%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69837ea2f9fa50a62f9d190d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61917-cwe-668-exposure-of-resource-to-wro-3f5a5af1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61917%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69837ea2f9fa50a62f9d1904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25049-cwe-913-improper-control-of-dynamic-698b739a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25049%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0662-cwe-426-untrusted-search-path-in-aut-fb3049c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0662%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837796f9fa50a62f9b5b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0660-cwe-121-stack-based-buffer-overflow--8b0875ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0660%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837796f9fa50a62f9b5b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0661-cwe-787-out-of-bounds-write-in-autod-f988f150</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0661%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837796f9fa50a62f9b5b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0537-cwe-787-out-of-bounds-write-in-autod-4f4f57fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0537%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837796f9fa50a62f9b5b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0538-cwe-787-out-of-bounds-write-in-autod-b77e745b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0538%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837419f9fa50a62f9ac078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20119-improper-validation-of-specified-ty-ebb4ee15</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20119%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20RoomOS%20Software&amp;severity=high&amp;id=69837419f9fa50a62f9ac08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20111-use-of-hard-coded-credentials-in-ci-bf72ccb4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20111%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Cisco%20Cisco%20Prime%20Infrastructure&amp;severity=medium&amp;id=69837419f9fa50a62f9ac087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20123-url-redirection-to-untrusted-site-o-8629cd8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20123%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=69837419f9fa50a62f9ac08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20098-unrestricted-upload-of-file-with-da-eec3aa8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20098%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Meeting%20Management&amp;severity=high&amp;id=69837419f9fa50a62f9ac084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20056-download-of-code-without-integrity--69833cde</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20056%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Cisco%20Cisco%20Secure%20Web%20Appliance&amp;severity=medium&amp;id=69837419f9fa50a62f9ac081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0659-cwe-787-out-of-bounds-write-in-autod-f330298c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0659%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20USD%20for%20Arnold&amp;severity=high&amp;id=69837419f9fa50a62f9ac07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-assisted-cloud-intrusion-achieves-admin-access--7ee8ed65</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-assisted%20cloud%20intrusion%20achieves%20admin%20access%20in%208%20minutes&amp;severity=medium&amp;id=6983b358f9fa50a62fac6fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-year-new-sector-targeting-indias-startup-ecosy-7d880cb5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20year%2C%20new%20sector%3A%20Targeting%20India&apos;s%20startup%20ecosystem&amp;severity=medium&amp;id=6983b358f9fa50a62fac6fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-routers-dns-and-a-tds-hidden-in-aeza-n-5ef12f72</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20Routers%2C%20DNS%2C%20and%20a%20TDS%20Hidden%20in%20Aeza%20Networks&amp;severity=medium&amp;id=6983b358f9fa50a62fac6fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/punishing-owl-attacks-russia-a-new-owl-in-the-hack-307ce4bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Punishing%20Owl%20Attacks%20Russia%3A%20A%20New%20Owl%20in%20the%20Hacktivists&apos;%20Forest&amp;severity=medium&amp;id=6983b358f9fa50a62fac6fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anatomy-of-a-russian-crypto-drainer-operation-4ca9a827</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anatomy%20of%20a%20Russian%20Crypto%20Drainer%20Operation&amp;severity=medium&amp;id=6983b6ddf9fa50a62fad288d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22549-cwe-250-execution-with-unnecessary--e87d8941</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22549%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20F5%20F5%20BIG-IP%20Container%20Ingress%20Services&amp;severity=medium&amp;id=69836601f9fa50a62f96098c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1642-cwe-349-acceptance-of-extraneous-unt-1423ae64</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1642%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20F5%20NGINX%20Open%20Source&amp;severity=medium&amp;id=6983627ef9fa50a62f94fb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22548-cwe-362-concurrent-execution-using--12bbf082</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22548%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=6983627ef9fa50a62f94fb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20732-cwe-451-user-interface-ui-misrepres-a9763fbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20732%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20F5%20BIG-IP&amp;severity=low&amp;id=6983627ef9fa50a62f94fb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20730-cwe-200-exposure-of-sensitive-infor-1e73f43f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20730%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20F5%20BIG-IP%20Edge%20Client&amp;severity=low&amp;id=6983627ef9fa50a62f94fb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-amaranth-dragon-exploits-winrar-flaw--bb02afa1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Amaranth-Dragon%20Exploits%20WinRAR%20Flaw%20in%20Espionage%20Campaigns&amp;severity=medium&amp;id=69845e9ff9fa50a62f0ff3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amaranth-dragon-weaponizing-cve-2025-8088-for-targ-7dfc4b87</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amaranth-Dragon%3A%20Weaponizing%20CVE-2025-8088%20for%20Targeted%20Espionage%20in%20the%20Southeast%20Asia&amp;severity=medium&amp;id=698350eef9fa50a62f8f0b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14740-cwe-732-incorrect-permission-assign-d39e0e46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14740%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Docker%20Inc.%20Docker%20Desktop&amp;severity=medium&amp;id=6983546df9fa50a62f8ff386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-allowed-full-compromise-of-google--9a65807f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20Allowed%20Full%20Compromise%20of%20Google%20Looker%20Instances&amp;severity=critical&amp;id=69834d32f9fa50a62f8e1d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5329-cwe-89-improper-neutralization-of-sp-4df4d90a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5329%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Martcode%20Software%20Inc.%20Delta%20Course%20Automation&amp;severity=critical&amp;id=69834d77f9fa50a62f8e393b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15368-cwe-98-improper-control-of-filename-65383c43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15368%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themeboy%20SportsPress%20%E2%80%93%20Sports%20Club%20%26%20League%20Manager&amp;severity=high&amp;id=69834d77f9fa50a62f8e3935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-cyberwar-and-rising-nation-sta-896fac48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20Cyberwar%20and%20Rising%20Nation%20State%20Threats&amp;severity=medium&amp;id=6983462af9fa50a62f8bffb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/341-malicious-clawed-skills-found-by-the-bot-they--cac03cca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=341%20Malicious%20Clawed%20Skills%20Found%20by%20the%20Bot%20They%20Were%20Targeting&amp;severity=medium&amp;id=6983546df9fa50a62f8fec2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dockerdash-flaw-in-docker-ai-assistant-leads-to-rc-8c2ee893</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DockerDash%20Flaw%20in%20Docker%20AI%20Assistant%20Leads%20to%20RCE%2C%20Data%20Theft&amp;severity=critical&amp;id=69833112f9fa50a62f86384c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-godfather-of-ransomware-inside-cartel-ambition-6c4d8a5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Godfather%20of%20Ransomware%3F%20Inside%20Cartel%20Ambitions&amp;severity=medium&amp;id=6983b6ddf9fa50a62fad2884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-malicious-crypto-trading-add-ons-found-7f6e64cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20Malicious%20Crypto%20Trading%20Add-Ons%20Found%20in%20Moltbot%2FOpenClaw&amp;severity=medium&amp;id=69847bd0f9fa50a62f1a71f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0873-cwe-79-improper-neutralization-of-in-3db399cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ercom%20Cryptobox&amp;severity=medium&amp;id=6983627ef9fa50a62f94fb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24735-cwe-359-exposure-of-private-persona-76777b11</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24735%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Answer&amp;severity=high&amp;id=6983708ef9fa50a62f98de78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59818-vulnerability-in-zenitel-tcis-3-e1f94afc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59818%3A%20Vulnerability%20in%20Zenitel%20TCIS-3%2B&amp;severity=critical&amp;id=69832335f9fa50a62f825756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptominers-reverse-shells-dropped-in-recent-reac-4b650cda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cryptominers%2C%20Reverse%20Shells%20Dropped%20in%20Recent%20React2Shell%20Attacks&amp;severity=medium&amp;id=69831bfaf9fa50a62f7ff2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-first-90-seconds-how-early-decisions-shape-inc-cdb9dba8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20First%2090%20Seconds%3A%20How%20Early%20Decisions%20Shape%20Incident%20Response%20Investigations&amp;severity=high&amp;id=69845e9ff9fa50a62f0ff3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41085-cwe-79-improper-neutralization-of-i-f5d26662</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41085%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Apidog%20Apidog%20Web%20Platform&amp;severity=medium&amp;id=69831c3bf9fa50a62f80155e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fresh-solarwinds-vulnerability-exploited-in-attack-bf32f06e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fresh%20SolarWinds%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=69831876f9fa50a62f7f28f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1622-cwe-532-insertion-of-sensitive-infor-88036ec4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1622%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20neo4j%20Enterprise%20Edition&amp;severity=medium&amp;id=698311a1f9fa50a62f7d02dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-analysis-of-moltbook-agent-network-bot-to-75107f17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Analysis%20of%20Moltbook%20Agent%20Network%3A%20Bot-to-Bot%20Prompt%20Injection%20and%20Data%20Leaks&amp;severity=medium&amp;id=698306e2f9fa50a62f79d87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0816-cwe-89-improper-neutralization-of-sp-9a170231</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0816%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gtlwpdev%20All%20push%20notification%20for%20WP&amp;severity=medium&amp;id=6983072af9fa50a62f79eb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15487-cwe-22-improper-limitation-of-a-pat-0dded556</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15487%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20qriouslad%20Code%20Explorer&amp;severity=medium&amp;id=69830729f9fa50a62f79eb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1370-cwe-89-improper-neutralization-of-sp-44db5f3a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1370%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20comprassibs%20SIBS%20woocommerce%20payment%20gateway&amp;severity=medium&amp;id=6983072af9fa50a62f79eba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0743-cwe-79-improper-neutralization-of-in-d908999a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0743%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20orenhav%20WP%20Content%20Permission&amp;severity=medium&amp;id=6983072af9fa50a62f79eb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0742-cwe-79-improper-neutralization-of-in-49053c10</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0742%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zealopensource%20Smart%20Appointment%20%26%20Booking&amp;severity=medium&amp;id=6983072af9fa50a62f79eb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0679-cwe-862-missing-authorization-in-for-4ef3a96e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0679%3A%20CWE-862%20Missing%20Authorization%20in%20fortispay%20Fortis%20for%20WooCommerce&amp;severity=medium&amp;id=69830729f9fa50a62f79eb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15508-cwe-200-exposure-of-sensitive-infor-6177add6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15508%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20magicimport%20Magic%20Import%20Document%20Extractor&amp;severity=medium&amp;id=69830729f9fa50a62f79eb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0572-cwe-862-missing-authorization-in-web-e7277085</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0572%3A%20CWE-862%20Missing%20Authorization%20in%20webpurify%20WebPurify%20Profanity%20Filter&amp;severity=medium&amp;id=69830729f9fa50a62f79eb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15507-cwe-862-missing-authorization-in-ma-a6cf4e03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15507%3A%20CWE-862%20Missing%20Authorization%20in%20magicimport%20Magic%20Import%20Document%20Extractor&amp;severity=medium&amp;id=69830729f9fa50a62f79eb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15268-cwe-89-improper-neutralization-of-s-e8f793d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15268%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20infility%20Infility%20Global&amp;severity=high&amp;id=69830729f9fa50a62f79eb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0681-cwe-79-improper-neutralization-of-in-42e82463</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rtddev%20Extended%20Random%20Number%20Generator&amp;severity=medium&amp;id=6983072af9fa50a62f79eb8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15285-cwe-862-missing-authorization-in-lu-cfc3b5c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15285%3A%20CWE-862%20Missing%20Authorization%20in%20lupsonline%20SEO%20Flow%20by%20LupsOnline&amp;severity=high&amp;id=69830729f9fa50a62f79eb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14461-cwe-862-missing-authorization-in-tp-560241f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14461%3A%20CWE-862%20Missing%20Authorization%20in%20tpixendit%20Xendit%20Payment&amp;severity=medium&amp;id=69830729f9fa50a62f79eb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15260-cwe-862-missing-authorization-in-lw-fba313d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15260%3A%20CWE-862%20Missing%20Authorization%20in%20lwsdevelopers%20MyRewards&amp;severity=medium&amp;id=69830729f9fa50a62f79eb5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15482-cwe-200-exposure-of-sensitive-infor-e0e06d24</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15482%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20chapaet%20Chapa%20Payment%20Gateway%20Plugin%20for%20WooCommerce&amp;severity=medium&amp;id=69830729f9fa50a62f79eb6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1819-cwe-79-improper-neutralization-of-in-91abdc20</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1819%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Karel%20Electronics%20Industry%20and%20Trade%20Inc.%20ViPort&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-python-infostealers-target-macos-v-f89b34d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20Python%20Infostealers%20Target%20macOS%20via%20Fake%20Ads%20and%20Installers&amp;severity=medium&amp;id=6983125df9fa50a62f7d2a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24447-improper-neutralization-of-formula--ff6f4904</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24447%3A%20Improper%20neutralization%20of%20formula%20elements%20in%20a%20CSV%20file%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=6982f1fdf9fa50a62f736054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23704-unrestricted-upload-of-file-with-da-857cff0a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23704%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=6982f1fdf9fa50a62f73604f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22875-cross-site-scripting-xss-in-six-apa-08808dab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22875%3A%20Cross-site%20scripting%20(XSS)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=6982f1fdf9fa50a62f73604a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21393-cross-site-scripting-xss-in-six-apa-d034a7f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21393%3A%20Cross-site%20scripting%20(XSS)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=6982f1fdf9fa50a62f736045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1756-cwe-434-unrestricted-upload-of-file--7ad77ef4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1756%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20seezee%20WP%20FOFT%20Loader&amp;severity=high&amp;id=6982ee78f9fa50a62f7260f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eclipse-foundation-mandates-pre-publish-security-c-e7238876</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eclipse%20Foundation%20Mandates%20Pre-Publish%20Security%20Checks%20for%20Open%20VSX%20Extensions&amp;severity=medium&amp;id=6983125df9fa50a62f7d2a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20987-cwe-284-improper-access-control-in--4dcabacd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20987%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20GalaxyDiagnostics&amp;severity=high&amp;id=6982fcd1f9fa50a62f765da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20986-cwe-22-improper-limitation-of-a-pat-6f48f0c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20986%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(%26%2339%3BPath%20Traversal%26%2339%3B)%20in%20Samsung%20Mobile%20Chinese%20Samsung%20Members&amp;severity=medium&amp;id=6982fcd1f9fa50a62f765da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20985-cwe-20-improper-input-validation-in-8a62bf1b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20985%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Members&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20984-cwe-280-improper-handling-of-insuff-1c49c69a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20984%3A%20CWE-280%3A%20Improper%20handling%20of%20insufficient%20permission%20in%20Samsung%20Mobile%20Galaxy%20Wearable&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20983-cwe-926-improper-export-of-android--06309a5f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20983%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20982-cwe-35-path-traversal-in-samsung-mo-6ab58797</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20982%3A%20CWE-35%3A%20Path%20Traversal%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20981-cwe-20-improper-input-validation-in-8c5e889c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20981%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20980-cwe-20-improper-input-validation-in-3e641da2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20980%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20979-cwe-269-impoper-privilege-managemen-106bd045</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20979%3A%20CWE-269%20Impoper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20978-cwe-269-impoper-privilege-managemen-b57983f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20978%3A%20CWE-269%20Impoper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20977-cwe-284-improper-access-control-in--df7d1cd5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20977%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-actively-exploited-solarwinds-web-help-d-5202fe85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Actively%20Exploited%20SolarWinds%20Web%20Help%20Desk%20RCE%20to%20KEV%20Catalog&amp;severity=critical&amp;id=6983125df9fa50a62f7d2a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29867-cwe-843-access-of-resource-using-in-e17a9b74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29867%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Hancom%20Inc.%20Hancom%20Office%202018&amp;severity=high&amp;id=6982d5def9fa50a62f6a7ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1791-cwe-434-unrestricted-upload-of-file--fb6094c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1791%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Hillstone%20Networks%20Operation%20and%20Maintenance%20Security%20Gateway&amp;severity=low&amp;id=6982c448f9fa50a62f51f8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1835-cross-site-request-forgery-in-lcg012-ae5e0431</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1835%3A%20Cross-Site%20Request%20Forgery%20in%20lcg0124%20BootDo&amp;severity=medium&amp;id=69829a18f9fa50a62ff8dfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-desktop-4443-unauthenticated-api-exposure-f37ba59f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Desktop%204.44.3%20-%20Unauthenticated%20%20API%20Exposure&amp;severity=medium&amp;id=69845ddcf9fa50a62f0fd4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortiweb-fabric-connector-76x-sql-injection-to-rem-db046e74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FortiWeb%20Fabric%20Connector%207.6.x%20-%20SQL%20Injection%20to%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69845ddcf9fa50a62f0fd4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aiohttp-391-directory-traversal-poc-06c6f577</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=aiohttp%203.9.1%20-%20directory%20traversal%20PoC&amp;severity=medium&amp;id=69845ddcf9fa50a62f0fd4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ingress-nginx-admission-controller-v1111-fd-inject-5be78404</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ingress-NGINX%20Admission%20Controller%20v1.11.1%20-%20FD%20Injection%20to%20RCE&amp;severity=critical&amp;id=69845ddcf9fa50a62f0fd4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/octoprint-1112-file-upload-63465292</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OctoPrint%201.11.2%20-%20File%20Upload&amp;severity=medium&amp;id=69845ddcf9fa50a62f0fd49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redis-802-rce-58f92bee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Redis%208.0.2%20-%20RCE&amp;severity=critical&amp;id=69845ddcf9fa50a62f0fd497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-1011-ntlm-hash-disclosure-spoofing-9b39ea95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=windows%2010%2F11%20-%20NTLM%20Hash%20Disclosure%20Spoofing&amp;severity=medium&amp;id=69845ddcf9fa50a62f0fd492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-04-ab1fd846</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-04&amp;severity=medium&amp;id=6983e0d6f9fa50a62fb69fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71031-na-1ecbeaac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71031%3A%20n%2Fa&amp;severity=high&amp;id=6983a8cef9fa50a62fa9fe84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70545-na-20c02591</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70545%3A%20n%2Fa&amp;severity=medium&amp;id=69836601f9fa50a62f960988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70997-na-24272539</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70997%3A%20n%2Fa&amp;severity=high&amp;id=6983627ef9fa50a62f94fb81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69618-na-7e17525d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69618%3A%20n%2Fa&amp;severity=high&amp;id=69835b75f9fa50a62f92b4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-04-7395cf17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-04&amp;severity=low&amp;id=69832683f9fa50a62f838bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69621-na-6c7cbd12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69621%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd1f9fa50a62f765daf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69620-na-4c7a89dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69620%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd1f9fa50a62f765da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1813-unrestricted-upload-in-bolo-blog-bol-b4844d55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1813%3A%20Unrestricted%20Upload%20in%20bolo-blog%20bolo-solo&amp;severity=medium&amp;id=69828885f9fa50a62fe9cc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1633-cwe-306-missing-authentication-for-c-358e9305</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1633%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Synectix%20LAN%20232%20TRIO&amp;severity=critical&amp;id=6982fcd1f9fa50a62f765db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1632-cwe-306-missing-authentication-for-c-69ba200a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1632%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20RISS%20SRL%20MOMA%20Seismic%20Station&amp;severity=critical&amp;id=6982817df9fa50a62fe78b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1812-path-traversal-in-bolo-blog-bolo-sol-741f75b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1812%3A%20Path%20Traversal%20in%20bolo-blog%20bolo-solo&amp;severity=medium&amp;id=69827df8f9fa50a62fe64081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1755-cwe-79-improper-neutralization-of-in-6a922468</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1755%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Menu%20Icons%20by%20ThemeIsle&amp;severity=medium&amp;id=69827a75f9fa50a62fe57fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24514-cwe-770-allocation-of-resources-wit-fe0a4b00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24514%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Kubernetes%20ingress-nginx&amp;severity=medium&amp;id=69827a75f9fa50a62fe57fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24513-cwe-754-improper-check-for-unusual--15bf96ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24513%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Kubernetes%20ingress-nginx&amp;severity=low&amp;id=69827a75f9fa50a62fe57fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24512-cwe-20-improper-input-validation-in-994b9fe2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24512%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69827a75f9fa50a62fe57fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1580-cwe-20-improper-input-validation-in--c604c8c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1580%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69827a75f9fa50a62fe57fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33081-cwe-312-cleartext-storage-of-sensit-14cffe63</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33081%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20IBM%20Concert&amp;severity=low&amp;id=698276f1f9fa50a62fe4b3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36033-cwe-79-improper-neutralization-of-i-3c6e0ea9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36033%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Engineering%20Lifecycle%20Management%20-%20Global%20Configuration%20Management&amp;severity=medium&amp;id=698276f1f9fa50a62fe4b3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36094-cwe-1284-improper-validation-of-spe-64bc533b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36094%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=698276f1f9fa50a62fe4b3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1811-path-traversal-in-bolo-blog-bolo-sol-24469a6c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1811%3A%20Path%20Traversal%20in%20bolo-blog%20bolo-solo&amp;severity=medium&amp;id=69826c65f9fa50a62fe2a068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1341-cwe-306-missing-authentication-for-c-a1d18d0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1341%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Avation%20Avation%20Light%20Engine%20Pro&amp;severity=critical&amp;id=69826c65f9fa50a62fe2a065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25510-cwe-434-unrestricted-upload-of-file-4e04b8c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25510%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=698268e3f9fa50a62fe1ecce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25509-cwe-204-observable-response-discrep-a743822b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25509%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=698268e3f9fa50a62fe1ecca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25150-cwe-1321-improperly-controlled-modi-c356c655</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25150%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20QwikDev%20qwik&amp;severity=critical&amp;id=698268e3f9fa50a62fe1ecbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25148-cwe-79-improper-neutralization-of-i-b527805d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25148%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QwikDev%20qwik&amp;severity=medium&amp;id=698268e3f9fa50a62fe1ecb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25151-cwe-352-cross-site-request-forgery--54a7f0af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25151%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20QwikDev%20qwik&amp;severity=medium&amp;id=698268e3f9fa50a62fe1ecc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25155-cwe-352-cross-site-request-forgery--fc29b370</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25155%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20QwikDev%20qwik&amp;severity=medium&amp;id=698268e3f9fa50a62fe1ecc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25149-cwe-601-url-redirection-to-untruste-221b295d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25149%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20QwikDev%20qwik&amp;severity=low&amp;id=698268e3f9fa50a62fe1ecba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1862-type-confusion-in-google-chrome-74752399</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1862%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=6982655ef9fa50a62fe085f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1861-heap-buffer-overflow-in-google-chrom-00b60d91</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1861%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6982655ef9fa50a62fe085f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65078-cwe-426-untrusted-search-path-in-le-d88b2302</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65078%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=critical&amp;id=698261daf9fa50a62fdf39d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24887-cwe-78-improper-neutralization-of-s-2e48c07a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24887%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=698261daf9fa50a62fdf39e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24053-cwe-22-improper-limitation-of-a-pat-19af0cd1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24053%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=698261daf9fa50a62fdf39e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24052-cwe-601-url-redirection-to-untruste-7dabc228</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24052%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=698261daf9fa50a62fdf39df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65077-cwe-22-improper-limitation-of-a-pat-1ed37367</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65077%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=high&amp;id=698261daf9fa50a62fdf39d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65081-cwe-125-out-of-bounds-read-in-lexma-2674a469</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65081%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=medium&amp;id=698261daf9fa50a62fdf39dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65080-cwe-843-access-of-resource-using-in-7bdf51d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65080%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=medium&amp;id=698261daf9fa50a62fdf39d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1810-path-traversal-in-bolo-blog-bolo-sol-f4bf9946</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1810%3A%20Path%20Traversal%20in%20bolo-blog%20bolo-solo&amp;severity=medium&amp;id=69825e55f9fa50a62fde8b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65079-cwe-122-heap-based-buffer-overflow--7090318c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65079%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=medium&amp;id=69825e55f9fa50a62fde8b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1801-inconsistent-interpretation-of-http--410806b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1801%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69825ad5f9fa50a62fdde084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1803-use-of-default-credentials-in-ziroom-eff2e206</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1803%3A%20Use%20of%20Default%20Credentials%20in%20Ziroom%20ZHOME%20A0101&amp;severity=critical&amp;id=6982574ef9fa50a62fdd1d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24149-cwe-94-improper-control-of-generati-2d4eb83d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24149%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=6982574ef9fa50a62fdd1d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64438-cwe-835-loop-with-unreachable-exit--0a2c29a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64438%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc199e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64098-cwe-125-out-of-bounds-read-in-epros-1889535f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64098%3A%20CWE-125%20Out-of-bounds%20Read%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc1998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62799-cwe-122-heap-based-buffer-overflow--ed63869c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62799%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20eProsima%20Fast-DDS&amp;severity=high&amp;id=69825048f9fa50a62fdc1992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62603-cwe-125-out-of-bounds-read-in-epros-328d3edd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62603%3A%20CWE-125%20Out-of-bounds%20Read%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc198c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62602-cwe-122-heap-based-buffer-overflow--b712494b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62602%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc1986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62601-cwe-122-heap-based-buffer-overflow--ae3ec93e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62601%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc1980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24441-cwe-319-cleartext-transmission-of-s-f6d6bcba</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24441%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20AC7&amp;severity=high&amp;id=69825048f9fa50a62fdc19aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24434-cwe-352-cross-site-request-forgery--eb99fff6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24434%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20AC7&amp;severity=medium&amp;id=69825048f9fa50a62fdc19a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24427-cwe-201-insertion-of-sensitive-info-2518bc19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24427%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20AC7&amp;severity=medium&amp;id=6982493ef9fa50a62fdabb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62600-cwe-190-integer-overflow-or-wraparo-ebce4785</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62600%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20eProsima%20Fast-DDS&amp;severity=high&amp;id=6982493ef9fa50a62fdabaff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24426-cwe-79-improper-neutralization-of-i-6027d436</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24426%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20AC7&amp;severity=medium&amp;id=6982493ef9fa50a62fdabb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1802-command-injection-in-ziroom-zhome-a0-4f2a0123</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1802%3A%20Command%20Injection%20in%20Ziroom%20ZHOME%20A0101&amp;severity=medium&amp;id=6982493ef9fa50a62fdabb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62673-cwe-122-heap-based-buffer-overflow--c706b0f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62673%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62501-cwe-322-key-exchange-without-entity-5ed7f272</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62501%3A%20CWE-322%20Key%20Exchange%20without%20Entity%20Authentication%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62405-cwe-122-heap-based-buffer-overflow--88225e85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62405%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62404-cwe-122-heap-based-buffer-overflow--003e1e3d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62404%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabaed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61983-cwe-122-heap-based-buffer-overflow--e46fba2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61983%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61944-cwe-122-heap-based-buffer-overflow--815cf30e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61944%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59487-cwe-122-heap-based-buffer-overflow--c6ddbb8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59487%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=698245baf9fa50a62fda11d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59482-cwe-122-heap-based-buffer-overflow--45d8dec5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59482%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=698245baf9fa50a62fda11cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58455-cwe-122-heap-based-buffer-overflow--e71fcffc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58455%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=698245baf9fa50a62fda11c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58077-cwe-122-heap-based-buffer-overflow--bdbbf656</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58077%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=698245baf9fa50a62fda11bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25502-cwe-121-stack-based-buffer-overflow-80bd3249</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25502%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=698245bcf9fa50a62fda1234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25503-cwe-704-incorrect-type-conversion-o-4799c60b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25503%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=698245bcf9fa50a62fda123a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25241-cwe-89-improper-neutralization-of-s-0b72583b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25241%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=critical&amp;id=698245bcf9fa50a62fda1231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25240-cwe-89-improper-neutralization-of-s-1ab86a4a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25240%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=medium&amp;id=698245bcf9fa50a62fda122e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25239-cwe-89-improper-neutralization-of-s-b8b1fc95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25239%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=high&amp;id=698245bcf9fa50a62fda122b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25238-cwe-89-improper-neutralization-of-s-256012a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25238%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=critical&amp;id=698245baf9fa50a62fda11ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25237-cwe-624-executable-regular-expressi-3bed76f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25237%3A%20CWE-624%3A%20Executable%20Regular%20Expression%20Error%20in%20pear%20pearweb&amp;severity=critical&amp;id=698245baf9fa50a62fda11e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25236-cwe-89-improper-neutralization-of-s-16a75fbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25236%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=medium&amp;id=698245baf9fa50a62fda11e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25235-cwe-337-predictable-seed-in-pseudo--62642ee1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25235%3A%20CWE-337%3A%20Predictable%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20pear%20pearweb&amp;severity=high&amp;id=698245baf9fa50a62fda11e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25234-cwe-89-improper-neutralization-of-s-2aba1fe0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25234%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=medium&amp;id=698245baf9fa50a62fda11de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25233-cwe-783-operator-precedence-logic-e-98d15dee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25233%3A%20CWE-783%3A%20Operator%20Precedence%20Logic%20Error%20in%20pear%20pearweb&amp;severity=high&amp;id=698245baf9fa50a62fda11db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52631-cwe-200-in-hcl-aion-19e7abe9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52631%3A%20CWE-200%20in%20HCL%20AION&amp;severity=low&amp;id=69823eb3f9fa50a62fd8ce63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52623-cwe-522-in-hcl-aion-e4370358</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52623%3A%20CWE-522%20in%20HCL%20AION&amp;severity=low&amp;id=69823eb3f9fa50a62fd8ce5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25522-cwe-79-improper-neutralization-of-i-5f82c5bd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25522%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8cebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25490-cwe-79-improper-neutralization-of-i-fa34bd3e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25490%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8ceb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25489-cwe-79-improper-neutralization-of-i-6e83cee9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25489%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8ceaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25488-cwe-79-improper-neutralization-of-i-5d98ec6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25488%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8cea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25487-cwe-79-improper-neutralization-of-i-4b55417c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25487%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8cea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25486-cwe-79-improper-neutralization-of-i-240f94bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25486%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25485-cwe-79-improper-neutralization-of-i-8105c312</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25485%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52628-cwe-1275-in-hcl-aion-df4675a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52628%3A%20CWE-1275%20in%20HCL%20AION&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25484-cwe-79-improper-neutralization-of-i-b210ab58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25484%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25483-cwe-79-improper-neutralization-of-i-81489a10</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25483%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0620-cwe-693-protection-mechanism-failure-c1563062</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0620%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20TP-Link%20Systems%20Inc.%20AXE75&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25482-cwe-79-improper-neutralization-of-i-73649cae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25482%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52633-cwe-539-in-hcl-aion-af9f9cab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52633%3A%20CWE-539%20in%20HCL%20AION&amp;severity=low&amp;id=69823eb3f9fa50a62fd8ce66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62599-cwe-190-integer-overflow-or-wraparo-1c1e982d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62599%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20eProsima%20Fast-DDS&amp;severity=high&amp;id=6982fcd3f9fa50a62f7662ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52629-cwe-1032-in-hcl-aion-994fd821</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52629%3A%20CWE-1032%20in%20HCL%20AION&amp;severity=low&amp;id=6982493ff9fa50a62fdabb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52626-cwe-78-in-hcl-aion-f4156f00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52626%3A%20CWE-78%20in%20HCL%20AION&amp;severity=medium&amp;id=698253c8f9fa50a62fdcb702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52627-cwe-732-in-hcl-aion-98a54cce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52627%3A%20CWE-732%20in%20HCL%20AION&amp;severity=medium&amp;id=6982493ff9fa50a62fdabb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22228-cwe-400-uncontrolled-resource-consu-b8859d18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22228%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=medium&amp;id=69823426f9fa50a62fd6b72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22220-cwe-20-improper-input-validation-in-3259f418</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22220%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=medium&amp;id=69823426f9fa50a62fd6b728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24669-cwe-613-insufficient-session-expira-f8c1b8f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24669%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20gunet%20openeclass&amp;severity=high&amp;id=6982fcd8f9fa50a62f766497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24668-cwe-284-improper-access-control-in--80d3ed64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24668%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f766493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24667-cwe-613-insufficient-session-expira-683c6237</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24667%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f76648f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24666-cwe-352-cross-site-request-forgery--5852c27a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24666%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f76648b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24665-cwe-79-improper-neutralization-of-i-c873464b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24665%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gunet%20openeclass&amp;severity=high&amp;id=6982fcd8f9fa50a62f766488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24774-cwe-841-improper-enforcement-of-beh-1a435a61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24774%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd9f9fa50a62f767686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24773-cwe-639-authorization-bypass-throug-c3909f60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24773%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20gunet%20openeclass&amp;severity=high&amp;id=6982fcd9f9fa50a62f767679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24674-cwe-79-improper-neutralization-of-i-d9b0eb15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24674%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f7664ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24673-cwe-434-unrestricted-upload-of-file-59e52bf4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24673%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f7664a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24672-cwe-79-improper-neutralization-of-i-c7b1d13a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24672%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gunet%20openeclass&amp;severity=high&amp;id=6982fcd8f9fa50a62f7664a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24671-cwe-79-improper-neutralization-of-i-c3d6a6da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24671%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f7664a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24670-cwe-284-improper-access-control-in--40136907</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24670%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f76649d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24664-cwe-204-observable-response-discrep-832f3070</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24664%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd6f9fa50a62f76638d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1568-cwe-347-improper-verification-of-cry-723aa830</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1568%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Rapid7%20Vulnerability%20Management&amp;severity=critical&amp;id=69822999f9fa50a62fd3ce12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-fixes-critical-ask-gordon-ai-flaw-allowing--a13814cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Fixes%20Critical%20Ask%20Gordon%20AI%20Flaw%20Allowing%20Code%20Execution%20via%20Image%20Metadata&amp;severity=critical&amp;id=6983125df9fa50a62f7d2aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23794-cwe-79-improper-neutralization-of-i-0843fb34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23794%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Syncope&amp;severity=medium&amp;id=69821482f9fa50a62fceb336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23795-cwe-611-improper-restriction-of-xml-0af39dea</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23795%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Syncope&amp;severity=medium&amp;id=69821482f9fa50a62fceb33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1814-cwe-331-insufficient-entropy-in-rapi-2e82bb61</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1814%3A%20CWE-331%20Insufficient%20Entropy%20in%20Rapid7%20InsightVM%2FNexpose&amp;severity=medium&amp;id=698210fef9fa50a62fce298c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14550-cwe-407-inefficient-algorithmic-com-c6ea672a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14550%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=high&amp;id=69820d79f9fa50a62fcd6037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1312-cwe-89-improper-neutralization-of-sp-c1fc6281</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1312%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69820d79f9fa50a62fcd604f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1287-cwe-89-improper-neutralization-of-sp-15ffb705</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1287%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69820d79f9fa50a62fcd604a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1285-cwe-407-inefficient-algorithmic-comp-78e15559</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1285%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=high&amp;id=69820d79f9fa50a62fcd6045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1207-cwe-89-improper-neutralization-of-sp-15490eb5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1207%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69820d79f9fa50a62fcd6040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13473-cwe-208-observable-timing-discrepan-e5c863de</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13473%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69820d79f9fa50a62fcd6032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5319-cwe-89-improper-neutralization-of-sp-0c35b7ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5319%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Emit%20Informatics%20and%20Communication%20Technologies%20Industry%20and%20Trade%20Ltd.%20Co.%20DIGITA%20Efficiency%20Management%20System&amp;severity=critical&amp;id=69820d79f9fa50a62fcd603d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25036-missing-authorization-in-wp-chill-p-512b99ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25036%3A%20Missing%20Authorization%20in%20WP%20Chill%20Passster&amp;severity=medium&amp;id=6982067bf9fa50a62fcb3e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25028-missing-authorization-in-element-in-fd98d27d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25028%3A%20Missing%20Authorization%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6982067bf9fa50a62fcb3e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25027-improper-control-of-filename-for-in-a2342b8d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25027%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Unicamp&amp;severity=high&amp;id=6982067bf9fa50a62fcb3e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25024-cross-site-request-forgery-csrf-in--662ab1b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25024%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Blair%20Williams%20ThirstyAffiliates&amp;severity=medium&amp;id=6982067bf9fa50a62fcb3e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25023-exposure-of-sensitive-system-inform-b59e83cd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25023%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20mdedev%20Run%20Contests%2C%20Raffles%2C%20and%20Giveaways%20with%20ContestsWP&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25022-improper-neutralization-of-special--995c316d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25022%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Iqonic%20Design%20KiviCare&amp;severity=high&amp;id=6982067af9fa50a62fcb3e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25021-missing-authorization-in-mizan-them-c1fd0679</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25021%3A%20Missing%20Authorization%20in%20Mizan%20Themes%20Mizan%20Demo%20Importer&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25020-missing-authorization-in-wp-connect-c410c418</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25020%3A%20Missing%20Authorization%20in%20WP%20connect%20WP%20Sync%20for%20Notion&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25019-missing-authorization-in-vito-peleg-ce990a25</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25019%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25016-missing-authorization-in-nelio-soft-0ffdca0e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25016%3A%20Missing%20Authorization%20in%20Nelio%20Software%20Nelio%20Popups&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25015-cross-site-request-forgery-csrf-in--3d88aeb9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25015%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stiofan%20UsersWP&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25014-cross-site-request-forgery-csrf-in--f77d18d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25014%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themelooks%20Enter%20Addons&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25012-missing-authorization-in-gfazioli-w-0f8cb5ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25012%3A%20Missing%20Authorization%20in%20gfazioli%20WP%20Bannerize%20Pro&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25011-missing-authorization-in-northern-b-1511f03a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25011%3A%20Missing%20Authorization%20in%20Northern%20Beaches%20Websites%20WP%20Custom%20Admin%20Interface&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25010-missing-authorization-in-illid-shar-d200709f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25010%3A%20Missing%20Authorization%20in%20ILLID%20Share%20This%20Image&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24998-exposure-of-sensitive-system-inform-46d6c32d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24998%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Hustle&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24997-missing-authorization-in-wired-impa-3e744f48</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24997%3A%20Missing%20Authorization%20in%20Wired%20Impact%20Wired%20Impact%20Volunteer%20Management&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24996-missing-authorization-in-wpelemento-f93a2d5b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24996%3A%20Missing%20Authorization%20in%20wpelemento%20WPElemento%20Importer&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24995-missing-authorization-in-iulia-caza-92683b75</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24995%3A%20Missing%20Authorization%20in%20Iulia%20Cazan%20Latest%20Post%20Shortcode&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24994-missing-authorization-in-sunshineph-e2ea7299</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24994%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24992-insertion-of-sensitive-information--d82a0356</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24992%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPFactory%20Advanced%20WooCommerce%20Product%20Sales%20Reporting&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24991-authorization-bypass-through-user-c-9d633bbc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24991%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20HT%20Plugins%20Extensions%20For%20CF7&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24990-missing-authorization-in-fahad-mahm-8cfb29bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24990%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20WP%20Docs&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24988-improper-neutralization-of-input-du-e8fa762f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24988%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brian%20Hogg%20The%20Events%20Calendar%20Shortcode%20%26%20Block&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24986-cross-site-request-forgery-csrf-in--84152fb5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24986%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp.insider%20Simple%20Membership%20WP%20user%20Import&amp;severity=medium&amp;id=69820676f9fa50a62fcb3da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24985-missing-authorization-in-approveme--8aba0016</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24985%3A%20Missing%20Authorization%20in%20approveme%20WP%20Forms%20Signature%20Contract%20Add-On&amp;severity=medium&amp;id=69820676f9fa50a62fcb3da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24984-missing-authorization-in-brecht-vis-382f1ebe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24984%3A%20Missing%20Authorization%20in%20Brecht%20Visual%20Link%20Preview&amp;severity=medium&amp;id=69820676f9fa50a62fcb3da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24982-missing-authorization-in-brainstorm-42864172</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24982%3A%20Missing%20Authorization%20in%20Brainstorm%20Force%20Spectra&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24967-missing-authorization-in-ameliabook-5a1ef234</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24967%3A%20Missing%20Authorization%20in%20ameliabooking%20Amelia&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24966-cross-site-request-forgery-csrf-in--39ade7d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24966%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Copyscape%20Copyscape%20Premium&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24965-missing-authorization-in-wasiliy-st-6a139262</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24965%3A%20Missing%20Authorization%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24962-cross-site-request-forgery-csrf-in--9d30c429</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24962%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Brainstorm%20Force%20Sigmize&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24961-server-side-request-forgery-ssrf-in-ae5b2f1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24961%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThemeGoods%20Grand%20Blog&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24958-improper-neutralization-of-input-du-1ac57776</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24958%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24957-missing-authorization-in-wp-chill-s-42a6953e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24957%3A%20Missing%20Authorization%20in%20WP%20Chill%20Strong%20Testimonials&amp;severity=medium&amp;id=69820673f9fa50a62fcb3ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24954-deserialization-of-untrusted-data-i-95f5726a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24954%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=high&amp;id=69820673f9fa50a62fcb3ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24952-improper-neutralization-of-input-du-06452c9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24952%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69820673f9fa50a62fcb3ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24951-missing-authorization-in-saad-iqbal-fabde56a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24951%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20myCred&amp;severity=medium&amp;id=69820673f9fa50a62fcb3ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24947-missing-authorization-in-la-studio--1a892bc5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24947%3A%20Missing%20Authorization%20in%20LA-Studio%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24945-missing-authorization-in-themefic-u-6adb953d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24945%3A%20Missing%20Authorization%20in%20Themefic%20Ultimate%20Addons%20for%20Contact%20Form%207&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24942-cross-site-request-forgery-csrf-in--cb2e92f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24942%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24940-missing-authorization-in-themefic-t-67568d6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24940%3A%20Missing%20Authorization%20in%20Themefic%20Travelfic%20Toolkit&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24939-missing-authorization-in-wp-chill-m-2d51a39c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24939%3A%20Missing%20Authorization%20in%20WP%20Chill%20Modula%20Image%20Gallery&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24938-improper-neutralization-of-input-du-b2113b3c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20Better%20Search&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-metro4shell-rce-flaw-in-react-nati-583d977e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Metro4Shell%20RCE%20Flaw%20in%20React%20Native%20CLI%20npm%20Package&amp;severity=critical&amp;id=6983125df9fa50a62f7d2aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react-native-vulnerability-exploited-in-t-c5f4341d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React%20Native%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=698202baf9fa50a62fca56c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-allows-hackers-to-hijack-openclaw-ai-20ce9799</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20Allows%20Hackers%20to%20Hijack%20OpenClaw%20AI%20Assistant&amp;severity=critical&amp;id=6981ff36f9fa50a62fc98e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detecting-and-monitoring-openclaw-clawdbot-moltbot-0a61ac8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detecting%20and%20Monitoring%20OpenClaw%20(clawdbot%2C%20moltbot)%2C%20(Tue%2C%20Feb%203rd)&amp;severity=medium&amp;id=69831349f9fa50a62f7d42bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7760-cwe-79-improper-neutralization-of-in-a9105f8f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7760%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ofisimo%20Web-Based%20Software%20Technologies%20Association%20Web%20Package%20Flora&amp;severity=high&amp;id=6981edd5f9fa50a62fc5ae12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leak-51-million-panera-bread-records-da8bcba7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Leak%205.1%20Million%20Panera%20Bread%20Records&amp;severity=medium&amp;id=6981ea1ef9fa50a62fc4166e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6397-cwe-79-improper-neutralization-of-in-2087d065</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ankara%20Hosting%20Website%20Design%20Website%20Software&amp;severity=high&amp;id=6981ea60f9fa50a62fc43b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-supply-chain-attack-breakdown-c81f1b9c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20supply%20chain%20attack%20breakdown&amp;severity=medium&amp;id=69821f0cf9fa50a62fd06c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1664-cwe-639-authorization-bypass-through-8a0cc424</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1664%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key&amp;severity=medium&amp;id=6981e349f9fa50a62fc25650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11598-cwe-359-exposure-of-private-persona-dfd2833c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11598%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Centralny%20O%C5%9Brodek%20Informatyki%20mObywatel&amp;severity=low&amp;id=6981dfc7f9fa50a62fc15520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russias-apt28-rapidly-weaponizes-newly-patched-off-9d7af1f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%E2%80%99s%20APT28%20Rapidly%20Weaponizes%20Newly%20Patched%20Office%20Vulnerability&amp;severity=medium&amp;id=6981dc0ef9fa50a62fc009a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1432-cwe-89-improper-neutralization-of-sp-cf0635ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1432%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20T-Systems%20Buroweb&amp;severity=critical&amp;id=6981dc51f9fa50a62fc0247c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-cloud-outages-ripple-across-the-internet-e209c4c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Cloud%20Outages%20Ripple%20Across%20the%20Internet&amp;severity=high&amp;id=6983125df9fa50a62f7d2aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67857-insertion-of-sensitive-information--6a15e9ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67857%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data&amp;severity=medium&amp;id=69821b8cf9fa50a62fcf9c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67856-179fb517</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67856&amp;severity=medium&amp;id=69821b8cf9fa50a62fcf9c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67855-improper-neutralization-of-input-du-e3a836cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67855%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=69821b8cf9fa50a62fcf9c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67853-improper-restriction-of-excessive-a-53304999</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67853%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts&amp;severity=high&amp;id=69821b8cf9fa50a62fcf9c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67852-url-redirection-to-untrusted-site-o-bace6e1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67852%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)&amp;severity=low&amp;id=69821b8cf9fa50a62fcf9c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67851-improper-neutralization-of-formula--d13a40ba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67851%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File&amp;severity=medium&amp;id=6982fcd9f9fa50a62f767693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67850-improper-neutralization-of-input-du-8bb2e59b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67850%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=high&amp;id=6982d5def9fa50a62f6a7ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67849-improper-neutralization-of-input-du-f0e4d716</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67849%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=high&amp;id=6982d5def9fa50a62f6a7ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67848-improper-handling-of-insufficient-p-11d090d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67848%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges&amp;severity=high&amp;id=6982d5def9fa50a62f6a7ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59902-cwe-79-improper-neutralization-of-i-cb794028</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NICE%20NICE%20Chat&amp;severity=high&amp;id=69823426f9fa50a62fd6b737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41065-cwe-79-improper-neutralization-of-i-1f0804d0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41065%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Luna%20Imaging%20LUNA&amp;severity=medium&amp;id=69823426f9fa50a62fd6b734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt28-uses-microsoft-office-cve-2026-21509-in-espi-a350f095</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT28%20Uses%20Microsoft%20Office%20CVE-2026-21509%20in%20Espionage-Focused%20Malware%20Attacks&amp;severity=medium&amp;id=6983125df9fa50a62f7d2aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8461-cwe-79-improper-neutralization-of-in-91f90918</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Seres%20Software%20syWEB&amp;severity=high&amp;id=6981b919f9fa50a62fb2b79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8456-cwe-79-improper-neutralization-of-in-882d06a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8456%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Kod8%20Software%20Technologies%20Trade%20Ltd.%20Co.%20Kod8%20Individual%20and%20SME%20Website&amp;severity=high&amp;id=6981b595f9fa50a62fb1f690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-chrysalis-backdoor-a-deep-dive-into-lotus-blos-7bbdc6d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Chrysalis%20Backdoor%3A%20A%20Deep%20Dive%20into%20Lotus%20Blossom&apos;s%20toolkit&amp;severity=medium&amp;id=6981b210f9fa50a62fafd65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1592-cwe-79-improper-neutralization-of-in-a6128ea3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1592%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=6981ae8df9fa50a62faf0c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1591-cwe-79-improper-neutralization-of-in-b893cd0e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=6981ae8df9fa50a62faf0c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1730-cwe-434-unrestricted-upload-of-file--cbb4a663</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1730%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20skirridsystems%20OS%20DataHub%20Maps&amp;severity=high&amp;id=6981ab4df9fa50a62fae40d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1371-cwe-200-exposure-of-sensitive-inform-a38ab61b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1371%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=6981ab4df9fa50a62fae40c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1375-cwe-639-authorization-bypass-through-29a9cae7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1375%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=6981ab4df9fa50a62fae40ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8590-cwe-200-exposure-of-sensitive-inform-5729c7a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8590%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20AKCE%20Software%20Technology%20R%26D%20Industry%20and%20Trade%20Inc.%20SKSPro&amp;severity=high&amp;id=6981a400f9fa50a62facb80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8589-cwe-79-improper-neutralization-of-in-2493d852</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AKCE%20Software%20Technology%20R%26D%20Industry%20and%20Trade%20Inc.%20SKSPro&amp;severity=high&amp;id=6981a400f9fa50a62facb80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24465-stack-based-buffer-overflow-in-elec-35d69429</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24465%3A%20Stack-based%20buffer%20overflow%20in%20ELECOM%20CO.%2CLTD.%20WAB-S733IW2-PD&amp;severity=critical&amp;id=6981a07df9fa50a62fabfc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24449-use-of-weak-credentials-in-elecom-c-6195e038</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24449%3A%20Use%20of%20weak%20credentials%20in%20ELECOM%20CO.%2CLTD.%20WRC-X1500GS-B&amp;severity=medium&amp;id=6981a07df9fa50a62fabfc5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22550-improper-neutralization-of-special--77e831ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22550%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ELECOM%20CO.%2CLTD.%20WRC-X1500GS-B&amp;severity=high&amp;id=6981a07df9fa50a62fabfc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20704-cross-site-request-forgery-csrf-in--688ce2f1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20704%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20ELECOM%20CO.%2CLTD.%20WRC-X1500GS-B&amp;severity=medium&amp;id=6981a07df9fa50a62fabfc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1447-cwe-352-cross-site-request-forgery-c-d6ed4597</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1447%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20getwpfunnels%20Mail%20Mint%20%E2%80%93%20Email%20Marketing%2C%20Newsletter%2C%20Email%20Automation%20%26%20WooCommerce%20Emails&amp;severity=medium&amp;id=69819975f9fa50a62faa53cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1058-cwe-79-improper-neutralization-of-in-f5ac77e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=69819975f9fa50a62faa53b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1210-cwe-79-improper-neutralization-of-in-9ebaaad9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1210%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69819975f9fa50a62faa53c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1065-cwe-434-unrestricted-upload-of-file--c9fe553b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1065%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=69819975f9fa50a62faa53bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0617-cwe-79-improper-neutralization-of-in-d5e79671</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=69819975f9fa50a62faa53af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58381-cwe-35-path-traversal-in-brocade-fa-ff5304b3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58381%3A%20CWE-35%3A%20Path%20Traversal%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=69818ee8f9fa50a62fa7da8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mozilla-adds-one-click-option-to-disable-generativ-e233d72a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mozilla%20Adds%20One-Click%20Option%20to%20Disable%20Generative%20AI%20Features%20in%20Firefox&amp;severity=low&amp;id=6981b662f9fa50a62fb2320f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0950-cwe-200-exposure-of-sensitive-inform-f3102e6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0950%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20brainstormforce%20Spectra%20Gutenberg%20Blocks%20%E2%80%93%20Website%20Builder%20for%20the%20Block%20Editor&amp;severity=medium&amp;id=69818b64f9fa50a62fa73b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14274-cwe-79-improper-neutralization-of-i-cddbffa3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14274%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=medium&amp;id=69818b64f9fa50a62fa73b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24694-uncontrolled-search-path-element-in-bab4bf19</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24694%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Roland%20Corporation%20Roland%20Cloud%20Manager&amp;severity=high&amp;id=69818b64f9fa50a62fa73b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9711-cwe-272-least-privilege-violation-in-26a33153</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9711%3A%20CWE-272%3A%20Least%20Privilege%20Violation%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=69818b64f9fa50a62fa73b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58380-cwe-35-path-traversal-in-brocade-fa-1d7784fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58380%3A%20CWE-35%3A%20Path%20Traversal%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=69818461f9fa50a62fa607ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-hosting-breach-attributed-to-china-linked--30b9c561</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Hosting%20Breach%20Attributed%20to%20China-Linked%20Lotus%20Blossom%20Hacking%20Group&amp;severity=medium&amp;id=698180a3f9fa50a62fa53d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0383-cwe-78-improper-neutralization-of-sp-58f3f0d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0383%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=6981764df9fa50a62fa17c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24936-cwe-20-improper-input-validation-in-17d71855</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24936%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ASUSTOR%20ADM&amp;severity=critical&amp;id=6981764df9fa50a62fa17c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0909-cwe-639-authorization-bypass-through-55ffa7bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0909%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20alimir%20WP%20ULike%20%E2%80%93%20Like%20%26%20Dislike%20Buttons%20for%20Engagement%20and%20Feedback&amp;severity=medium&amp;id=6981764df9fa50a62fa17c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1788-cwe-787-out-of-bounds-write-in-xquic-eb13681d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1788%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Xquic%20Project%20Xquic%20Server&amp;severity=medium&amp;id=6981764df9fa50a62fa17c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24935-cwe-295-improper-certificate-valida-8db5c61e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24935%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=6981ab4df9fa50a62fae40e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24934-cwe-295-improper-certificate-valida-c90c42dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24934%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=6981ab4df9fa50a62fae40e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24933-cwe-295-improper-certificate-valida-0f223701</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24933%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=6981ab4df9fa50a62fae40df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24932-cwe-295-improper-certificate-valida-51c30f9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24932%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=6981ab4df9fa50a62fae40dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58379-cwe-250-execution-with-unnecessary--4d6c9aa7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58379%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=69815a2df9fa50a62f75462f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58383-cwe-250-execution-with-unnecessary--28045ad1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58383%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=69815a2df9fa50a62f754635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58382-cwe-305-authentication-bypass-by-pr-2712b1cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58382%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=69815a2df9fa50a62f754632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67482-vulnerability-in-wikimedia-foundati-3ab1abb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67482%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20Scribunto&amp;severity=low&amp;id=69815a2df9fa50a62f75463a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12774-cwe-312-cleartext-storage-of-sensit-dc98f0cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12774%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Brocade%20SANnav&amp;severity=medium&amp;id=69815a2df9fa50a62f75462c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67476-vulnerability-in-wikimedia-foundati-af667c78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67476%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69814fa1f9fa50a62f7207f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61658-vulnerability-in-wikimedia-foundati-893022c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61658%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20CheckUser&amp;severity=low&amp;id=69814fa1f9fa50a62f7207ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61653-vulnerability-in-wikimedia-foundati-bd66ea7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61653%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20TextExtracts&amp;severity=low&amp;id=69814fa1f9fa50a62f7207e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61652-vulnerability-in-wikimedia-foundati-c77e99b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61652%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20DiscussionTools&amp;severity=low&amp;id=69814fa1f9fa50a62f7207e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12773-cwe-209-generation-of-error-message-9a8c085f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12773%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Brocade%20SANnav&amp;severity=high&amp;id=69814899f9fa50a62f6fcd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61649-vulnerability-in-wikimedia-foundati-6556cb0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61649%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20CheckUser&amp;severity=low&amp;id=69814899f9fa50a62f6fcda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61650-cwe-79-improper-neutralization-of-i-c1f4561b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20CheckUser&amp;severity=low&amp;id=69814899f9fa50a62f6fcda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61646-vulnerability-in-wikimedia-foundati-d6a53ef1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61646%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69814899f9fa50a62f6fcd9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61647-vulnerability-in-wikimedia-foundati-1352debf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61647%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20CheckUser&amp;severity=low&amp;id=69813e0cf9fa50a62f67cdfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71179-na-4f02fb85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71179%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd6f9fa50a62f766387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70849-na-14adde7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70849%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd6f9fa50a62f766384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70841-na-87527d63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70841%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd6f9fa50a62f766381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70758-na-edce0892</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70758%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd6f9fa50a62f76637d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70560-na-a1557cbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70560%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd6f9fa50a62f766379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70559-na-fa1d2f69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70559%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd6f9fa50a62f766375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70311-na-719ec484</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70311%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd6f9fa50a62f766372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69983-na-b240ae98</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69983%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd6f9fa50a62f76636f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69981-na-ed422e9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69981%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd6f9fa50a62f76636c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69971-na-d9d772c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69971%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd4f9fa50a62f766340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69970-na-40e3c75d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69970%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd4f9fa50a62f76633d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69875-na-cdb5ae5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69875%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd4f9fa50a62f766339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69848-na-f57d1d43</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69848%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f766336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69431-na-b784a65c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69431%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f766332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69430-na-bb7b39df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69430%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f76632f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69429-na-f07f1dd5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69429%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f76632c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67189-na-07340f67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67189%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f766329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67188-na-9a3a25b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67188%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd4f9fa50a62f766326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67187-na-ebbbc6cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67187%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd4f9fa50a62f766323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67186-na-edcd0909</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67186%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd3f9fa50a62f766303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65924-na-299b6040</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65924%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd3f9fa50a62f766300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65923-na-b3f5ff7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65923%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd3f9fa50a62f7662fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65875-na-e9002ae9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65875%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd3f9fa50a62f7662f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63624-na-b2497d1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63624%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd3f9fa50a62f7662f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63372-na-a133bbc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63372%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd3f9fa50a62f7662f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61506-na-3f2c3321</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61506%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd3f9fa50a62f7662e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60865-na-98359347</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60865%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd3f9fa50a62f7662e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59439-na-7a5713e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59439%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd3f9fa50a62f7662e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58348-na-cbaee5db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58348%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58347-na-41b153f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58347%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58346-na-72d688ae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58346%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58345-na-9fef52b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58345%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58344-na-4d2bb961</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58344%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58343-na-5ad7c576</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58343%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f76629e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58342-na-807e1435</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58342%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f76629a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58341-na-a2a814f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58341%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f766296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58340-na-889d6323</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58340%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f766292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57529-na-01c7915e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57529%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd2f9fa50a62f76628e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46651-na-f768328f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46651%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd1f9fa50a62f76625d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-03-a3d53514</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-03&amp;severity=medium&amp;id=69828f56f9fa50a62fec0b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10878-cwe-89-improper-neutralization-of-s-0326dd4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10878%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Insaat%20Fikir%20Odalari%20AdminPando&amp;severity=critical&amp;id=698253c8f9fa50a62fdcb6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66374-na-bedcdb2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66374%3A%20n%2Fa&amp;severity=high&amp;id=69823426f9fa50a62fd6b723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-03-8e5385fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-03&amp;severity=low&amp;id=69817d1ff9fa50a62fa3e532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61639-cwe-200-exposure-of-sensitive-infor-31a81168</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61639%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813a88f9fa50a62f66a5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61641-vulnerability-in-wikimedia-foundati-cf54e7c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61641%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813705f9fa50a62f65ad9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61643-vulnerability-in-wikimedia-foundati-b0afc499</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61643%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813705f9fa50a62f65ada3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6589-vulnerability-in-wikimedia-foundatio-28598a3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6589%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813004f9fa50a62f63a36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6590-cwe-200-exposure-of-sensitive-inform-0472138d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6590%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=medium&amp;id=69813004f9fa50a62f63a36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25228-cwe-22-improper-limitation-of-a-pat-4868ed53</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25228%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=69813006f9fa50a62f63a41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6592-vulnerability-in-wikimedia-foundatio-2087539a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6592%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20AbuseFilter&amp;severity=low&amp;id=69813004f9fa50a62f63a373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6593-vulnerability-in-wikimedia-foundatio-552c2908</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6593%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813004f9fa50a62f63a376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25222-cwe-200-exposure-of-sensitive-infor-acec093e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25222%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20polarnl%20PolarLearn&amp;severity=medium&amp;id=69813006f9fa50a62f63a418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25221-cwe-352-cross-site-request-forgery--8ef58480</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25221%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20polarnl%20PolarLearn&amp;severity=low&amp;id=69813006f9fa50a62f63a414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6927-vulnerability-in-wikimedia-foundatio-b66a1f9f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6927%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813004f9fa50a62f63a381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25142-cwe-94-improper-control-of-generati-8791321b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25142%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69813006f9fa50a62f63a40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25137-cwe-552-files-or-directories-access-cb236fdd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25137%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20NixOS%20nixpkgs&amp;severity=critical&amp;id=69813006f9fa50a62f63a40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealers-without-borders-macos-python-stealers-07ae7015</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealers%20without%20borders%3A%20macOS%2C%20Python%20stealers%2C%20and%20platform%20abuse&amp;severity=medium&amp;id=6981d1b4f9fa50a62fb9d98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12772-cwe-312-cleartext-storage-of-sensit-a95ac02c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12772%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Brocade%20SANnav&amp;severity=high&amp;id=69813002f9fa50a62f63a03c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25134-cwe-88-improper-neutralization-of-a-90955f28</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25134%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=69813005f9fa50a62f63a3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25060-cwe-599-missing-validation-of-opens-937f34e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25060%3A%20CWE-599%3A%20Missing%20Validation%20of%20OpenSSL%20Certificate%20in%20OpenListTeam%20OpenList&amp;severity=high&amp;id=69813005f9fa50a62f63a3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25059-cwe-22-improper-limitation-of-a-pat-745d502d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25059%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenListTeam%20OpenList&amp;severity=high&amp;id=69813005f9fa50a62f63a3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36194-cwe-1262-improper-access-control-fo-96d3a201</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36194%3A%20CWE-1262%20Improper%20Access%20Control%20for%20Register%20Interface%20in%20IBM%20PowerVM%20Hypervisor&amp;severity=low&amp;id=69813002f9fa50a62f63a042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36238-cwe-497-exposure-of-sensitive-syste-79eaf296</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36238%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20PowerVM%20Hypervisor&amp;severity=medium&amp;id=69813002f9fa50a62f63a045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36253-cwe-759-use-of-a-one-way-hash-witho-8e816f27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36253%3A%20CWE-759%20Use%20of%20a%20One-Way%20Hash%20without%20a%20Salt%20in%20IBM%20Concert&amp;severity=medium&amp;id=69813002f9fa50a62f63a048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36436-cwe-79-improper-neutralization-of-i-fb05570e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36436%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=69813002f9fa50a62f63a04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12679-cwe-312-cleartext-storage-of-sensit-b2708941</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12679%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Brocade%20SANnav&amp;severity=high&amp;id=69813002f9fa50a62f63a035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66480-cwe-22-improper-limitation-of-a-pat-f9b78ea6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66480%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wildfirechat%20im-server&amp;severity=critical&amp;id=69813002f9fa50a62f63a04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69207-cwe-639-authorization-bypass-throug-43fcd7bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69207%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20khoj-ai%20khoj&amp;severity=medium&amp;id=69813002f9fa50a62f63a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22778-cwe-532-insertion-of-sensitive-info-0fbec5f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22778%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20vllm-project%20vllm&amp;severity=critical&amp;id=69813004f9fa50a62f63a39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13096-cwe-918-server-side-request-forgery-8fe02f54</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13096%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Business%20Automation%20Workflow%20containers&amp;severity=high&amp;id=69813002f9fa50a62f63a03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22780-cwe-770-allocation-of-resources-wit-d9804ba4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22780%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20rizinorg%20rizin&amp;severity=medium&amp;id=69813004f9fa50a62f63a3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12680-cwe-256-plaintext-storage-of-a-pass-b8f3474b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12680%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Brocade%20SANnav&amp;severity=medium&amp;id=69813002f9fa50a62f63a039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23476-cwe-79-improper-neutralization-of-i-7acc7f94</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23476%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NeoRazorX%20facturascripts&amp;severity=medium&amp;id=69813004f9fa50a62f63a3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23515-cwe-78-improper-neutralization-of-s-832cd743</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23515%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=69813004f9fa50a62f63a3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24040-cwe-362-concurrent-execution-using--4721980a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24040%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20parallax%20jsPDF&amp;severity=medium&amp;id=69813005f9fa50a62f63a3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24043-cwe-74-improper-neutralization-of-s-86f1965d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24043%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20parallax%20jsPDF&amp;severity=medium&amp;id=69813005f9fa50a62f63a3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24133-cwe-770-allocation-of-resources-wit-9a7fcc49</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24133%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69813005f9fa50a62f63a3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24737-cwe-116-improper-encoding-or-escapi-a9824d9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24737%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69813005f9fa50a62f63a3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23997-cwe-79-improper-neutralization-of-i-c1ff4e64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23997%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NeoRazorX%20facturascripts&amp;severity=high&amp;id=69813005f9fa50a62f63a3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0924-cwe-362-concurrent-execution-using-s-a2653c7f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0924%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Dr.Buho%20BuhoCleaner&amp;severity=high&amp;id=69813004f9fa50a62f63a392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1778-cwe-295-improper-certificate-validat-8c1863c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1778%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20AWS%20SageMaker%20Python%20SDK&amp;severity=medium&amp;id=69813004f9fa50a62f63a39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1777-cwe-319-cleartext-transmission-of-se-6c7a47ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1777%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20AWS%20SageMaker%20Python%20SDK&amp;severity=high&amp;id=69813004f9fa50a62f63a397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24007-cwe-352-cross-site-request-forgery--e9478fd3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24007%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=69813005f9fa50a62f63a3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24051-cwe-426-untrusted-search-path-in-op-0b813398</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24051%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20open-telemetry%20opentelemetry-go&amp;severity=high&amp;id=69813005f9fa50a62f63a3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-dropbox-phishing-campaign-via-pdf-and-cloud-s-ae7e8863</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Dropbox%20Phishing%20Campaign%20via%20PDF%20and%20Cloud%20Storage&amp;severity=medium&amp;id=698105ccf9fa50a62f55d511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22229-cwe-78-improper-neutralization-of-s-4fa10250</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22229%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22227-cwe-78-improper-neutralization-of-s-69860cb0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22227%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22226-cwe-78-improper-neutralization-of-s-104e12d2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22226%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22225-cwe-78-improper-neutralization-of-s-29b4cdf9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22225%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22224-cwe-78-improper-neutralization-of-s-bac7f152</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22224%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22223-cwe-78-improper-neutralization-of-s-dc5d7404</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22223%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20System%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22222-cwe-78-improper-neutralization-of-s-176a439f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22222%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-341-malicious-clawhub-skills-stea-1b7d1ac6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20341%20Malicious%20ClawHub%20Skills%20Stealing%20Data%20from%20OpenClaw%20Users&amp;severity=medium&amp;id=6981b662f9fa50a62fb23212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0631-cwe-78-improper-neutralization-of-sp-495e182f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0631%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0630-cwe-78-improper-neutralization-of-sp-9fdbb9a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0630%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22221-cwe-78-improper-neutralization-of-s-d9128518</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22221%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-does-cyberthreat-attribution-help-in-practice-108625a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20does%20cyberthreat%20attribution%20help%20in%20practice%3F&amp;severity=medium&amp;id=6980e37ff9fa50a62f4d7d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-bug-enables-one-click-remote-code-executi-f29b9ca2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Bug%20Enables%20One-Click%20Remote%20Code%20Execution%20via%20Malicious%20Link&amp;severity=critical&amp;id=6981b662f9fa50a62fb23215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1232-cwe-693-in-beyondtrust-privilege-man-412ace57</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1232%3A%20CWE-693%20in%20BeyondTrust%20Privilege%20management%20for%20Windows&amp;severity=medium&amp;id=6980d112f9fa50a62f4a9b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-begins-ntlm-phase-out-with-three-stage-p-db4e373f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Begins%20NTLM%20Phase-Out%20With%20Three-Stage%20Plan%20to%20Move%20Windows%20to%20Kerberos&amp;severity=low&amp;id=6981b662f9fa50a62fb23218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-branded-extortion-activity-expands-es-ad2675a7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters-Branded%20Extortion%20Activity%20Expands%2C%20Escalates&amp;severity=medium&amp;id=6980c2cef9fa50a62f489931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47402-cwe-126-buffer-over-read-in-qualcom-3ec9d46f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47402%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6980c31af9fa50a62f48b600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47399-cwe-120-buffer-copy-without-checkin-eb928ffb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47399%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47398-cwe-416-use-after-free-in-qualcomm--b317978c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47398%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47397-cwe-401-improper-release-of-memory--6e3d77ab</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47397%3A%20CWE-401%20Improper%20Release%20of%20Memory%20Before%20Removing%20Last%20Reference%20(&apos;Memory%20Leak&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47366-cwe-749-exposed-dangerous-method-or-e6e6d67e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47366%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47364-cwe-190-integer-overflow-or-wraparo-00adc77f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47364%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6980c319f9fa50a62f48b5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47363-cwe-190-integer-overflow-or-wraparo-d90611a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47363%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6980c319f9fa50a62f48b5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47359-cwe-416-use-after-free-in-qualcomm--247902eb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47359%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47358-cwe-416-use-after-free-in-qualcomm--1f021da9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47358%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14914-cwe-22-in-ibm-websphere-application-8b17a92a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14914%3A%20CWE-22%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=high&amp;id=6980c319f9fa50a62f48b5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-for-exposed-anthropic-models-mon-feb-2nd-311eb122</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20for%20exposed%20Anthropic%20Models%2C%20(Mon%2C%20Feb%202nd)&amp;severity=medium&amp;id=6980c2e6f9fa50a62f48a1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15395-cwe-863-incorrect-authorization-in--00702f39</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15395%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20Jazz%20Foundation&amp;severity=medium&amp;id=6980c319f9fa50a62f48b5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1703-cwe-22-improper-limitation-of-a-path-cec10edf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1703%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Python%20Packaging%20Authority%20pip&amp;severity=low&amp;id=6980bf7df9fa50a62f481764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-vsx-publisher-account-hijacked-in-fresh-glass-4095a4bf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20VSX%20Publisher%20Account%20Hijacked%20in%20Fresh%20GlassWorm%20Attack&amp;severity=medium&amp;id=6980b13af9fa50a62f450ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1760-inconsistent-interpretation-of-http--e8c3b5d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1760%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6980b180f9fa50a62f4545f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1761-stack-based-buffer-overflow-in-red-h-5ed2e51a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1761%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=6980b180f9fa50a62f4545f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1186-cwe-22-improper-limitation-of-a-path-f73661f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1186%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ABC%20PRO%20SP.%20Z%20O.O.%20EAP%20Legislator&amp;severity=high&amp;id=6980b180f9fa50a62f4545f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/default-ics-credentials-exploited-in-destructive-a-7fb05b57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Default%20ICS%20Credentials%20Exploited%20in%20Destructive%20Attack%20on%20Polish%20Energy%20Facilities&amp;severity=medium&amp;id=6980adb6f9fa50a62f443467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2nd-february-threat-intelligence-report-bd9882a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2nd%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6980aa66f9fa50a62f4395c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24071-cwe-367-time-of-check-time-of-use-t-0e091344</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24071%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Native%20Instruments%20Native%20Access&amp;severity=high&amp;id=6980aa65f9fa50a62f439594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24070-cwe-426-untrusted-search-path-in-na-d3bf89df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24070%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Native%20Instruments%20Native%20Access&amp;severity=high&amp;id=6980aa65f9fa50a62f439591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8587-cwe-89-improper-neutralization-of-sp-f35da5ab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8587%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AKCE%20Software%20Technology%20R%26D%20Industry%20and%20Trade%20Inc.%20SKSPro&amp;severity=high&amp;id=6980a35df9fa50a62f42094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1757-missing-release-of-memory-after-effe-a0b6fc76</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1757%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69809c55f9fa50a62f409541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-malware-and-cyberattacks-in-th-6a9c8fc3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20Malware%20and%20Cyberattacks%20in%20the%20Age%20of%20AI&amp;severity=medium&amp;id=6980951af9fa50a62f3e2ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-proxy-botnet-office-zero-day-mongodb--1079d903</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Proxy%20Botnet%2C%20Office%20Zero-Day%2C%20MongoDB%20Ransoms%2C%20AI%20Hijacks%20%26%20New%20Threats&amp;severity=medium&amp;id=6981b662f9fa50a62fb2321b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-1400-mongodb-databases-ransacked-by-threat-ac-fefda5fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%201%2C400%20MongoDB%20Databases%20Ransacked%20by%20Threat%20Actor&amp;severity=medium&amp;id=69809196f9fa50a62f3c3e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-moves-closer-to-disabling-ntlm-52adee71</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Moves%20Closer%20to%20Disabling%20NTLM&amp;severity=medium&amp;id=69808e12f9fa50a62f3b0342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-you-need-assistance-8f4fd974</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%2C%20You%20Need%20Assistance!&amp;severity=medium&amp;id=698083b8f9fa50a62f37054c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0599-cwe-400-uncontrolled-resource-consum-d7b2482e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0599%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20huggingface%20huggingface%2Ftext-generation-inference&amp;severity=high&amp;id=698083b8f9fa50a62f37059e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5986-cwe-73-external-control-of-file-name-d80fe82d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5986%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=critical&amp;id=698083b8f9fa50a62f37058f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7105-cwe-400-uncontrolled-resource-consum-c2e5f2b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7105%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=698083b8f9fa50a62f37059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2356-cwe-29-path-traversal-filename-in-pa-ce230c5d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2356%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=critical&amp;id=698083b8f9fa50a62f370582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5386-cwe-1125-excessive-attack-surface-in-58c2e960</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5386%3A%20CWE-1125%20Excessive%20Attack%20Surface%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=698083b8f9fa50a62f37058b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6208-cwe-400-uncontrolled-resource-consum-4339b4ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6208%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=698083b8f9fa50a62f370596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10279-cwe-379-creation-of-temporary-file--5f6c9a35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10279%3A%20CWE-379%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Insecure%20Permissions%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=698083b8f9fa50a62f370592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4147-cwe-1220-insufficient-granularity-of-fcdfdfa3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4147%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=698083b8f9fa50a62f370586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1117-cwe-284-improper-access-control-in-p-16cd6feb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1117%3A%20CWE-284%20Improper%20Access%20Control%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=6980792cf9fa50a62f31f217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-supply-chain-hack-conducted-by-china-via-h-df9cd168</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Supply%20Chain%20Hack%20Conducted%20by%20China%20via%20Hosting%20Provider&amp;severity=medium&amp;id=69806e6ef9fa50a62f2d9060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54263-cwe-98-improper-control-of-filename-73d2c584</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54263%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Talemy%20Spirit%20Framework&amp;severity=high&amp;id=69806eb0f9fa50a62f2dba76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9974-vulnerability-in-nokia-nokia-ont-c7bc3643</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9974%3A%20Vulnerability%20in%20Nokia%20Nokia%20ONT&amp;severity=high&amp;id=69806b1df9fa50a62f2c3c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-official-update-mechanism-hijacked-to-deli-9a7db83a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Official%20Update%20Mechanism%20Hijacked%20to%20Deliver%20Malware%20to%20Select%20Users&amp;severity=low&amp;id=6981b662f9fa50a62fb23221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20419-cwe-754-improper-check-for-unusual--c4e4a49c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20419%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20418-cwe-787-out-of-bounds-write-in-medi-dcb95681</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20418%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=critical&amp;id=69806094f9fa50a62f0b3fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20417-cwe-787-out-of-bounds-write-in-medi-0b0410a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20417%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20415-cwe-415-double-free-in-mediatek-inc-f332af50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20415%3A%20CWE-415%20Double%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20414-cwe-416-use-after-free-in-mediatek--55737f91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20414%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20413-cwe-1285-specified-index-position-o-cfb947da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20413%3A%20CWE-1285%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20412-cwe-787-out-of-bounds-write-in-medi-45313a05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20412%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69806094f9fa50a62f0b3fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20411-cwe-416-use-after-free-in-mediatek--fb6d4f1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20411%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69806094f9fa50a62f0b3fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20410-cwe-787-out-of-bounds-write-in-medi-260a2dbe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20410%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20409-cwe-787-out-of-bounds-write-in-medi-59af0c46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20409%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69806092f9fa50a62f0b3f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20408-cwe-122-heap-overflow-in-mediatek-i-46f3fc29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20408%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69806092f9fa50a62f0b3f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20407-cwe-787-out-of-bounds-write-in-medi-9d5cd63b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20407%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=critical&amp;id=69806092f9fa50a62f0b3f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20406-cwe-770-allocation-of-resources-wit-23191c9a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20406%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20405-cwe-617-reachable-assertion-in-medi-3e6421fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20405%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20404-cwe-787-out-of-bounds-write-in-medi-3283e24e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20404%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20403-cwe-787-out-of-bounds-write-in-medi-44e96189</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20403%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20422-cwe-617-reachable-assertion-in-medi-aed96d0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20422%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806096f9fa50a62f0b42d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20421-cwe-125-out-of-bounds-read-in-media-218fedd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20421%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20402-cwe-787-out-of-bounds-write-in-medi-94eb6596</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20402%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20401-cwe-617-reachable-assertion-in-medi-04e3483c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20401%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20420-cwe-125-out-of-bounds-read-in-media-9dd5d463</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20420%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1518-server-side-request-forgery-ssrf-in--5120fbd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1518%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69805578ac06320222d0c0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22888-improper-handling-of-extra-values-i-9941aaa0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22888%3A%20Improper%20handling%20of%20extra%20values%20in%20Cybozu%2C%20Inc.%20Cybozu%20Garoon&amp;severity=medium&amp;id=69804768ac06320222c3bb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22881-cross-site-scripting-xss-in-cybozu--95b0b9a3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22881%3A%20Cross-site%20scripting%20(XSS)%20in%20Cybozu%2C%20Inc.%20Cybozu%20Garoon&amp;severity=medium&amp;id=69804768ac06320222c3bb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20711-cross-site-scripting-xss-in-cybozu--34a74228</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20711%3A%20Cross-site%20scripting%20(XSS)%20in%20Cybozu%2C%20Inc.%20Cybozu%20Garoon&amp;severity=medium&amp;id=69804768ac06320222c3bb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0658-cwe-352-cross-site-request-forgery-c-29eae45b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0658%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Five%20Star%20Restaurant%20Reservations&amp;severity=medium&amp;id=698043e3ac06320222c1dd0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15396-cwe-79-cross-site-scripting-xss-in--e274366b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15396%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Library%20Viewer&amp;severity=high&amp;id=698043e3ac06320222c1dd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15030-cwe-269-improper-privilege-manageme-7c2c4cdd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15030%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20User%20Profile%20Builder&amp;severity=critical&amp;id=698043e3ac06320222c1dd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1530-improper-certificate-validation-in-r-a5c41860</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1530%3A%20Improper%20Certificate%20Validation%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69803cdcac06320222bdf0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1531-improper-certificate-validation-in-r-c5c10b19</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1531%3A%20Improper%20Certificate%20Validation%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69803cdcac06320222bdf0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/escan-antivirus-update-servers-compromised-to-deli-01e8d7c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=eScan%20Antivirus%20Update%20Servers%20Compromised%20to%20Deliver%20Multi-Stage%20Malware&amp;severity=medium&amp;id=69806471f9fa50a62f14456f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13881-incorrect-privilege-assignment-in-r-46708347</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13881%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69803cdcac06320222bdf09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1746-sql-injection-in-jeecgboot-a5a79fe7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1746%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=69803cdcac06320222bdf0ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-vsx-supply-chain-attack-used-compromised-dev--b944767e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20VSX%20Supply%20Chain%20Attack%20Used%20Compromised%20Dev%20Account%20to%20Spread%20GlassWorm&amp;severity=medium&amp;id=6980321bac06320222b73f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1745-cross-site-request-forgery-in-source-6d717d8e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1745%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Medical%20Certificate%20Generator%20App&amp;severity=medium&amp;id=698035d4ac06320222b923c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25202-cwe-798-use-of-hard-coded-credentia-9417c5c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25202%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=69802ecbac06320222b5653c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25201-cwe-434-unrestricted-upload-of-file-57fca6fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25201%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=69802ecbac06320222b56539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25200-cwe-434-unrestricted-upload-of-file-fb70b7e3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25200%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=69802ecbac06320222b56536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24788-improper-neutralization-of-special--fdeb122d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24788%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RaspAP%20raspap-webgui&amp;severity=high&amp;id=69802ecbac06320222b56532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1744-cross-site-scripting-in-d-link-dsl-6-42a46ae0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1744%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DSL-6641K&amp;severity=medium&amp;id=69802ecbac06320222b5652b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1743-authentication-bypass-by-capture-rep-a2f8a11f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1743%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20DJI%20Mavic%20Mini&amp;severity=low&amp;id=69802440ac06320222ae2d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1742-unrestricted-upload-in-efm-iptime-a8-6d1c4e7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1742%3A%20Unrestricted%20Upload%20in%20EFM%20ipTIME%20A8004T&amp;severity=medium&amp;id=69802440ac06320222ae2d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1741-backdoor-in-efm-iptime-a8004t-a6ce7be2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1741%3A%20Backdoor%20in%20EFM%20ipTIME%20A8004T&amp;severity=high&amp;id=698019b4ac063202228a700f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1740-improper-authentication-in-efm-iptim-0c8f5671</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1740%3A%20Improper%20Authentication%20in%20EFM%20ipTIME%20A8004T&amp;severity=medium&amp;id=698019b4ac063202228a7009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1739-null-pointer-dereference-in-free5gc--ad89dabf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1739%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC%20pcf&amp;severity=medium&amp;id=69800820ac063202227a882f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13348-cwe-862-missing-authorization-in-as-a40e758c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13348%3A%20CWE-862%20Missing%20Authorization%20in%20ASUS%20ASUS%20Business%20Manager&amp;severity=high&amp;id=69800820ac063202227a8823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1738-reachable-assertion-in-open5gs-86c2590e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1738%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=69800820ac063202227a8826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1737-reachable-assertion-in-open5gs-19af8589</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1737%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=697ffd93ac0632022270663c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1736-reachable-assertion-in-open5gs-341c287c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1736%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=697ff68cac06320222673ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1735-command-injection-in-yealink-meeting-8f7075f5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1735%3A%20Command%20Injection%20in%20Yealink%20MeetingBar%20A30&amp;severity=low&amp;id=697ff68cac06320222673aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/d-link-dir-825-revb-210-stack-buffer-overflow-dos-247968d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=D-Link%20DIR-825%20Rev.B%202.10%20-%20Stack%20Buffer%20Overflow%20(DoS)&amp;severity=medium&amp;id=6981b62cf9fa50a62fb22405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rpi-jukebox-rfid-280-stored-cross-site-scripting-x-778770e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RPi-Jukebox-RFID%202.8.0%20-%20Stored%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=6981b62cf9fa50a62fb22400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/piranha-cms-120-stored-xss-in-text-block-88916144</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Piranha%20CMS%2012.0%20-%20Stored%20XSS%20in%20Text%20Block&amp;severity=medium&amp;id=6981b62cf9fa50a62fb223fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-02-6afab789</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-02&amp;severity=medium&amp;id=69813dd7f9fa50a62f677cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70960-na-2fa73ca9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70960%3A%20n%2Fa&amp;severity=medium&amp;id=69813004f9fa50a62f63a38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70959-na-28dbfa81</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70959%3A%20n%2Fa&amp;severity=medium&amp;id=69813004f9fa50a62f63a38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70958-na-79956a6c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70958%3A%20n%2Fa&amp;severity=medium&amp;id=69813004f9fa50a62f63a389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-02-3a16fae5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-02&amp;severity=low&amp;id=6980605bf9fa50a62f0ad30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1734-missing-authorization-in-zhong-bang--4a1d3155</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1734%3A%20Missing%20Authorization%20in%20Zhong%20Bang%20CRMEB&amp;severity=medium&amp;id=697fe4f8ac0632022254f721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1733-improper-authorization-in-zhong-bang-685c81aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1733%3A%20Improper%20Authorization%20in%20Zhong%20Bang%20CRMEB&amp;severity=medium&amp;id=697fddf0ac06320222500779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-01-f1820db8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-01&amp;severity=medium&amp;id=697febc9ac063202225bd9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-01-8f5478b5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-01&amp;severity=low&amp;id=697f430aac06320222f64068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25069-cwe-22-improper-limitation-of-a-pat-afb23a8b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25069%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SunFounder%20Pironman%20Dashboard%20(pm_dashboard)&amp;severity=critical&amp;id=697e96fbac063202225694f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/escan-antivirus-delivers-malware-in-supply-chain-a-6bb6e275</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=eScan%20Antivirus%20Delivers%20Malware%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=697e1bbdac063202223b0095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1165-cwe-352-cross-site-request-forgery-c-ca610645</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1165%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Popup%20Box%20%E2%80%93%20Create%20Countdown%2C%20Coupon%2C%20Video%2C%20Contact%20Form%20Popups&amp;severity=medium&amp;id=697e1164ac0632022238f8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14554-cwe-79-improper-neutralization-of-i-b079b282</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hayyatapps%20Sell%20BTC%20%E2%80%93%20Cryptocurrency%20Selling%20%20Calculator&amp;severity=high&amp;id=697e06d8ac0632022235a598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-redkitten-cyber-campaign-targets-human-f0c3bff7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20RedKitten%20Cyber%20Campaign%20Targets%20Human%20Rights%20NGOs%20and%20Activists&amp;severity=medium&amp;id=697f10f7ac06320222d31afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kaspersky-siem-42-update-whats-new-kaspersky-offic-0f27f3c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kaspersky%20SIEM%204.2%20update%20%E2%80%94%20what%E2%80%99s%20new%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=697dd95fac06320222238741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-the-expansion-of-shinyhunters-branded-saa-7c8fee00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20the%20Expansion%20of%20ShinyHunters-Branded%20SaaS%20Data%20Theft&amp;severity=medium&amp;id=6980803af9fa50a62f356ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mandiant-finds-shinyhunters-style-vishing-attacks--65a0fc7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mandiant%20Finds%20ShinyHunters-Style%20Vishing%20Attacks%20Stealing%20MFA%20to%20Breach%20SaaS%20Platforms&amp;severity=medium&amp;id=697dc6a3ac063202221e55f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cert-polska-details-coordinated-cyber-attacks-on-3-c244f712</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CERT%20Polska%20Details%20Coordinated%20Cyber%20Attacks%20on%2030%2B%20Wind%20and%20Solar%20Farms&amp;severity=medium&amp;id=697dc6a3ac063202221e55f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1251-cwe-639-authorization-bypass-through-0dcb57e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1251%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20psmplugins%20SupportCandy%20%E2%80%93%20Helpdesk%20%26%20Customer%20Support%20Ticket%20System&amp;severity=medium&amp;id=697da7ecac06320222134c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0683-cwe-89-improper-neutralization-of-sp-4338147b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0683%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20psmplugins%20SupportCandy%20%E2%80%93%20Helpdesk%20%26%20Customer%20Support%20Ticket%20System&amp;severity=medium&amp;id=697d9d60ac06320222110317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15525-cwe-863-incorrect-authorization-in--2dc020d8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15525%3A%20CWE-863%20Incorrect%20Authorization%20in%20dcooney%20Ajax%20Load%20More%20%E2%80%93%20Infinite%20Scroll%2C%20Load%20More%2C%20%26%20Lazy%20Load&amp;severity=medium&amp;id=697d8bcbac06320222f8a0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1431-cwe-862-missing-authorization-in-wpd-11205345</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1431%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=697d8bcbac06320222f8a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15510-cwe-862-missing-authorization-in-we-8fab338d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15510%3A%20CWE-862%20Missing%20Authorization%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=697d6520ac06320222aa2326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-31-45ad8107</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-31&amp;severity=medium&amp;id=697e9a49ac0632022257398d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-31-20d0a565</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-31&amp;severity=low&amp;id=697d9622ac0632022204bcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25156-cwe-79-improper-neutralization-of-i-a714bd99</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25156%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kohler%20hotcrp&amp;severity=high&amp;id=697d3064ac06320222828d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1705-cross-site-scripting-in-d-link-dsl-6-4909cbf9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1705%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DSL-6641K&amp;severity=medium&amp;id=697d25daac063202227d3694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2668-cwe-789-in-ibm-db2-for-linux-unix-an-c8921221</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2668%3A%20CWE-789%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36001-cwe-674-uncontrolled-recursion-in-i-7ddb6515</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36001%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d363d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36009-cwe-1108-in-ibm-db2-for-linux-unix--d1a2d36c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36009%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36070-cwe-770-allocation-of-resources-wit-d3601657</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36070%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36098-cwe-770-allocation-of-resources-wit-275ba750</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36098%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36123-cwe-770-allocation-of-resources-wit-ebc3dce8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36123%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36184-cwe-250-in-ibm-db2-for-linux-unix-a-befe28b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36184%3A%20CWE-250%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=high&amp;id=697d25d9ac063202227d364c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36353-cwe-943-in-ibm-db2-for-linux-unix-a-f0aa8dc2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36353%3A%20CWE-943%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d364f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36365-cwe-639-authorization-bypass-throug-2d42b29c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36365%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36366-cwe-943-in-ibm-db2-for-linux-unix-a-dbc5a3b9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36366%3A%20CWE-943%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36384-cwe-428-unquoted-search-path-or-ele-6af37e68</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36384%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=high&amp;id=697d25daac063202227d367f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36387-cwe-770-allocation-of-resources-wit-3f17f5c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36387%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d3682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36407-cwe-1284-improper-validation-of-spe-f7c89e3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36407%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d3685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36423-cwe-1284-improper-validation-of-spe-e52ba2f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36423%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d3688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36424-cwe-1284-improper-validation-of-spe-1333e0ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36424%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d368b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36427-cwe-1284-improper-validation-of-spe-0f0a6c97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36427%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d368e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36428-cwe-1284-improper-validation-of-spe-45e0fe3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36428%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d3691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36442-cwe-943-in-ibm-db2-for-linux-unix-a-965a2472</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36442%3A%20CWE-943%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d2254ac063202227c9fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1723-cwe-78-improper-neutralization-of-sp-9c7384c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1723%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOTOLINK%20X6000R&amp;severity=critical&amp;id=697d1ed0ac063202227bbb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25141-cwe-94-improper-control-of-generati-0a817c27</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25141%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20orval-labs%20orval&amp;severity=critical&amp;id=697d1444ac0632022278962a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25130-cwe-78-improper-neutralization-of-s-ca371bc9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25130%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20aliasrobotics%20cai&amp;severity=critical&amp;id=697d1444ac06320222789625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25129-cwe-427-uncontrolled-search-path-el-fcd943ae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25129%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20bobthecow%20psysh&amp;severity=medium&amp;id=697d1444ac06320222789620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24293-vulnerability-in-rails-activestorag-36ee0cdd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24293%3A%20Vulnerability%20in%20Rails%20activestorage&amp;severity=critical&amp;id=697d1444ac0632022278961a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23835-cwe-73-external-control-of-file-nam-e94ac8c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23835%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20lobehub%20lobe-chat&amp;severity=medium&amp;id=697d10c0ac0632022277c27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11175-cwe-917-improper-neutralization-of--002c9475</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11175%3A%20CWE-917%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20Expression%20Language%20Statement%20(&apos;Expression%20Language%20Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20DiscussionTools%20Extension&amp;severity=high&amp;id=697d0634ac06320222741993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62349-cwe-287-improper-authentication-in--d6768a4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62349%3A%20CWE-287%20Improper%20Authentication%20in%20Salt%20Project%20Salt&amp;severity=medium&amp;id=697d02b1ac06320222725d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62348-cwe-94-improper-control-of-generati-51d30aa3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62348%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Salt%20Project%20Salt&amp;severity=high&amp;id=697d02b1ac06320222725d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dynowiper-update-technical-analysis-2476835f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DynoWiper%20update%3A%20Technical%20analysis&amp;severity=medium&amp;id=698083b8f9fa50a62f370564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9432-cwe-312-cleartext-storage-of-sensiti-9e16fdbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9432%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=697cfba8ac063202226ddd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-presentations-abused-for-phishing-fri-jan-3-7cfca707</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Presentations%20Abused%20for%20Phishing%2C%20(Fri%2C%20Jan%2030th)&amp;severity=medium&amp;id=697cf0f5ac063202226b8f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-paid-for-being-jailed-googles-68m-se-d0cc372a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Paid%20for%20Being%20Jailed%2C%20Google%E2%80%99s%20%2468M%20Settlement%2C%20CISA%20Chief%E2%80%99s%20ChatGPT%20Leak&amp;severity=medium&amp;id=697cf0e9ac063202226b8b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1702-improper-authorization-in-sourcecode-116a5d0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1702%3A%20Improper%20Authorization%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=697d09b8ac06320222751064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1701-sql-injection-in-itsourcecode-studen-121bdbc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1701%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697d09b8ac0632022275105d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1700-cross-site-scripting-in-projectworld-0be90a39</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1700%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20House%20Rental%20and%20Property%20Listing&amp;severity=medium&amp;id=697ce690ac0632022267af13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1691-deserialization-in-bolo-solo-6c2c9678</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1691%3A%20Deserialization%20in%20bolo-solo&amp;severity=medium&amp;id=697ce690ac0632022267af0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1690-command-injection-in-tenda-hg10-5ca5522d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1690%3A%20Command%20Injection%20in%20Tenda%20HG10&amp;severity=medium&amp;id=697cdf88ac063202226562a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1689-command-injection-in-tenda-hg10-04c9932c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1689%3A%20Command%20Injection%20in%20Tenda%20HG10&amp;severity=medium&amp;id=697cdf88ac0632022265629a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1688-sql-injection-in-itsourcecode-direct-dfed63ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1688%3A%20SQL%20Injection%20in%20itsourcecode%20Directory%20Management%20System&amp;severity=medium&amp;id=697cd880ac06320222633559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1687-command-injection-in-tenda-hg10-3cd4f732</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1687%3A%20Command%20Injection%20in%20Tenda%20HG10&amp;severity=medium&amp;id=697cd880ac06320222633551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4686-cwe-89-improper-neutralization-of-sp-05c599ed</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4686%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kodmatic%20Computer%20Software%20Tourism%20Construction%20Industry%20and%20Trade%20Ltd.%20Co.%20Online%20Exam%20and%20Assessment&amp;severity=high&amp;id=697cd880ac0632022263354e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25128-cwe-20-improper-input-validation-in-13ab9ba7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25128%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=high&amp;id=697ccdf4ac06320222611087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25050-cwe-202-exposure-of-sensitive-infor-c0c2d2a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25050%3A%20CWE-202%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20vendurehq%20vendure&amp;severity=low&amp;id=697ccdf4ac06320222611083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24855-cwe-79-improper-neutralization-of-i-0f522e38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24855%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=697ccdf4ac0632022261107e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24854-cwe-89-improper-neutralization-of-s-82a5753b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24854%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=697ccdf4ac0632022261107a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7964-cwe-229-improper-handling-of-values--2d7ee87b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7964%3A%20CWE-229%3A%20Improper%20Handling%20of%20Values%20in%20silabs.com%20Silicon%20Labs%20Zigbee%20Stack&amp;severity=critical&amp;id=697ccdf4ac0632022261106f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1686-buffer-overflow-in-totolink-a3600r-6b75badd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1686%3A%20Buffer%20Overflow%20in%20Totolink%20A3600R&amp;severity=high&amp;id=697ccdf4ac06320222611072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/175000-exposed-ollama-hosts-could-enable-llm-abuse-aa9f77fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=175%2C000%20Exposed%20Ollama%20Hosts%20Could%20Enable%20LLM%20Abuse&amp;severity=medium&amp;id=697cc335ac063202225d72b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1685-improper-restriction-of-excessive-au-2801b5e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1685%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=697cc6ebac063202225ecfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1684-denial-of-service-in-free5gc-smf-07a599ee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1684%3A%20Denial%20of%20Service%20in%20Free5GC%20SMF&amp;severity=medium&amp;id=697cc6ebac063202225ecfa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4027-improper-input-validation-in-red-hat-9404e900</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4027%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20OpenShift%20Serverless&amp;severity=high&amp;id=697cbfe4ac063202225ceb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6723-cwe-269-improper-privilege-managemen-d45e9479</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6723%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Progress%20Software%20Chef%20Inspec&amp;severity=medium&amp;id=697cca73ac0632022260359c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1683-denial-of-service-in-free5gc-smf-82eef032</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1683%3A%20Denial%20of%20Service%20in%20Free5GC%20SMF&amp;severity=medium&amp;id=697cca73ac063202226035a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1682-null-pointer-dereference-in-free5gc--80a0232e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1682%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC%20SMF&amp;severity=medium&amp;id=697cca73ac0632022260359f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9226-cwe-79-improper-neutralization-of-in-fa582aa6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20OpManager&amp;severity=medium&amp;id=697db656ac06320222187bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-chrome-extensions-abusing-affi-4215055b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20Chrome%20Extensions%20Abusing%20Affiliate%20Links%20and%20Stealing%20ChatGPT%20Access&amp;severity=medium&amp;id=697dc6a3ac063202221e55f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1498-cwe-90-improper-neutralization-of-sp-8f4f0959</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1498%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=697cae50ac0632022258677c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/white-house-scraps-burdensome-software-security-ru-0e500003</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=White%20House%20Scraps%20%E2%80%98Burdensome%E2%80%99%20Software%20Security%20Rules&amp;severity=medium&amp;id=697ca715ac063202225692a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13176-cwe-269-improper-privilege-manageme-c0837eb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13176%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ESET%2C%20spol.%20s.r.o%20ESET%20Inspect%20Connector&amp;severity=high&amp;id=697ca3c3ac0632022255cb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-uat-8099-targets-iis-servers-in-asia--ef044fe7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20UAT-8099%20Targets%20IIS%20Servers%20in%20Asia%20with%20BadIIS%20SEO%20Malware&amp;severity=medium&amp;id=697dc6a3ac063202221e55fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badges-bytes-and-blackmail-23acc84e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Badges%2C%20Bytes%20and%20Blackmail&amp;severity=medium&amp;id=697dc6a3ac063202221e55fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26385-cwe-77-improper-neutralization-of-s-9f4d77f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26385%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Johnson%20Controls%20Metasys&amp;severity=critical&amp;id=697c9243ac063202224f3c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22626-vulnerability-in-hiksemi-hs-afs-s1h-47590381</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22626%3A%20Vulnerability%20in%20HIKSEMI%20HS-AFS-S1H1&amp;severity=medium&amp;id=697c9243ac063202224f3c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22625-vulnerability-in-hiksemi-hs-afs-s1h-e12a6df2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22625%3A%20Vulnerability%20in%20HIKSEMI%20HS-AFS-S1H1&amp;severity=medium&amp;id=697c9243ac063202224f3c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22624-vulnerability-in-hiksemi-hs-afs-s1h-5699d8a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22624%3A%20Vulnerability%20in%20HIKSEMI%20HS-AFS-S1H1&amp;severity=medium&amp;id=697c9243ac063202224f3c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22623-vulnerability-in-hiksemi-hs-afs-s1h-b5fb56f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22623%3A%20Vulnerability%20in%20HIKSEMI%20HS-AFS-S1H1&amp;severity=high&amp;id=697c9243ac063202224f3c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0709-vulnerability-in-hikvision-ds-3wap52-877503e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0709%3A%20Vulnerability%20in%20Hikvision%20DS-3WAP521-SI&amp;severity=high&amp;id=697c9243ac063202224f3c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hugging-face-abused-to-deploy-android-rat-76fcf33e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hugging%20Face%20Abused%20to%20Deploy%20Android%20RAT&amp;severity=medium&amp;id=697c91fdac063202224f2357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1699-cwe-829-inclusion-of-functionality-f-246dea02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1699%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Eclipse%20Foundation%20Eclipse%20Theia%20-%20Website&amp;severity=critical&amp;id=697c8420ac0632022249df80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-malware-talks-back-3dc8f95d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Malware%20Talks%20Back&amp;severity=medium&amp;id=697ced97ac063202226a8793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-devices-bricked-following-russia-linked-intrus-0fae875c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Devices%20Bricked%20Following%20Russia-Linked%20Intrusion%20Into%20Polish%20Power%20Grid&amp;severity=low&amp;id=697c7ce5ac0632022246955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/labyrinth-chollima-evolves-into-three-adversaries-2399fbec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LABYRINTH%20CHOLLIMA%20Evolves%20into%20Three%20Adversaries&amp;severity=medium&amp;id=697c728bac06320222401ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-intelligence-dossier-toxicsnake-53941704</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Intelligence%20Dossier%3A%20TOXICSNAKE&amp;severity=medium&amp;id=697c728bac06320222401f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21418-cwe-78-improper-neutralization-of-s-2211bd2a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21418%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=697c728bac06320222401f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-patches-exploited-epmm-zero-days-efe15326</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Patches%20Exploited%20EPMM%20Zero-Days&amp;severity=critical&amp;id=697c6ed5ac063202223d125e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1395-cwe-209-generation-of-error-message--468f2ac7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1395%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Codriapp%20Innovation%20and%20Software%20Technologies%20Inc.%20HeyGarson&amp;severity=high&amp;id=697c728bac06320222401f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22277-cwe-78-improper-neutralization-of-s-ff14e5a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22277%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20UnityVSA&amp;severity=high&amp;id=697c6f18ac063202223d45cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meet-iclickfix-a-widespread-framework-using-the-cl-e275cbd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meet%20IClickFix%3A%20a%20widespread%20framework%20using%20the%20ClickFix%20tactic&amp;severity=medium&amp;id=697c6f1cac063202223d4635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attack-on-stan-your-malware-my-c2-77f84c64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attack%20on%20*stan%3A%20Your%20malware%2C%20my%20C2&amp;severity=medium&amp;id=697c6f1cac063202223d45fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nfcshare-android-trojan-nfc-card-data-theft-via-ma-6441cd2c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NFCShare%20Android%20Trojan%3A%20NFC%20card%20data%20theft%20via%20malicious%20APK&amp;severity=medium&amp;id=697c6f1cac063202223d45f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-google-engineer-convicted-for-stealing-2000-ai--970db7ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-Google%20Engineer%20Convicted%20for%20Stealing%20AI%20Secrets%20for%20China%20Startup&amp;severity=medium&amp;id=697c85b0ac063202224aa3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25211-cwe-532-insertion-of-sensitive-info-150c55db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25211%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20llamastack%20Llama%20Stack&amp;severity=low&amp;id=697c5d74ac0632022237b59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartermail-fixes-critical-unauthenticated-rce-fla-63bd7cac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmarterMail%20Fixes%20Critical%20Unauthenticated%20RCE%20Flaw%20with%20CVSS%209.3%20Score&amp;severity=critical&amp;id=697c85b0ac063202224aa3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25210-cwe-190-integer-overflow-or-wraparo-f81ed376</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25210%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20libexpat%20project%20libexpat&amp;severity=medium&amp;id=697c59efac0632022236acf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0805-cwe-22-improper-limitation-of-a-path-6789e9fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0805%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=high&amp;id=697c4f63ac06320222326298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0963-cwe-22-improper-limitation-of-a-path-9ed6ccb6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0963%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=critical&amp;id=697c4f63ac0632022232629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1680-cwe-250-execution-with-unnecessary-p-e9896a9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1680%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Edgemo%20(Danoffice%20IT)%20Local%20Admin%20Service&amp;severity=high&amp;id=697c4f63ac0632022232629e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12899-access-of-resource-using-incompatib-1d2d3635</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12899%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=697c44d7ac063202222d2c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-ivanti-epmm-zero-day-rce-flaws-actively-exploi-16adf6db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Ivanti%20EPMM%20Zero-Day%20RCE%20Flaws%20Actively%20Exploited%2C%20Security%20Updates%20Released&amp;severity=critical&amp;id=697c3a16ac0632022228de5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24714-inclusion-of-undocumented-features--b6d65bd8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24714%3A%20Inclusion%20of%20undocumented%20features%20or%20chicken%20bits%20in%20NETGEAR%20NETGEAR%20products&amp;severity=high&amp;id=697c334dac0632022226c7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24729-cwe-434-unrestricted-upload-of-file-b0f77a6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24729%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Internet%20Information%20Co.%2C%20Ltd%20DreamMaker&amp;severity=critical&amp;id=697c334dac0632022226c800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24728-cwe-306-missing-authentication-for--1a7f3b9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24728%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Internet%20Information%20Co.%2C%20Ltd%20DreamMaker&amp;severity=critical&amp;id=697c334dac0632022226c7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15322-incorrect-authorization-in-tanium-t-019634aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15322%3A%20Incorrect%20Authorization%20in%20Tanium%20Tanium%20Server&amp;severity=medium&amp;id=697bfe87ac06320222d12b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-30-11257a61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-30&amp;severity=medium&amp;id=697d48c9ac0632022288f1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69662-na-8d33d632</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69662%3A%20n%2Fa&amp;severity=high&amp;id=697d02b1ac06320222725d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51958-na-dd246dd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51958%3A%20n%2Fa&amp;severity=critical&amp;id=697cfba8ac063202226ddd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-30-15a00164</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-30&amp;severity=low&amp;id=697c795eac06320222451188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1638-command-injection-in-tenda-ac21-9f7b3e79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1638%3A%20Command%20Injection%20in%20Tenda%20AC21&amp;severity=medium&amp;id=697bf078ac06320222c697bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1665-cwe-78-improper-neutralization-of-sp-c9578cde</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1665%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nvm-sh%20nvm&amp;severity=medium&amp;id=697becf3ac06320222c55bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1637-stack-based-buffer-overflow-in-tenda-507f0cdd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1637%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=697be268ac06320222c19d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25126-cwe-20-improper-input-validation-in-ba555a42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25126%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20polarnl%20PolarLearn&amp;severity=high&amp;id=697bdb5fac06320222be5e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1625-command-injection-in-d-link-dwr-m961-b510ef37</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1625%3A%20Command%20Injection%20in%20D-Link%20DWR-M961&amp;severity=medium&amp;id=697bdb5fac06320222be5e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1624-command-injection-in-d-link-dwr-m961-80502f4b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1624%3A%20Command%20Injection%20in%20D-Link%20DWR-M961&amp;severity=medium&amp;id=697bdb5fac06320222be5e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25117-cwe-20-improper-input-validation-in-4c2f2c60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25117%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pwncollege%20dojo&amp;severity=high&amp;id=697bdb5fac06320222be5e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25063-cwe-78-improper-neutralization-of-s-1ebe5dfe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25063%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20gradle%20gradle-completion&amp;severity=high&amp;id=697bd7ddac06320222bd31b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-accelerated-campaign-targeting-iranian-protests-90b6a87f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-accelerated%20campaign%20targeting%20Iranian%20protests&amp;severity=medium&amp;id=697c67ffac063202223ad898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25061-cwe-787-out-of-bounds-write-in-sims-fbc0942c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25061%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20simsong%20tcpflow&amp;severity=medium&amp;id=697bd7ddac06320222bd31b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25047-cwe-1321-improperly-controlled-modi-c68dda6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25047%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20sharpred%20deepHas&amp;severity=critical&amp;id=697bd7ddac06320222bd31af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25046-cwe-77-improper-neutralization-of-s-e10f5e1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25046%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20MoonshotAI%20kimi-agent-sdk&amp;severity=low&amp;id=697bd7ddac06320222bd31ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1340-cwe-94-improper-control-of-generatio-d6bbfd70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1340%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=critical&amp;id=697bd7ddac06320222bd31a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1281-cwe-94-improper-control-of-generatio-91dc6445</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1281%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=critical&amp;id=697bd7ddac06320222bd31a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24846-cwe-22-improper-limitation-of-a-pat-ea3770a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24846%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20malcontent&amp;severity=medium&amp;id=697bd0d5ac06320222ba1d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24845-cwe-522-insufficiently-protected-cr-f3ac7216</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24845%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20chainguard-dev%20malcontent&amp;severity=medium&amp;id=697bd0d5ac06320222ba1d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/escan-confirms-update-server-breached-to-push-mali-385c9705</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=eScan%20confirms%20update%20server%20breached%20to%20push%20malicious%20update&amp;severity=medium&amp;id=697bcd4fac06320222b8f01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1623-command-injection-in-totolink-a7000r-6c60c5f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1623%3A%20Command%20Injection%20in%20Totolink%20A7000R&amp;severity=medium&amp;id=697bc648ac06320222b6137b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15288-incorrect-authorization-in-tanium-i-9103c701</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15288%3A%20Incorrect%20Authorization%20in%20Tanium%20Interact&amp;severity=low&amp;id=697bc2c4ac06320222b51cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24687-cwe-22-improper-limitation-of-a-pat-59fe3665</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24687%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20umbraco%20Umbraco.Forms.Issues&amp;severity=medium&amp;id=697bbf42ac06320222b3ea9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22806-cwe-863-incorrect-authorization-in--c3cae920</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22806%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20loft-sh%20loft&amp;severity=critical&amp;id=697bbf40ac06320222b3ea60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15550-cross-site-request-forgery-csrf-in--c6e29524</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15550%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20birkir%20prime&amp;severity=medium&amp;id=697bbbbbac06320222b23d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25068-cwe-129-improper-validation-of-arra-73514c18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25068%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20ALSA%20Project%20alsa-lib&amp;severity=medium&amp;id=697bb4b4ac06320222af609b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1453-cwe-306-missing-authentication-for-c-752dbedd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1453%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20KiloView%20Encoder%20Series%20E1%20hardware%20Version%201.4&amp;severity=critical&amp;id=697bb130ac06320222ae6e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1610-hard-coded-credentials-in-tenda-ax12-87309e3b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1610%3A%20Hard-coded%20Credentials%20in%20Tenda%20AX12%20Pro%20V2&amp;severity=critical&amp;id=697bb130ac06320222ae6e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1457-cwe-121-stack-based-buffer-overflow--4f098f83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1457%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20VIGI%20C485%20V1&amp;severity=high&amp;id=697bb130ac06320222ae6e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-175000-publicly-exposed-ollama-ai-b3130f16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20175%2C000%20Publicly%20Exposed%20Ollama%20AI%20Servers%20Across%20130%20Countries&amp;severity=medium&amp;id=697c85b0ac063202224aa3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1601-command-injection-in-totolink-a7000r-c97d1fb3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1601%3A%20Command%20Injection%20in%20Totolink%20A7000R&amp;severity=medium&amp;id=697baa29ac06320222ac22ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15548-cwe-311-missing-encryption-of-sensi-a1c071fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15548%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=medium&amp;id=697ba6a4ac06320222aacef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15543-cwe-59-improper-link-resolution-bef-151b5ed0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15543%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=medium&amp;id=697ba6a4ac06320222aaceec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15542-cwe-754-improper-check-for-unusual--328c43d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15542%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=medium&amp;id=697ba6a4ac06320222aacee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15541-cwe-59-improper-link-resolution-bef-b7ae23c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15541%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=medium&amp;id=697ba6a4ac06320222aacee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13399-cwe-331-insufficient-entropy-in-tp--7865447e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13399%3A%20CWE-331%20Insufficient%20Entropy%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=high&amp;id=697ba6a4ac06320222aacee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1600-business-logic-errors-in-bdtask-bhoj-35f197f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1600%3A%20Business%20Logic%20Errors%20in%20Bdtask%20Bhojon%20All-In-One%20Restaurant%20Management%20System&amp;severity=medium&amp;id=697ba321ac06320222a9c4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24780-cwe-863-incorrect-authorization-in--67a6b7b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24780%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Significant-Gravitas%20AutoGPT&amp;severity=high&amp;id=697b9f9cac06320222a8a3d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24414-cwe-276-incorrect-default-permissio-1f7f6c0d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24414%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Icinga%20icinga-powershell-framework&amp;severity=medium&amp;id=697b9f9cac06320222a8a3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1599-business-logic-errors-in-bdtask-bhoj-ea10cc82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1599%3A%20Business%20Logic%20Errors%20in%20Bdtask%20Bhojon%20All-In-One%20Restaurant%20Management%20System&amp;severity=medium&amp;id=697b9f9cac06320222a8a3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15545-cwe-20-improper-input-validation-in-4307789c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15545%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Archer%20RE605X&amp;severity=high&amp;id=697b9c18ac06320222a73330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24413-cwe-276-incorrect-default-permissio-dc8e15f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24413%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Icinga%20icinga2&amp;severity=medium&amp;id=697b9c18ac06320222a73335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-what-you-should-know-56f9e2c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20chain%20attack%3A%20what%20you%20should%20know&amp;severity=medium&amp;id=697c67ffac063202223ad88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23896-cwe-269-improper-privilege-manageme-897a8f60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23896%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20immich-app%20immich&amp;severity=high&amp;id=697b9895ac06320222a54d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1598-cross-site-scripting-in-bdtask-bhojo-286e36a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1598%3A%20Cross%20Site%20Scripting%20in%20Bdtask%20Bhojon%20All-In-One%20Restaurant%20Management%20System&amp;severity=medium&amp;id=697b9895ac06320222a54d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1597-improper-authorization-in-bdtask-sal-052f19c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1597%3A%20Improper%20Authorization%20in%20Bdtask%20SalesERP&amp;severity=medium&amp;id=697b8e08ac063202229e04a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62514-cwe-327-use-of-a-broken-or-risky-cr-5cae969a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62514%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Scille%20parsec-cloud&amp;severity=high&amp;id=697b837eac063202229a57ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1596-command-injection-in-d-link-dwr-m961-f7f775e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1596%3A%20Command%20Injection%20in%20D-Link%20DWR-M961&amp;severity=medium&amp;id=697b837eac063202229a580f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1595-sql-injection-in-itsourcecode-societ-61a27535</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1595%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=697b837eac063202229a57f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0936-cwe-532-insertion-of-sensitive-infor-1738d88d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0936%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20in%20B%26R%20Industrial%20Automation%20GmbH%20Process%20Visualization%20Interface%20(PVI)&amp;severity=medium&amp;id=697b837eac063202229a57f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13905-cwe-276-incorrect-default-permissio-708b23d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13905%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Process%20Expert&amp;severity=high&amp;id=697b7ff8ac06320222994737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/llms-hijacked-monetized-in-operation-bizarre-bazaa-c5956bca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LLMs%20Hijacked%2C%20Monetized%20in%20%E2%80%98Operation%20Bizarre%20Bazaar%E2%80%99&amp;severity=medium&amp;id=697b78bdac06320222955e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n8n-vulnerabilities-could-lead-to-remote-code-exec-586624fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=N8n%20Vulnerabilities%20Could%20Lead%20to%20Remote%20Code%20Execution&amp;severity=critical&amp;id=697b7539ac063202229444f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-ai-toys-can-actually-discuss-with-your-child--819790a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20AI%20toys%20can%20actually%20discuss%20with%20your%20child%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=697b75b8ac063202229475d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7714-cwe-89-improper-neutralization-of-sp-b785585b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7714%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Global%20Interactive%20Design%20Media%20Software%20Inc.%20Content%20Management%20System%20(CMS)&amp;severity=high&amp;id=697b7905ac06320222957a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7713-cwe-79-improper-neutralization-of-in-72be5bbe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7713%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Global%20Interactive%20Design%20Media%20Software%20Inc.%20Content%20Management%20System%20(CMS)&amp;severity=high&amp;id=697b71e7ac06320222933482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1594-sql-injection-in-itsourcecode-societ-c3b483c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1594%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=697b71e7ac0632022293348c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1593-sql-injection-in-itsourcecode-societ-7eadb9ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1593%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=697b71e7ac06320222933485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1590-sql-injection-in-itsourcecode-school-cb5d8e52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1590%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697b6e64ac06320222920567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1589-sql-injection-in-itsourcecode-school-50b312a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1589%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697b6e64ac06320222920560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7014-cwe-384-session-fixation-in-qr-menu--340f58dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7014%3A%20CWE-384%20Session%20Fixation%20in%20QR%20Menu%20Pro%20Smart%20Menu%20Systems%20Menu%20Panel&amp;severity=medium&amp;id=697b6ae0ac0632022290510d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7013-cwe-639-authorization-bypass-through-8eaa239c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7013%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20QR%20Menu%20Pro%20Smart%20Menu%20Systems%20Menu%20Panel&amp;severity=medium&amp;id=697b6ae0ac0632022290510a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1616-cwe-22-improper-limitation-of-a-path-dae9ff9d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1616%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20osim&amp;severity=high&amp;id=697b6ae0ac06320222905110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1588-path-traversal-in-jishenghua-jsherp-cfb05d2f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1588%3A%20Path%20Traversal%20in%20jishenghua%20jshERP&amp;severity=medium&amp;id=697b63d8ac063202228d5104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-patches-critical-web-help-desk-vulnerab-0e70963f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Patches%20Critical%20Web%20Help%20Desk%20Vulnerabilities&amp;severity=critical&amp;id=697b6021ac063202228c37e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-new-rces-darknet-busts-kernel--b4c9bec2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20New%20RCEs%2C%20Darknet%20Busts%2C%20Kernel%20Bugs%20%26%2025%2B%20More%20Stories&amp;severity=medium&amp;id=697c85b0ac063202224aa3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposed-byob-c2-infrastructure-reveals-a-multi-sta-063c0ec2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposed%20BYOB%20C2%20Infrastructure%20Reveals%20a%20Multi-Stage%20Malware%20Deployment&amp;severity=medium&amp;id=697b8a84ac063202229c76ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-uat-8099-new-persistence-mechanisms-and-9cd0fce3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20UAT-8099%3A%20New%20persistence%20mechanisms%20and%20regional%20focus&amp;severity=medium&amp;id=697b8a84ac063202229c76fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1587-denial-of-service-in-open5gs-0ae120df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1587%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=697b7905ac06320222957a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1586-denial-of-service-in-open5gs-1697a513</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1586%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=697b7c74ac0632022298179e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/survey-of-100-energy-systems-reveals-critical-ot-c-508ad055</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Survey%20of%20100%2B%20Energy%20Systems%20Reveals%20Critical%20OT%20Cybersecurity%20Gaps&amp;severity=critical&amp;id=697c85b0ac063202224aa3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7016-cwe-284-improper-access-control-in-a-fd171379</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7016%3A%20CWE-284%20Improper%20Access%20Control%20in%20Ak%C4%B1n%20Software%20Computer%20Import%20Export%20Industry%20and%20Trade%20Ltd.%20QR%20Menu&amp;severity=high&amp;id=697b4b3bac06320222857268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7015-cwe-384-session-fixation-in-akn-soft-9200086c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7015%3A%20CWE-384%20Session%20Fixation%20in%20Ak%C4%B1n%20Software%20Computer%20Import%20Export%20Industry%20and%20Trade%20Ltd.%20QR%20Menu&amp;severity=medium&amp;id=697b4b3bac0632022285726b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1469-cwe-79-improper-neutralization-of-in-3c9882ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1469%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20RLE%20NOVA%20PlanManager&amp;severity=medium&amp;id=697b4b3bac0632022285726e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disrupts-ipidea-proxy-network-7bf945c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Disrupts%20IPIDEA%20Proxy%20Network&amp;severity=medium&amp;id=697b4401ac06320222821fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22764-cwe-287-improper-authentication-in--5bb23bd6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22764%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20OpenManage%20Network%20Integration&amp;severity=medium&amp;id=697b40b1ac06320222813294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-fixes-four-critical-web-help-desk-flaws-f265e12e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Fixes%20Four%20Critical%20Web%20Help%20Desk%20Flaws%20With%20Unauthenticated%20RCE%20and%20Auth%20Bypass&amp;severity=critical&amp;id=697c85b0ac063202224aa3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23570-cwe-20-improper-input-validation-in-693c1180</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23570%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23569-cwe-125-out-of-bounds-read-in-teamv-be6eba33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23569%3A%20CWE-125%20Out-of-bounds%20Read%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b78b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23568-cwe-125-out-of-bounds-read-in-teamv-ed71544d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23568%3A%20CWE-125%20Out-of-bounds%20Read%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23567-cwe-122-heap-based-buffer-overflow--0d9eadca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23567%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23566-cwe-20-improper-input-validation-in-bb138666</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23566%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23565-cwe-476-null-pointer-dereference-in-10bd67de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23565%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23564-cwe-319-cleartext-transmission-of-s-cf89a13b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23564%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23571-cwe-20-improper-input-validation-in-357bc4a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23571%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23563-cwe-59-improper-link-resolution-bef-2c959c66</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23563%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1188-cwe-131-incorrect-calculation-of-buf-a32db7fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1188%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Eclipse%20Foundation%20Eclipse%20OMR&amp;severity=medium&amp;id=697b1d87ac063202225ccb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/approaching-cyclone-vortex-werewolf-attacks-russia-5a696a5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Approaching%20Cyclone%3A%20Vortex%20Werewolf%20Attacks%20Russia&amp;severity=medium&amp;id=697b11634623b1157c786762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disrupts-ipidea-one-of-the-worlds-largest-r-d7810cdb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Disrupts%20IPIDEA%20%E2%80%94%20One%20of%20the%20World%E2%80%99s%20Largest%20Residential%20Proxy%20Networks&amp;severity=medium&amp;id=697b2159ac063202227641f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14975-cwe-269-improper-privilege-manageme-8ffdf05d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14975%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Custom%20Login%20Page%20Customizer&amp;severity=high&amp;id=697afc494623b1157c712eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25067-cwe-706-use-of-incorrectly-resolved-28664543</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25067%3A%20CWE-706%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20SmarterTools%20SmarterMail&amp;severity=medium&amp;id=697ae0284623b1157c685561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55704-hidden-functionality-in-brother-ind-c9945be2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55704%3A%20Hidden%20functionality%20in%20Brother%20Industries%2C%20Ltd.%20Multiple%20MFPs&amp;severity=medium&amp;id=697ad59c4623b1157c4a2d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53869-improper-certificate-validation-in--e8696625</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53869%3A%20Improper%20certificate%20validation%20in%20Brother%20Industries%2C%20Ltd.%20Multiple%20MFPs&amp;severity=low&amp;id=697ad59c4623b1157c4a2d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1552-sql-injection-in-semcms-a2e1db25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1552%3A%20SQL%20Injection%20in%20SEMCMS&amp;severity=medium&amp;id=697aab6e4623b1157c0ab0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-29-d5d28356</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-29&amp;severity=medium&amp;id=697bf749ac06320222ca82b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63658-na-b482fdc9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63658%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63657-na-ed92a875</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63657%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63656-na-6a64da22</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63656%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63655-na-acc11400</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63655%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63653-na-48a644e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63653%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63652-na-0702c782</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63652%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63651-na-8211c044</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63651%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63650-na-df986b68</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63650%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69604-na-1b7bb371</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69604%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69929-na-96016b4a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69929%3A%20n%2Fa&amp;severity=critical&amp;id=697bbbbbac06320222b23da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69516-na-f009c423</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69516%3A%20n%2Fa&amp;severity=high&amp;id=697bbbbbac06320222b23da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63649-na-ab41c60c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63649%3A%20n%2Fa&amp;severity=high&amp;id=697bbbbbac06320222b23d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69749-na-be0d3637</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69749%3A%20n%2Fa&amp;severity=medium&amp;id=697ba6a4ac06320222aacef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45160-na-fa9630c9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45160%3A%20n%2Fa&amp;severity=medium&amp;id=697b9895ac06320222a54d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71011-na-ad816e7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71011%3A%20n%2Fa&amp;severity=medium&amp;id=697b7c74ac0632022298179a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71009-na-80adfc9e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71009%3A%20n%2Fa&amp;severity=medium&amp;id=697b7905ac06320222957a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71008-na-f0d09f23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71008%3A%20n%2Fa&amp;severity=medium&amp;id=697b7905ac06320222957a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-29-8945747f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-29&amp;severity=low&amp;id=697ace5f4623b1157c3a4d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15344-improper-neutralization-of-special--1f69625b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15344%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tanium%20Asset&amp;severity=medium&amp;id=697aa4644623b1157cff7f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1551-sql-injection-in-itsourcecode-school-9de4a5e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1551%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697aa0e04623b1157cfcbe4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1550-improper-authorization-in-phpgurukul-f47217ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1550%3A%20Improper%20Authorization%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=697a96554623b1157cf77812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1549-path-traversal-in-jishenghua-jsherp-ae219776</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1549%3A%20Path%20Traversal%20in%20jishenghua%20jshERP&amp;severity=medium&amp;id=697a96554623b1157cf7780a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1548-command-injection-in-totolink-a7000r-1e6db936</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1548%3A%20Command%20Injection%20in%20Totolink%20A7000R&amp;severity=medium&amp;id=697a92d04623b1157cf6c70b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24897-cwe-22-improper-limitation-of-a-pat-fd98c0bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24897%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ErugoOSS%20Erugo&amp;severity=critical&amp;id=697a8f4c4623b1157cf569af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1547-command-injection-in-totolink-a7000r-d8463cd2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1547%3A%20Command%20Injection%20in%20Totolink%20A7000R&amp;severity=medium&amp;id=697a889e4623b1157cf358f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1546-sql-injection-in-jishenghua-jsherp-1d61f7fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1546%3A%20SQL%20Injection%20in%20jishenghua%20jshERP&amp;severity=medium&amp;id=697a889e4623b1157cf358ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24889-cwe-190-integer-overflow-or-wraparo-d5fa101f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24889%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20stellar%20rs-soroban-sdk&amp;severity=medium&amp;id=697a889e4623b1157cf358fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24888-cwe-1321-improperly-controlled-modi-dfb0b84f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24888%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20microsoft%20maker.js&amp;severity=medium&amp;id=697a84c24623b1157cf1f0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1545-sql-injection-in-itsourcecode-school-68c5fba1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1545%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697a84c24623b1157cf1f0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1544-os-command-injection-in-d-link-dir-8-323bb0b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1544%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=697a84c24623b1157cf1f0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24857-cwe-122-heap-based-buffer-overflow--c87d825c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24857%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20simsong%20bulk_extractor&amp;severity=medium&amp;id=697a84c24623b1157cf1f0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24856-cwe-20-improper-input-validation-in-5ecbf86c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24856%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697a7db94623b1157cef795b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1535-sql-injection-in-code-projects-onlin-e78824be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1535%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=697a7db94623b1157cef7954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1534-sql-injection-in-code-projects-onlin-32e9c123</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1534%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=697a7db94623b1157cef794d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1533-sql-injection-in-code-projects-onlin-3bb6d75d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1533%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=697a76b14623b1157cee2be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1532-path-traversal-in-d-link-dcs-700l-0d55b15e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1532%3A%20Path%20Traversal%20in%20D-Link%20DCS-700L&amp;severity=medium&amp;id=697a76b14623b1157cee2bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14840-cwe-754-improper-check-for-unusual--8644af37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14840%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Drupal%20HTTP%20Client%20Manager&amp;severity=high&amp;id=697a6c254623b1157cec1717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14472-cwe-352-cross-site-request-forgery--4da66927</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14472%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Acquia%20Content%20Hub&amp;severity=high&amp;id=697a6c254623b1157cec1714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13986-cwe-288-authentication-bypass-using-7492dbc9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13986%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Disable%20Login%20Page&amp;severity=medium&amp;id=697a6c254623b1157cec1711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13985-cwe-863-incorrect-authorization-in--7b644f2d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13985%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Entity%20Share&amp;severity=medium&amp;id=697a6c254623b1157cec170e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13984-cwe-942-permissive-cross-domain-sec-a4e51af9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13984%3A%20CWE-942%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20Drupal%20Next.js&amp;severity=medium&amp;id=697a6c254623b1157cec170b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13983-cwe-79-improper-neutralization-of-i-385bb760</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Tagify&amp;severity=medium&amp;id=697a6c254623b1157cec1708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13982-cwe-352-cross-site-request-forgery--b4e38f1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13982%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Login%20Time%20Restriction&amp;severity=high&amp;id=697a6c254623b1157cec1705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13981-cwe-79-improper-neutralization-of-i-bbccedf1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13981%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20AI%20(Artificial%20Intelligence)&amp;severity=medium&amp;id=697a6c254623b1157cec1702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13980-cwe-288-authentication-bypass-using-fe270382</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13980%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20CKEditor%205%20Premium%20Features&amp;severity=medium&amp;id=697a6c254623b1157cec16ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13979-cwe-267-privilege-defined-with-unsa-58cfa0ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13979%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Drupal%20Mini%20site&amp;severity=medium&amp;id=697a6c254623b1157cec16fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46691-cwe-284-improper-access-control-in--ab84e367</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46691%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20PremierColor&amp;severity=high&amp;id=697a68a44623b1157ceb14dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61728-cwe-407-inefficient-algorithmic-com-4fc7cb51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61728%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20archive%2Fzip&amp;severity=medium&amp;id=697a653b4623b1157cea4eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61726-cwe-400-uncontrolled-resource-consu-8c02c13f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61726%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20net%2Furl&amp;severity=high&amp;id=697a653b4623b1157cea4ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61730-cwe-940-improper-verification-of-so-76478fe8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61730%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Go%20standard%20library%20crypto%2Ftls&amp;severity=medium&amp;id=697a653b4623b1157cea4ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61731-cwe-78-improper-neutralization-of-s-ea428bb2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61731%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Go%20toolchain%20cmd%2Fgo&amp;severity=high&amp;id=697a653b4623b1157cea4ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68119-cwe-78-improper-neutralization-of-s-28a28e3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68119%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Go%20toolchain%20cmd%2Fgo&amp;severity=high&amp;id=697a653b4623b1157cea4eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0750-cwe-347-improper-verification-of-cry-79d8acb9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0750%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Drupal%20Drupal%20Commerce%20Paybox&amp;severity=high&amp;id=697a5e9e4623b1157ce6c328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cant-stop-wont-stop-ta584-innovates-initial-access-ec2c0e48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can&apos;t%20stop%2C%20won&apos;t%20stop%3A%20TA584%20innovates%20initial%20access&amp;severity=medium&amp;id=697a7db84623b1157cef78f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24775-cwe-345-insufficient-verification-o-f4613c19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24775%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20opf%20openproject&amp;severity=medium&amp;id=697a538a4623b1157ce16565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24772-cwe-345-insufficient-verification-o-71f8ba4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24772%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20opf%20openproject&amp;severity=high&amp;id=697a538a4623b1157ce16562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33237-cwe-476-null-pointer-dereference-in-81893456</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33237%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20GeForce&amp;severity=medium&amp;id=697a50074623b1157cdfcf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33220-cwe-416-use-after-free-in-nvidia-ge-0f018ead</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33220%3A%20CWE-416%20Use%20After%20Free%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=697a50074623b1157cdfcf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33219-cwe-190-integer-overflow-or-wraparo-527d0560</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33219%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=697a50074623b1157cdfcf4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57796-cwe-257storing-passwords-in-a-recov-d01accbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57796%3A%20CWE-257%3AStoring%20Passwords%20in%20a%20Recoverable%20Format%20in%20Explorance%20Blue&amp;severity=medium&amp;id=697a50074623b1157cdfcf60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33218-cwe-190-integer-overflow-or-wraparo-0c7d2b02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33218%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=697a50074623b1157cdfcf46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33217-cwe-416-use-after-free-in-nvidia-ge-2236de6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33217%3A%20CWE-416%20Use%20After%20Free%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=697a50074623b1157cdfcf41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-moltbot-ai-coding-assistant-on-vs-code-market-900aeb84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Moltbot%20AI%20Coding%20Assistant%20on%20VS%20Code%20Marketplace%20Drops%20Malware&amp;severity=medium&amp;id=697a711c4623b1157ced2a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57795-cwe-434-unrestricted-upload-of-file-e007868c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57795%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Explorance%20Blue&amp;severity=critical&amp;id=697a50074623b1157cdfcf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57794-cwe-434-unrestricted-upload-of-file-b5057a24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57794%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Explorance%20Blue&amp;severity=critical&amp;id=697a4c814623b1157cded9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57792-cwe-89-improper-neutralization-of-s-4004c8b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57792%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Explorance%20Blue&amp;severity=critical&amp;id=697a4c814623b1157cded9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46306-processing-a-maliciously-crafted-ke-9fb00563</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46306%3A%20Processing%20a%20maliciously%20crafted%20Keynote%20file%20may%20disclose%20memory%20contents%20in%20Apple%20Keynote&amp;severity=medium&amp;id=697a4c814623b1157cded9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46316-processing-a-maliciously-crafted-pa-75d1e1d7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46316%3A%20Processing%20a%20maliciously%20crafted%20Pages%20document%20may%20result%20in%20unexpected%20termination%20or%20disclosure%20of%20process%20memory%20in%20Apple%20Pages&amp;severity=medium&amp;id=697a4c814623b1157cded9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/purerat-attacker-now-using-ai-to-build-toolset-2af757b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PureRAT%3A%20Attacker%20Now%20Using%20AI%20to%20Build%20Toolset&amp;severity=medium&amp;id=697a5a904623b1157ce3616d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57793-cwe-89-improper-neutralization-of-s-29361549</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57793%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Explorance%20Blue&amp;severity=high&amp;id=697a48fd4623b1157cdca040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-attacks-target-indian-government-using-sheetcr-100bc94d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20Attacks%20Target%20Indian%20Government%20Using%20SHEETCREEP%2C%20FIREPOWER%2C%20and%20MAILCREEP&amp;severity=medium&amp;id=697a5de14623b1157ce5e519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24685-cwe-77-improper-neutralization-of-s-6f10201c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24685%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=697a41f64623b1157cda80d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13919-cwe-427-uncontrolled-search-path-el-c00ea7e0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13919%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Broadcom%20Symantec%20Endpoint%20Protection%20Windows%20Client&amp;severity=medium&amp;id=697a41f64623b1157cda80d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13918-cwe-269-improper-privilege-manageme-a03a536b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13918%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Broadcom%20Symantec%20Endpoint%20Protection%20Windows%20Client&amp;severity=medium&amp;id=697a41f64623b1157cda80d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1522-denial-of-service-in-open5gs-30d7b5a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1522%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=697a3aee4623b1157cd881cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13917-cwe-269-improper-privilege-manageme-a27c792c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13917%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Broadcom%20Symantec%20Web%20Security%20Services%20Agent&amp;severity=high&amp;id=697a3aee4623b1157cd881be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-electrum-tied-to-december-2025-cyber-attac-0499845a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-Aligned%20ELECTRUM%20Tied%20to%20December%202025%20Cyber%20Attack%20on%20Polish%20Power%20Grid&amp;severity=medium&amp;id=697a711c4623b1157ced2a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/odd-weblogic-request-possible-cve-2026-21962-explo-a209ffae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Odd%20WebLogic%20Request.%20Possible%20CVE-2026-21962%20Exploit%20Attempt%20or%20AI%20Slop%26%23x3f%3B%2C%20(Wed%2C%20Jan%2028th)&amp;severity=low&amp;id=697a33b14623b1157cd612e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1539-insertion-of-sensitive-information-i-46f2f66f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1539%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=697a295b4623b1157cd23357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1536-improper-neutralization-of-crlf-sequ-c6e4953a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1536%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=697a295b4623b1157cd23353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1237-cwe-672-operation-on-a-resource-afte-35d95eae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1237%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20Canonical%20juju&amp;severity=low&amp;id=697a25d84623b1157ccf7646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1521-denial-of-service-in-open5gs-17317464</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1521%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=697a37694623b1157cd7577e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1520-cross-site-scripting-in-rethinkdb-925878bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1520%3A%20Cross%20Site%20Scripting%20in%20rethinkdb&amp;severity=medium&amp;id=697a3aee4623b1157cd881d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1060-cwe-200-exposure-of-sensitive-inform-d6fb7916</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1060%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20litonice13%20WP%20Adminify%20%E2%80%93%20White%20Label%20WordPress%2C%20Admin%20Menu%20Editor%2C%20Login%20Customizer&amp;severity=medium&amp;id=697a1ed44623b1157cc754bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-we-cant-let-ai-take-the-wheel-of-cyber-defense-18cbaba2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20We%20Can%E2%80%99t%20Let%20AI%20Take%20the%20Wheel%20of%20Cyber%20Defense&amp;severity=medium&amp;id=697a17914623b1157cc3cd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14795-cwe-352-cross-site-request-forgery--dc5464ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14795%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webguyio%20Stop%20Spammers%20Classic&amp;severity=medium&amp;id=697a10bc4623b1157cc06b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-high-severity-n8n-flaws-allow-authenticated-re-04eb96b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20High-Severity%20n8n%20Flaws%20Allow%20Authenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=697a711c4623b1157ced2a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14865-cwe-79-improper-neutralization-of-i-d417b336</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14865%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Passster%20%E2%80%93%20Password%20Protect%20Pages%20and%20Content&amp;severity=medium&amp;id=697a06304623b1157cbbccdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1056-cwe-22-improper-limitation-of-a-path-76433a03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1056%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20inc2734%20Snow%20Monkey%20Forms&amp;severity=critical&amp;id=697a06304623b1157cbbcce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59901-cwe-352-cross-site-request-forgery--5415921e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59901%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59900-cwe-79-improper-neutralization-of-i-f2c65362</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59899-cwe-79-improper-neutralization-of-i-0aeadfaf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59898-cwe-79-improper-neutralization-of-i-c76427bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59897-cwe-79-improper-neutralization-of-i-6d38f5f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59896-cwe-79-improper-neutralization-of-i-fb73c322</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59895-cwe-20-improper-input-validation-in-472be37e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59895%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59894-cwe-352-cross-site-request-forgery--55c4fc53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59894%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba64623b1157cb5f7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59893-cwe-352-cross-site-request-forgery--6491e6fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59893%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59892-cwe-352-cross-site-request-forgery--d423eee7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59892%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59891-cwe-352-cross-site-request-forgery--6aa76c29</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59891%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vm2-nodejs-flaw-allows-sandbox-escape-and-3cc420a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20vm2%20Node.js%20Flaw%20Allows%20Sandbox%20Escape%20and%20Arbitrary%20Code%20Execution&amp;severity=critical&amp;id=697a711c4623b1157ced2a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mustang-panda-deploys-updated-coolclient-backdoor--192b2556</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mustang%20Panda%20Deploys%20Updated%20COOLCLIENT%20Backdoor%20in%20Government%20Cyber%20Attacks&amp;severity=medium&amp;id=697a711c4623b1157ced2a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26386-cwe-121-stack-based-buffer-overflow-8524005e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26386%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Johnson%20Controls%20iSTAR%20Configuration%20Utility%20(ICU)&amp;severity=high&amp;id=6979f49d4623b1157cb36511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1398-cwe-352-cross-site-request-forgery-c-b8b22e77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1398%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chrisnowak%20Change%20WP%20URL&amp;severity=medium&amp;id=6979f49e4623b1157cb36555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1399-cwe-79-improper-neutralization-of-in-81723c42</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1399%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miles99%20WP%20Google%20Ad%20Manager%20Plugin&amp;severity=medium&amp;id=6979f49e4623b1157cb3655c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14616-cwe-352-cross-site-request-forgery--1bc6a122</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14616%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20recooty%20Recooty%20%E2%80%93%20Job%20Widget%20(Old%20Dashboard)&amp;severity=medium&amp;id=6979f49d4623b1157cb3650a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1280-cwe-862-missing-authorization-in-nme-b59b0a88</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1280%3A%20CWE-862%20Missing%20Authorization%20in%20nmedia%20Frontend%20File%20Manager%20Plugin&amp;severity=high&amp;id=6979f49d4623b1157cb3651a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14283-cwe-79-improper-neutralization-of-i-856e0c19</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14283%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpblockart%20BlockArt%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20Blocks%20%2CWordPress%20Block%20Plugin%2C%20Sections%20%26%20Template%20Library&amp;severity=medium&amp;id=6979f49d4623b1157cb36500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14063-cwe-79-improper-neutralization-of-i-7e17c6bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14063%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seomantis%20SEO%20Links%20Interlinking&amp;severity=medium&amp;id=6979f49d4623b1157cb364f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0844-cwe-284-improper-access-control-in-n-aa2a6daa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0844%3A%20CWE-284%20Improper%20Access%20Control%20in%20nmedia%20Simple%20User%20Registration&amp;severity=high&amp;id=6979f49d4623b1157cb36515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14386-cwe-862-missing-authorization-in-sh-3192e753</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14386%3A%20CWE-862%20Missing%20Authorization%20in%20shahrukhlinkgraph%20Search%20Atlas%20SEO%20%E2%80%93%20Premier%20SEO%20Plugin%20for%20One-Click%20WP%20Publishing%20%26%20Integrated%20AI%20Optimization&amp;severity=high&amp;id=6979f49d4623b1157cb36504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1380-cwe-352-cross-site-request-forgery-c-14e7b5f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1380%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lxicon%20Bitcoin%20Donate%20Button&amp;severity=medium&amp;id=6979f49d4623b1157cb36524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1391-cwe-79-improper-neutralization-of-in-51b44b00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1391%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mamunreza%20Vzaar%20Media%20Management&amp;severity=medium&amp;id=6979f49d4623b1157cb36529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1377-cwe-352-cross-site-request-forgery-c-bce7e9f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1377%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hu_chao%20imwptip&amp;severity=medium&amp;id=6979f49d4623b1157cb3651f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41351-cwe-649-reliance-on-obfuscation-or--1369b5e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41351%3A%20CWE-649%3A%20Reliance%20on%20Obfuscation%20or%20Encryption%20of%20Security-Relevant%20Inputs%20without%20Integrity%20Checking%20in%20Funambol%20Cloud%20Server&amp;severity=medium&amp;id=6979ea104623b1157caf530c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/password-reuse-in-disguise-an-often-missed-risky-w-ed799261</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Password%20Reuse%20in%20Disguise%3A%20An%20Often-Missed%20Risky%20Workaround&amp;severity=medium&amp;id=697a711c4623b1157ced2a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-boosts-account-security-for-at-risk-indiv-6d563928</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Boosts%20Account%20Security%20for%20At-Risk%20Individuals&amp;severity=low&amp;id=6979e2d64623b1157cad53af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-warns-of-active-exploitation-of-winrar-vuln-f6581a5a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Warns%20of%20Active%20Exploitation%20of%20WinRAR%20Vulnerability%20CVE-2025-8088&amp;severity=critical&amp;id=697a711c4623b1157ced2a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-python-spellchecker-packages-on-pypi-delivere-538aff52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Python%20Spellchecker%20Packages%20on%20PyPI%20Delivered%20Hidden%20Remote%20Access%20Trojan&amp;severity=medium&amp;id=697a711c4623b1157ced2a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-charges-31-more-defendants-in-massive-atm-hacki-44b4b376</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Charges%2031%20More%20Defendants%20in%20Massive%20ATM%20Hacking%20Probe&amp;severity=medium&amp;id=6979d8494623b1157ca8ecb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apts-cybercriminals-widely-exploiting-winrar-vulne-20a116ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APTs%2C%20Cybercriminals%20Widely%20Exploiting%20WinRAR%20Vulnerability&amp;severity=medium&amp;id=6979d4c64623b1157ca7b116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7740-cwe-1392-use-of-default-credentials--fa8357e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7740%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Hitachi%20Energy%20SuprOS&amp;severity=high&amp;id=697a3aee4623b1157cd881d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1400-cwe-434-unrestricted-upload-of-file--efe63ebf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1400%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=high&amp;id=6979cdf04623b1157ca477fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1053-cwe-79-improper-neutralization-of-in-55a02526</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vinod-dalvi%20Ivory%20Search%20%E2%80%93%20WordPress%20Search%20Plugin&amp;severity=medium&amp;id=6979cdf04623b1157ca477ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0702-cwe-89-improper-neutralization-of-sp-1e75cd74</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0702%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpcreatix%20VidShop%20%E2%80%93%20Shoppable%20Videos%20for%20WooCommerce&amp;severity=high&amp;id=6979cdf04623b1157ca477e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1381-cwe-79-improper-neutralization-of-in-710963ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1381%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcodefactory%20Order%20Minimum%2FMaximum%20Amount%20Limits%20for%20WooCommerce&amp;severity=medium&amp;id=6979cdf04623b1157ca477f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-exploited-forticloud-sso-authenti-2f826feb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Exploited%20FortiCloud%20SSO%20Authentication%20Bypass&amp;severity=low&amp;id=6979c6b54623b1157ca2192c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0818-vulnerability-in-mozilla-thunderbird-c0309850</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0818%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=6979bfee4623b1157c9f66d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40554-cwe-1390-weak-authentication-in-sol-4a053463</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40554%3A%20CWE-1390%20Weak%20Authentication%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=6979bfee4623b1157c9f66cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/high-severity-remote-code-execution-vulnerability--76b8cc58</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=High-Severity%20Remote%20Code%20Execution%20Vulnerability%20Patched%20in%20OpenSSL&amp;severity=critical&amp;id=6979bfad4623b1157c9f4f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40553-cwe-502-deserialization-of-untruste-e3390f42</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40553%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=6979bfee4623b1157c9f66cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40552-cwe-1390-weak-authentication-in-sol-becd1309</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40552%3A%20CWE-1390%20Weak%20Authentication%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=6979bfee4623b1157c9f66c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40551-cwe-502-deserialization-of-untruste-fe5db3df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40551%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=6979bfee4623b1157c9f66c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40537-cwe-798-use-of-hard-coded-credentia-df12b498</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40537%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=high&amp;id=6979bfee4623b1157c9f66bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40536-cwe-693-protection-mechanism-failur-5fa97301</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40536%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=high&amp;id=6979bc5c4623b1157c9e0bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1054-cwe-862-missing-authorization-in-met-83252a16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1054%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=medium&amp;id=6979bc5c4623b1157c9e0bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1389-cwe-639-authorization-bypass-through-ef6bd941</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1389%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20bplugins%20Document%20Embedder%20%E2%80%93%20Embed%20PDFs%2C%20Word%2C%20Excel%2C%20and%20Other%20Files&amp;severity=medium&amp;id=6979bc5c4623b1157c9e0bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0832-cwe-862-missing-authorization-in-saa-54c8d588</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0832%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20New%20User%20Approve&amp;severity=high&amp;id=6979b5554623b1157c9a94ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1310-cwe-862-missing-authorization-in-mig-e736befa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1310%3A%20CWE-862%20Missing%20Authorization%20in%20migaweb%20Simple%20calendar%20for%20Elementor&amp;severity=medium&amp;id=6979b5554623b1157c9a94e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14039-cwe-79-improper-neutralization-of-i-41238a84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14039%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20presstigers%20Simple%20Folio&amp;severity=medium&amp;id=6979b5554623b1157c9a94b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12709-cwe-79-improper-neutralization-of-i-2f408848</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12709%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bfintal%20Interactions%20%E2%80%93%20Create%20Interactive%20Experiences%20in%20the%20Block%20Editor&amp;severity=medium&amp;id=6979b5554623b1157c9a94b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9082-cwe-79-improper-neutralization-of-in-555402c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=6979b5554623b1157c9a94bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1295-cwe-79-improper-neutralization-of-in-34f959f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1295%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supercleanse%20Buy%20Now%20Plus%20%E2%80%94%20Payments%20with%20Stripe&amp;severity=medium&amp;id=6979b5554623b1157c9a94dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0825-cwe-862-missing-authorization-in-crm-0634d7b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0825%3A%20CWE-862%20Missing%20Authorization%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=medium&amp;id=6979b5554623b1157c9a94c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1244-cwe-79-improper-neutralization-of-in-e57bf048</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1244%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeccoop%20Forms%20Bridge%20%E2%80%93%20Infinite%20integrations&amp;severity=medium&amp;id=6979b5554623b1157c9a94d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1466-cwe-79-improper-neutralization-of-in-c2af209e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1466%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jirafeau%20project%20Jirafeau&amp;severity=medium&amp;id=6979b1d04623b1157c989124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13471-cwe-639-authorization-bypass-throug-65cffba6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13471%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20User%20Activity%20Log&amp;severity=medium&amp;id=6979aac84623b1157c94fc41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14610-cwe-918-server-side-request-forgery-6be5fa9a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14610%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bloompixel%20TableMaster%20for%20Elementor%20%E2%80%93%20Advanced%20Responsive%20Tables%20for%20Elementor&amp;severity=high&amp;id=6979a3c14623b1157c91fb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1083-cwe-79-improper-neutralization-of-in-7d10b706</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Appointment%20Hour%20Booking%20%E2%80%93%20Booking%20Calendar&amp;severity=medium&amp;id=6979a3c14623b1157c91fb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1298-cwe-862-missing-authorization-in-iul-8dd77780</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1298%3A%20CWE-862%20Missing%20Authorization%20in%20iulia-cazan%20Easy%20Replace%20Image&amp;severity=medium&amp;id=6979a3c14623b1157c91fb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8072-cwe-79-improper-neutralization-of-in-582d698e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8072%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nebojsadabic%20Target%20Video%20Easy%20Publish&amp;severity=medium&amp;id=6979a3c14623b1157c91fb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-cve-2026-24858-after-active-forti-a16b9dd7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20CVE-2026-24858%20After%20Active%20FortiOS%20SSO%20Exploitation%20Detected&amp;severity=critical&amp;id=697a711c4623b1157ced2a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1514-cwe-863-incorrect-authorization-in-2-7ba44a60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1514%3A%20CWE-863%20Incorrect%20Authorization%20in%202100%20Technology%20Official%20Document%20Management%20System&amp;severity=high&amp;id=69798b254623b1157c8997f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1506-os-command-injection-in-d-link-dir-6-55cc86e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1506%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=697979914623b1157c5f512a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1505-os-command-injection-in-d-link-dir-6-bca8f308</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1505%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=69796f044623b1157c5b85f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1513-cwe-79-improper-neutralization-of-in-fccdf7dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NAVER%20billboard.js&amp;severity=medium&amp;id=69796f044623b1157c5b85f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21569-xxe-xml-external-entity-injection-i-8f906fa2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21569%3A%20XXE%20(XML%20External%20Entity%20Injection)%20in%20Atlassian%20Crowd%20Data%20Center&amp;severity=high&amp;id=69795d714623b1157c56bc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24852-cwe-122-heap-based-buffer-overflow--1bf8b510</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24852%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69795d714623b1157c56bc19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24850-cwe-347-improper-verification-of-cr-76dbd910</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24850%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20RustCrypto%20signatures&amp;severity=medium&amp;id=69795d714623b1157c56bc0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24842-cwe-22-improper-limitation-of-a-pat-1ca97d57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24842%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=697959ec4623b1157c540f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-28-9c334e10</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-28&amp;severity=medium&amp;id=697aa42e4623b1157cfee9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71007-na-17a1c6b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71007%3A%20n%2Fa&amp;severity=high&amp;id=697a7db94623b1157cef7949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71006-na-260bba14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71006%3A%20n%2Fa&amp;severity=medium&amp;id=697a76b14623b1157cee2bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71005-na-015f040b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71005%3A%20n%2Fa&amp;severity=medium&amp;id=697a73324623b1157ceda5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71003-na-906f7142</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71003%3A%20n%2Fa&amp;severity=high&amp;id=697a73324623b1157ceda5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71004-na-f5f5621c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71004%3A%20n%2Fa&amp;severity=medium&amp;id=697a6fa94623b1157cecc63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71002-na-71abaf31</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71002%3A%20n%2Fa&amp;severity=medium&amp;id=697a653b4623b1157cea4ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69602-na-a9e747b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69602%3A%20n%2Fa&amp;severity=critical&amp;id=697a5e9e4623b1157ce6c337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69601-na-70c7cb89</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69601%3A%20n%2Fa&amp;severity=medium&amp;id=697a5e9e4623b1157ce6c331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71001-na-3b9ae8e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71001%3A%20n%2Fa&amp;severity=medium&amp;id=697a538a4623b1157ce1655d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71000-na-1ed2b827</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71000%3A%20n%2Fa&amp;severity=high&amp;id=697a50074623b1157cdfcf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70999-na-afcc4a15</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70999%3A%20n%2Fa&amp;severity=high&amp;id=697a48fd4623b1157cdca04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65891-na-69b501d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65891%3A%20n%2Fa&amp;severity=high&amp;id=697a48fd4623b1157cdca046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65890-na-0c7b96ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65890%3A%20n%2Fa&amp;severity=high&amp;id=697a457a4623b1157cdb1920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65889-na-33df1a10</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65889%3A%20n%2Fa&amp;severity=high&amp;id=697a457a4623b1157cdb191a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65888-na-1b6aece5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65888%3A%20n%2Fa&amp;severity=high&amp;id=697a3aee4623b1157cd881c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65887-na-fb692bab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65887%3A%20n%2Fa&amp;severity=medium&amp;id=697a3aee4623b1157cd881c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65886-na-75479913</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65886%3A%20n%2Fa&amp;severity=high&amp;id=697a37694623b1157cd75778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61140-na-f61e153f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61140%3A%20n%2Fa&amp;severity=critical&amp;id=697a33e64623b1157cd61d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69517-na-778e3abf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69517%3A%20n%2Fa&amp;severity=high&amp;id=697a30624623b1157cd4fb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57283-na-a6ffd88e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57283%3A%20n%2Fa&amp;severity=high&amp;id=697a30624623b1157cd4fb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70336-na-a812106d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70336%3A%20n%2Fa&amp;severity=medium&amp;id=697a2cdd4623b1157cd3c0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-28-b0a89e81</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-28&amp;severity=low&amp;id=6979b19b4623b1157c988123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24838-cwe-79-improper-neutralization-of-i-86dbcfdd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24838%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=critical&amp;id=697959ec4623b1157c540f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24837-cwe-79-improper-neutralization-of-i-4c2712b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24837%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=697952e34623b1157c50b1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24836-cwe-79-improper-neutralization-of-i-a758299f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24836%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=697952e34623b1157c50b1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24833-cwe-79-improper-neutralization-of-i-e692c3ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24833%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=697952e34623b1157c50b1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24784-cwe-79-improper-neutralization-of-i-18400fd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24784%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=697952e34623b1157c50b1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24785-cwe-327-use-of-a-broken-or-risky-cr-c461cae6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24785%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20jmlepisto%20clatter&amp;severity=high&amp;id=69794f604623b1157c50222d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24134-cwe-639-authorization-bypass-throug-69f23a39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24134%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69794f604623b1157c502228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23830-cwe-94-improper-control-of-generati-c9f465fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23830%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=697a295b4623b1157cd2335e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55292-cwe-348-use-of-less-trusted-source--9d293b2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55292%3A%20CWE-348%3A%20Use%20of%20Less%20Trusted%20Source%20in%20meshtastic%20firmware&amp;severity=high&amp;id=697a295b4623b1157cd2335a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24783-cwe-682-incorrect-calculation-in-sc-0f5aaacd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24783%3A%20CWE-682%3A%20Incorrect%20Calculation%20in%20script3%20soroban-fixed-point-math&amp;severity=high&amp;id=69793a494623b1157c4b1c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24779-cwe-918-server-side-request-forgery-384b4cb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24779%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=697936c84623b1157c4a64f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24778-cwe-79-improper-neutralization-of-i-5100454f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24778%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=697936c84623b1157c4a64ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24770-cwe-22-improper-limitation-of-a-pat-70884c4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24770%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20infiniflow%20ragflow&amp;severity=critical&amp;id=697936c84623b1157c4a64fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24765-cwe-502-deserialization-of-untruste-079f9476</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24765%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sebastianbergmann%20phpunit&amp;severity=high&amp;id=697933434623b1157c49959a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24748-cwe-863-incorrect-authorization-in--433c70ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24748%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20akuity%20kargo&amp;severity=medium&amp;id=69792fbd4623b1157c48ea50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24741-cwe-22-improper-limitation-of-a-pat-7fd7b575</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24741%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20C4illin%20ConvertX&amp;severity=high&amp;id=69792fbd4623b1157c48ea56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24740-cwe-284-improper-access-control-in--b480a569</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24740%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20amir20%20dozzle&amp;severity=high&amp;id=697928b74623b1157c47a0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1504-inappropriate-implementation-in-goog-452349d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1504%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=697928b74623b1157c47a0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21589-cwe-288-authentication-bypass-using-54eb0b0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21589%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Juniper%20Networks%20Session%20Smart%20Router&amp;severity=critical&amp;id=697925324623b1157c47013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14988-cwe-732-incorrect-permission-assign-b0ebb5d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14988%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20iba%20Systems%20ibaPDA&amp;severity=critical&amp;id=69791e294623b1157c4599a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12810-cwe-287-improper-authentication-in--2d0dafcb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12810%3A%20CWE-287%20Improper%20Authentication%20in%20Delinea%20Inc.%20Secret%20Server%20On-Prem&amp;severity=medium&amp;id=69791aa44623b1157c447322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24688-cwe-835-loop-with-unreachable-exit--a6e7123b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24688%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=697917214623b1157c43bf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24771-cwe-79-improper-neutralization-of-i-7f5c5c69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24771%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=697917214623b1157c43bfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24473-cwe-200-exposure-of-sensitive-infor-79ff5adf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24473%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20honojs%20hono&amp;severity=medium&amp;id=697917214623b1157c43bf95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24472-cwe-524-use-of-cache-containing-sen-4196de9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24472%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20honojs%20hono&amp;severity=medium&amp;id=697917214623b1157c43bf90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24858-improper-access-control-in-fortinet-214153b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24858%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=critical&amp;id=6979139d4623b1157c42d523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24398-cwe-185-incorrect-regular-expressio-638cd874</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24398%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20honojs%20hono&amp;severity=medium&amp;id=697910194623b1157c40e7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24116-cwe-125-out-of-bounds-read-in-bytec-a6b8f243</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24116%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=697910194623b1157c40e7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22264-cwe-416-use-after-free-in-oisf-suri-3e92570b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22264%3A%20CWE-416%3A%20Use%20After%20Free%20in%20OISF%20suricata&amp;severity=high&amp;id=6979058d4623b1157c3e0403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0746-cwe-918-server-side-request-forgery--1bdef5bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0746%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=medium&amp;id=6979058d4623b1157c3e03ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22263-cwe-1050-excessive-platform-resourc-b06997bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22263%3A%20CWE-1050%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20OISF%20suricata&amp;severity=medium&amp;id=6979058d4623b1157c3e03fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22262-cwe-121-stack-based-buffer-overflow-06f08f07</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22262%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=medium&amp;id=6979058d4623b1157c3e03f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22261-cwe-1050-excessive-platform-resourc-743223e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22261%3A%20CWE-1050%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20OISF%20suricata&amp;severity=low&amp;id=697902094623b1157c3d233f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23593-vulnerability-in-hewlett-packard-en-7dcdb00b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23593%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Fabric%20Composer&amp;severity=high&amp;id=6978fe854623b1157c3c22de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33234-cwe-78-improper-neutralization-of-s-6a9f47b2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33234%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20runx&amp;severity=high&amp;id=6978fe854623b1157c3c22d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23592-vulnerability-in-hewlett-packard-en-7e9f731c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23592%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Fabric%20Composer&amp;severity=high&amp;id=6978fe854623b1157c3c22db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1315-cwe-20-improper-input-validation-in--42ad57fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1315%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C220%20v1&amp;severity=high&amp;id=6978fe854623b1157c3c22ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0919-cwe-20-improper-input-validation-in--0ede4dec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0919%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C220%20v1&amp;severity=high&amp;id=6978fe854623b1157c3c22e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0918-cwe-476-null-pointer-dereference-in--27d378ff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0918%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C220%20v1&amp;severity=high&amp;id=6978fe854623b1157c3c22e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22260-cwe-674-uncontrolled-recursion-in-o-05cf0dac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22260%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20OISF%20suricata&amp;severity=high&amp;id=6978fb014623b1157c3a8c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14911-vulnerability-in-mongodb-mongo-c-dr-d085cc8f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14911%3A%20Vulnerability%20in%20MongoDB%20Mongo-c-driver&amp;severity=high&amp;id=6978fb014623b1157c3a8c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22259-cwe-400-uncontrolled-resource-consu-86b4ae49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22259%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OISF%20suricata&amp;severity=high&amp;id=6978f3f94623b1157c39790c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-rolls-out-lockdown-style-security-mode-to-9fdae6f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Rolls%20Out%20Lockdown-Style%20Security%20Mode%20to%20Protect%20Targeted%20Users%20From%20Spyware&amp;severity=medium&amp;id=69791f8b4623b1157c45d419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-detect-pakistan-linked-cyber-campaigns-aim-69233911</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Detect%20Pakistan-Linked%20Cyber%20Campaigns%20Aimed%20at%20Indian%20Government%20Entities&amp;severity=medium&amp;id=69791f8b4623b1157c45d41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0705-cwe-276-in-acronis-acronis-cloud-man-7dec6718</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0705%3A%20CWE-276%20in%20Acronis%20Acronis%20Cloud%20Manager&amp;severity=medium&amp;id=6978ecf04623b1157c3739d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-apps-nfc-skimming-attacks-and-other-android-i-964f4e8f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20apps%2C%20NFC%20skimming%20attacks%2C%20and%20other%20Android%20issues%20in%202026%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=697920694623b1157c45f3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1483-cwe-89-improper-neutralization-of-sp-a2843041</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1483%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1482-cwe-89-improper-neutralization-of-sp-613e5093</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1482%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1481-cwe-89-improper-neutralization-of-sp-cb323b62</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1481%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1480-cwe-89-improper-neutralization-of-sp-7ed5fc20</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1480%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1479-cwe-89-improper-neutralization-of-sp-020896bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1479%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1478-cwe-89-improper-neutralization-of-sp-11571c96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1478%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1477-cwe-89-improper-neutralization-of-sp-90f0182a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1477%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1476-cwe-89-improper-neutralization-of-sp-2a7a74b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1476%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c36696c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1475-cwe-89-improper-neutralization-of-sp-76ede8e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1475%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c366969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1474-cwe-89-improper-neutralization-of-sp-9edb4b40</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1474%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c366966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1473-cwe-89-improper-neutralization-of-sp-8752fa95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1473%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c366963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1472-cwe-89-improper-neutralization-of-sp-408b0a59</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1472%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c366960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22258-cwe-400-uncontrolled-resource-consu-6660cb73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22258%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OISF%20suricata&amp;severity=high&amp;id=6978e96c4623b1157c36696f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24869-vulnerability-in-mozilla-firefox-b0872c4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24869%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6978e2684623b1157c350b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24868-vulnerability-in-mozilla-firefox-3ae61c11</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24868%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6978e2684623b1157c350b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24875-cwe-190-integer-overflow-or-wraparo-66631d11</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24875%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20yoyofr%20modizer&amp;severity=high&amp;id=6978e26a4623b1157c350bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24874-cwe-843-access-of-resource-using-in-cb8a3098</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24874%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20themrdemonized%20xray-monolith&amp;severity=critical&amp;id=6978e2684623b1157c350b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24873-cwe-125-out-of-bounds-read-in-rinne-942a2b67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24873%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Rinnegatamante%20lpp-vita&amp;severity=high&amp;id=6978e2684623b1157c350b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68670-cwe-121-stack-based-buffer-overflow-a6365ecc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68670%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=critical&amp;id=6978e2684623b1157c350b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24872-vulnerability-in-projectskyfire-sky-f5dffb02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24872%3A%20Vulnerability%20in%20ProjectSkyfire%20SkyFire_548&amp;severity=critical&amp;id=6978e2684623b1157c350b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24871-cwe-94-improper-control-of-generati-6e3cc839</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24871%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20pilgrimage233%20Minecraft-Rcon-Manage&amp;severity=critical&amp;id=6978e2684623b1157c350b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24870-cwe-200-exposure-of-sensitive-infor-203d0690</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24870%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=low&amp;id=6978e2684623b1157c350b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24832-cwe-787-out-of-bounds-write-in-ixra-dedc5197</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24832%3A%20CWE-787%20Out-of-bounds%20Write%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=critical&amp;id=6978dee54623b1157c340bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24831-cwe-835-loop-with-unreachable-exit--0a4371f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24831%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=high&amp;id=6978dee54623b1157c340bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0648-cwe-253-incorrect-check-of-function--bffea3a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0648%3A%20CWE-253%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Eclipse%20Foundation%20Eclipse%20ThreadX&amp;severity=high&amp;id=6978dee54623b1157c340bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55095-cwe-121-stack-based-buffer-overflow-c455961a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55095%3A%20CWE-121%20%20Stack-based%20Buffer%20Overflow%20in%20Eclipse%20Foundation%20Eclipse%20ThreadX%20-%20USBX&amp;severity=medium&amp;id=6978dee54623b1157c340bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55102-cwe-400-uncontrolled-resource-consu-b1a75b72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55102%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Eclipse%20Foundation%20Eclipse%20ThreadX%20-%20NetX%20Duo&amp;severity=high&amp;id=6978db5e4623b1157c33187c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-100-organizations-targeted-in-shinyhunters-ph-f0a71441</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20100%20Organizations%20Targeted%20in%20ShinyHunters%20Phishing%20Campaign&amp;severity=medium&amp;id=6978d4214623b1157c312357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attacks-expand-using-fake-captchas-micros-a74c1b32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attacks%20Expand%20Using%20Fake%20CAPTCHAs%2C%20Microsoft%20Scripts%2C%20and%20Trusted%20Web%20Services&amp;severity=medium&amp;id=69791f8b4623b1157c45d41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1489-out-of-bounds-write-in-red-hat-red-h-0b1d383e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1489%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6978d0d04623b1157c302b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1470-cwe-95-improper-neutralization-of-di-90ad0231</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1470%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)&amp;severity=critical&amp;id=6978cd4c4623b1157c2e02f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/packagegate-flaws-open-javascript-ecosystem-to-sup-63993445</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98PackageGate%E2%80%99%20Flaws%20Open%20JavaScript%20Ecosystem%20to%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=6978c28d4623b1157c2b24f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1485-out-of-bounds-read-in-red-hat-red-ha-1021c9d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1485%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=6978c6444623b1157c2c3089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1484-out-of-bounds-write-in-red-hat-red-h-1a38e534</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1484%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6978c6444623b1157c2c3085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivoting-from-paytool-tracking-various-frauds-and--4fbe3952</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pivoting%20From%20PayTool%3A%20Tracking%20Various%20Frauds%20and%20E-Crime%20Targeting%20Canada&amp;severity=medium&amp;id=6978f3f84623b1157c39786c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-quantum-computing-and-the-pote-f67c4472</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20Quantum%20Computing%20and%20the%20Potential%20Synergy%20With%20Advanced%20AI&amp;severity=medium&amp;id=6978b0fd4623b1157c258c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-edge-extensions-caught-stealing-chatgpt-ses-2228617f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%2C%20Edge%20Extensions%20Caught%20Stealing%20ChatGPT%20Sessions&amp;severity=low&amp;id=6978b0fd4623b1157c258c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12387-cwe-754-improper-check-for-unusual--cf7e98e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12387%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Pix-Link%20LV-WR21Q&amp;severity=medium&amp;id=6978aa244623b1157c209818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12386-cwe-306-missing-authentication-for--e386709e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12386%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Pix-Link%20LV-WR21Q&amp;severity=medium&amp;id=6978aa244623b1157c209813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ctem-in-practice-prioritization-validation-and-out-000549fd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CTEM%20in%20Practice%3A%20Prioritization%2C%20Validation%2C%20and%20Outcomes%20That%20Matter&amp;severity=medium&amp;id=69791f8b4623b1157c45d422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coolclient-backdoor-updated-new-data-stealing-tool-402aab41</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CoolClient%20backdoor%20updated%2C%20new%20data%20stealing%20tools%20used&amp;severity=medium&amp;id=6978e5e84623b1157c359a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41728-cwe-125-out-of-bounds-read-in-beckh-8fd0b144</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41728%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Beckhoff%20Automation%20Beckhoff.Device.Manager.XAR&amp;severity=medium&amp;id=6978a6a04623b1157c1f3433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41727-cwe-420-unprotected-alternate-chann-c5405b93</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41727%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Beckhoff%20Automation%20Beckhoff.Device.Manager.XAR&amp;severity=high&amp;id=6978a6a04623b1157c1f3439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41726-cwe-190-integer-overflow-or-wraparo-b2917777</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41726%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Beckhoff%20Automation%20Beckhoff.Device.Manager.XAR&amp;severity=high&amp;id=6978a6a04623b1157c1f3436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-linux-vulnerabil-427b51e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Linux%20Vulnerabilities&amp;severity=low&amp;id=6978985d4623b1157c1a3531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-office-zero-day-cve-2026-21509-emergency-44da08bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Office%20Zero-Day%20(CVE-2026-21509)%20-%20Emergency%20Patch%20Issued%20for%20Active%20Exploitation&amp;severity=high&amp;id=69791f8b4623b1157c45d425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-grist-core-vulnerability-allows-rce-attac-ecac8c52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Grist-Core%20Vulnerability%20Allows%20RCE%20Attacks%20via%20Spreadsheet%20Formulas&amp;severity=critical&amp;id=69791f8b4623b1157c45d428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24348-cwe-20-improper-input-validation-in-fd43884c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24348%3A%20CWE-20%20Improper%20Input%20Validation%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=high&amp;id=69788a804623b1157c156bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24830-cwe-190-integer-overflow-or-wraparo-6873dccf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24830%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Ralim%20IronOS&amp;severity=critical&amp;id=69788a804623b1157c156bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21417-cwe-256-plaintext-storage-of-a-pass-d642e959</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21417%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Dell%20CloudBoost%20Virtual%20Appliance&amp;severity=high&amp;id=69788a804623b1157c156bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24347-cwe-20-improper-input-validation-in-89d3b05d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24347%3A%20CWE-20%20Improper%20Input%20Validation%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=medium&amp;id=69788a804623b1157c156bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24346-cwe-798-use-of-hard-coded-credentia-5ce39fc1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24346%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=high&amp;id=6978db5e4623b1157c331882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1467-improper-neutralization-of-crlf-sequ-c16f3390</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1467%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6978f0754623b1157c38c52f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24829-cwe-787-out-of-bounds-write-in-is-d-caaaa648</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24829%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Is-Daouda%20is-Engine&amp;severity=medium&amp;id=6978f0754623b1157c38c536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24828-cwe-401-missing-release-of-memory-a-670bf0ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24828%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Is-Daouda%20is-Engine&amp;severity=high&amp;id=6978f0754623b1157c38c533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24345-cwe-20-improper-input-validation-in-dc94d8d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24345%3A%20CWE-20%20Improper%20Input%20Validation%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=medium&amp;id=6978db5e4623b1157c33187f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24827-cwe-787-out-of-bounds-write-in-gers-1945ebca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24827%3A%20CWE-787%20Out-of-bounds%20Write%20in%20gerstrong%20Commander-Genius&amp;severity=high&amp;id=6978d7da4623b1157c322a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24826-cwe-787-out-of-bounds-write-in-cada-bb3cea2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24826%3A%20CWE-787%20Out-of-bounds%20Write%20in%20cadaver%20turso3d&amp;severity=critical&amp;id=69790cec4623b1157c400490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21721-vulnerability-in-grafana-grafanagra-3613c954</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21721%3A%20Vulnerability%20in%20Grafana%20grafana%2Fgrafana&amp;severity=high&amp;id=697883784623b1157c131411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21720-vulnerability-in-grafana-grafanagra-3c0383a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21720%3A%20Vulnerability%20in%20Grafana%20grafana%2Fgrafana-enterprise&amp;severity=high&amp;id=697883784623b1157c13140e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24344-cwe-120-buffer-copy-without-checkin-554e2e6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24344%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=high&amp;id=697883784623b1157c131414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24825-cwe-401-missing-release-of-memory-a-eec619d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24825%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20ydb-platform%20ydb&amp;severity=medium&amp;id=697883784623b1157c131423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24824-cwe-79-improper-neutralization-of-i-90b11954</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20yacy%20yacy_search_server&amp;severity=medium&amp;id=697883784623b1157c131420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-have-used-the-peckbirdy-javas-984bb4b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Have%20Used%20the%20PeckBirdy%20JavaScript%20C2%20Framework%20Since%202023&amp;severity=medium&amp;id=69791f8b4623b1157c45d42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24823-cwe-787-out-of-bounds-write-in-fast-b0665349</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24823%3A%20CWE-787%20Out-of-bounds%20Write%20in%20FASTSHIFT%20X-TRACK&amp;severity=critical&amp;id=697883784623b1157c13141d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24822-cwe-787-out-of-bounds-write-in-tttt-aac842f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24822%3A%20CWE-787%20Out-of-bounds%20Write%20in%20ttttupup%20wxhelper&amp;severity=critical&amp;id=697883784623b1157c13141a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24821-cwe-125-out-of-bounds-read-in-turan-b1b6443e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24821%3A%20CWE-125%20Out-of-bounds%20Read%20in%20turanszkij%20WickedEngine&amp;severity=critical&amp;id=697883784623b1157c131417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24820-cwe-125-out-of-bounds-read-in-turan-77d68267</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24820%3A%20CWE-125%20Out-of-bounds%20Read%20in%20turanszkij%20WickedEngine&amp;severity=medium&amp;id=69787ff64623b1157c11b8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24819-cwe-1325-improperly-controlled-sequ-5ae68213</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24819%3A%20CWE-1325%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20foxinmy%20weixin4j&amp;severity=medium&amp;id=69787ff64623b1157c11b8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24818-cwe-125-out-of-bounds-read-in-prayd-493f9901</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24818%3A%20CWE-125%20Out-of-bounds%20Read%20in%20praydog%20UEVR&amp;severity=medium&amp;id=69787ff54623b1157c11b68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24817-cwe-787-out-of-bounds-write-in-pray-18d5f82d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24817%3A%20CWE-787%20Out-of-bounds%20Write%20in%20praydog%20UEVR&amp;severity=high&amp;id=69787ff54623b1157c11b689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24816-cwe-835-loop-with-unreachable-exit--15b8d095</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24816%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20datavane%20tis&amp;severity=critical&amp;id=69787ff54623b1157c11b686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24815-cwe-434-unrestricted-upload-of-file-d3686da3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24815%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20datavane%20tis&amp;severity=critical&amp;id=69787ff54623b1157c11b683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24814-cwe-190-integer-overflow-or-wraparo-c2e362a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24814%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20swoole%20swoole-src&amp;severity=critical&amp;id=69787ff54623b1157c11b680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24813-cwe-476-null-pointer-dereference-in-2da74693</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24813%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20abcz316%20SKRoot-linuxKernelRoot&amp;severity=high&amp;id=69787ff54623b1157c11b67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24812-vulnerability-in-root-project-root-64665872</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24812%3A%20Vulnerability%20in%20root-project%20root&amp;severity=critical&amp;id=69787ff54623b1157c11b67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24811-vulnerability-in-root-project-root-7b965294</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24811%3A%20Vulnerability%20in%20root-project%20root&amp;severity=critical&amp;id=69787ff54623b1157c11b677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24809-cwe-787-out-of-bounds-write-in-pray-826db66e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24809%3A%20CWE-787%20Out-of-bounds%20Write%20in%20praydog%20REFramework&amp;severity=medium&amp;id=69787ff54623b1157c11b674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24807-cwe-347-improper-verification-of-cr-3eccaada</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24807%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20liuyueyi%20quick-media&amp;severity=medium&amp;id=69787ff54623b1157c11b671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24806-cwe-94-improper-control-of-generati-b6861ea8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24806%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20liuyueyi%20quick-media&amp;severity=medium&amp;id=69787c804623b1157c108be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24805-cwe-476-null-pointer-dereference-in-3b3d3d04</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24805%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20visualfc%20liteide&amp;severity=medium&amp;id=69787c804623b1157c108bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-office-zero-day-likely-exploited-a885b7b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Office%20Zero-Day%20Likely%20Exploited%20in%20Targeted%20Attacks&amp;severity=medium&amp;id=69787c3d4623b1157c10804e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24804-cwe-835-loop-with-unreachable-exit--0ebdcdb5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24804%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20coolsnowwolf%20lede&amp;severity=critical&amp;id=69787c804623b1157c108bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24803-cwe-835-loop-with-unreachable-exit--ce2b24a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24803%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20coolsnowwolf%20lede&amp;severity=critical&amp;id=69787c804623b1157c108bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24802-cwe-835-loop-with-unreachable-exit--36694367</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24802%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20briandilley%20jsonrpc4j&amp;severity=medium&amp;id=69787c804623b1157c108bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24801-vulnerability-in-ralim-ironos-e3c2d198</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24801%3A%20Vulnerability%20in%20Ralim%20IronOS&amp;severity=medium&amp;id=69787c804623b1157c108bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24800-cwe-787-out-of-bounds-write-in-tild-2d89ca37</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24800%3A%20CWE-787%20Out-of-bounds%20Write%20in%20tildearrow%20furnace&amp;severity=critical&amp;id=69787c804623b1157c108bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24799-cwe-787-out-of-bounds-write-in-davi-86c6f764</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24799%3A%20CWE-787%20Out-of-bounds%20Write%20in%20davisking%20dlib&amp;severity=medium&amp;id=69787c804623b1157c108bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24798-cwe-119-improper-restriction-of-ope-1fb91011</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24798%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20GaijinEntertainment%20DagorEngine&amp;severity=critical&amp;id=69787c804623b1157c108bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24797-cwe-787-out-of-bounds-write-in-neka-dabe41fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24797%3A%20CWE-787%20Out-of-bounds%20Write%20in%20neka-nat%20cupoch&amp;severity=medium&amp;id=697878ed4623b1157c0fa6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24795-cwe-787-out-of-bounds-write-in-clov-be5d62bf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24795%3A%20CWE-787%20Out-of-bounds%20Write%20in%20CloverHackyColor%20CloverBootloader&amp;severity=medium&amp;id=697878ed4623b1157c0fa6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24796-cwe-125-out-of-bounds-read-in-clove-89b633ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24796%3A%20CWE-125%20Out-of-bounds%20Read%20in%20CloverHackyColor%20CloverBootloader&amp;severity=medium&amp;id=697878ed4623b1157c0fa6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24794-cwe-119-improper-restriction-of-ope-ee39e994</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24794%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20CardboardPowered%20cardboard&amp;severity=critical&amp;id=697878ed4623b1157c0fa69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24793-cwe-787-out-of-bounds-write-in-azer-1ec9b576</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24793%3A%20CWE-787%20Out-of-bounds%20Write%20in%20azerothcore%20azerothcore-wotlk&amp;severity=critical&amp;id=697878ed4623b1157c0fa69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1464-cwe-190-integer-overflow-or-wraparou-e3c1db4c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1464%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20MuntashirAkon%20AppManager&amp;severity=medium&amp;id=697878ed4623b1157c0fa694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1465-cwe-119-improper-restriction-of-oper-dd88a3aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1465%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20anyrtcIO-Community%20anyRTC-RTMP-OpenSource&amp;severity=high&amp;id=697878ed4623b1157c0fa697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14971-cwe-862-missing-authorization-in-li-47d68db7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14971%3A%20CWE-862%20Missing%20Authorization%20in%20linknacional%20Link%20Invoice%20Payment%20for%20WooCommerce&amp;severity=medium&amp;id=697863d44623b1157c081536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21408-uncontrolled-search-path-element-in-1a82a11f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21408%3A%20Uncontrolled%20Search%20Path%20Element%20in%20FUJIFILM%20Business%20Innovation%20Corp.%20beat-access%20for%20Windows&amp;severity=high&amp;id=69784b384623b1157cfa2612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1361-cwe-121-stack-based-buffer-overflow--2a765591</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1361%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ASDA-Soft&amp;severity=high&amp;id=6978329c4623b1157cd9c78d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/initial-stages-of-romance-scams-x5bguest-diaryx5d--30aa95fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Initial%20Stages%20of%20Romance%20Scams%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Tue%2C%20Jan%2027th)&amp;severity=medium&amp;id=697820db4623b1157ccbe03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24686-cwe-22-improper-limitation-of-a-pat-a82658c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24686%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20theupdateframework%20go-tuf&amp;severity=medium&amp;id=69780bf04623b1157cc7aad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24479-cwe-22-improper-limitation-of-a-pat-37e6225f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24479%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zhblue%20hustoj&amp;severity=critical&amp;id=69780bf04623b1157cc7aabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24490-cwe-79-improper-neutralization-of-i-8427805e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24490%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=high&amp;id=69780bf04623b1157cc7aacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24489-cwe-93-improper-neutralization-of-c-684b5c93</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24489%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20HappyHackingSpace%20gakido&amp;severity=medium&amp;id=69780bf04623b1157cc7aac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24486-cwe-22-improper-limitation-of-a-pat-b129ef62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24486%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Kludex%20python-multipart&amp;severity=high&amp;id=69780bf04623b1157cc7aac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23683-cwe-862-missing-authorization-in-sa-0f5da0d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23683%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6978086c4623b1157cc5f11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-27-2880f4ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-27&amp;severity=medium&amp;id=697956324623b1157c51968a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65264-na-1aa1d5f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65264%3A%20n%2Fa&amp;severity=medium&amp;id=6978f0754623b1157c38c52b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69564-na-1d8455d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69564%3A%20n%2Fa&amp;severity=critical&amp;id=6978e96c4623b1157c36695c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69562-na-db202841</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69562%3A%20n%2Fa&amp;severity=critical&amp;id=6978e96c4623b1157c366958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69559-na-01951af2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69559%3A%20n%2Fa&amp;severity=critical&amp;id=6978e96c4623b1157c366954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69563-na-87b4b46f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69563%3A%20n%2Fa&amp;severity=critical&amp;id=6978e5e94623b1157c359a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28162-na-c7e6a9dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28162%3A%20n%2Fa&amp;severity=medium&amp;id=6978e2684623b1157c350b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69565-na-8780e99d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69565%3A%20n%2Fa&amp;severity=critical&amp;id=6978e2684623b1157c350b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28164-na-aff48337</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28164%3A%20n%2Fa&amp;severity=medium&amp;id=6978db5e4623b1157c331878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-27-46946cc2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-27&amp;severity=low&amp;id=697894d64623b1157c193d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1449-sql-injection-in-hisense-transtech-s-4d92f699</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1449%3A%20SQL%20Injection%20in%20Hisense%20TransTech%20Smart%20Bus%20Management%20System&amp;severity=medium&amp;id=69790cec4623b1157c40049a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1448-os-command-injection-in-d-link-dir-6-1061472a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1448%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=69790cec4623b1157c400493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24478-cwe-22-improper-limitation-of-a-pat-7cc58696</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24478%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=69790cec4623b1157c4004a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24477-cwe-201-insertion-of-sensitive-info-0135526e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24477%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=6977fa5c4623b1157cc21c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30248-cwe-427-in-western-digital-wd-disco-dfdda4a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30248%3A%20CWE-427%20in%20Western%20Digital%20WD%20Discovery&amp;severity=high&amp;id=6977f35d4623b1157cc0c83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24470-cwe-441-unintended-proxy-or-interme-b639318b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24470%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20zalando%20skipper&amp;severity=high&amp;id=6977efd04623b1157cc026ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24003-cwe-287-improper-authentication-in--eeb0d1a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24003%3A%20CWE-287%3A%20Improper%20Authentication%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=6977e8c84623b1157cbefcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1445-unrestricted-upload-in-ijason-liu-bo-1de5fa1b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1445%3A%20Unrestricted%20Upload%20in%20iJason-Liu%20Books_Manager&amp;severity=medium&amp;id=6977e8c84623b1157cbefcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59472-vulnerability-in-vercel-next-83d3bf12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59472%3A%20Vulnerability%20in%20vercel%20next&amp;severity=medium&amp;id=6977e1c04623b1157cbdb6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59471-vulnerability-in-vercel-next-17d14f61</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59471%3A%20Vulnerability%20in%20vercel%20next&amp;severity=medium&amp;id=6977e1c04623b1157cbdb69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1444-cross-site-scripting-in-ijason-liu-b-f13b545f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1444%3A%20Cross%20Site%20Scripting%20in%20iJason-Liu%20Books_Manager&amp;severity=medium&amp;id=69790cec4623b1157c4004a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22709-cwe-94-improper-control-of-generati-1636b6af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22709%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20patriksimek%20vm2&amp;severity=critical&amp;id=69790cec4623b1157c4004b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22696-cwe-347-improper-verification-of-cr-b87887a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22696%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Phala-Network%20dcap-qvl&amp;severity=critical&amp;id=69790cec4623b1157c4004ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-attacks-target-indian-government-using-gogitte-beb16e30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20Attacks%20Target%20Indian%20Government%20Using%20GOGITTER%2C%20GITSHELLPAD%2C%20and%20GOSHELL%20%7C%20Part%201&amp;severity=medium&amp;id=69786adc4623b1157c0a63cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1443-sql-injection-in-code-projects-onlin-0655515f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1443%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=6977ccaa4623b1157cb9dc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9820-stack-based-buffer-overflow-in-red-h-f66f7bc7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9820%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6977c9254623b1157cb7b5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9615-improper-preservation-of-permissions-3fd3b178</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9615%3A%20Improper%20Preservation%20of%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=6977c9254623b1157cb7b5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1190-missing-xml-validation-in-red-hat-re-cee86e03</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1190%3A%20Missing%20XML%20Validation%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=6977c5a14623b1157cb6ffab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0810-incorrect-calculation-of-multi-byte--af498b2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0810%3A%20Incorrect%20Calculation%20of%20Multi-Byte%20String%20Length%20in%20GitoxideLabs%20gitoxide&amp;severity=high&amp;id=6977c5a14623b1157cb6ffa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14525-allocation-of-resources-without-lim-f4a700f4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14525%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Virtualization%204&amp;severity=medium&amp;id=6977c5a14623b1157cb6ff90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14969-missing-release-of-resource-after-e-6be880ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14969%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Quarkus%203.27.2&amp;severity=medium&amp;id=6977c5a14623b1157cb6ff94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14459-authorization-bypass-through-user-c-38c24cd0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14459%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20RHEL-9-CNV-4.19&amp;severity=high&amp;id=6977c5a14623b1157cb6ff8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11687-improper-neutralization-of-input-du-8a400365</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11687%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=6977c5a14623b1157cb6ff83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11065-generation-of-error-message-contain-49b83784</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11065%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information&amp;severity=medium&amp;id=6977c5a14623b1157cb6ff7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9522-cwe-918-server-side-request-forgery--fc627c84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9522%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TP-Link%20Systems%20Inc.%20Omada%20Controller&amp;severity=medium&amp;id=6977c5a14623b1157cb6ffa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9521-cwe-522-insufficiently-protected-cre-7f02f470</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9521%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20TP-Link%20Systems%20Inc.%20Omada%20Controller&amp;severity=low&amp;id=6977c5a14623b1157cb6ff9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9520-cwe-639-authorization-bypass-through-e6d09812</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9520%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TP-Link%20Systems%20Inc.%20Omada%20Controller&amp;severity=high&amp;id=6977c5a14623b1157cb6ff98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23864-cwe-502-deserialization-of-untruste-c66bc996</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23864%3A%20(CWE-502)%3A%20Deserialization%20of%20Untrusted%20Data.%20(CWE-400)%3A%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-webpack&amp;severity=high&amp;id=6977c21c4623b1157cb61420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14756-cwe-77-improper-neutralization-of-s-4556bd0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14756%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20MR600%20v5.0&amp;severity=high&amp;id=6977b0924623b1157cb2aa67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71178-cwe-427-uncontrolled-search-path-el-577cf8f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71178%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Micron%20Technology%2C%20Inc.%20Crucial%20Storage%20Executive&amp;severity=high&amp;id=6977ad0e4623b1157cb13175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0925-improper-validation-of-specified-qua-53d9897a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0925%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Tanium%20Discover&amp;severity=low&amp;id=6977ad0e4623b1157cb13179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24435-cwe-942-permissive-cross-domain-sec-71857ed3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24435%3A%20CWE-942%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977ad0e4623b1157cb13180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24439-cwe-116-improper-encoding-or-escapi-bdf35b88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24439%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=low&amp;id=6977ad0e4623b1157cb13184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57784-cwe-208-observable-timing-discrepan-e92bf02d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57784%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Hiawatha%20Hiawatha%20Web%20server&amp;severity=medium&amp;id=6977ad0e4623b1157cb1316f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24432-cwe-352-cross-site-request-forgery--f00e195e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24432%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=medium&amp;id=6977ad0e4623b1157cb1317c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57785-cwe-415-double-free-in-hiawatha-hia-29a8d525</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57785%3A%20CWE-415%20Double%20Free%20in%20Hiawatha%20Hiawatha%20Web%20server&amp;severity=medium&amp;id=6977ad0e4623b1157cb13172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57783-cwe-444-inconsistent-interpretation-e25faf48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57783%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Hiawatha%20Hiawatha%20Web%20server&amp;severity=medium&amp;id=6977a98b4623b1157caf781f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24433-cwe-79-improper-neutralization-of-i-45669f67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=medium&amp;id=6977a98b4623b1157caf7835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24431-cwe-317-cleartext-storage-of-sensit-ab9006d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24431%3A%20CWE-317%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20GUI%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977a98b4623b1157caf7831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24437-cwe-525-use-of-web-browser-cache-co-72fdfb6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24437%3A%20CWE-525%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=medium&amp;id=6977a98b4623b1157caf783d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24436-cwe-307-improper-restriction-of-exc-6aed44b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24436%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=critical&amp;id=6977a98b4623b1157caf7839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24428-cwe-863-incorrect-authorization-in--44cb5ee5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24428%3A%20CWE-863%20Incorrect%20Authorization%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977a98b4623b1157caf7825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24430-cwe-201-insertion-of-sensitive-info-04c7a288</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24430%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977a98b4623b1157caf782d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24429-cwe-1393-use-of-default-password-in-8ff3cec7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24429%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=critical&amp;id=6977a98b4623b1157caf7829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24440-cwe-620-unverified-password-change--1c4abfce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24440%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977a98b4623b1157caf7841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1224-allocation-of-resources-without-limi-d7ece23d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1224%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Tanium%20Discover&amp;severity=medium&amp;id=6977a98b4623b1157caf7822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1446-cwe-79-improper-neutralization-of-in-73578bdc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1446%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Pro&amp;severity=medium&amp;id=6977a6094623b1157cae90c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21509-cwe-807-reliance-on-untrusted-input-a681ae8b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21509%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=6977a2884623b1157cab31e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indian-users-targeted-in-tax-phishing-campaign-del-8506907c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indian%20Users%20Targeted%20in%20Tax%20Phishing%20Campaign%20Delivering%20Blackmoon%20Malware&amp;severity=medium&amp;id=6977d37c4623b1157cbb6736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/access-system-flaws-enabled-hackers-to-unlock-door-15d14345</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Access%20System%20Flaws%20Enabled%20Hackers%20to%20Unlock%20Doors%20at%20Major%20European%20Firms&amp;severity=medium&amp;id=697794364623b1157ca384e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-vs-code-ai-extensions-with-15-million-in-61603c0d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20VS%20Code%20AI%20Extensions%20with%201.5%20Million%20Installs%20Steal%20Developer%20Source%20Code&amp;severity=medium&amp;id=6977d37c4623b1157cbb6739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gentic-ai-security-measures-based-on-the-owasp-asi-366d5139</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%D0%90gentic%20AI%20security%20measures%20based%20on%20the%20OWASP%20ASI%20Top%2010&amp;severity=medium&amp;id=69778a194623b1157c9f3ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-moonpeak-executed-via-lnk-files-8203f9e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20MoonPeak%20Executed%20via%20LNK%20Files&amp;severity=medium&amp;id=6977a9814623b1157caf7565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/26th-january-threat-intelligence-report-5ae286fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=26th%20January%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69776dbd4623b1157c9313f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1284-cwe-787-out-of-bounds-write-in-dassa-a10795f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1284%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=697771404623b1157c944d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1283-cwe-122-heap-based-buffer-overflow-i-189e83d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1283%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=697771404623b1157c944d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crunchbase-confirms-data-breach-after-hacking-clai-2677bfd4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crunchbase%20Confirms%20Data%20Breach%20After%20Hacking%20Claims&amp;severity=medium&amp;id=69775f794623b1157c8e6c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-firewall-flaws-ai-built-malware-brows-83313ca1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Firewall%20Flaws%2C%20AI-Built%20Malware%2C%20Browser%20Traps%2C%20Critical%20CVEs%20%26%20More&amp;severity=critical&amp;id=6977d37c4623b1157cbb673c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stanley-malware-toolkit-enables-phishing-via-websi-7c6649d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Stanley%E2%80%99%20Malware%20Toolkit%20Enables%20Phishing%20via%20Website%20Spoofing&amp;severity=medium&amp;id=697754ed4623b1157c89cf5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/winning-against-ai-based-attacks-requires-a-combin-b2304b8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Winning%20Against%20AI-Based%20Attacks%20Requires%20a%20Combined%20Defensive%20Approach&amp;severity=medium&amp;id=6977d37c4623b1157cbb673f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59109-cwe-1295-debug-messages-revealing-u-4fa85a06</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59109%3A%20CWE-1295%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information%20in%20dormakaba%20dormakaba%20registration%20unit%209002&amp;severity=medium&amp;id=6977400b4623b1157c815ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59108-cwe-1392-use-of-default-credentials-70a71ad4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59108%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=critical&amp;id=6977400b4623b1157c815ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59107-cwe-798-use-of-hard-coded-credentia-b94476b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59107%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400b4623b1157c815edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59106-cwe-272-least-privilege-violation-i-b1342125</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59106%3A%20CWE-272%3A%20Least%20Privilege%20Violation%20in%20dormakaba%20Access%20Manager%2092xx-k7&amp;severity=high&amp;id=6977400b4623b1157c815ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59105-cwe-312-cleartext-storage-of-sensit-0c88dcf3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59105%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400b4623b1157c815ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59104-cwe-1234-hardware-internal-or-debug-f630324d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59104%3A%20CWE-1234%3A%20Hardware%20Internal%20or%20Debug%20Modes%20Allow%20Override%20of%20Locks%20in%20dormakaba%20Access%20Manager%2092xx-k7&amp;severity=high&amp;id=6977400b4623b1157c815ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59103-cwe-1391-use-of-weak-credentials-in-431460c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59103%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=critical&amp;id=6977400b4623b1157c815ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59102-cwe-312-cleartext-storage-of-sensit-aa17446d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59102%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=medium&amp;id=6977400b4623b1157c815ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59101-cwe-291-reliance-on-ip-address-for--51142fc9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59101%3A%20CWE-291%3A%20Reliance%20on%20IP%20Address%20for%20Authentication%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400b4623b1157c815ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59100-cwe-285-improper-authorization-in-d-0466289c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59100%3A%20CWE-285%3A%20Improper%20Authorization%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=medium&amp;id=6977400b4623b1157c815eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59099-cwe-35-path-traversal-in-dormakaba--dac7a66d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59099%3A%20CWE-35%3A%20Path%20Traversal%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400a4623b1157c815ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59098-cwe-497-exposure-of-sensitive-syste-bc41aa77</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59098%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400a4623b1157c815e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59097-cwe-306-missing-authentication-for--acb2ae90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59097%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=critical&amp;id=6977400a4623b1157c815e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59096-cwe-798-use-of-hard-coded-credentia-4dde671c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59096%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=medium&amp;id=6977400a4623b1157c815e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59095-cwe-798-use-of-hard-coded-credentia-71cd56bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59095%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=medium&amp;id=6977400a4623b1157c815e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59094-cwe-269-improper-privilege-manageme-77fa67b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59094%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=high&amp;id=6977400a4623b1157c815e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59093-cwe-656-reliance-on-security-throug-d255abf4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59093%3A%20CWE-656%3A%20Reliance%20on%20Security%20Through%20Obscurity%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=high&amp;id=6977400a4623b1157c815e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59092-cwe-798-use-of-hard-coded-credentia-2cb59293</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59092%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=high&amp;id=6977400a4623b1157c815e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59091-cwe-798-use-of-hard-coded-credentia-84df14c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59091%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=critical&amp;id=6977400a4623b1157c815e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59090-cwe-306-missing-authentication-for--88a4dc03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59090%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=critical&amp;id=6977400a4623b1157c815e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27821-cwe-787-out-of-bounds-write-in-apac-2665aad5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27821%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Apache%20Software%20Foundation%20HDFS%20native%20client&amp;severity=high&amp;id=697739004623b1157c7df51e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41083-cwe-74-improper-neutralization-of-s-95e69c45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41083%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Altitude%20Altitude%20Communication%20Server&amp;severity=medium&amp;id=697739004623b1157c7df521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24656-cwe-502-deserialization-of-untruste-dadf3c2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24656%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Karaf&amp;severity=low&amp;id=697739004623b1157c7df524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41082-cwe-444-inconsistent-interpretation-08d9a62c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41082%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Altitude%20Altitude%20Communication%20Server&amp;severity=medium&amp;id=6977357c4623b1157c7c290d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-sandworm-hackers-blamed-for-cyberattack-on-96300613</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Sandworm%20Hackers%20Blamed%20for%20Cyberattack%20on%20Polish%20Power%20Grid&amp;severity=medium&amp;id=69772e414623b1157c783c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macsync-stealer-returns-seo-poisoning-and-fake-git-6295929d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MacSync%20Stealer%20Returns%3A%20SEO%20Poisoning%20and%20Fake%20GitHub%20Repositories%20Target%20macOS%20Users&amp;severity=medium&amp;id=697731f84623b1157c79b499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konni-hackers-deploy-ai-generated-powershell-backd-f6a39cdb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Konni%20Hackers%20Deploy%20AI-Generated%20PowerShell%20Backdoor%20Against%20Blockchain%20Developers&amp;severity=high&amp;id=6977d37c4623b1157cbb6742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1429-cwe-79-improper-neutralization-of-in-3558d8ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WellChoose%20Single%20Sign-On%20Portal%20System&amp;severity=medium&amp;id=6977276d4623b1157c74e4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-depth-analysis-of-vietnamese-stealer-python-bas-eb75b788</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-Depth%20Analysis%20of%20Vietnamese%20Stealer%3A%20Python-Based%20Info%20Stealer%20Using%20Telegram%20C2%20and%20DLL%20Sideloading&amp;severity=high&amp;id=6977235f4623b1157c732d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1428-cwe-78-improper-neutralization-of-sp-3e22c0ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1428%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WellChoose%20Single%20Sign-On%20Portal%20System&amp;severity=high&amp;id=6977276d4623b1157c74e4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1427-cwe-78-improper-neutralization-of-sp-65c40dce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1427%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WellChoose%20Single%20Sign-On%20Portal%20System&amp;severity=high&amp;id=697724144623b1157c737332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1425-stack-based-buffer-overflow-in-pymum-f80d7835</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1425%3A%20Stack-based%20Buffer%20Overflow%20in%20pymumu%20SmartDNS&amp;severity=medium&amp;id=69771ce04623b1157c70533a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1424-unrestricted-upload-in-phpgurukul-ne-5bc5b437</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1424%3A%20Unrestricted%20Upload%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=697712544623b1157c6c4eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1423-unrestricted-upload-in-code-projects-cc67b584</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1423%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Examination%20System&amp;severity=medium&amp;id=69777bcc4623b1157c990fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1422-sql-injection-in-code-projects-onlin-28382f5c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1422%3A%20SQL%20Injection%20in%20code-projects%20Online%20Examination%20System&amp;severity=medium&amp;id=697707c94623b1157c67230d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14973-cwe-89-sql-injection-in-recipe-card-f2600f17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14973%3A%20CWE-89%20SQL%20Injection%20in%20Recipe%20Card%20Blocks%20Lite&amp;severity=medium&amp;id=697707c94623b1157c67230a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14316-cwe-79-cross-site-scripting-xss-in--dffe6429</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14316%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20AhaChat%20Messenger%20Marketing&amp;severity=high&amp;id=697707c94623b1157c672307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1421-cross-site-scripting-in-code-project-046be19b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1421%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Examination%20System&amp;severity=medium&amp;id=6976fd4a4623b1157c61191a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2024-vmware-flaw-now-in-attackers-crosshairs-b1464dff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2024%20VMware%20Flaw%20Now%20in%20Attackers%E2%80%99%20Crosshairs&amp;severity=critical&amp;id=6976fd0a4623b1157c6110a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1420-buffer-overflow-in-tenda-ac23-efd98bbc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1420%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=6977a2884623b1157cab31e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1419-command-injection-in-d-link-dcs700l-47f8b11c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1419%3A%20Command%20Injection%20in%20D-Link%20DCS700l&amp;severity=medium&amp;id=6976f2b04623b1157c5da02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1418-out-of-bounds-write-in-gpac-90738829</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1418%3A%20Out-of-bounds%20Write%20in%20GPAC&amp;severity=medium&amp;id=6976eba84623b1157c5a7de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1417-null-pointer-dereference-in-gpac-b6af9ad7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1417%3A%20NULL%20Pointer%20Dereference%20in%20GPAC&amp;severity=medium&amp;id=6976e11c4623b1157c3c0df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1416-null-pointer-dereference-in-gpac-c0697bcc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1416%3A%20NULL%20Pointer%20Dereference%20in%20GPAC&amp;severity=medium&amp;id=6976e11c4623b1157c3c0dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1415-null-pointer-dereference-in-gpac-dbe50936</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1415%3A%20NULL%20Pointer%20Dereference%20in%20GPAC&amp;severity=medium&amp;id=6976d6914623b1157c2ea348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1414-command-injection-in-sangfor-operati-0c2293e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1414%3A%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=6976d6914623b1157c2ea342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1413-command-injection-in-sangfor-operati-7e9a2394</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1413%3A%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=6976cc044623b1157c29d717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1412-command-injection-in-sangfor-operati-db60d9a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1412%3A%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=6976c1784623b1157c18b140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-webserver-with-x24pwd-as-a-starting-path--e2d59043</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20Webserver%20with%20%2F%26%23x24%3B(pwd)%2F%20as%20a%20Starting%20Path%2C%20(Sun%2C%20Jan%2025th)&amp;severity=medium&amp;id=6976bdc14623b1157c134d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1411-improper-access-controls-in-beetel-7-dbb2cd28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1411%3A%20Improper%20Access%20Controls%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=6976ba704623b1157c0e5ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1410-missing-authentication-in-beetel-777-3433ed1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1410%3A%20Missing%20Authentication%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=6976ba704623b1157c0e5adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-26-52609b0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-26&amp;severity=low&amp;id=69791f4c4623b1157c45b7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-26-7634b3de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-26&amp;severity=medium&amp;id=697804b24623b1157cc3b376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70368-na-fc9fb059</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70368%3A%20n%2Fa&amp;severity=medium&amp;id=6977bbea4623b1157cb50af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67274-na-675b0cd8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67274%3A%20n%2Fa&amp;severity=high&amp;id=69779ef44623b1157ca6f10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70982-na-6d9036c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70982%3A%20n%2Fa&amp;severity=critical&amp;id=69779ef44623b1157ca6f106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50537-na-4d81dee7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50537%3A%20n%2Fa&amp;severity=medium&amp;id=69778d624623b1157ca089f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-26-e00f0889</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-26&amp;severity=low&amp;id=6976eb734623b1157c5a4481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1409-improper-restriction-of-excessive-au-ce85d87d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1409%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Beetel%20777VR1&amp;severity=low&amp;id=6976a8dc4623b1157cff7319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1408-weak-password-requirements-in-beetel-b1b1330b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1408%3A%20Weak%20Password%20Requirements%20in%20Beetel%20777VR1&amp;severity=low&amp;id=6976a5594623b1157cfebce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1407-information-disclosure-in-beetel-777-1bc56a3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1407%3A%20Information%20Disclosure%20in%20Beetel%20777VR1&amp;severity=low&amp;id=697697484623b1157cf22641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1406-open-redirect-in-lcg0124-bootdo-8924e3de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1406%3A%20Open%20Redirect%20in%20lcg0124%20BootDo&amp;severity=medium&amp;id=697607244623b1157c802958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6461-cwe-200-exposure-of-sensitive-inform-6c1da386</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6461%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cubewp1211%20CubeWP%20Framework&amp;severity=medium&amp;id=697588954623b1157c01bbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-25-fdf20aef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-25&amp;severity=medium&amp;id=6976b3324623b1157c047f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-25-fa2973a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-25&amp;severity=low&amp;id=6975ceb04623b1157c599c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0593-cwe-862-missing-authorization-in-wpg-6cec36e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0593%3A%20CWE-862%20Missing%20Authorization%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=6974f8714623b1157cc25a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0862-cwe-79-improper-neutralization-of-in-0c02f79a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pdfcrowd%20Save%20as%20PDF%20Plugin%20by%20PDFCrowd&amp;severity=medium&amp;id=6974ea624623b1157cbe8a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13920-cwe-200-exposure-of-sensitive-infor-7da736bd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13920%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpdirectorykit%20WP%20Directory%20Kit&amp;severity=medium&amp;id=6974c0304623b1157cb57048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0911-cwe-434-unrestricted-upload-of-file--7bd667a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0911%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpmudev%20Hustle%20%E2%80%93%20Email%20Marketing%2C%20Lead%20Generation%2C%20Optins%2C%20Popups&amp;severity=high&amp;id=6974c0304623b1157cb5704c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multi-stage-phishing-campaign-targets-russia-with--0cd263eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multi-Stage%20Phishing%20Campaign%20Targets%20Russia%20with%20Amnesia%20RAT%20and%20Ransomware&amp;severity=medium&amp;id=69752d084623b1157ccddeae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13205-cwe-352-cross-site-request-forgery--5759c8f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13205%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69748ef84623b1157cac2e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1127-cwe-79-improper-neutralization-of-in-71eb27eb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Timeline%20Event%20History&amp;severity=medium&amp;id=69748ef84623b1157cac2e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13194-cwe-352-cross-site-request-forgery--70ed80ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13194%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69748ef84623b1157cac2e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1191-cwe-79-improper-neutralization-of-in-45545a99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1191%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freemp%20JavaScript%20Notifier&amp;severity=medium&amp;id=69748ef84623b1157cac2e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1208-cwe-352-cross-site-request-forgery-c-8ce06f0d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1208%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mainichiweb%20Friendly%20Functions%20for%20Welcart&amp;severity=medium&amp;id=69748ef84623b1157cac2e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1189-cwe-79-improper-neutralization-of-in-f6a677db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leadbi%20LeadBI%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69748ef84623b1157cac2e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1300-cwe-79-improper-neutralization-of-in-02ef204c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1300%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mehtevas%20Responsive%20Header%20Plugin&amp;severity=medium&amp;id=69748ef84623b1157cac2e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13139-cwe-352-cross-site-request-forgery--9b96c820</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13139%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69748ef84623b1157cac2e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nike-probing-potential-security-incident-as-hacker-78d65ffd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nike%20Probing%20Potential%20Security%20Incident%20as%20Hackers%20Threaten%20to%20Leak%20Data&amp;severity=medium&amp;id=697487bd4623b1157caa41c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1098-cwe-79-improper-neutralization-of-in-a7605f1a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1098%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codemacher%20CM%20CSS%20Columns&amp;severity=medium&amp;id=6974846c4623b1157ca99ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0633-cwe-287-improper-authentication-in-r-90d7cd89</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0633%3A%20CWE-287%20Improper%20Authentication%20in%20roxnor%20MetForm%20%E2%80%93%20Contact%20Form%2C%20Survey%2C%20Quiz%2C%20%26%20Custom%20Form%20Builder%20for%20Elementor&amp;severity=low&amp;id=6974846c4623b1157ca99ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1302-cwe-79-improper-neutralization-of-in-e2def23c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1302%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shahinurislam%20Meta-box%20GalleryMeta&amp;severity=medium&amp;id=6974846c4623b1157ca99ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14630-cwe-352-cross-site-request-forgery--fd43bd15</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14630%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rtowebsites%20AdminQuickbar&amp;severity=medium&amp;id=6974846c4623b1157ca99ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0687-cwe-862-missing-authorization-in-sha-2768dd95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0687%3A%20CWE-862%20Missing%20Authorization%20in%20shahinurislam%20Meta-box%20GalleryMeta&amp;severity=medium&amp;id=6974846c4623b1157ca99ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1266-cwe-79-improper-neutralization-of-in-b43efe42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neop%20Postalicious&amp;severity=medium&amp;id=6974846c4623b1157ca99ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14907-cwe-352-cross-site-request-forgery--6add1cc8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14907%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hallsofmontezuma%20Moderate%20Selected%20Posts&amp;severity=medium&amp;id=6974846c4623b1157ca99ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15516-cwe-862-missing-authorization-in-pl-5fb8bc44</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15516%3A%20CWE-862%20Missing%20Authorization%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=medium&amp;id=6974846c4623b1157ca99ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0800-cwe-79-improper-neutralization-of-in-d9bf7dc1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20User%20Submitted%20Posts%20%E2%80%93%20Enable%20Users%20to%20Submit%20Posts%20from%20the%20Front%20End&amp;severity=high&amp;id=6974846c4623b1157ca99ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-dynowiper-malware-used-in-attempted-sandworm-a-301f8258</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20DynoWiper%20Malware%20Used%20in%20Attempted%20Sandworm%20Attack%20on%20Polish%20Power%20Sector&amp;severity=medium&amp;id=69752d084623b1157ccddeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/who-approved-this-agent-rethinking-access-accounta-641b74f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Who%20Approved%20This%20Agent%3F%20Rethinking%20Access%2C%20Accountability%2C%20and%20Risk%20in%20the%20Age%20of%20AI%20Agents&amp;severity=low&amp;id=69752d084623b1157ccddeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-actively-exploited-vmware-vcenter-flaw-c-6b83f1fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Actively%20Exploited%20VMware%20vCenter%20Flaw%20CVE-2024-37079%20to%20KEV%20Catalog&amp;severity=critical&amp;id=69752d084623b1157ccddeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1088-cwe-352-cross-site-request-forgery-c-1f994a39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1088%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zero1zerouk%20Login%20Page%20Editor&amp;severity=medium&amp;id=6974765f4623b1157ca739c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13676-cwe-79-improper-neutralization-of-i-ffb5d910</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13676%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ostin654%20JustClick%20registration%20plugin&amp;severity=medium&amp;id=6974765d4623b1157ca738d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1099-cwe-79-improper-neutralization-of-in-faff8b5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1099%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shazdeh%20Administrative%20Shortcodes&amp;severity=medium&amp;id=697476614623b1157ca73a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14609-cwe-862-missing-authorization-in-ma-8f6614c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14609%3A%20CWE-862%20Missing%20Authorization%20in%20marcinlawrowski%20Wise%20Analytics&amp;severity=medium&amp;id=6974765d4623b1157ca738de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1097-cwe-79-improper-neutralization-of-in-da69674f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1097%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeruby%20ThemeRuby%20Multi%20Authors%20%E2%80%93%20Assign%20Multiple%20Writers%20to%20Posts&amp;severity=medium&amp;id=697476614623b1157ca73a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14941-cwe-79-improper-neutralization-of-i-bbccb57c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14941%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aminhashemy%20GZSEO&amp;severity=medium&amp;id=6974765d4623b1157ca738fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1084-cwe-79-improper-neutralization-of-in-00bf3db8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lovor%20Cookie%20consent%20for%20developers&amp;severity=medium&amp;id=6974765f4623b1157ca739bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14843-cwe-862-missing-authorization-in-wi-73b7f14d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14843%3A%20CWE-862%20Missing%20Authorization%20in%20wizit%20Wizit%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=6974765d4623b1157ca738f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1075-cwe-352-cross-site-request-forgery-c-1425f457</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1075%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20teamzt%20ZT%20Captcha&amp;severity=medium&amp;id=6974765f4623b1157ca739ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1081-cwe-352-cross-site-request-forgery-c-3041ea61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1081%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sauravrox%20Set%20Bulk%20Post%20Categories&amp;severity=medium&amp;id=6974765f4623b1157ca739b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14629-cwe-862-missing-authorization-in-ta-62cef717</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14629%3A%20CWE-862%20Missing%20Authorization%20in%20tandubhai%20Alchemist%20Ajax%20Upload&amp;severity=medium&amp;id=6974765d4623b1157ca738e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14985-cwe-79-improper-neutralization-of-i-361cb023</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robiulawal40%20Alpha%20Blocks&amp;severity=medium&amp;id=6974765f4623b1157ca73998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14797-cwe-79-improper-neutralization-of-i-b3b472b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14797%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kometschuh%20Same%20Category%20Posts&amp;severity=medium&amp;id=6974765d4623b1157ca738e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1095-cwe-79-improper-neutralization-of-in-72d847a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1095%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cantothemes%20Canto%20Testimonials&amp;severity=medium&amp;id=6974765f4623b1157ca739c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0806-cwe-89-improper-neutralization-of-sp-eccc3b64</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0806%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20andddd%20WP-ClanWars&amp;severity=medium&amp;id=6974765f4623b1157ca7399c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13374-cwe-434-unrestricted-upload-of-file-1e1b18e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13374%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20irisideatechsolutions%20Kalrav%20AI%20Agent&amp;severity=critical&amp;id=6974765d4623b1157ca738d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1076-cwe-352-cross-site-request-forgery-c-fde3f105</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1076%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bramdnl%20Star%20Review%20Manager&amp;severity=medium&amp;id=6974765f4623b1157ca739b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14906-cwe-352-cross-site-request-forgery--ea6107fb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14906%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20waqasvickey0071%20WP%20Youtube%20Video%20Gallery&amp;severity=medium&amp;id=6974765d4623b1157ca738f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12836-cwe-79-improper-neutralization-of-i-f9fdd795</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12836%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vektor-inc%20VK%20Google%20Job%20Posting%20Manager&amp;severity=medium&amp;id=6974765d4623b1157ca738cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0807-cwe-918-server-side-request-forgery--5f2404fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0807%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpmessiah%20Frontis%20Blocks%20%E2%80%94%20Block%20Library%20for%20the%20Block%20Editor&amp;severity=high&amp;id=6974765f4623b1157ca739a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1070-cwe-352-cross-site-request-forgery-c-b502509d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1070%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20adzbierajewski%20Alex%20User%20Counter&amp;severity=medium&amp;id=6974765f4623b1157ca739a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14903-cwe-352-cross-site-request-forgery--bc4661f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14903%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stefanristic%20Simple%20Crypto%20Shortcodes&amp;severity=medium&amp;id=6974765d4623b1157ca738f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1257-cwe-98-improper-control-of-filename--dc21fe66</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1257%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20shazdeh%20Administrative%20Shortcodes&amp;severity=high&amp;id=697476614623b1157ca73aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13952-cwe-cwe-416-use-after-free-418-in-i-b52c6841</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13952%3A%20CWE%20-%20CWE-416%3A%20Use%20After%20Free%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=critical&amp;id=6974300c4623b1157c7863fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24422-cwe-200-exposure-of-sensitive-infor-acf3cbca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24422%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=6974300c4623b1157c786400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24420-cwe-284-improper-access-control-in--b0a1dc5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24420%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=6974300c4623b1157c7863fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24469-cwe-22-improper-limitation-of-a-pat-e3953dca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24469%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20frustratedProton%20http-server&amp;severity=high&amp;id=6974300c4623b1157c786403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24421-cwe-862-missing-authorization-in-th-5b1dfbc7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24421%3A%20CWE-862%3A%20Missing%20Authorization%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=697425804623b1157c76ac63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24412-cwe-20-improper-input-validation-in-51455e14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24412%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697425804623b1157c76ac5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24411-cwe-20-improper-input-validation-in-4aee028d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24411%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697425804623b1157c76ac59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24410-cwe-20-improper-input-validation-in-98f9ec0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24410%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697425804623b1157c76ac54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24409-cwe-20-improper-input-validation-in-01d23c78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24409%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697425804623b1157c76ac4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24407-cwe-20-improper-input-validation-in-281869ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24407%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c75171f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24406-cwe-20-improper-input-validation-in-71863bb7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24406%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c75171a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24405-cwe-20-improper-input-validation-in-848b1bd8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24405%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c751715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24404-cwe-20-improper-input-validation-in-acba84f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24404%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c751710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24403-cwe-20-improper-input-validation-in-db406130</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24403%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c75170b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22583-cwe-88-improper-neutralization-of-a-0166cd7b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22583%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=697417714623b1157c721592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22582-cwe-88-improper-neutralization-of-a-66ae174e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22582%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=697417714623b1157c72158f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22586-cwe-321-hard-coded-cryptographic-ke-c2d9c280</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22586%3A%20CWE-321%20Hard-coded%20Cryptographic%20Key%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=697417714623b1157c721598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22585-cwe-327-use-of-a-broken-or-risky-cr-13b354f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22585%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=697417714623b1157c721595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24399-cwe-79-improper-neutralization-of-i-62f1bff2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24399%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chattermate%20chattermate.chat&amp;severity=critical&amp;id=697417714623b1157c72159b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-24-5f146b44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-24&amp;severity=medium&amp;id=697561b24623b1157cd82845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-24-6f7f1d5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-24&amp;severity=low&amp;id=69753e8a4623b1157cd1b5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24140-cwe-915-improperly-controlled-modif-32322b1d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24140%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20franklioxygen%20MyTube&amp;severity=low&amp;id=69740ce44623b1157c6b18a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24139-cwe-862-missing-authorization-in-fr-71264e43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24139%3A%20CWE-862%3A%20Missing%20Authorization%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69740ce44623b1157c6b18a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24474-cwe-95-improper-neutralization-of-d-3b3999e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24474%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20DioxusLabs%20components&amp;severity=medium&amp;id=69740ce44623b1157c6b18ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24128-cwe-79-improper-neutralization-of-i-7a9e0f4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24128%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=697405dd4623b1157c69e7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sandworm-behind-cyberattack-on-polands-power-grid--cc7bd571</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sandworm%20behind%20cyberattack%20on%20Poland&apos;s%20power%20grid%20in%20late%202025&amp;severity=medium&amp;id=6973fed44623b1157c688627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1386-cwe-61-unix-symbolic-link-symlink-fo-74d39d5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1386%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20AWS%20Firecracker&amp;severity=medium&amp;id=6973dbae4623b1157c62ac34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14947-cwe-862-missing-authorization-in-pl-4ef1f336</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14947%3A%20CWE-862%20Missing%20Authorization%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=medium&amp;id=6973b17e4623b1157c537c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24423-cwe-306-missing-authentication-for--ca9947c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24423%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SmarterTools%20SmarterMail&amp;severity=critical&amp;id=6973aa764623b1157c50089a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71177-cwe-79-improper-neutralization-of-i-bb86400d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71177%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20LavaLite%20LavaLite%20CMS&amp;severity=medium&amp;id=6973a6f24623b1157c4f2e06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1299-cwe-93-in-python-software-foundation-d09db2f5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1299%3A%20CWE-93%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=6973a6f24623b1157c4f2e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-updates-kev-catalog-with-four-actively-exploi-76ea0673</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Updates%20KEV%20Catalog%20with%20Four%20Actively%20Exploited%20Software%20Vulnerabilities&amp;severity=low&amp;id=697395284623b1157c4bbbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0994-cwe-674-uncontrolled-recursion-in-py-57587e7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0994%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Python%20Protobuf&amp;severity=high&amp;id=69738e544623b1157c4a43aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24636-missing-authorization-in-syed-balkh-90312e20</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24636%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Sugar%20Calendar%20(Lite)&amp;severity=medium&amp;id=69738ae44623b1157c48be2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24635-improper-control-of-filename-for-in-95559a7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24635%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20DevsBlink%20EduBlink%20Core&amp;severity=high&amp;id=69738ae44623b1157c48be28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24634-authorization-bypass-through-user-c-56f3c604</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24634%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Rustaurius%20Ultimate%20Reviews&amp;severity=medium&amp;id=69738ae44623b1157c48be25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24633-missing-authorization-in-passionate-c0f5644c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24633%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20Add%20Expires%20Headers%20%26%20Optimized%20Minify&amp;severity=medium&amp;id=69738ae24623b1157c48bd19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24632-improper-neutralization-of-input-du-04975acf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jagdish1o1%20Delay%20Redirects&amp;severity=medium&amp;id=69738ae24623b1157c48bd16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24631-authorization-bypass-through-user-c-27c93a86</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24631%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Rosebud&amp;severity=medium&amp;id=69738ae24623b1157c48bd13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24630-improper-neutralization-of-input-du-79a10227</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Design%20Stylish%20Cost%20Calculator&amp;severity=medium&amp;id=69738ae24623b1157c48bd10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24629-improper-neutralization-of-input-du-a6e92fc9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ability%2C%20Inc%20Web%20Accessibility%20with%20Max%20Access&amp;severity=medium&amp;id=69738ae24623b1157c48bd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24627-missing-authorization-in-trusona-tr-f54d15b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24627%3A%20Missing%20Authorization%20in%20Trusona%20Trusona%20for%20WordPress&amp;severity=medium&amp;id=69738ae24623b1157c48bd0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24626-improper-neutralization-of-input-du-b42c4923</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LogicHunt%20Logo%20Slider&amp;severity=medium&amp;id=69738ae24623b1157c48bd07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24625-missing-authorization-in-imaginate--4adbbf43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24625%3A%20Missing%20Authorization%20in%20Imaginate%20Solutions%20File%20Uploads%20Addon%20for%20WooCommerce&amp;severity=medium&amp;id=69738ae24623b1157c48bd04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24624-improper-neutralization-of-special--8fb4c855</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24624%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20saeros1984%20Neoforum&amp;severity=high&amp;id=69738ae24623b1157c48bd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24623-improper-neutralization-of-input-du-80e9f0cb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24623%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saeros1984%20Neoforum&amp;severity=high&amp;id=69738ae24623b1157c48bcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24622-missing-authorization-in-sergiy-dzy-ff94e238</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24622%3A%20Missing%20Authorization%20in%20Sergiy%20Dzysyak%20Suggestion%20Toolkit&amp;severity=medium&amp;id=69738ae14623b1157c48bcda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24621-improper-neutralization-of-input-du-0a7ca6a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vladimir%20Statsenko%20Terms%20descriptions&amp;severity=medium&amp;id=69738ae14623b1157c48bcd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24620-improper-neutralization-of-input-du-8bf5f163</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginOps%20Landing%20Page%20Builder&amp;severity=medium&amp;id=69738ae14623b1157c48bcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24619-missing-authorization-in-popcash-po-ef6eb75f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24619%3A%20Missing%20Authorization%20in%20PopCash%20PopCash.Net%20Code%20Integration%20Tool&amp;severity=medium&amp;id=69738ae14623b1157c48bcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24617-improper-neutralization-of-input-du-54c61973</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24617%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20Iser%20Easy%20Modal&amp;severity=medium&amp;id=69738ae14623b1157c48bcce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24616-missing-authorization-in-damian-wp--d1eb6ccc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24616%3A%20Missing%20Authorization%20in%20Damian%20WP%20Popups&amp;severity=medium&amp;id=69738ae14623b1157c48bccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24615-missing-authorization-in-themebeez--266457b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24615%3A%20Missing%20Authorization%20in%20themebeez%20Cream%20Magazine&amp;severity=medium&amp;id=69738ae14623b1157c48bcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24614-improper-neutralization-of-input-du-6a32600a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Devsbrain%20Flex%20QR%20Code%20Generator&amp;severity=medium&amp;id=69738ae14623b1157c48bcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24613-missing-authorization-in-ecwid-by-l-950e77ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24613%3A%20Missing%20Authorization%20in%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart%20Ecwid%20Shopping%20Cart&amp;severity=medium&amp;id=69738ae14623b1157c48bcc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24612-missing-authorization-in-themebeez--a5e5a476</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24612%3A%20Missing%20Authorization%20in%20themebeez%20Orchid%20Store&amp;severity=medium&amp;id=69738ae14623b1157c48bcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24609-improper-control-of-filename-for-in-58da0be6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24609%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Laurent&amp;severity=high&amp;id=69738adf4623b1157c48bc3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24608-improper-control-of-filename-for-in-6091aaec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24608%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Laurent%20Core&amp;severity=high&amp;id=69738adf4623b1157c48bc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24607-missing-authorization-in-wptravelen-9729b4f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24607%3A%20Missing%20Authorization%20in%20wptravelengine%20Travel%20Monster&amp;severity=medium&amp;id=69738adf4623b1157c48bc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24606-missing-authorization-in-web-impian-ae007fd0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24606%3A%20Missing%20Authorization%20in%20Web%20Impian%20Bayarcash%20WooCommerce&amp;severity=medium&amp;id=69738adf4623b1157c48bc31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24605-missing-authorization-in-pencilwp-x-c38467c0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24605%3A%20Missing%20Authorization%20in%20pencilwp%20X%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69738adf4623b1157c48bc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24604-missing-authorization-in-themebeez--30922a3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24604%3A%20Missing%20Authorization%20in%20themebeez%20Simple%20GDPR%20Cookie%20Compliance&amp;severity=medium&amp;id=69738adf4623b1157c48bc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24603-missing-authorization-in-themebeez--ba8bb196</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24603%3A%20Missing%20Authorization%20in%20themebeez%20Universal%20Google%20Adsense%20and%20Ads%20manager&amp;severity=medium&amp;id=69738adf4623b1157c48bc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24602-missing-authorization-in-raptive-ra-9e27e86e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24602&amp;severity=null&amp;id=69738adf4623b1157c48bc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24601-improper-neutralization-of-input-du-710442a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24601%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Pay%20Writer&amp;severity=medium&amp;id=69738adf4623b1157c48bc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24600-improper-neutralization-of-input-du-6de255a1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24600%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Review&amp;severity=medium&amp;id=69738adf4623b1157c48bc1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24599-authorization-bypass-through-user-c-66b06521</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24599%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20XLPlugins%20NextMove%20Lite&amp;severity=medium&amp;id=69738ade4623b1157c48bbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24598-missing-authorization-in-bestwebsof-aa9dc619</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24598%3A%20Missing%20Authorization%20in%20bestwebsoft%20Multilanguage%20by%20BestWebSoft&amp;severity=medium&amp;id=69738ade4623b1157c48bbf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24596-cross-site-request-forgery-csrf-in--ff3b2e0d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24596%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20marynixie%20Related%20Posts%20Thumbnails%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69738ade4623b1157c48bbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24595-missing-authorization-in-zohocrm-zo-194af72e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24595%3A%20Missing%20Authorization%20in%20zohocrm%20Zoho%20CRM%20Lead%20Magnet&amp;severity=medium&amp;id=69738ade4623b1157c48bbf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24594-improper-neutralization-of-input-du-c8532c8b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24594%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=69738ade4623b1157c48bbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24593-exposure-of-sensitive-system-inform-37772e7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24593%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Strategy11%20Team%20AWP%20Classifieds&amp;severity=medium&amp;id=69738ade4623b1157c48bbed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24591-improper-neutralization-of-input-du-af2203d8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24591%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yasir129%20Turn%20Yoast%20SEO%20FAQ%20Block%20to%20Accordion&amp;severity=medium&amp;id=69738ade4623b1157c48bbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24589-insertion-of-sensitive-information--a73bfe64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24589%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Cargus%20eCommerce%20Cargus&amp;severity=medium&amp;id=69738ade4623b1157c48bbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24588-missing-authorization-in-topdevs-sm-9615a9b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24588%3A%20Missing%20Authorization%20in%20topdevs%20Smart%20Product%20Viewer&amp;severity=medium&amp;id=69738ade4623b1157c48bbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24587-missing-authorization-in-kutsy-ajax-73179f9f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24587%3A%20Missing%20Authorization%20in%20kutsy%20AJAX%20Hits%20Counter%20%2B%20Popular%20Posts%20Widget&amp;severity=medium&amp;id=69738ade4623b1157c48bbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24585-missing-authorization-in-hyyan-abo--78acc02e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24585%3A%20Missing%20Authorization%20in%20Hyyan%20Abo%20Fakher%20Hyyan%20WooCommerce%20Polylang%20Integration&amp;severity=medium&amp;id=69738adc4623b1157c48bba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24584-improper-neutralization-of-input-du-ec5f6ef0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24584%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20Tutor%20LMS%20BunnyNet%20Integration&amp;severity=medium&amp;id=69738adc4623b1157c48bba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24583-missing-authorization-in-sumup-sumu-0943be14</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24583%3A%20Missing%20Authorization%20in%20sumup%20SumUp%20Payment%20Gateway%20For%20WooCommerce&amp;severity=medium&amp;id=69738adc4623b1157c48bba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24581-missing-authorization-in-wp-swings--9bef3430</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24581%3A%20Missing%20Authorization%20in%20WP%20Swings%20Points%20and%20Rewards%20for%20WooCommerce&amp;severity=medium&amp;id=69738adc4623b1157c48bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24580-missing-authorization-in-ecwid-by-l-603dfe49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24580%3A%20Missing%20Authorization%20in%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart%20Ecwid%20Shopping%20Cart&amp;severity=medium&amp;id=69738adc4623b1157c48bb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24579-missing-authorization-in-wp-messiah-122fb5ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24579%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Ai%20Image%20Alt%20Text%20Generator%20for%20WP&amp;severity=medium&amp;id=69738adc4623b1157c48bb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24578-missing-authorization-in-jahid-hasa-b4a7ce44</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24578%3A%20Missing%20Authorization%20in%20Jahid%20Hasan%20Admin%20login%20URL%20Change&amp;severity=medium&amp;id=69738adc4623b1157c48bb94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24577-missing-authorization-in-genetech-p-e7993b4a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24577%3A%20Missing%20Authorization%20in%20Genetech%20Products%20Pie%20Register&amp;severity=medium&amp;id=69738adc4623b1157c48bb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24576-improper-neutralization-of-input-du-9d9d3333</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20COP%20UX%20Flat&amp;severity=medium&amp;id=69738adc4623b1157c48bb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24572-improper-neutralization-of-special--65c0f257</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24572%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20Content&amp;severity=high&amp;id=69738adc4623b1157c48bb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24571-missing-authorization-in-boxnow-box-d4a2aee9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24571%3A%20Missing%20Authorization%20in%20boxnow%20BOX%20NOW%20Delivery&amp;severity=medium&amp;id=69738adb4623b1157c48baab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24570-missing-authorization-in-wisdmlabs--eaf7e375</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24570%3A%20Missing%20Authorization%20in%20WisdmLabs%20Edwiser%20Bridge&amp;severity=medium&amp;id=69738adb4623b1157c48baa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24569-missing-authorization-in-sully-medi-7d996894</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24569%3A%20Missing%20Authorization%20in%20Sully%20Media%20Library%20File%20Size&amp;severity=medium&amp;id=69738adb4623b1157c48baa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24567-missing-authorization-in-briarinc-a-340f843a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24567%3A%20Missing%20Authorization%20in%20briarinc%20Anything%20Order%20by%20Terms&amp;severity=medium&amp;id=69738adb4623b1157c48baa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24566-missing-authorization-in-inet-inet--5af1f865</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24566%3A%20Missing%20Authorization%20in%20iNET%20iNET%20Webkit&amp;severity=medium&amp;id=69738adb4623b1157c48ba9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24565-insertion-of-sensitive-information--5598e7cb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24565%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20bPlugins%20B%20Accordion&amp;severity=medium&amp;id=69738adb4623b1157c48ba9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24564-improper-neutralization-of-script-r-765f2f6d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24564%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Israpil%20Textmetrics&amp;severity=medium&amp;id=69738adb4623b1157c48ba99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24563-missing-authorization-in-ashan-pere-431f5cbe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24563%3A%20Missing%20Authorization%20in%20Ashan%20Perera%20LifePress&amp;severity=medium&amp;id=69738adb4623b1157c48ba96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24562-missing-authorization-in-ryviu-ryvi-3dfaa5e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24562%3A%20Missing%20Authorization%20in%20Ryviu%20Ryviu%20%E2%80%93%20Product%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=69738adb4623b1157c48ba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24561-missing-authorization-in-mahmudul-h-fb60dcf6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24561%3A%20Missing%20Authorization%20in%20Mahmudul%20Hasan%20Arif%20FluentBoards&amp;severity=medium&amp;id=69738adb4623b1157c48ba90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24559-insertion-of-sensitive-information--8ec50cc6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24559%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20CRM%20Perks%20Integration%20for%20Contact%20Form%207%20HubSpot&amp;severity=medium&amp;id=69738ada4623b1157c48ba7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24558-improper-neutralization-of-input-du-5028d6bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antoniobg%20ABG%20Rich%20Pins&amp;severity=medium&amp;id=69738ada4623b1157c48ba7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24557-insertion-of-sensitive-information--af8c4bd7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24557%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WEN%20Solutions%20Contact%20Form%207%20GetResponse%20Extension&amp;severity=medium&amp;id=69738ada4623b1157c48ba79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24556-missing-authorization-in-wpdive-ele-cf372713</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24556%3A%20Missing%20Authorization%20in%20wpdive%20ElementCamp&amp;severity=medium&amp;id=69738ada4623b1157c48ba76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24555-improper-neutralization-of-input-du-0565a140</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artplacer%20ArtPlacer%20Widget&amp;severity=medium&amp;id=69738ada4623b1157c48ba73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24553-exposure-of-sensitive-system-inform-69daedde</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24553%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Dotstore%20Fraud%20Prevention%20For%20Woocommerce&amp;severity=medium&amp;id=69738ada4623b1157c48ba70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24551-missing-authorization-in-monetagwp--76cd26cb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24551%3A%20Missing%20Authorization%20in%20monetagwp%20Monetag%20Official%20Plugin&amp;severity=medium&amp;id=69738ada4623b1157c48ba6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24550-improper-neutralization-of-input-du-a7368c50</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kaira%20Blockons&amp;severity=medium&amp;id=69738ada4623b1157c48ba6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24549-cross-site-request-forgery-csrf-in--7e41016f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24549%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Paolo%20GeoDirectory&amp;severity=medium&amp;id=69738ada4623b1157c48ba67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24548-server-side-request-forgery-ssrf-in-20243811</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24548%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20princeahmed%20Radio%20Player&amp;severity=medium&amp;id=69738ada4623b1157c48ba64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24544-missing-authorization-in-harmonic-d-75ce92fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24544%3A%20Missing%20Authorization%20in%20Harmonic%20Design%20HD%20Quiz&amp;severity=medium&amp;id=69738ad94623b1157c48ba41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24543-missing-authorization-in-horea-radu-32690cb1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24543%3A%20Missing%20Authorization%20in%20Horea%20Radu%20Materialis%20Companion&amp;severity=medium&amp;id=69738ad94623b1157c48ba3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24542-cross-site-request-forgery-csrf-in--dc2d7fc7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24542%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20John%20James%20Jacoby%20WP%20Term%20Order&amp;severity=medium&amp;id=69738ad94623b1157c48ba3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24541-missing-authorization-in-mkscripts--d796b840</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24541%3A%20Missing%20Authorization%20in%20mkscripts%20Download%20After%20Email&amp;severity=medium&amp;id=69738ad94623b1157c48ba38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24540-missing-authorization-in-prince-int-eb42e5d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24540%3A%20Missing%20Authorization%20in%20princeahmed%20Integrate%20Google%20Drive&amp;severity=medium&amp;id=69738ad94623b1157c48ba35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24539-missing-authorization-in-abcdatos-p-1558be26</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24539%3A%20Missing%20Authorization%20in%20ABCdatos%20Protecci%C3%B3n%20de%20datos%20%E2%80%93%20RGPD&amp;severity=medium&amp;id=69738ad94623b1157c48ba32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24538-improper-control-of-filename-for-in-b3ce93bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24538%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20omnipressteam%20Omnipress&amp;severity=high&amp;id=69738ad94623b1157c48ba2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24535-missing-authorization-in-webdevstud-08f028cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24535%3A%20Missing%20Authorization%20in%20webdevstudios%20Automatic%20Featured%20Images%20from%20Videos&amp;severity=medium&amp;id=69738ad94623b1157c48ba2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24534-missing-authorization-in-upress-boo-8d170298</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24534%3A%20Missing%20Authorization%20in%20uPress%20Booter&amp;severity=medium&amp;id=69738ad94623b1157c48ba29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24532-missing-authorization-in-sitelock-s-e609cf5e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24532%3A%20Missing%20Authorization%20in%20SiteLock%20SiteLock%20Security%20%E2%80%93%20WP%20Hardening%2C%20Login%20Security%20%26%20Malware%20Scans&amp;severity=medium&amp;id=69738ad94623b1157c48ba25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24531-improper-control-of-filename-for-in-a81762ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24531%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Prowess&amp;severity=high&amp;id=69738ad74623b1157c48b9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24530-missing-authorization-in-sheepfish--1f28bc89</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24530%3A%20Missing%20Authorization%20in%20sheepfish%20WebP%20Conversion&amp;severity=medium&amp;id=69738ad74623b1157c48b9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24529-missing-authorization-in-alejandro--a569df45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24529%3A%20Missing%20Authorization%20in%20Alejandro%20Quick%20Restaurant%20Reservations&amp;severity=medium&amp;id=69738ad74623b1157c48b9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24528-improper-neutralization-of-input-du-3f977a7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelgrade%20Nova%20Blocks&amp;severity=medium&amp;id=69738ad74623b1157c48b9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24526-improper-neutralization-of-input-du-ddb20594</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Steve%20Truman%20Email%20Inquiry%20%26%20Cart%20Options%20for%20WooCommerce&amp;severity=medium&amp;id=69738ad74623b1157c48b9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24525-missing-authorization-in-cloudpanel-f4eecdbf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24525%3A%20Missing%20Authorization%20in%20CloudPanel%20CLP%20Varnish%20Cache&amp;severity=medium&amp;id=69738ad74623b1157c48b9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24524-missing-authorization-in-essekia-ta-9dc80486</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24524%3A%20Missing%20Authorization%20in%20Essekia%20Tablesome&amp;severity=medium&amp;id=69738ad74623b1157c48b9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24523-exposure-of-sensitive-system-inform-ffc70139</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24523%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Marcus%20(aka%20%40msykes)%20WP%20FullCalendar&amp;severity=medium&amp;id=69738ad74623b1157c48b9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24522-missing-authorization-in-mythemesho-f09c71cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24522%3A%20Missing%20Authorization%20in%20MyThemeShop%20WP%20Subscribe&amp;severity=medium&amp;id=69738ad74623b1157c48b9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24521-cross-site-request-forgery-csrf-in--91d2ebfe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24521%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Timur%20Kamaev%20Kama%20Thumbnail&amp;severity=medium&amp;id=69738ad74623b1157c48b9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71149-9b81d3fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71149&amp;severity=null&amp;id=69f59eeccbff5d8610a6dc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-confirms-forticloud-sso-exploitation-agai-9c3231c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Confirms%20FortiCloud%20SSO%20Exploitation%20Against%20Patched%20Devices&amp;severity=medium&amp;id=697380134623b1157c454d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-12b-gdpr-fines-net-ntlmv1-rainbow-ta-caf92026</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20%E2%82%AC1.2B%20GDPR%20Fines%2C%20Net-NTLMv1%20Rainbow%20Tables%2C%20Rockwell%20Security%20Notice&amp;severity=medium&amp;id=697380134623b1157c454d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13921-cwe-862-missing-authorization-in-we-a2c34bf9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13921%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20weDocs%3A%20AI%20Powered%20Knowledge%20Base%2C%20Docs%2C%20Documentation%2C%20Wiki%20%26%20AI%20Chatbot&amp;severity=medium&amp;id=69737cc14623b1157c442f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishers-abuse-sharepoint-in-new-campaign-targetin-2e360e7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishers%20Abuse%20SharePoint%20in%20New%20Campaign%20Targeting%20Energy%20Sector&amp;severity=medium&amp;id=697375894623b1157c425251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-confirms-active-forticloud-sso-bypass-on--b01c7571</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Confirms%20Active%20FortiCloud%20SSO%20Bypass%20on%20Fully%20Patched%20FortiGate%20Firewalls&amp;severity=low&amp;id=6973dcc84623b1157c62f844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0914-cwe-79-improper-neutralization-of-in-f2472eb5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20legalweb%20WP%20DSGVO%20Tools%20(GDPR)&amp;severity=medium&amp;id=69736eb04623b1157c3e7c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14866-cwe-863-incorrect-authorization-in--c314b303</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14866%3A%20CWE-863%20Incorrect%20Authorization%20in%20melapress%20Melapress%20Role%20Editor&amp;severity=high&amp;id=69736eb04623b1157c3e7c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4320-cwe-305-authentication-bypass-by-pri-e6a7f97a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4320%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Birebirsoft%20Software%20and%20Technology%20Solutions%20Sufirmam&amp;severity=critical&amp;id=69736eb04623b1157c3e7c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4319-cwe-307-improper-restriction-of-exce-193cd2e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4319%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Birebirsoft%20Software%20and%20Technology%20Solutions%20Sufirmam&amp;severity=critical&amp;id=69736eb04623b1157c3e7c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/under-armour-looking-into-data-breach-affecting-cu-296429ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Under%20Armour%20Looking%20Into%20Data%20Breach%20Affecting%20Customers%E2%80%99%20Email%20Addresses&amp;severity=medium&amp;id=697363f14623b1157c3ba487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-jailbreaking-via-poetry-bypassing-chatbot-defen-1b200656</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20jailbreaking%20via%20poetry%3A%20bypassing%20chatbot%20defenses%20with%20rhyme%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6973646d4623b1157c3bc72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2204-cwe-79-improper-neutralization-of-in-874e6d94</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2204%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tapandsign%20Technologies%20Software%20Inc.%20Tap%26Sign&amp;severity=medium&amp;id=697364324623b1157c3bbd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watering-hole-attack-targets-emeditor-users-with-i-395c198c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Watering%20Hole%20Attack%20Targets%20EmEditor%20Users%20With%20Information-Stealing%20Malware&amp;severity=medium&amp;id=6973fed44623b1157c68862a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-zimbra-collabora-9417db17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Zimbra%20Collaboration%20Vulnerability&amp;severity=medium&amp;id=6973606d4623b1157c3a53b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infotainment-ev-charger-exploits-earn-hackers-1m-a-a8400194</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infotainment%2C%20EV%20Charger%20Exploits%20Earn%20Hackers%20%241M%20at%20Pwn2Own%20Automotive%202026&amp;severity=medium&amp;id=69735ce94623b1157c392ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tiktok-forms-us-joint-venture-to-continue-operatio-76f3330a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TikTok%20Forms%20U.S.%20Joint%20Venture%20to%20Continue%20Operations%20Under%202025%20Executive%20Order&amp;severity=low&amp;id=6973dcc84623b1157c62f847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-attack-uses-stolen-credentials-to-install-e6fb05ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Attack%20Uses%20Stolen%20Credentials%20to%20Install%20LogMeIn%20RMM%20for%20Persistent%20Access&amp;severity=medium&amp;id=6973dcc84623b1157c62f84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fresh-smartermail-flaw-exploited-for-admin-access-74135f93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fresh%20SmarterMail%20Flaw%20Exploited%20for%20Admin%20Access&amp;severity=medium&amp;id=69734ed94623b1157c2ee660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-the-vs-code-tasks-infection-vector-8b864c0d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20the%20VS%20Code%20Tasks%20Infection%20Vector&amp;severity=medium&amp;id=697352904623b1157c3211dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/restless-spirit-new-attacks-on-russian-companies-8c7dee55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Restless%20Spirit%3A%20New%20Attacks%20on%20Russian%20Companies&amp;severity=medium&amp;id=697352904623b1157c321206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osiris-new-ransomware-experienced-attackers-1074fa06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Osiris%3A%20New%20Ransomware%2C%20Experienced%20Attackers%3F&amp;severity=medium&amp;id=69734b8c4623b1157c2daa7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46699-cwe-1336-improper-neutralization-of-b242477c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46699%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Dell%20Data%20Protection%20Advisor&amp;severity=medium&amp;id=697348084623b1157c2c602d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22276-cwe-312-cleartext-storage-of-sensit-fd4bfe9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22276%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Dell%20ObjectScale&amp;severity=medium&amp;id=697344814623b1157c299738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22275-cwe-540-inclusion-of-sensitive-info-c9207016</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22275%3A%20CWE-540%3A%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20Dell%20ObjectScale&amp;severity=medium&amp;id=697395744623b1157c4bc736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22274-cwe-319-cleartext-transmission-of-s-eea32901</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22274%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Dell%20ObjectScale&amp;severity=medium&amp;id=697395744623b1157c4bc733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22273-cwe-1392-use-of-default-credentials-92dba187</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22273%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Dell%20ObjectScale&amp;severity=high&amp;id=69733d904623b1157c262fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2-venezuelans-convicted-in-us-for-using-malware-to-6fc657df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2%20Venezuelans%20Convicted%20in%20US%20for%20Using%20Malware%20to%20Hack%20ATMs&amp;severity=medium&amp;id=69733d4a4623b1157c260fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22271-cwe-319-cleartext-transmission-of-s-58afcc64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22271%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Dell%20ObjectScale&amp;severity=high&amp;id=697339f44623b1157c229e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1364-cwe-306-missing-authentication-for-c-1e047c96</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1364%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20JNC%20IAQS&amp;severity=critical&amp;id=697336714623b1157c2123f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1363-cwe-603-use-of-client-side-authentic-0ca429aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1363%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20JNC%20IAQS&amp;severity=critical&amp;id=697336714623b1157c2123f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-flags-multi-stage-aitm-phishing-and-bec--98e1168a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Flags%20Multi-Stage%20AitM%20Phishing%20and%20BEC%20Attacks%20Targeting%20Energy%20Firms&amp;severity=medium&amp;id=697332b74623b1157c1fcdcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24515-cwe-476-null-pointer-dereference-in-b8ec9798</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24515%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=697328604623b1157c1b2149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0603-improper-neutralization-of-special-e-a3609d42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0603%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)&amp;severity=high&amp;id=69731dd54623b1157c143c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14745-cwe-79-improper-neutralization-of-i-bf3204bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14745%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=697308bc4623b1157c072633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14069-cwe-79-improper-neutralization-of-i-74650657</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14069%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=medium&amp;id=697308bc4623b1157c07262c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0927-cwe-862-missing-authorization-in-iqo-d88ff5fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0927%3A%20CWE-862%20Missing%20Authorization%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=medium&amp;id=697308bc4623b1157c072638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67847-improper-control-of-generation-of-c-cb248159</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67847%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=697301b44623b1157c02f7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15522-cwe-79-improper-neutralization-of-i-0d0a9356</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15522%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=medium&amp;id=697301b44623b1157c02f7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3839-product-ui-does-not-warn-user-of-uns-6fd6c1dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3839%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions&amp;severity=high&amp;id=6972f7294623b1157c000a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0710-null-pointer-dereference-e6c9efc6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0710%3A%20NULL%20Pointer%20Dereference&amp;severity=high&amp;id=6972f3a54623b1157cfeb6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15351-cwe-502-deserialization-of-untruste-4064d94f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15351%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Anritsu%20VectorStar&amp;severity=high&amp;id=6972f3a54623b1157cfeb6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15350-cwe-502-deserialization-of-untruste-789dbba9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15350%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Anritsu%20VectorStar&amp;severity=high&amp;id=6972f3a54623b1157cfeb6ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15349-cwe-362-concurrent-execution-using--33e0b786</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15349%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Anritsu%20ShockLine&amp;severity=high&amp;id=6972f3a54623b1157cfeb6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15348-cwe-502-deserialization-of-untruste-09b2c70a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15348%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Anritsu%20ShockLine&amp;severity=high&amp;id=6972f3a54623b1157cfeb6e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0778-cwe-306-missing-authentication-for-c-5789b63e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0778%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Enel%20X%20JuiceBox%2040&amp;severity=high&amp;id=6972f3a64623b1157cfeb73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0776-cwe-427-uncontrolled-search-path-ele-2b7de517</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0776%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Discord%20Client&amp;severity=high&amp;id=6972f3a64623b1157cfeb73b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0775-cwe-732-incorrect-permission-assignm-8c16c2d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0775%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20npm%20cli&amp;severity=high&amp;id=6972f3a64623b1157cfeb738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0761-cwe-94-improper-control-of-generatio-b5c5cee9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0761%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Foundation%20Agents%20MetaGPT&amp;severity=critical&amp;id=6972f3a64623b1157cfeb735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0760-cwe-502-deserialization-of-untrusted-515e434f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0760%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Foundation%20Agents%20MetaGPT&amp;severity=critical&amp;id=6972f3a54623b1157cfeb6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0759-cwe-78-improper-neutralization-of-sp-b8238697</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0759%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Katana%20Network%20Development%20Starter%20Kit&amp;severity=critical&amp;id=6972f3a54623b1157cfeb6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0755-cwe-78-improper-neutralization-of-sp-26f401d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0755%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Gemini%20MCP%20Tool%20gemini-mcp-tool&amp;severity=critical&amp;id=6972f3a54623b1157cfeb6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15061-cwe-78-improper-neutralization-of-s-db540980</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15061%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Framelink%20Figma%20MCP%20Server&amp;severity=critical&amp;id=6972f3a54623b1157cfeb6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15062-cwe-416-use-after-free-in-trimble-s-29f16b40</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15062%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp&amp;severity=high&amp;id=6972f3a54623b1157cfeb6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0795-cwe-78-improper-neutralization-of-sp-b053339a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0795%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde335c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0794-cwe-416-use-after-free-in-algo-8180--3809cb62</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0794%3A%20CWE-416%3A%20Use%20After%20Free%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde3359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0793-cwe-122-heap-based-buffer-overflow-i-9cc4df30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0793%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde3356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0792-cwe-121-stack-based-buffer-overflow--dbb59b62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0792%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde3353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0791-cwe-121-stack-based-buffer-overflow--a601b9d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0791%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde3350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0790-cwe-425-direct-request-forced-browsi-5a753de2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0790%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=medium&amp;id=6972e91b4623b1157cde334d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0789-cwe-200-exposure-of-sensitive-inform-027b9713</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0789%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=medium&amp;id=6972e91b4623b1157cde334a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0788-cwe-79-improper-neutralization-of-in-9ba223db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0788%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=medium&amp;id=6972e91a4623b1157cde2eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0787-cwe-78-improper-neutralization-of-sp-23f6af26</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0787%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0786-cwe-78-improper-neutralization-of-sp-e4b3d7db</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0786%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0785-cwe-78-improper-neutralization-of-sp-b9cd0258</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0785%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0784-cwe-78-improper-neutralization-of-sp-55e85409</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0784%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0783-cwe-78-improper-neutralization-of-sp-18839d80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0783%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0782-cwe-78-improper-neutralization-of-sp-24290a57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0782%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0781-cwe-78-improper-neutralization-of-sp-805caa8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0781%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0780-cwe-78-improper-neutralization-of-sp-8ac60f0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0780%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0779-cwe-78-improper-neutralization-of-sp-3ed1666d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0779%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0796-cwe-78-improper-neutralization-of-sp-136f06d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0796%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde335f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24304-cwe-284-improper-access-control-in--14ecfe54</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24304%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Resource%20Manager&amp;severity=critical&amp;id=6972d78d4623b1157cbba819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-scan-you-scan-we-all-scan-for-knowledge-2e7a450b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20scan%2C%20you%20scan%2C%20we%20all%20scan%20for...%20%20knowledge%3F&amp;severity=medium&amp;id=697344804623b1157c2996f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-23-3b49b2d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-23&amp;severity=medium&amp;id=697410324623b1157c6bb3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70458-na-661089ae</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70458%3A%20n%2Fa&amp;severity=medium&amp;id=6973ed494623b1157c65c467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70457-na-91bb990f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70457%3A%20n%2Fa&amp;severity=critical&amp;id=6973e9bc4623b1157c653479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52026-na-3b0b91c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52026%3A%20n%2Fa&amp;severity=high&amp;id=6973df424623b1157c63574b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52025-na-f20ec138</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52025%3A%20n%2Fa&amp;severity=critical&amp;id=6973df424623b1157c635745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52024-na-2947f353</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52024%3A%20n%2Fa&amp;severity=critical&amp;id=6973df424623b1157c635724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52023-na-c942b319</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52023%3A%20n%2Fa&amp;severity=medium&amp;id=6973df424623b1157c63571e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52022-na-edb52e96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52022%3A%20n%2Fa&amp;severity=medium&amp;id=6973df424623b1157c635719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67264-na-19e062e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67264%3A%20n%2Fa&amp;severity=high&amp;id=6973d8294623b1157c61e916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70986-na-d27ddcd7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70986%3A%20n%2Fa&amp;severity=high&amp;id=6973c7784623b1157c5d5f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70985-na-8685ccb7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70985%3A%20n%2Fa&amp;severity=critical&amp;id=6973c7784623b1157c5d5f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70983-na-4c0f9baf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70983%3A%20n%2Fa&amp;severity=critical&amp;id=6973c7784623b1157c5d5f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67231-na-c282a4c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67231%3A%20n%2Fa&amp;severity=medium&amp;id=6973a6f24623b1157c4f2e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67230-na-fe053529</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67230%3A%20n%2Fa&amp;severity=high&amp;id=6973a36c4623b1157c4e4f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67229-na-c3418b4e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67229%3A%20n%2Fa&amp;severity=critical&amp;id=6973a36c4623b1157c4e4f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67125-na-a855620d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67125%3A%20n%2Fa&amp;severity=medium&amp;id=697398e14623b1157c4c5d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67124-na-ca750136</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67124%3A%20n%2Fa&amp;severity=medium&amp;id=697398e14623b1157c4c5d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66720-na-139a4d58</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66720%3A%20n%2Fa&amp;severity=high&amp;id=697398e14623b1157c4c5d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66719-na-b82acee0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66719%3A%20n%2Fa&amp;severity=critical&amp;id=697398e14623b1157c4c5d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69908-na-60ef07ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69908%3A%20n%2Fa&amp;severity=high&amp;id=697395744623b1157c4bc719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69907-na-6f934627</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69907%3A%20n%2Fa&amp;severity=high&amp;id=69738e544623b1157c4a43a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-23-af1d534a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-23&amp;severity=low&amp;id=697305034623b1157c062155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20613-the-archivereaderextractcontents-fu-01297bbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20613%3A%20The%20ArchiveReader.extractContents()%20function%20used%20by%20cctl%20image%20load%20and%20container%20image%20load%20performs%20no%20pathname%20validation%20before%20extracting%20an%20archive%20member.%20This%20means%20that%20a%20carelessly%20or%20maliciously%20constructed%20archive%20can%20extract%20a%20file%20into%20any%20user-writable%20location%20on%20the%20system%20using%20relative%20pathnames.%20in%20Apple%20Container&amp;severity=high&amp;id=6972bee84623b1157c9abe11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24132-cwe-77-improper-neutralization-of-s-bbb57000</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24132%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20orval-labs%20orval&amp;severity=high&amp;id=6973c7784623b1157c5d5f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9290-cwe-760-use-of-a-one-way-hash-with-a-d3a39afd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9290%3A%20CWE-760%20Use%20of%20a%20One-Way%20Hash%20with%20a%20Predictable%20Salt%20in%20TP-Link%20Systems%20Inc.%20Omada%20Software%20Controller&amp;severity=medium&amp;id=6972b45c4623b1157c9773aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24130-cwe-90-improper-neutralization-of-s-c452a8c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24130%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20Arksine%20moonraker&amp;severity=low&amp;id=6972ad5b4623b1157c962ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21264-cwe-79-improper-neutralization-of-i-3a8a0d1d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21264%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Account&amp;severity=critical&amp;id=6972ad5b4623b1157c962b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21521-cwe-150-improper-neutralization-of--d51ff96e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21521%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Microsoft%20Microsoft%20365%20Word%20Copilot&amp;severity=high&amp;id=6972ad5b4623b1157c962ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21227-cwe-22-improper-limitation-of-a-pat-77139522</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21227%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20Azure%20Logic%20Apps&amp;severity=high&amp;id=6972ad5b4623b1157c962b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24307-cwe-1287-improper-validation-of-spe-2aa8248d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24307%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Microsoft%20365%20Copilot&amp;severity=critical&amp;id=6972ad5b4623b1157c962bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24305-cwe-285-improper-authorization-in-m-d2b88af4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24305%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=6972ad5b4623b1157c962bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21524-cwe-200-exposure-of-sensitive-infor-60a2a02c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21524%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Data%20Explorer&amp;severity=high&amp;id=6972ad5b4623b1157c962ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24306-cwe-284-improper-access-control-in--9fb678ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24306%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Front%20Door&amp;severity=critical&amp;id=6972ad5b4623b1157c962bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21520-cwe-77-improper-neutralization-of-s-77ca71f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21520%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Copilot%20Studio&amp;severity=high&amp;id=6972ad5b4623b1157c962ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25051-cwe-256-in-automationdirect-click-p-0829e4f5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25051%3A%20CWE-256%20in%20AutomationDirect%20CLICK%20Programmable%20Logic%20Controller&amp;severity=medium&amp;id=6972a64c4623b1157c93e393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24124-cwe-306-missing-authentication-for--40ffe6ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24124%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dragonflyoss%20dragonfly&amp;severity=high&amp;id=6972a64c4623b1157c93e39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67652-cwe-261-in-automationdirect-click-p-7f6bbb91</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67652%3A%20CWE-261%20in%20AutomationDirect%20CLICK%20Programmable%20Logic%20Controller&amp;severity=medium&amp;id=6972a64c4623b1157c93e397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24117-cwe-918-server-side-request-forgery-6b2fc737</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24117%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sigstore%20rekor&amp;severity=medium&amp;id=6972a2ca4623b1157c932a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20912-cwe-284-improper-access-control-in--c7861e51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20912%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=critical&amp;id=6972a2c84623b1157c932842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20904-cwe-284-improper-access-control-in--2e778f4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20904%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=medium&amp;id=6972a2c84623b1157c93283b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20897-cwe-284-improper-access-control-in--95afbe78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20897%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=critical&amp;id=6972a2c84623b1157c932834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20888-cwe-284-improper-access-control-in--da14ea46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20888%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=medium&amp;id=6972a2c84623b1157c93282d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20883-cwe-284-improper-access-control-in--07110b27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20883%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=medium&amp;id=6972a2c84623b1157c932826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20800-cwe-200-exposure-of-sensitive-infor-66459a78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20800%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=medium&amp;id=6972a2c84623b1157c932820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20750-cwe-284-improper-access-control-in--d3838295</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20750%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=critical&amp;id=6972a2c84623b1157c932819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20736-cwe-284-improper-access-control-in--dbe267b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20736%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=high&amp;id=6972a2c84623b1157c932813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0798-cwe-284-improper-access-control-in-g-9f7e4564</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0798%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=low&amp;id=6972a2c84623b1157c93280d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24058-cwe-289-authentication-bypass-by-al-1716d926</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24058%3A%20CWE-289%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20charmbracelet%20soft-serve&amp;severity=high&amp;id=6972a2c84623b1157c932849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23988-cwe-367-time-of-check-time-of-use-t-d8faaf97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23988%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20pbatard%20rufus&amp;severity=high&amp;id=69729f444623b1157c9270dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1201-cwe-639-authorization-bypass-through-834fd42e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1201%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Hubitat%20Elevation%20C3&amp;severity=critical&amp;id=69729f444623b1157c9270d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9289-cwe-79-improper-neutralization-of-in-19cd4d9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9289%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TP-Link%20Systems%20Inc.%20Omada%20Software%20Controller&amp;severity=medium&amp;id=69729f444623b1157c9270ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23954-cwe-22-improper-limitation-of-a-pat-19fa0791</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23954%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20lxc%20incus&amp;severity=high&amp;id=69729f444623b1157c9270d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14751-cwe-620-unverified-password-change--937f26e3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14751%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Weintek%20cMT3072XH&amp;severity=high&amp;id=69729bc34623b1157c91e03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14750-cwe-472-external-control-of-assumed-8529627d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14750%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20Weintek%20cMT3072XH&amp;severity=high&amp;id=69729bc34623b1157c91e037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23953-cwe-93-improper-neutralization-of-c-c46ca4a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23953%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20lxc%20incus&amp;severity=high&amp;id=69729bc34623b1157c91e03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23831-cwe-476-null-pointer-dereference-in-5f5dc905</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23831%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20sigstore%20rekor&amp;severity=medium&amp;id=6972983c4623b1157c90d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22234-cwe-208-timing-descrepency-in-sprin-90328a7f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22234%3A%20CWE-208%20Timing%20Descrepency%20in%20Spring%20Spring%20Security&amp;severity=medium&amp;id=697294b84623b1157c8fbb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22281-cwe-367-time-of-check-time-of-use-t-e329b852</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22281%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Dell%20PowerScale%20OneFS&amp;severity=low&amp;id=697278984623b1157c86bd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68609-the-authentication-algorithm-is-sou-1ae1ca03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68609%3A%20The%20authentication%20algorithm%20is%20sound%2C%20but%20the%20implemented%20mechanism%20can%20be%20bypassed%20as%20the%20result%20of%20a%20separate%20weakness%20that%20is%20primary%20to%20the%20authentication%20error.%20in%20Palantir%20com.palantir.aries%3Aaries&amp;severity=medium&amp;id=697278984623b1157c86bd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22280-cwe-732-incorrect-permission-assign-6cecdb7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22280%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=697278984623b1157c86bd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22279-cwe-778-insufficient-logging-in-del-798655e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22279%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=697275ff4623b1157c865178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konni-adopts-ai-to-generate-powershell-backdoors-8ad75d8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KONNI%20Adopts%20AI%20to%20Generate%20PowerShell%20Backdoors&amp;severity=medium&amp;id=69728a2c4623b1157c8ba841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-osiris-ransomware-emerges-as-new-strain-using--a1641a3d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Osiris%20Ransomware%20Emerges%20as%20New%20Strain%20Using%20POORTRY%20Driver%20in%20BYOVD%20Attack&amp;severity=medium&amp;id=69729a4b4623b1157c918192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1260-cwe-119-improper-restriction-of-oper-100766b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1260%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Google%20Sentencepiece&amp;severity=high&amp;id=69725c7b4623b1157c8074a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0535-cwe-79-cross-site-scripting-xss-stor-762a37b9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0535%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69725c7b4623b1157c8074a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0534-cwe-79-cross-site-scripting-xss-stor-196fd083</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0534%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69725c7b4623b1157c80749f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0533-cwe-79-cross-site-scripting-xss-stor-3467f94f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0533%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69725c7b4623b1157c80749a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22359-cross-site-request-forgery-csrf-in--07b46d41</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22359%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AA-Team%20Wordpress%20Movies%20Bulk%20Importer&amp;severity=medium&amp;id=69725c7b4623b1157c8074ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24390-improper-control-of-filename-for-in-7f62e2f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24390%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20QantumThemes%20Kentha%20Elementor%20Widgets&amp;severity=high&amp;id=697259354623b1157c7fb5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24389-improper-neutralization-of-input-du-09de9a97</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Chill%20Gallery%20PhotoBlocks&amp;severity=medium&amp;id=697259354623b1157c7fb5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24388-missing-authorization-in-ludwig-you-23aa5517</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24388%3A%20Missing%20Authorization%20in%20Ludwig%20You%20WPMasterToolKit&amp;severity=medium&amp;id=697259344623b1157c7fb5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24387-missing-authorization-in-arul-prasa-257560ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24387%3A%20Missing%20Authorization%20in%20Arul%20Prasad%20J%20WP%20Quick%20Post%20Duplicator&amp;severity=medium&amp;id=697259344623b1157c7fb5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24386-missing-authorization-in-element-in-1f4e2eee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24386%3A%20Missing%20Authorization%20in%20Element%20Invader%20Element%20Invader%20%E2%80%93%20Template%20Kits%20for%20Elementor&amp;severity=medium&amp;id=697259344623b1157c7fb5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24384-cross-site-request-forgery-csrf-in--f8a68dc1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24384%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20launchinteractive%20Merge%20%2B%20Minify%20%2B%20Refresh&amp;severity=medium&amp;id=697259344623b1157c7fb5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24383-improper-neutralization-of-input-du-1eee0743</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24383%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20B%20Slider&amp;severity=medium&amp;id=697259344623b1157c7fb59f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24381-server-side-request-forgery-ssrf-in-89ad9d0f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24381%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThemeGoods%20PhotoMe&amp;severity=medium&amp;id=697259344623b1157c7fb59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24380-missing-authorization-in-metagauss--46332224</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24380%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=medium&amp;id=697259344623b1157c7fb599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24379-authorization-bypass-through-user-c-4cd78a6a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24379%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=medium&amp;id=697259344623b1157c7fb596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24377-exposure-of-sensitive-system-inform-f70ffb79</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24377%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=medium&amp;id=697259344623b1157c7fb593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24374-cross-site-request-forgery-csrf-in--45f51f13</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24374%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Metagauss%20RegistrationMagic&amp;severity=medium&amp;id=697259344623b1157c7fb590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24371-missing-authorization-in-bookingalg-a800e289</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24371%3A%20Missing%20Authorization%20in%20bookingalgorithms%20BA%20Book%20Everything&amp;severity=medium&amp;id=697259324623b1157c7fb4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24368-missing-authorization-in-theme-one--d7fe8ecb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24368%3A%20Missing%20Authorization%20in%20Theme-one%20The%20Grid&amp;severity=medium&amp;id=697259324623b1157c7fb4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24367-improper-neutralization-of-special--e34d4d03</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24367%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=697259324623b1157c7fb4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24366-missing-authorization-in-yithemes-y-53476d99</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24366%3A%20Missing%20Authorization%20in%20YITHEMES%20YITH%20WooCommerce%20Request%20A%20Quote&amp;severity=medium&amp;id=697259324623b1157c7fb4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24365-cross-site-request-forgery-csrf-in--3677c20e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24365%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20storeapps%20Stock%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=697259324623b1157c7fb4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24361-improper-neutralization-of-input-du-e5f68885</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20LearnPress%20%E2%80%93%20Course%20Review&amp;severity=medium&amp;id=697259324623b1157c7fb4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24360-server-side-request-forgery-ssrf-in-0816eff8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24360%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=697259324623b1157c7fb4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24358-missing-authorization-in-expresstec-3b896dce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24358%3A%20Missing%20Authorization%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=697259324623b1157c7fb4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24357-missing-authorization-in-brecht-wp--bf8e0b30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24357%3A%20Missing%20Authorization%20in%20Brecht%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=697259324623b1157c7fb4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24356-missing-authorization-in-roxnor-get-aceab1a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24356%3A%20Missing%20Authorization%20in%20Roxnor%20GetGenie&amp;severity=medium&amp;id=697259324623b1157c7fb4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24355-improper-neutralization-of-input-du-11f35b9b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=medium&amp;id=697259304623b1157c7fb4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24354-improper-neutralization-of-input-du-161355a8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Shortcodes%20%26%20Performance&amp;severity=medium&amp;id=697259304623b1157c7fb49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24353-missing-authorization-in-wpeverest--ac78bf46</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24353%3A%20Missing%20Authorization%20in%20wpeverest%20User%20Registration&amp;severity=medium&amp;id=697259304623b1157c7fb49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23978-improper-control-of-filename-for-in-8d851faa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23978%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Softwebmedia%20Gyan%20Elements&amp;severity=high&amp;id=697259304623b1157c7fb498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23976-improper-neutralization-of-input-du-6ac41a6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23976%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Chill%20Modula%20Image%20Gallery&amp;severity=medium&amp;id=697259304623b1157c7fb495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23975-improper-control-of-filename-for-in-ee2a36af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23975%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20uxper%20Golo&amp;severity=high&amp;id=697259304623b1157c7fb492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23974-missing-authorization-in-uxper-golo-7810e477</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23974%3A%20Missing%20Authorization%20in%20uxper%20Golo&amp;severity=medium&amp;id=697259304623b1157c7fb48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22483-cross-site-request-forgery-csrf-in--8ffc1a42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22483%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20winkm89%20teachPress&amp;severity=medium&amp;id=697259304623b1157c7fb48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22482-server-side-request-forgery-ssrf-in-33290a0a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22482%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wbolt.com%20IMGspider&amp;severity=medium&amp;id=697259304623b1157c7fb489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22481-missing-authorization-in-rasedul-ha-8fa04e3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22481%3A%20Missing%20Authorization%20in%20Rasedul%20Haque%20Rumi%20BD%20Courier%20Order%20Ratio%20Checker&amp;severity=medium&amp;id=697259304623b1157c7fb486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22472-missing-authorization-in-hassantafr-071552a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22472%3A%20Missing%20Authorization%20in%20hassantafreshi%20Easy%20Form%20Builder&amp;severity=medium&amp;id=6972592f4623b1157c7fb45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22470-improper-neutralization-of-special--54dc9382</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22470%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FireStorm%20Plugins%20FireStorm%20Professional%20Real%20Estate&amp;severity=high&amp;id=6972592f4623b1157c7fb45c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22469-improper-neutralization-of-script-r-c45c909d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22469%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mwtemplates%20DeepDigital&amp;severity=medium&amp;id=6972592f4623b1157c7fb459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22468-missing-authorization-in-absolutepl-a3ce3083</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22468%3A%20Missing%20Authorization%20in%20AbsolutePlugins%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=6972592f4623b1157c7fb456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22466-missing-authorization-in-chandni-pa-218f879e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22466%3A%20Missing%20Authorization%20in%20Chandni%20Patel%20WP%20MapIt&amp;severity=medium&amp;id=6972592f4623b1157c7fb453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22464-improper-control-of-filename-for-in-8346f902</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22464%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=6972592f4623b1157c7fb450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22463-improper-neutralization-of-input-du-2a8c2d80</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22463%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Micro.company%20Form%20to%20Chat%20App&amp;severity=medium&amp;id=6972592f4623b1157c7fb44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22462-cross-site-request-forgery-csrf-in--8cb8bf5d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22462%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20richardevcom%20Add%20Polylang%20support%20for%20Customizer&amp;severity=medium&amp;id=6972592f4623b1157c7fb44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22461-missing-authorization-in-webappick--853908b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22461%3A%20Missing%20Authorization%20in%20WebAppick%20CTX%20Feed&amp;severity=medium&amp;id=6972592f4623b1157c7fb447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22458-missing-authorization-in-mikado-the-c57e9d29</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22458%3A%20Missing%20Authorization%20in%20Mikado-Themes%20Wanderland&amp;severity=medium&amp;id=6972592f4623b1157c7fb444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22450-missing-authorization-in-select-the-933c36f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22450%3A%20Missing%20Authorization%20in%20Select-Themes%20Don%20Peppe&amp;severity=medium&amp;id=6972592e4623b1157c7fb41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22447-missing-authorization-in-select-the-9024751c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22447%3A%20Missing%20Authorization%20in%20Select-Themes%20Prowess&amp;severity=medium&amp;id=6972592e4623b1157c7fb418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22445-missing-authorization-in-proptech-p-2bdbf7a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22445%3A%20Missing%20Authorization%20in%20Proptech%20Plugin%20Apimo%20Connector&amp;severity=medium&amp;id=6972592e4623b1157c7fb415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22430-authorization-bypass-through-user-c-e00bb923</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22430%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Verdure&amp;severity=medium&amp;id=6972592e4623b1157c7fb412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22426-authorization-bypass-through-user-c-729af269</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22426%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Elated-Themes%20Sweet%20Jane&amp;severity=medium&amp;id=6972592e4623b1157c7fb40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22411-authorization-bypass-through-user-c-644870b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22411%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Dolcino&amp;severity=medium&amp;id=6972592e4623b1157c7fb40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22409-authorization-bypass-through-user-c-f17156d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22409%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Justicia&amp;severity=medium&amp;id=6972592e4623b1157c7fb409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22407-authorization-bypass-through-user-c-4f83e280</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22407%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Roam&amp;severity=medium&amp;id=6972592e4623b1157c7fb406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22406-authorization-bypass-through-user-c-ca0974fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22406%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Overton&amp;severity=medium&amp;id=6972592e4623b1157c7fb403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22404-authorization-bypass-through-user-c-a75619ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22404%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Innovio&amp;severity=medium&amp;id=6972592e4623b1157c7fb400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22402-improper-control-of-filename-for-in-754c2471</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22402%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pavothemes%20Triply&amp;severity=high&amp;id=6972592d4623b1157c7fb3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22401-improper-control-of-filename-for-in-76a3f9b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22401%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pavothemes%20Freshio&amp;severity=high&amp;id=6972592c4623b1157c7fb3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22400-authorization-bypass-through-user-c-c9bc89e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22400%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Holmes&amp;severity=medium&amp;id=6972592c4623b1157c7fb3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22398-authorization-bypass-through-user-c-c481578b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22398%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Fleur&amp;severity=medium&amp;id=6972592c4623b1157c7fb3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22396-authorization-bypass-through-user-c-691048d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22396%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Fiorello&amp;severity=medium&amp;id=6972592c4623b1157c7fb3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22393-authorization-bypass-through-user-c-04b4faa9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22393%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Curly&amp;severity=medium&amp;id=6972592c4623b1157c7fb3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22391-authorization-bypass-through-user-c-fc417f40</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22391%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Cocco&amp;severity=medium&amp;id=6972592c4623b1157c7fb3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22388-improper-neutralization-of-input-du-a9b4737b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22388%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Emu%20Owl%20Carousel%20WP&amp;severity=medium&amp;id=6972592c4623b1157c7fb3de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22382-cross-site-request-forgery-csrf-in--13191fb8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22382%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mikado-Themes%20PawFriends%20-%20Pet%20Shop%20and%20Veterinary%20WordPress%20Theme&amp;severity=medium&amp;id=6972592c4623b1157c7fb3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22360-cross-site-request-forgery-csrf-in--6ae3ccf4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22360%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AA-Team%20SearchAzon&amp;severity=medium&amp;id=6972592c4623b1157c7fb3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22358-server-side-request-forgery-ssrf-in-1b0045c9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22358%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SmartDataSoft%20Electrician%20-%20Electrical%20Service%20WordPress&amp;severity=medium&amp;id=6972592b4623b1157c7fb3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22355-cross-site-request-forgery-csrf-in--826c9a2d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22355%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gregmolnar%20Simple%20XML%20Sitemap&amp;severity=high&amp;id=6972592b4623b1157c7fb3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22353-improper-neutralization-of-input-du-93d3dab9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20winkm89%20teachPress&amp;severity=medium&amp;id=6972592b4623b1157c7fb3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22349-improper-neutralization-of-input-du-235d7551</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linux4me2%20Menu%20In%20Post&amp;severity=medium&amp;id=6972592b4623b1157c7fb3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22348-missing-authorization-in-tasos-fel--4a634023</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22348%3A%20Missing%20Authorization%20in%20Tasos%20Fel%20Civic%20Cookie%20Control&amp;severity=medium&amp;id=6972592b4623b1157c7fb3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22347-improper-neutralization-of-input-du-3a8aafff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20subhansanjaya%20Carousel%20Horizontal%20Posts%20Content%20Slider&amp;severity=medium&amp;id=6972592b4623b1157c7fb3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69321-improper-neutralization-of-input-du-f9444f41</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69321%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Spa&amp;severity=high&amp;id=6972592b4623b1157c7fb3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69320-improper-neutralization-of-input-du-73ba0b60</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69320%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Magazine&amp;severity=high&amp;id=6972592b4623b1157c7fb3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69318-improper-neutralization-of-input-du-a9785071</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69318%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hossni%20Mubarak%20JobWP&amp;severity=high&amp;id=6972592b4623b1157c7fb3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69317-improper-neutralization-of-input-du-04556d88</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69317%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scriptsbundle%20CarSpot&amp;severity=high&amp;id=6972592b4623b1157c7fb3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69316-improper-neutralization-of-input-du-99167229</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69316%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20TableOn&amp;severity=high&amp;id=697259294623b1157c7fb2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69315-missing-authorization-in-nsquared-s-d79b69dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69315%3A%20Missing%20Authorization%20in%20NSquared%20Simply%20Schedule%20Appointments&amp;severity=medium&amp;id=697259294623b1157c7fb2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69314-improper-control-of-filename-for-in-dc5aee48</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69314%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20Werkstatt&amp;severity=high&amp;id=697259294623b1157c7fb2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69313-missing-authorization-in-wpxpo-post-39d23d47</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69313%3A%20Missing%20Authorization%20in%20WPXPO%20PostX&amp;severity=high&amp;id=697259294623b1157c7fb2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69312-unrestricted-upload-of-file-with-da-1962b44b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69312%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Xpro%20Xpro%20Elementor%20Addons&amp;severity=critical&amp;id=697259294623b1157c7fb2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69311-missing-authorization-in-broadstree-ad485980</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69311%3A%20Missing%20Authorization%20in%20Broadstreet%20Broadstreet%20Ads&amp;severity=high&amp;id=697259294623b1157c7fb2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69300-missing-authorization-in-leap13-pre-c6282d69</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69300%3A%20Missing%20Authorization%20in%20Leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=697259294623b1157c7fb2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69293-incorrect-privilege-assignment-in-e-a75b5c5c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69293%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Final%20User&amp;severity=high&amp;id=697259294623b1157c7fb2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69292-incorrect-privilege-assignment-in-e-dee04ece</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69292%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20WP%20Membership&amp;severity=high&amp;id=697259294623b1157c7fb2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69193-missing-authorization-in-e-plugins--cc2fa49c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69193%3A%20Missing%20Authorization%20in%20e-plugins%20WP%20Membership&amp;severity=high&amp;id=697259294623b1157c7fb2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69192-missing-authorization-in-e-plugins--0ec334fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69192%3A%20Missing%20Authorization%20in%20e-plugins%20Real%20Estate%20Pro&amp;severity=high&amp;id=697259284623b1157c7fb29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69191-missing-authorization-in-e-plugins--df02ee49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69191%3A%20Missing%20Authorization%20in%20e-plugins%20ListingHub&amp;severity=high&amp;id=697259284623b1157c7fb299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69190-missing-authorization-in-e-plugins--20c44783</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69190%3A%20Missing%20Authorization%20in%20e-plugins%20Listihub&amp;severity=high&amp;id=697259284623b1157c7fb296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69188-missing-authorization-in-e-plugins--953bca88</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69188%3A%20Missing%20Authorization%20in%20e-plugins%20fitness-trainer&amp;severity=high&amp;id=697259284623b1157c7fb293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69187-missing-authorization-in-e-plugins--38901f51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69187%3A%20Missing%20Authorization%20in%20e-plugins%20Final%20User&amp;severity=high&amp;id=697259284623b1157c7fb290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69186-missing-authorization-in-e-plugins--373ceb9c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69186%3A%20Missing%20Authorization%20in%20e-plugins%20Hospital%20Doctor%20Directory&amp;severity=high&amp;id=697259284623b1157c7fb28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69185-missing-authorization-in-e-plugins--a22c5886</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69185%3A%20Missing%20Authorization%20in%20e-plugins%20Hotel%20Listing&amp;severity=high&amp;id=697259284623b1157c7fb28a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69184-missing-authorization-in-e-plugins--1c735838</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69184%3A%20Missing%20Authorization%20in%20e-plugins%20Institutions%20Directory&amp;severity=high&amp;id=697259284623b1157c7fb287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69183-incorrect-privilege-assignment-in-e-d09b5863</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69183%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Hospital%20Doctor%20Directory&amp;severity=high&amp;id=697259284623b1157c7fb284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69182-incorrect-privilege-assignment-in-e-52836f79</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69182%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Institutions%20Directory&amp;severity=high&amp;id=697259284623b1157c7fb281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69181-missing-authorization-in-e-plugins--20b23f39</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69181%3A%20Missing%20Authorization%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=697259274623b1157c7fb240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69180-improper-neutralization-of-special--c6ea928d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69180%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themepassion%20Ultra%20Portfolio&amp;severity=high&amp;id=697259274623b1157c7fb23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69102-improper-neutralization-of-input-du-a3768e18</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boopathi%20Rajan%20WP%20Test%20Email&amp;severity=high&amp;id=697259274623b1157c7fb23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69101-authentication-bypass-using-an-alte-2d65891d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69101%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20AmentoTech%20Workreap%20Core&amp;severity=critical&amp;id=697259274623b1157c7fb237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69100-improper-control-of-filename-for-in-10caffa1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69100%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20North&amp;severity=high&amp;id=697259274623b1157c7fb234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69099-deserialization-of-untrusted-data-i-1885d6ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69099%3A%20Deserialization%20of%20Untrusted%20Data%20in%20fuelthemes%20North&amp;severity=high&amp;id=697259274623b1157c7fb231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69098-improper-neutralization-of-input-du-0d6ef6ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69098%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpWave%20Hide%20My%20WP&amp;severity=high&amp;id=697259274623b1157c7fb22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69097-improper-limitation-of-a-pathname-t-bec48a3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69097%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=high&amp;id=697259274623b1157c7fb22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69095-missing-authorization-in-designthem-5a534652</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69095%3A%20Missing%20Authorization%20in%20designthemes%20Reservation%20Plugin&amp;severity=medium&amp;id=697259274623b1157c7fb228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69079-deserialization-of-untrusted-data-i-e3d04117</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69079%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Sound%20%7C%20Musical%20Instruments%20Online%20Store&amp;severity=critical&amp;id=697259274623b1157c7fb225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69078-improper-control-of-filename-for-in-1e28ec28</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69078%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Malta&amp;severity=high&amp;id=697259264623b1157c7fb213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69077-improper-control-of-filename-for-in-6e04414f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69077%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Hobo&amp;severity=high&amp;id=697259254623b1157c7fb210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69076-improper-control-of-filename-for-in-44999491</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Modern%20Housewife&amp;severity=high&amp;id=697259254623b1157c7fb20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69075-improper-control-of-filename-for-in-6e77f5a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69075%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Yolox&amp;severity=high&amp;id=697259254623b1157c7fb20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69074-improper-control-of-filename-for-in-15f6344d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69074%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Pearson%20Specter&amp;severity=high&amp;id=697259254623b1157c7fb207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69073-improper-control-of-filename-for-in-de805f38</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69073%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Piqes&amp;severity=high&amp;id=697259254623b1157c7fb204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69072-improper-control-of-filename-for-in-accd6e7b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69072%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Prider&amp;severity=high&amp;id=697259254623b1157c7fb201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69071-improper-control-of-filename-for-in-c5cbc3dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69071%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20TanTum&amp;severity=high&amp;id=697259254623b1157c7fb1fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69070-improper-control-of-filename-for-in-c7e05fa1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69070%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tornados&amp;severity=high&amp;id=697259254623b1157c7fb1fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69068-improper-control-of-filename-for-in-5bc3d201</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69068%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Muji&amp;severity=high&amp;id=697259254623b1157c7fb1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69067-improper-control-of-filename-for-in-1c5e241d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tails&amp;severity=high&amp;id=697259244623b1157c7fb199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69066-improper-control-of-filename-for-in-fbf1c2fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Indoor%20Plants&amp;severity=high&amp;id=697259244623b1157c7fb196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69065-improper-control-of-filename-for-in-0125eca1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Snow%20Mountain&amp;severity=high&amp;id=697259244623b1157c7fb193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69064-improper-control-of-filename-for-in-e5e3b94f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69064%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Pets%20Land&amp;severity=high&amp;id=697259244623b1157c7fb190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69062-improper-control-of-filename-for-in-026b611d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Weedles&amp;severity=high&amp;id=697259244623b1157c7fb18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69061-improper-control-of-filename-for-in-af46349f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20MoveMe&amp;severity=high&amp;id=697259244623b1157c7fb18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69060-improper-control-of-filename-for-in-ece79b00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69060%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20uReach&amp;severity=high&amp;id=697259244623b1157c7fb187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69059-improper-control-of-filename-for-in-e7e2fae9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69059%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20DiveIt&amp;severity=high&amp;id=697259244623b1157c7fb184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69058-improper-control-of-filename-for-in-0af349c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69058%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20PartyMaker&amp;severity=high&amp;id=697259244623b1157c7fb181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69057-improper-control-of-filename-for-in-e7112801</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69057%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Eldon&amp;severity=high&amp;id=697259244623b1157c7fb17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69056-improper-neutralization-of-input-du-2753daef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69056%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Hotel%20Listing&amp;severity=high&amp;id=697259234623b1157c7fb15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69055-improper-limitation-of-a-pathname-t-4dc23822</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69055%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SeaTheme%20BM%20Content%20Builder&amp;severity=medium&amp;id=697259234623b1157c7fb15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69054-improper-neutralization-of-input-du-2d9b6017</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69054%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20highwarden%20Super%20Logos%20Showcase&amp;severity=high&amp;id=697259234623b1157c7fb158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69053-improper-neutralization-of-input-du-fc3939a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69053%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player&amp;severity=high&amp;id=697259234623b1157c7fb155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69052-missing-authorization-in-fmeaddons--529d7963</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69052%3A%20Missing%20Authorization%20in%20FmeAddons%20Registration%20%26%20Login%20with%20Mobile%20Phone%20Number%20for%20WooCommerce&amp;severity=critical&amp;id=697259234623b1157c7fb152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69051-improper-neutralization-of-input-du-1d159fb0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro%20Reviews&amp;severity=high&amp;id=697259234623b1157c7fb14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69050-improper-control-of-filename-for-in-e568c597</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69050%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Overworld&amp;severity=high&amp;id=697259234623b1157c7fb14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69049-improper-control-of-filename-for-in-3447a9f3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69049%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20T%C3%B6bel&amp;severity=high&amp;id=697259234623b1157c7fb149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69048-improper-neutralization-of-input-du-70ab11b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69048%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player&amp;severity=high&amp;id=697259234623b1157c7fb146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69047-improper-control-of-filename-for-in-a48d622c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20MaxShop&amp;severity=high&amp;id=697259234623b1157c7fb143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69046-improper-control-of-filename-for-in-c2cfd85b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69046%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebGeniusLab%20iRecco%20Core&amp;severity=high&amp;id=697259214623b1157c7fb0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69045-improper-neutralization-of-special--a883d199</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69045%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FooEvents%20FooEvents%20for%20WooCommerce&amp;severity=high&amp;id=697259214623b1157c7fb0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69044-improper-control-of-filename-for-in-c0000d97</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69044%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Vango&amp;severity=high&amp;id=697259214623b1157c7fb0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69043-improper-control-of-filename-for-in-2586d312</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69043%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Rashy&amp;severity=high&amp;id=697259214623b1157c7fb0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69042-improper-control-of-filename-for-in-720e31ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69042%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Lindo&amp;severity=high&amp;id=697259214623b1157c7fb0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69041-improper-control-of-filename-for-in-4af62cdb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69041%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Dekoro&amp;severity=high&amp;id=697259214623b1157c7fb0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69040-improper-control-of-filename-for-in-240c0198</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69040%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Bfres&amp;severity=high&amp;id=697259214623b1157c7fb0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69039-improper-control-of-filename-for-in-048f92a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69039%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Bailly&amp;severity=high&amp;id=697259214623b1157c7fb0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69038-improper-control-of-filename-for-in-c598b21c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69038%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Hyori&amp;severity=high&amp;id=697259214623b1157c7fb0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69037-improper-control-of-filename-for-in-880c502b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69037%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Pippo&amp;severity=high&amp;id=697259214623b1157c7fb0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69036-deserialization-of-untrusted-data-i-9f2a316e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69036%3A%20Deserialization%20of%20Untrusted%20Data%20in%20strongholdthemes%20Tech%20Life%20CPT&amp;severity=high&amp;id=6972591f4623b1157c7fb093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69035-deserialization-of-untrusted-data-i-765fa325</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69035%3A%20Deserialization%20of%20Untrusted%20Data%20in%20strongholdthemes%20Dental%20Care%20CPT&amp;severity=high&amp;id=6972591f4623b1157c7fb090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69005-improper-control-of-filename-for-in-602266e6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69005%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Search%20%26%20Go&amp;severity=high&amp;id=6972591f4623b1157c7fb08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69004-improper-control-of-filename-for-in-e44db283</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69004%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20XpeedStudio%20Bajaar%20-%20Highly%20Customizable%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=6972591f4623b1157c7fb08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69003-improper-neutralization-of-input-du-2ee1bb27</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69003%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QantumThemes%20KenthaRadio&amp;severity=high&amp;id=6972591f4623b1157c7fb087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69002-deserialization-of-untrusted-data-i-f2e22d09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69002%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20OneLife&amp;severity=high&amp;id=6972591f4623b1157c7fb084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69001-improper-control-of-generation-of-c-3f9d1472</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69001%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Shahjahan%20Jewel%20FluentForm&amp;severity=medium&amp;id=6972591f4623b1157c7fb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68999-improper-neutralization-of-special--aebf6951</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68999%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HappyMonster%20Happy%20Addons%20for%20Elementor&amp;severity=high&amp;id=6972591f4623b1157c7fb07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68986-unrestricted-upload-of-file-with-da-9a2c70a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68986%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Miion&amp;severity=critical&amp;id=6972591f4623b1157c7fb07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68913-improper-control-of-filename-for-in-4c8969fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68913%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zozothemes%20Miion&amp;severity=high&amp;id=6972591f4623b1157c7fb078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68912-improper-limitation-of-a-pathname-t-88457da1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68912%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Harmonic%20Design%20HDForms&amp;severity=high&amp;id=6972591e4623b1157c7fb037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68911-missing-authorization-in-solacewp-s-3da9a145</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68911%3A%20Missing%20Authorization%20in%20solacewp%20Solace&amp;severity=medium&amp;id=6972591e4623b1157c7fb034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68910-unrestricted-upload-of-file-with-da-26187745</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68910%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20Blogzee&amp;severity=critical&amp;id=6972591e4623b1157c7fb031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68909-unrestricted-upload-of-file-with-da-cc6e01ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68909%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20Blogistic&amp;severity=critical&amp;id=6972591e4623b1157c7fb02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68908-improper-control-of-filename-for-in-a6cabbd7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68908%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20temash%20Barberry&amp;severity=high&amp;id=6972591e4623b1157c7fb02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68907-improper-limitation-of-a-pathname-t-eb2a8a96</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68907%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AivahThemes%20Hostme%20v2&amp;severity=high&amp;id=6972591e4623b1157c7fb028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68906-improper-neutralization-of-input-du-1c57cff4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68906%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20JNews%20-%20Video&amp;severity=high&amp;id=6972591e4623b1157c7fb025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68905-improper-control-of-filename-for-in-ff1e9f14</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68905%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jegtheme%20JNews%20-%20Pay%20Writer&amp;severity=high&amp;id=6972591e4623b1157c7fb022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68904-improper-neutralization-of-input-du-ced207c0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20JNews%20-%20Frontend%20Submit&amp;severity=high&amp;id=6972591e4623b1157c7fb01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68903-deserialization-of-untrusted-data-i-5b3f44b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68903%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AivahThemes%20Anona&amp;severity=high&amp;id=6972591e4623b1157c7fb01c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68902-improper-limitation-of-a-pathname-t-c538a106</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68902%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AivahThemes%20Anona&amp;severity=high&amp;id=6972591d4623b1157c7fb006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68901-improper-limitation-of-a-pathname-t-db9c136c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68901%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AivahThemes%20Anona&amp;severity=high&amp;id=6972591d4623b1157c7fb003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68900-improper-neutralization-of-input-du-bdddb953</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68900%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kriesi%20Enfold&amp;severity=medium&amp;id=6972591d4623b1157c7fb000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68899-deserialization-of-untrusted-data-i-96b08e62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68899%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Vivagh&amp;severity=high&amp;id=6972591d4623b1157c7faffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68898-improper-neutralization-of-input-du-e8867837</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cjjparadoxmax%20Synergy%20Project%20Manager&amp;severity=medium&amp;id=6972591d4623b1157c7faffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68896-missing-authorization-in-vrpr-wdv-o-6ae5876d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68896%3A%20Missing%20Authorization%20in%20vrpr%20WDV%20One%20Page%20Docs&amp;severity=medium&amp;id=6972591d4623b1157c7faff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68894-improper-neutralization-of-input-du-ce857be1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68894%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shoutoutglobal%20ShoutOut&amp;severity=high&amp;id=6972591d4623b1157c7faff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68884-improper-neutralization-of-input-du-6fffc42e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arevico%20WP%20Simple%20Redirect&amp;severity=high&amp;id=6972591d4623b1157c7faff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68883-improper-neutralization-of-input-du-e02bcec3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68883%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extremeidea%20bidorbuy%20Store%20Integrator&amp;severity=high&amp;id=6972591d4623b1157c7fafee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68881-improper-neutralization-of-special--14a35230</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68881%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Saad%20Iqbal%20AppExperts&amp;severity=high&amp;id=6972591d4623b1157c7fafeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68871-improper-neutralization-of-input-du-729a4405</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68871%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20noCreativity%20Dooodl&amp;severity=high&amp;id=6972591b4623b1157c7fafb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68869-incorrect-privilege-assignment-in-l-4eda534f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68869%3A%20Incorrect%20Privilege%20Assignment%20in%20LazyCoders%20LLC%20LazyTasks&amp;severity=critical&amp;id=6972591b4623b1157c7fafae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68866-improper-neutralization-of-input-du-2b2c9d00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68866%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woofer696%20Dinatur&amp;severity=high&amp;id=6972591b4623b1157c7fafab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68864-improper-neutralization-of-input-du-75a71c1b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68864%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infility%20Infility%20Global&amp;severity=high&amp;id=6972591b4623b1157c7fafa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68859-improper-neutralization-of-input-du-fc6a1396</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68859%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20agmorpheus%20Syntax%20Highlighter%20Compress&amp;severity=high&amp;id=6972591b4623b1157c7fafa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68858-improper-neutralization-of-input-du-a4ecdeab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Casey%20Bisson%20wpCAS&amp;severity=high&amp;id=6972591b4623b1157c7fafa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68857-improper-neutralization-of-special--6c1018a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68857%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ichurakov%20Paid%20Downloads&amp;severity=critical&amp;id=6972591b4623b1157c7faf9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68849-improper-neutralization-of-input-du-34789717</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68849%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Frank%20Corso%20Quote%20Master&amp;severity=high&amp;id=6972591b4623b1157c7faf9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68839-improper-neutralization-of-input-du-9948d05a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68839%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Remi%20Corson%20Easy%20Theme%20Options&amp;severity=high&amp;id=6972591b4623b1157c7faf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68838-improper-neutralization-of-input-du-8d7400fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68838%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20expresstechsoftware%20MemberPress%20Discord%20Addon&amp;severity=high&amp;id=6972591b4623b1157c7faf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68835-improper-neutralization-of-input-du-c756e8de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68835%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matiskiba%20Ravpage&amp;severity=high&amp;id=6972591a4623b1157c7faf89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68558-missing-authorization-in-averta-dep-828d605f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68558%3A%20Missing%20Authorization%20in%20averta%20Depicter%20Slider&amp;severity=medium&amp;id=6972591a4623b1157c7faf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68538-improper-neutralization-of-input-du-c4004e1a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Craft&amp;severity=high&amp;id=6972591a4623b1157c7faf83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68520-improper-neutralization-of-input-du-2e74c0b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20DotLife&amp;severity=high&amp;id=6972591a4623b1157c7faf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68518-improper-neutralization-of-input-du-a8703c1b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Hoteller&amp;severity=high&amp;id=6972591a4623b1157c7faf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68510-improper-control-of-filename-for-in-5dd548ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68510%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=6972591a4623b1157c7faf7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68073-missing-authorization-in-ninja-team-07902cf1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68073%3A%20Missing%20Authorization%20in%20Ninja%20Team%20GDPR%20CCPA%20Compliance%20Support&amp;severity=medium&amp;id=6972591a4623b1157c7faf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68072-missing-authorization-in-merv-barre-cc985565</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68072%3A%20Missing%20Authorization%20in%20Merv%20Barrett%20Easy%20Property%20Listings&amp;severity=medium&amp;id=6972591a4623b1157c7faf74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68059-missing-authorization-in-e-plugins--77d62311</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68059%3A%20Missing%20Authorization%20in%20e-plugins%20Hotel%20Listing&amp;severity=high&amp;id=6972591a4623b1157c7faf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68058-missing-authorization-in-e-plugins--ab67652f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68058%3A%20Missing%20Authorization%20in%20e-plugins%20Institutions%20Directory&amp;severity=high&amp;id=6972591a4623b1157c7faf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68057-missing-authorization-in-e-plugins--2d9c4b66</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68057%3A%20Missing%20Authorization%20in%20e-plugins%20Hospital%20Doctor%20Directory&amp;severity=high&amp;id=697259194623b1157c7faf58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68047-deserialization-of-untrusted-data-i-c49bf780</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68047%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Arraytics%20Eventin&amp;severity=high&amp;id=697259194623b1157c7faf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68046-exposure-of-sensitive-system-inform-ba4c0977</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68046%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ThemeHunk%20Contact%20Form%20%26%20Lead%20Form%20Elementor%20Builder&amp;severity=medium&amp;id=697259194623b1157c7faf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68041-improper-neutralization-of-input-du-0df36845</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68041%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codisto%20Omnichannel%20for%20WooCommerce&amp;severity=high&amp;id=697259194623b1157c7faf4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68039-missing-authorization-in-chris-simm-a82594ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68039%3A%20Missing%20Authorization%20in%20Chris%20Simmons%20WP%20BackItUp&amp;severity=medium&amp;id=697259194623b1157c7faf4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68035-insertion-of-sensitive-information--fbcffc5d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68035%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20tabbyai%20Tabby%20Checkout&amp;severity=high&amp;id=697259194623b1157c7faf49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68034-improper-neutralization-of-special--55f4b309</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68034%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CleverReach%C2%AE%20CleverReach%C2%AE%20WP&amp;severity=critical&amp;id=697259194623b1157c7faf46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68030-server-side-request-forgery-ssrf-in-a21d7013</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68030%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WP%20Messiah%20Frontis%20Blocks&amp;severity=high&amp;id=697259194623b1157c7faf43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68027-incorrect-privilege-assignment-in-t-a14f0fe1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68027%3A%20Incorrect%20Privilege%20Assignment%20in%20Themefic%20Hydra%20Booking&amp;severity=high&amp;id=697259194623b1157c7faf40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68020-missing-authorization-in-wanotifier-407a07fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68020%3A%20Missing%20Authorization%20in%20WANotifier%20Notifier&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68019-missing-authorization-in-cleverplug-dd70e525</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68019%3A%20Missing%20Authorization%20in%20cleverplugins%20SEO%20Booster&amp;severity=medium&amp;id=697259194623b1157c7faf3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68018-missing-authorization-in-ilmosys-or-c5c178d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68018%3A%20Missing%20Authorization%20in%20StackWC%20Order%20Listener%20for%20WooCommerce&amp;severity=critical&amp;id=697259184623b1157c7faf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68017-improper-neutralization-of-special--6206eb7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68017%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Antideo%20Antideo%20Email%20Validator&amp;severity=high&amp;id=697259184623b1157c7faf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68016-missing-authorization-in-onepay-sri-a47aed27</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68016%3A%20Missing%20Authorization%20in%20Onepay%20Sri%20Lanka%20onepay%20Payment%20Gateway%20For%20WooCommerce&amp;severity=medium&amp;id=697259184623b1157c7faf12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68015-improper-control-of-generation-of-c-7c3f3dc9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68015%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Vollstart%20Event%20Tickets%20with%20Ticket%20Scanner&amp;severity=critical&amp;id=697259184623b1157c7faf0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68013-missing-authorization-in-cardpaysol-a6e7175f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68013%3A%20Missing%20Authorization%20in%20cardpaysolutions%20Payment%20Gateway%20Authorize.Net%20CIM%20for%20WooCommerce&amp;severity=medium&amp;id=697259184623b1157c7faf0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68012-improper-neutralization-of-input-du-3220ddc5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68012%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dmytro%20Shteflyuk%20CodeColorer&amp;severity=high&amp;id=697259184623b1157c7faf09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68011-improper-neutralization-of-input-du-cf88fe4d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GLS%20GLS%20Shipping%20for%20WooCommerce&amp;severity=high&amp;id=697259184623b1157c7faf06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68009-missing-authorization-in-codeless-s-5fcdc7a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68009%3A%20Missing%20Authorization%20in%20Codeless%20Slider%20Templates&amp;severity=medium&amp;id=697259184623b1157c7faf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68008-improper-neutralization-of-input-du-69815023</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68008%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mndpsingh287%20WP%20Mail&amp;severity=high&amp;id=697259184623b1157c7faf00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68007-missing-authorization-in-event-espr-82b8dec6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68007%3A%20Missing%20Authorization%20in%20Event%20Espresso%20Event%20Espresso%204%20Decaf&amp;severity=medium&amp;id=697259184623b1157c7faefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68006-insertion-of-sensitive-information--ed1feff1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68006%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Deetronix%20Booking%20Ultra%20Pro&amp;severity=medium&amp;id=697259174623b1157c7faedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68004-improper-neutralization-of-input-du-206a2d26</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kapil%20Chugh%20My%20Post%20Order&amp;severity=high&amp;id=697259174623b1157c7faed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68003-missing-authorization-in-renatoatsh-fd0be448</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68003%3A%20Missing%20Authorization%20in%20renatoatshown%20Shown%20Connector&amp;severity=medium&amp;id=697259174623b1157c7faed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68001-unrestricted-upload-of-file-with-da-16d7d75d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68001%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20garidium%20g-FFL%20Checkout&amp;severity=critical&amp;id=697259174623b1157c7faed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67968-unrestricted-upload-of-file-with-da-18899948</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67968%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20InspiryThemes%20Real%20Homes%20CRM&amp;severity=critical&amp;id=697259174623b1157c7faed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67967-missing-authorization-in-e-plugins--149fa327</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67967%3A%20Missing%20Authorization%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=697259174623b1157c7faecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67966-incorrect-privilege-assignment-in-e-8c144b61</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67966%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=697259174623b1157c7faeca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67964-improper-neutralization-of-input-du-82f02692</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67964%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Homey%20Core&amp;severity=high&amp;id=697259174623b1157c7faec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67963-improper-limitation-of-a-pathname-t-9f6b932a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67963%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ovatheme%20Movie%20Booking&amp;severity=high&amp;id=697259174623b1157c7faec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67961-server-side-request-forgery-ssrf-in-9205865a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67961%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Marco%20van%20Wieren%20WPO365&amp;severity=medium&amp;id=697259174623b1157c7faec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67960-improper-neutralization-of-input-du-05758a63</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67960%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20WorkScout-Core&amp;severity=high&amp;id=697259154623b1157c7fae98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67959-improper-neutralization-of-input-du-8f93f3d8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67959%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20WorkScout&amp;severity=high&amp;id=697259154623b1157c7fae95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67958-missing-authorization-in-taxcloud-t-cbf96692</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67958%3A%20Missing%20Authorization%20in%20Taxcloud%20TaxCloud%20for%20WooCommerce&amp;severity=medium&amp;id=697259154623b1157c7fae92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67957-improper-control-of-filename-for-in-4f9141ff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67957%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TangibleWP%20Listivo%20Core&amp;severity=high&amp;id=697259154623b1157c7fae8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67956-missing-authorization-in-wpeverest--696615a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67956%3A%20Missing%20Authorization%20in%20wpeverest%20User%20Registration&amp;severity=high&amp;id=697259154623b1157c7fae8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67955-improper-control-of-filename-for-in-35869ba7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67955%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TangibleWP%20MyHome%20Core&amp;severity=high&amp;id=697259154623b1157c7fae89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67954-exposure-of-sensitive-system-inform-9becc56d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67954%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=medium&amp;id=697259154623b1157c7fae86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67953-incorrect-privilege-assignment-in-b-40b90b35</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67953%3A%20Incorrect%20Privilege%20Assignment%20in%20Booking%20Activities%20Team%20Booking%20Activities&amp;severity=high&amp;id=697259154623b1157c7fae83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67952-improper-neutralization-of-input-du-f1c53f92</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67952%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Tour&amp;severity=high&amp;id=697259154623b1157c7fae80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67949-improper-neutralization-of-input-du-f6293952</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designingmedia%20Hostiko&amp;severity=high&amp;id=697259154623b1157c7fae7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67947-improper-neutralization-of-input-du-b6ce2862</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67947%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scriptsbundle%20AdForest%20Elementor&amp;severity=high&amp;id=697259144623b1157c7fae70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67946-improper-control-of-filename-for-in-1f2c95b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67946%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20scriptsbundle%20AdForest&amp;severity=high&amp;id=697259144623b1157c7fae6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67945-improper-neutralization-of-special--449b0da3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67945%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MailerLite%20MailerLite%20%E2%80%93%20WooCommerce%20integration&amp;severity=critical&amp;id=697259144623b1157c7fae6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67944-improper-control-of-generation-of-c-ce4f4ae0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67944%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=critical&amp;id=697259144623b1157c7fae67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67943-improper-neutralization-of-input-du-17b92856</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=697259144623b1157c7fae64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67942-missing-authorization-in-peachpayme-4aeb6f3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67942%3A%20Missing%20Authorization%20in%20peachpayments%20Peach%20Payments%20Gateway&amp;severity=medium&amp;id=697259144623b1157c7fae61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67941-improper-control-of-filename-for-in-f9123d65</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67941%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20The%20Aisle&amp;severity=high&amp;id=697259144623b1157c7fae5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67940-improper-control-of-filename-for-in-f98f49f5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67940%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Powerlift&amp;severity=high&amp;id=697259144623b1157c7fae5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67938-improper-control-of-filename-for-in-26398e46</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67938%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Biagiotti&amp;severity=high&amp;id=697259144623b1157c7fae58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67923-improper-neutralization-of-input-du-d9f31cfe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=697259144623b1157c7fae55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67626-cross-site-request-forgery-csrf-in--99cfe8ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67626%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Angel%20Costa%20WP%20SEO%20Search&amp;severity=medium&amp;id=697259134623b1157c7fae30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67620-improper-neutralization-of-input-du-9343df07</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CleverSoft%20Anon&amp;severity=high&amp;id=697259134623b1157c7fae2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67619-deserialization-of-untrusted-data-i-b01a6210</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67619%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Kids%20Heaven&amp;severity=high&amp;id=697259134623b1157c7fae2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67617-deserialization-of-untrusted-data-i-ec276769</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67617%3A%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20Consult%20Aid&amp;severity=critical&amp;id=697259134623b1157c7fae27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67616-improper-control-of-filename-for-in-b42999dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67616%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Mella&amp;severity=high&amp;id=697259134623b1157c7fae24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67615-improper-control-of-filename-for-in-1d5be9e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67615%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20bslthemes%20Myour&amp;severity=high&amp;id=697259134623b1157c7fae21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67614-improper-neutralization-of-input-du-d31edf7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20TheNa&amp;severity=high&amp;id=697259134623b1157c7fae1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66143-missing-authorization-in-merkulove--b040ea63</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66143%3A%20Missing%20Authorization%20in%20merkulove%20Crumber&amp;severity=medium&amp;id=697259134623b1157c7fae1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66142-missing-authorization-in-merkulove--1b81cea7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66142%3A%20Missing%20Authorization%20in%20merkulove%20Comparimager%20for%20Elementor&amp;severity=medium&amp;id=697259134623b1157c7fae18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66141-missing-authorization-in-merkulove--dda7b57b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66141%3A%20Missing%20Authorization%20in%20merkulove%20Scroller&amp;severity=medium&amp;id=697259134623b1157c7fae15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66140-missing-authorization-in-merkulove--36c3a702</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66140%3A%20Missing%20Authorization%20in%20merkulove%20Uper%20for%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66139-missing-authorization-in-merkulove--9b6a4521</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66139%3A%20Missing%20Authorization%20in%20merkulove%20Audier%20For%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66138-missing-authorization-in-merkulove--5a8fd2dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66138%3A%20Missing%20Authorization%20in%20merkulove%20Motionger%20for%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66137-missing-authorization-in-merkulove--ea8c0169</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66137%3A%20Missing%20Authorization%20in%20merkulove%20Searcher%20for%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66136-missing-authorization-in-merkulove--c05e35f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66136%3A%20Missing%20Authorization%20in%20merkulove%20Carter%20for%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66135-missing-authorization-in-merkulove--9fdd0379</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66135%3A%20Missing%20Authorization%20in%20merkulove%20Imager%20for%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64252-server-side-request-forgery-ssrf-in-640fda99</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64252%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Marco%20Milesi%20ANAC%20XML%20Viewer&amp;severity=medium&amp;id=697259114623b1157c7fab4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63051-exposure-of-sensitive-system-inform-806a3162</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63051%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20sizam%20REHub%20Framework&amp;severity=medium&amp;id=697259114623b1157c7fab4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63026-improper-neutralization-of-input-du-6171ca83</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63026%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Restaurant%20Theme%20Elements%20for%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63019-insertion-of-sensitive-information--b974c03d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63019%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Johan%20Jonk%20Stenstr%C3%B6m%20Cookies%20and%20Content%20Security%20Policy&amp;severity=medium&amp;id=697259114623b1157c7fab46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63018-missing-authorization-in-wproyal-ba-287c1c57</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63018%3A%20Missing%20Authorization%20in%20wproyal%20Bard&amp;severity=medium&amp;id=697259104623b1157c7fab39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63017-improper-control-of-filename-for-in-95b29fce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20WerkStatt%20Plugin&amp;severity=high&amp;id=697259104623b1157c7fab36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62754-missing-authorization-in-kapil-paul-700b8d31</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62754%3A%20Missing%20Authorization%20in%20Kapil%20Paul%20Payment%20Gateway%20bKash%20for%20WC&amp;severity=medium&amp;id=697259104623b1157c7fab33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62741-server-side-request-forgery-ssrf-in-ff1e7115</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62741%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SmartDataSoft%20Pool%20Services&amp;severity=medium&amp;id=697259104623b1157c7fab30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62106-missing-authorization-in-mario-pesh-02fbceda</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62106%3A%20Missing%20Authorization%20in%20Mario%20Peshev%20WP-CRM%20System&amp;severity=medium&amp;id=697259104623b1157c7fab2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62077-improper-neutralization-of-input-du-be80ae75</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62077%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SEOSEON%20EUROPE%20S.L%20Affiliate%20Link%20Tracker&amp;severity=medium&amp;id=697259104623b1157c7fab2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62056-unrestricted-upload-of-file-with-da-e7a7dcf0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62056%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20News%20Event&amp;severity=critical&amp;id=697259104623b1157c7fab27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62050-unrestricted-upload-of-file-with-da-a37648b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62050%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20Blogmatic&amp;severity=critical&amp;id=697259104623b1157c7fab24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5805-missing-authorization-in-ninetheme-e-58fb9aaa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5805%3A%20Missing%20Authorization%20in%20Ninetheme%20Electron&amp;severity=medium&amp;id=697259104623b1157c7fab21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54003-improper-control-of-filename-for-in-943115b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54003%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Depot&amp;severity=high&amp;id=697259104623b1157c7fab1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54002-missing-authorization-in-jthemes-xs-85c2024b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54002%3A%20Missing%20Authorization%20in%20Jthemes%20xSmart&amp;severity=medium&amp;id=6972590f4623b1157c7faae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53240-improper-neutralization-of-input-du-83e43970</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adamlabs%20WordPress%20Photo%20Gallery&amp;severity=high&amp;id=6972590f4623b1157c7faadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52762-improper-neutralization-of-input-du-438a830f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52762%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexostudio%20flexo-posts-manager&amp;severity=high&amp;id=6972590f4623b1157c7faada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52746-improper-neutralization-of-input-du-1924e741</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ayecode%20Restaurante&amp;severity=high&amp;id=6972590f4623b1157c7faad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50007-incorrect-privilege-assignment-in-j-0580525c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50007%3A%20Incorrect%20Privilege%20Assignment%20in%20Jthemes%20xSmart&amp;severity=high&amp;id=6972590f4623b1157c7faad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50006-improper-neutralization-of-input-du-6fadda2f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jthemes%20xSmart&amp;severity=high&amp;id=6972590f4623b1157c7faad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50005-improper-neutralization-of-input-du-987382b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50005%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=6972590f4623b1157c7faace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50004-deserialization-of-untrusted-data-i-eeb6d952</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50004%3A%20Deserialization%20of%20Untrusted%20Data%20in%20artbees%20JupiterX%20Core&amp;severity=high&amp;id=6972590f4623b1157c7faacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50003-improper-control-of-filename-for-in-781a9983</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50003%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Amuli&amp;severity=high&amp;id=6972590f4623b1157c7faac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50002-unrestricted-upload-of-file-with-da-de6744ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50002%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Farost%20Energia&amp;severity=critical&amp;id=6972590f4623b1157c7faac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49994-improper-control-of-filename-for-in-2047345c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49994%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Athens&amp;severity=high&amp;id=6972590d4623b1157c7faa9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49375-missing-authorization-in-cozythemes-9aa14118</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49375%3A%20Missing%20Authorization%20in%20cozythemes%20HomeLancer&amp;severity=medium&amp;id=6972590d4623b1157c7faa9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49336-improper-neutralization-of-input-du-29b8cad1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49336%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pondol%20Pondol%20BBS&amp;severity=medium&amp;id=6972590d4623b1157c7faa99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49249-improper-neutralization-of-input-du-8e63c1f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49249%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ApusTheme%20Drone&amp;severity=high&amp;id=6972590d4623b1157c7faa96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49066-improper-neutralization-of-input-du-85247c1d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49066%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Accordion%20Slider%20PRO&amp;severity=high&amp;id=6972590d4623b1157c7faa93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49055-improper-neutralization-of-special--bf4f12a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49055%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20WP%20Lead%20Capturing%20Pages&amp;severity=critical&amp;id=6972590d4623b1157c7faa90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49050-improper-neutralization-of-special--ceb451f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49050%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20WP%20Lead%20Capturing%20Pages&amp;severity=high&amp;id=6972590d4623b1157c7faa8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49049-improper-neutralization-of-special--32136600</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49049%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ZoomIt%20DZS%20Video%20Gallery&amp;severity=high&amp;id=6972590d4623b1157c7faa8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49046-improper-neutralization-of-input-du-a523b06f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49046%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20xPromoter&amp;severity=high&amp;id=6972590d4623b1157c7faa87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49045-improper-neutralization-of-input-du-d56a5c70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49045%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20highwarden%20Super%20Interactive%20Maps&amp;severity=high&amp;id=6972590d4623b1157c7faa84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49043-improper-neutralization-of-input-du-7ad9532b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49043%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Magic%20Responsive%20Slider%20and%20Carousel%20WordPress&amp;severity=high&amp;id=6972590c4623b1157c7faa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48094-improper-neutralization-of-input-du-1f367045</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Magic%20Slider&amp;severity=high&amp;id=6972590c4623b1157c7faa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47666-improper-neutralization-of-input-du-3e28c688</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47666%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Image%26Video%20FullScreen%20Background&amp;severity=high&amp;id=6972590c4623b1157c7faa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47600-improper-neutralization-of-script-r-dc90d48a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47600%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20xtemos%20WoodMart&amp;severity=medium&amp;id=6972590c4623b1157c7faa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47555-authorization-bypass-through-user-c-538ad53a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47555%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Themeum%20Tutor%20LMS&amp;severity=low&amp;id=6972590c4623b1157c7faa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47500-improper-neutralization-of-input-du-85e0ae4a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47500%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Benjamin%20Intal%20Stackable&amp;severity=medium&amp;id=6972590c4623b1157c7faa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47474-improper-control-of-filename-for-in-f88fd651</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47474%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ninetheme%20Anarkali&amp;severity=high&amp;id=6972590c4623b1157c7faa63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32123-improper-neutralization-of-input-du-7d36493b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32123%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20HTML5%20Video%20Player%20with%20Playlist%20%26%20Multiple%20Skins&amp;severity=high&amp;id=6972590c4623b1157c7faa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31413-cross-site-request-forgery-csrf-in--4a4d1467</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31413%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons&amp;severity=medium&amp;id=6972590c4623b1157c7faa5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27005-improper-neutralization-of-input-du-a9f96efe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27005%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20HTML5%20Video%20Player&amp;severity=high&amp;id=6972590c4623b1157c7faa5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-gnu-inetutils-telnetd-flaw-lets-attackers-0f5bd676</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20GNU%20InetUtils%20telnetd%20Flaw%20Lets%20Attackers%20Bypass%20Login%20and%20Gain%20Root%20Access&amp;severity=critical&amp;id=69729a4b4623b1157c918195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23761-cwe-824-access-of-uninitialized-poi-e22cfc65</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23761%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20VB-Audio%20Software%20Voicemeeter%20(Standard)&amp;severity=medium&amp;id=697251f54623b1157c7bcf88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23762-cwe-755-improper-handling-of-except-58a810d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23762%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20VB-Audio%20Software%20Voicemeeter%20(Standard)&amp;severity=medium&amp;id=697251f54623b1157c7bcf8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23763-cwe-668-exposure-of-resource-to-wro-c5e3de8f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23763%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20VB-Audio%20Software%20Matrix&amp;severity=high&amp;id=697251f54623b1157c7bcf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23764-cwe-823-use-of-out-of-range-pointer-0ecbb011</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23764%3A%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20VB-Audio%20Software%20Voicemeeter%20(Standard)&amp;severity=medium&amp;id=697251f54623b1157c7bcf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22278-cwe-307-improper-restriction-of-exc-63d6d9d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22278%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Dell%20PowerScale%20OneFS&amp;severity=high&amp;id=697251f54623b1157c7bcf85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36588-cwe-89-improper-neutralization-of-s-26748496</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36588%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=69724ae54623b1157c7a6893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32057-cwe-295-improper-certificate-valida-577d1175</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32057%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=697243dd4623b1157c78dedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32056-cwe-1241-use-of-predictable-algorit-21f21815</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32056%3A%20CWE-1241%3A%20Use%20of%20Predictable%20Algorithm%20in%20Random%20Number%20Generator%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=697243dd4623b1157c78ded8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/old-attack-new-speed-researchers-optimize-page-cac-2f714afd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Old%20Attack%2C%20New%20Speed%3A%20Researchers%20Optimize%20Page%20Cache%20Exploits&amp;severity=medium&amp;id=697240254623b1157c78210a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24009-cwe-502-deserialization-of-untruste-fbb20fca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24009%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20docling-project%20docling-core&amp;severity=high&amp;id=6972406b4623b1157c78272c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65098-cwe-79-improper-neutralization-of-i-f71e6496</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65098%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baptisteArno%20typebot.io&amp;severity=high&amp;id=69723cd54623b1157c77843e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64097-cwe-330-use-of-insufficiently-rando-532e6a2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64097%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20nerves-hub%20nerves_hub_web&amp;severity=critical&amp;id=69723cd54623b1157c778439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23760-cwe-288-authentication-bypass-using-307c60bd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23760%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SmarterTools%20SmarterMail&amp;severity=critical&amp;id=69723cd54623b1157c778445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1329-stack-based-buffer-overflow-in-tenda-8a33d034</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1329%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AX1803&amp;severity=high&amp;id=6972406b4623b1157c782733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1328-buffer-overflow-in-totolink-nr1800x-a1d00173</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1328%3A%20Buffer%20Overflow%20in%20Totolink%20NR1800X&amp;severity=high&amp;id=697251f54623b1157c7bcfa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-pixel-zero-click-redis-rce-chi-6c8f578f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Pixel%20Zero-Click%2C%20Redis%20RCE%2C%20China%20C2s%2C%20RAT%20Ads%2C%20Crypto%20Scams%20%26%2015%2B%20Stories&amp;severity=low&amp;id=69729a4b4623b1157c918198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1327-command-injection-in-totolink-nr1800-636c9eb0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1327%3A%20Command%20Injection%20in%20Totolink%20NR1800X&amp;severity=medium&amp;id=697232484623b1157c748474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konni-adopts-ai-to-generate-powershell-backdoors-9b308855</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KONNI%20Adopts%20AI%20to%20Generate%20PowerShell%20Backdoors&amp;severity=medium&amp;id=69722ec54623b1157c73cce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1326-command-injection-in-totolink-nr1800-ea6910ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1326%3A%20Command%20Injection%20in%20Totolink%20NR1800X&amp;severity=medium&amp;id=69722b404623b1157c72bdd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12738-cwe-200-exposure-of-sensitive-infor-837a963d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12738%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=69722b404623b1157c72bdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/december-2025-security-issues-in-korean-global-fin-604f9181</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=December%202025%20Security%20Issues%20in%20Korean%20%26%20Global%20Financial%20Sector&amp;severity=medium&amp;id=69728a2c4623b1157c8ba833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1325-weak-password-recovery-in-sangfor-op-224f4d41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1325%3A%20Weak%20Password%20Recovery%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=697224384623b1157c711e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1324-os-command-injection-in-sangfor-oper-bcaf02a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1324%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=high&amp;id=697224384623b1157c711e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14295-cwe-257-storing-passwords-in-a-reco-b2860b25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14295%3A%20CWE-257%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Automated%20Logic%20WebCTRL&amp;severity=high&amp;id=697220b84623b1157c6ff4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10856-cwe-434-unrestricted-upload-of-file-f1f9d43b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10856%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Solvera%20Software%20Services%20Trade%20Inc.%20Teknoera&amp;severity=high&amp;id=697219ac4623b1157c6e8dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10855-cwe-639-authorization-bypass-throug-a1a1bb5b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10855%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Solvera%20Software%20Services%20Trade%20Inc.%20Teknoera&amp;severity=high&amp;id=6972163c4623b1157c6df3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wave-of-attacks-targeting-fortigate-firewalls-6d647d9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Wave%20of%20Attacks%20Targeting%20FortiGate%20Firewalls&amp;severity=medium&amp;id=697215f54623b1157c6de53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67684-cwe-22-improper-limitation-of-a-pat-bc0a1d9a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67684%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenSolution%20Quick.Cart&amp;severity=critical&amp;id=697212a84623b1157c6d1f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67683-cwe-79-improper-neutralization-of-i-ae4cfec0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67683%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20Quick.Cart&amp;severity=medium&amp;id=697212a84623b1157c6d1f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10024-cwe-639-authorization-bypass-throug-7ff78f82</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10024%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20EXERT%20Computer%20Technologies%20Software%20Ltd.%20Co.%20Education%20Management%20System&amp;severity=high&amp;id=69720f224623b1157c6c54e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/filling-the-most-common-gaps-in-google-workspace-s-f386f7af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Filling%20the%20Most%20Common%20Gaps%20in%20Google%20Workspace%20Security&amp;severity=low&amp;id=69729a4b4623b1157c91819b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-package-impersonates-sympy-deploys--b22eefbf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20Package%20Impersonates%20SymPy%2C%20Deploys%20XMRig%20Miner%20on%20Linux%20Hosts&amp;severity=medium&amp;id=69729a4b4623b1157c91819e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartermail-auth-bypass-exploited-in-the-wild-two--107b4488</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmarterMail%20Auth%20Bypass%20Exploited%20in%20the%20Wild%20Two%20Days%20After%20Patch%20Release&amp;severity=low&amp;id=69729a4b4623b1157c9181a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atlassian-gitlab-zoom-release-security-patches-baa70442</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atlassian%2C%20GitLab%2C%20Zoom%20Release%20Security%20Patches&amp;severity=critical&amp;id=6971f2cd4623b1157c649e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1225-cwe-20-improper-input-validation-in--931c988d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1225%3A%20CWE-20%20Improper%20Input%20Validation%20in%20QOS.CH%20Sarl%20Logback-core&amp;severity=low&amp;id=6972163c4623b1157c6df3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1332-cwe-306-missing-authentication-for-c-b236b23b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1332%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HAMASTAR%20Technology%20MeetingHub&amp;severity=medium&amp;id=697275ff4623b1157c8651ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4764-cwe-89-improper-neutralization-of-sp-7304c9c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4764%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aida%20Computer%20Information%20Technology%20Inc.%20Hotel%20Guest%20Hotspot&amp;severity=high&amp;id=697212a84623b1157c6d1f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4763-cwe-79-improper-neutralization-of-in-9e52a134</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4763%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Aida%20Computer%20Information%20Technology%20Inc.%20Hotel%20Guest%20Hotspot&amp;severity=medium&amp;id=697212a84623b1157c6d1f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1331-cwe-434-unrestricted-upload-of-file--764369fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1331%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AMASTAR%20Technology%20MeetingHub&amp;severity=critical&amp;id=69723cd54623b1157c778441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-targeting-cisco-unified-cm-zero-day-72adec99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Targeting%20Cisco%20Unified%20CM%20Zero-Day&amp;severity=critical&amp;id=6971e8414623b1157c610b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-ai-generated-code-securex3f-thu-jan-22nd-9c248672</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20AI-Generated%20Code%20Secure%26%23x3f%3B%2C%20(Thu%2C%20Jan%2022nd)&amp;severity=medium&amp;id=6971e13c4623b1157c546e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1330-cwe-36-absolute-path-traversal-in-ha-8ec72c7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1330%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20HAMASTAR%20Technology%20MeetingHub&amp;severity=high&amp;id=6971e4f04623b1157c560bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24332-cwe-204-observable-response-discrep-8f1ed967</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24332%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Discord%20WebSocket%20API%20service&amp;severity=medium&amp;id=6971dde84623b1157c521593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0920-cwe-269-improper-privilege-managemen-5d2a4b0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0920%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=critical&amp;id=6971cc544623b1157c4acff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automated-fortigate-attacks-exploit-forticloud-sso-01b5fbea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automated%20FortiGate%20Attacks%20Exploit%20FortiCloud%20SSO%20to%20Alter%20Firewall%20Configurations&amp;severity=medium&amp;id=69729a4b4623b1157c9181a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-fixes-actively-exploited-zero-day-cve-2026-2-4c50f3ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Fixes%20Actively%20Exploited%20Zero-Day%20CVE-2026-20045%20in%20Unified%20CM%20and%20Webex&amp;severity=critical&amp;id=69729a4b4623b1157c9181a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24049-cwe-22-improper-limitation-of-a-pat-2e330dd1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24049%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pypa%20wheel&amp;severity=high&amp;id=6971a92c4623b1157c3a86c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24042-cwe-862-missing-authorization-in-ap-acba14bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24042%3A%20CWE-862%3A%20Missing%20Authorization%20in%20appsmithorg%20appsmith&amp;severity=critical&amp;id=6971a2234623b1157c33647c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24039-cwe-284-improper-access-control-in--7aa7861a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24039%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=6971a2234623b1157c336478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24038-cwe-287-improper-authentication-in--71130ede</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24038%3A%20CWE-287%3A%20Improper%20Authentication%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=6971a2234623b1157c336474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24037-cwe-79-improper-neutralization-of-i-f5563376</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24037%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=6971a2234623b1157c336470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24036-cwe-284-improper-access-control-in--93914593</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24036%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=6971a2234623b1157c33646b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24035-cwe-284-improper-access-control-in--9329fb36</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24035%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=697197984623b1157c136a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24034-cwe-434-unrestricted-upload-of-file-d7b7a95a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24034%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=697197984623b1157c136a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24010-cwe-74-improper-neutralization-of-s-8f68027a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24010%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=697190914623b1157c0cb806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24006-cwe-770-allocation-of-resources-wit-1150131c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24006%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=697190914623b1157c0cb802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24002-cwe-74-improper-neutralization-of-s-5cd70cb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24002%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20gristlabs%20grist-core&amp;severity=critical&amp;id=697190914623b1157c0cb7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24001-cwe-400-uncontrolled-resource-consu-10138374</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24001%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kpdecker%20jsdiff&amp;severity=low&amp;id=697190914623b1157c0cb7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23992-cwe-347-improper-verification-of-cr-356035ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23992%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20theupdateframework%20go-tuf&amp;severity=medium&amp;id=697190914623b1157c0cb7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23991-cwe-617-reachable-assertion-in-theu-bcca6105</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23991%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20theupdateframework%20go-tuf&amp;severity=medium&amp;id=697190914623b1157c0cb7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23966-cwe-345-insufficient-verification-o-3fba88f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23966%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20JuneAndGreen%20sm-crypto&amp;severity=critical&amp;id=697190914623b1157c0cb7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23965-cwe-347-improper-verification-of-cr-30d24726</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23965%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20JuneAndGreen%20sm-crypto&amp;severity=high&amp;id=697190914623b1157c0cb7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23967-cwe-347-improper-verification-of-cr-632a7977</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23967%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20JuneAndGreen%20sm-crypto&amp;severity=high&amp;id=697190914623b1157c0cb7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23699-improper-neutralization-of-special--88b06796</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23699%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ruijie%20Networks%20Co.%2C%20Ltd.%20AP180(JA)%20V1.xx&amp;severity=high&amp;id=697186044623b1157c0a2c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27380-cwe-79-improper-neutralization-of-i-c245392d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27380%3A%20CWE-79%20%E2%80%93%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-Site%20Scripting)%20in%20Altium%20AES&amp;severity=high&amp;id=697186044623b1157c0a2c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23957-cwe-770-allocation-of-resources-wit-088bb44b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23957%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=697186044623b1157c0a2c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23956-cwe-1333-inefficient-regular-expres-81048165</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23956%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=697186044623b1157c0a2c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27379-cwe-79-cross-site-scripting-xss-in--ce8bb266</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27379%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Altium%20AES&amp;severity=medium&amp;id=697186044623b1157c0a2c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27378-cwe-89-sql-injection-in-altium-aes-497db969</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27378%3A%20CWE-89%20SQL%20Injection%20in%20Altium%20AES&amp;severity=high&amp;id=69717b774623b1157c01dc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-heurremoteadmingotoresolvegen-df139cc8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20HEURRemoteAdmin.GoToResolve.gen&amp;severity=medium&amp;id=6972081c4623b1157c6a98e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23951-cwe-125-out-of-bounds-read-in-sumat-f9c52a12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23951%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=medium&amp;id=697174714623b1157cfcd293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27377-cwe-295-improper-certificate-valida-9684e506</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27377%3A%20CWE-295%20%E2%80%93%20Improper%20Certificate%20Validation%20in%20Altium%20Altium%20Designer&amp;severity=medium&amp;id=697174714623b1157cfcd28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-22-a28ebfbd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-22&amp;severity=medium&amp;id=6972beb24623b1157c9a7c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66428-na-e49c75a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66428%3A%20n%2Fa&amp;severity=high&amp;id=697271914623b1157c8544ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70899-na-47c41fad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70899%3A%20n%2Fa&amp;severity=medium&amp;id=69725c7b4623b1157c807496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56589-na-6f58c484</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56589%3A%20n%2Fa&amp;severity=high&amp;id=69725c7b4623b1157c807492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56590-na-a788daad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56590%3A%20n%2Fa&amp;severity=critical&amp;id=69725c7b4623b1157c80748e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69828-na-58cb5585</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69828%3A%20n%2Fa&amp;severity=critical&amp;id=697255704623b1157c7cc364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67221-na-b55c10a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67221%3A%20n%2Fa&amp;severity=high&amp;id=697255704623b1157c7cc360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69820-na-74a7fc7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69820%3A%20n%2Fa&amp;severity=medium&amp;id=69724ae54623b1157c7a6896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69612-na-9524f76d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69612%3A%20n%2Fa&amp;severity=medium&amp;id=697247604623b1157c79904a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69821-na-2e81d34c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69821%3A%20n%2Fa&amp;severity=high&amp;id=697243dd4623b1157c78dee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69822-na-d100a79b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69822%3A%20n%2Fa&amp;severity=high&amp;id=6972406b4623b1157c782728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69764-na-4b4e344f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69764%3A%20n%2Fa&amp;severity=critical&amp;id=6972406b4623b1157c782724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-22-ce618865</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-22&amp;severity=low&amp;id=6971e83e4623b1157c610aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23887-cwe-79-improper-neutralization-of-i-c1cb9e0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23887%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=697166604623b1157cf4ef71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23873-cwe-1236-improper-neutralization-of-bfdca59a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23873%3A%20CWE-1236%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20zhblue%20hustoj&amp;severity=medium&amp;id=697162dc4623b1157cf42cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1036-cwe-862-missing-authorization-in-10w-194bf8a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1036%3A%20CWE-862%20Missing%20Authorization%20in%2010web%20Photo%20Gallery%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Image%20Gallery&amp;severity=medium&amp;id=697162dc4623b1157cf42cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23737-cwe-502-deserialization-of-untruste-824b5dc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23737%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=69715f584623b1157cf35e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23736-cwe-1321-improperly-controlled-modi-57a8acae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23736%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=69715f584623b1157cf35e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23996-cwe-208-observable-timing-discrepan-ff484f4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23996%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20Athroniaeth%20fastapi-api-key&amp;severity=low&amp;id=697158504623b1157cf11dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/purplebravos-targeting-of-the-it-software-supply-c-29f1b8e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PurpleBravo%E2%80%99s%20Targeting%20of%20the%20IT%20Software%20Supply%20Chain&amp;severity=medium&amp;id=69715bd34623b1157cf1b863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23990-cwe-269-improper-privilege-manageme-fc32d928</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23990%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20controlplaneio-fluxcd%20flux-operator&amp;severity=medium&amp;id=697158504623b1157cf11db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23986-cwe-61-unix-symbolic-link-symlink-f-633913a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23986%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20copier-org%20copier&amp;severity=medium&amp;id=697154cc4623b1157cf0b385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23968-cwe-61-unix-symbolic-link-symlink-f-fc072e5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23968%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20copier-org%20copier&amp;severity=medium&amp;id=697154cc4623b1157cf0b381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23524-cwe-502-deserialization-of-untruste-6ac31d76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23524%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20laravel%20reverb&amp;severity=critical&amp;id=697151484623b1157cf00eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23960-cwe-79-improper-neutralization-of-i-3e3c263a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23960%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=697151484623b1157cf00ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23518-cwe-347-improper-verification-of-cr-2b7da1d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23518%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20fleetdm%20fleet&amp;severity=critical&amp;id=69714dc34623b1157cef80f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23517-cwe-862-missing-authorization-in-fl-5296eba5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23517%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69714dc34623b1157cef80ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23526-cwe-267-privilege-defined-with-unsa-757d7df5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23526%3A%20CWE-267%3A%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20cvat-ai%20cvat&amp;severity=high&amp;id=69714dc34623b1157cef80f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23516-cwe-83-improper-neutralization-of-s-e9036b5a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23516%3A%20CWE-83%3A%20Improper%20Neutralization%20of%20Script%20in%20Attributes%20in%20a%20Web%20Page%20in%20cvat-ai%20cvat&amp;severity=high&amp;id=69714a404623b1157ceef883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22808-cwe-79-improper-neutralization-of-i-4d4028d8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22808%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=697146bc4623b1157ced22dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22807-cwe-94-improper-control-of-generati-9811f67e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22807%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=697146bc4623b1157ced22d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22793-cwe-94-improper-control-of-generati-a207a9e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22793%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=697143384623b1157ceca8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22792-cwe-116-improper-encoding-or-escapi-6dc25d7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22792%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=69713fb64623b1157cec0b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21852-cwe-522-insufficiently-protected-cr-d3f2b60d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21852%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20anthropics%20claude-code&amp;severity=medium&amp;id=69713c964623b1157cebad0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69285-cwe-306-missing-authentication-for--f21c7742</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69285%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dataease%20SQLBot&amp;severity=high&amp;id=697135284623b1157cea327d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69209-cwe-120-buffer-copy-without-checkin-6a26ff4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69209%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20arduino%20ArduinoCore-avr&amp;severity=medium&amp;id=697131a44623b1157ce981d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68141-cwe-476-null-pointer-dereference-in-69aad5d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68141%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20EVerest%20everest-core&amp;severity=high&amp;id=697131a44623b1157ce981d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68140-cwe-863-incorrect-authorization-in--45ad28eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68140%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=697131a44623b1157ce981e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68139-cwe-384-session-fixation-in-everest-f93d3f38</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68139%3A%20CWE-384%3A%20Session%20Fixation%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69712e204623b1157ce8e0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12781-vulnerability-in-python-software-fo-5238a0da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12781%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69712e204623b1157ce8e0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68138-cwe-770-allocation-of-resources-wit-9cb3e41c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68138%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69712e204623b1157ce8e0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23955-cwe-1046-creation-of-immutable-text-edb954b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23955%3A%20CWE-1046%3A%20Creation%20of%20Immutable%20Text%20Using%20String%20Concatenation%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69712a9c4623b1157ce7dac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68137-cwe-120-buffer-copy-without-checkin-e8ca4119</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68137%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69712a9c4623b1157ce7dac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68136-cwe-770-allocation-of-resources-wit-39822731</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68136%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69712a9c4623b1157ce7dac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68135-cwe-703-improper-check-or-handling--4e9fc309</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68135%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=697124574623b1157ce6527d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-macsyncs-script-driven-stealer-and-hardware-7ca77c35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20MacSync&apos;s%20Script-Driven%20Stealer%20and%20Hardware%20Wallet%20App%20Trojanization&amp;severity=medium&amp;id=69715bd34623b1157cf1b923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68134-cwe-20-improper-input-validation-in-f353a3e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68134%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20EVerest%20everest-core&amp;severity=high&amp;id=697120104623b1157ce4b45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68132-cwe-125-out-of-bounds-read-in-evere-082a9036</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68132%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20EVerest%20everest-core&amp;severity=low&amp;id=697120104623b1157ce4b457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23754-cwe-639-authorization-bypass-throug-5138dd2f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23754%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20D-Link%20D-View%208&amp;severity=high&amp;id=697119084623b1157ce32428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23755-cwe-427-uncontrolled-search-path-el-93bd221c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23755%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20D-Link%20D-View%208&amp;severity=high&amp;id=697119084623b1157ce3242c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-purplebravo-campaign-targeted-3136-ip-74f44dc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20PurpleBravo%20Campaign%20Targeted%203%2C136%20IP%20Addresses%20via%20Fake%20Job%20Interviews&amp;severity=medium&amp;id=69713bc44623b1157ceb898e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0834-cwe-290-authentication-bypass-by-spo-8e62023d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0834%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20TP-Link%20Systems%20Inc.%20Archer%20C20%20v6.0%2C%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=697119084623b1157ce32430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20045-improper-control-of-generation-of-c-188d667d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20045%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Communications%20Manager&amp;severity=high&amp;id=6971006e4623b1157cd9ee59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20109-improper-neutralization-of-input-du-a6b3791b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20109%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Packaged%20Contact%20Center%20Enterprise&amp;severity=medium&amp;id=6971006e4623b1157cd9ee65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20080-uncontrolled-resource-consumption-i-d423f81b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20080%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20Ultra-Reliable%20Wireless%20Backhaul&amp;severity=medium&amp;id=6971006e4623b1157cd9ee5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20055-improper-neutralization-of-input-du-b3818533</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20055%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Packaged%20Contact%20Center%20Enterprise&amp;severity=medium&amp;id=6971006e4623b1157cd9ee5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20092-incorrect-permission-assignment-for-1af3c810</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20092%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Cisco%20Cisco%20Intersight%20Virtual%20Appliance&amp;severity=medium&amp;id=6971006e4623b1157cd9ee62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zoom-and-gitlab-release-security-updates-fixing-rc-e398edac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zoom%20and%20GitLab%20Release%20Security%20Updates%20Fixing%20RCE%2C%20DoS%2C%20and%202FA%20Bypass%20Flaws&amp;severity=critical&amp;id=69713bc44623b1157ceb8991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1290-cwe-305-authentication-bypass-by-pri-89863ae5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1290%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Jamf%20Jamf%20Pro&amp;severity=medium&amp;id=6970f25d4623b1157cd5d8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13878-cwe-617-reachable-assertion-in-isc--1c216a54</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13878%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20BIND%209&amp;severity=high&amp;id=6970eb554623b1157cd44ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-users-targeted-with-backup-themed-phishin-67db1cb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Users%20Targeted%20With%20Backup-Themed%20Phishing%20Emails&amp;severity=medium&amp;id=6970d98e4623b1157cd042b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22022-cwe-285-improper-authorization-in-a-60a1e182</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22022%3A%20CWE-285%20Improper%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Solr&amp;severity=high&amp;id=6970dd444623b1157cd11f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22444-cwe-20-improper-input-validation-in-bf4c21cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22444%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Solr&amp;severity=high&amp;id=6970dd444623b1157cd11f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-target-macos-developers-via-m-77d77ca3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Target%20macOS%20Developers%20via%20Malicious%20VS%20Code%20Projects&amp;severity=medium&amp;id=6970d6094623b1157cce8f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-expand-abuse-of-microsoft-visual-stu-0a2ba8d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20Expand%20Abuse%20of%20Microsoft%20Visual%20Studio%20Code&amp;severity=medium&amp;id=69715f574623b1157cf35e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-identity-security-must-move-beyond-mfa-0e4b66e0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Identity%20Security%20Must%20Move%20Beyond%20MFA&amp;severity=medium&amp;id=6970c7f94623b1157ccac874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14083-improper-access-control-in-red-hat--394da9aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14083%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=6970c4ab4623b1157cca1f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-api-security-harder-to-secure--41f747f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20API%20Security%20%E2%80%93%20Harder%20to%20Secure%2C%20Impossible%20to%20Ignore&amp;severity=medium&amp;id=6970c0f14623b1157cc96abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-mcp-server-flaws-lead-to-code-execution--584d6180</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20MCP%20Server%20Flaws%20Lead%20to%20Code%20Execution%2C%20Data%20Exposure&amp;severity=medium&amp;id=6970bd6d4623b1157cc85ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-yourself-from-bluetooth-headset-tra-de46510a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20yourself%20from%20Bluetooth-headset%20tracking%20and%20the%20WhisperPair%20attack%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6970bdf44623b1157cc8e22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0988-integer-overflow-or-wraparound-in-re-0a00057a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0988%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=low&amp;id=6970bdb04623b1157cc86604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracles-first-2026-cpu-delivers-337-new-security-p-354152cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%E2%80%99s%20First%202026%20CPU%20Delivers%20337%20New%20Security%20Patches&amp;severity=medium&amp;id=6970af5d4623b1157cc435b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposure-assessment-platforms-signal-a-shift-in-fo-d5dc7dfb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposure%20Assessment%20Platforms%20Signal%20a%20Shift%20in%20Focus&amp;severity=medium&amp;id=69713bc44623b1157ceb8997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0663-cwe-1286-improper-validation-of-synt-12c4aa85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0663%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=6970ac0c4623b1157cc37dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detailed-analysis-of-lockbit-50-6cffb81d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detailed%20Analysis%20of%20LockBit%205.0&amp;severity=medium&amp;id=69715bd34623b1157cf1b95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automatic-script-execution-in-visual-studio-code-w-21b59ec5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automatic%20Script%20Execution%20In%20Visual%20Studio%20Code%2C%20(Wed%2C%20Jan%2021st)&amp;severity=medium&amp;id=6970a4d14623b1157cc128af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-6-billion-passwords-shows-stagnant-use-f7446f58</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%206%20Billion%20Passwords%20Shows%20Stagnant%20User%20Behavior&amp;severity=medium&amp;id=69709a454623b1157cbe4d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chainlit-ai-framework-flaws-enable-data-theft-via--d29fe6c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chainlit%20AI%20Framework%20Flaws%20Enable%20Data%20Theft%20via%20File%20Read%20and%20SSRF%20Bugs&amp;severity=high&amp;id=69713bc44623b1157ceb899a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-linux-malware-framework-built-with-ai-ass-35e6d54a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%20Linux%20Malware%20Framework%20Built%20with%20AI%20Assistance%20Reaches%2088%2C000%20Lines%20of%20Code&amp;severity=medium&amp;id=69713bc44623b1157ceb899d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24016-uncontrolled-search-path-element-in-22cbc1e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24016%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Fsas%20Technologies%20Inc.%20ServerView%20Agents%20for%20Windows&amp;severity=high&amp;id=697081db4623b1157cb612d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24061-cwe-88-improper-neutralization-of-a-b71077e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24061%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20GNU%20Inetutils&amp;severity=critical&amp;id=69707ad34623b1157cb426fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-warns-of-fake-maintenance-messages-target-094a80b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Warns%20of%20Fake%20Maintenance%20Messages%20Targeting%20Users%E2%80%99%20Master%20Passwords&amp;severity=medium&amp;id=69713bc44623b1157ceb89a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14559-cwe-840-in-red-hat-red-hat-build-of-f99bd5f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14559%3A%20CWE-840%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=697070494623b1157cabd775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/certcc-warns-binary-parser-bug-allows-nodejs-privi-75fd5a70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CERT%2FCC%20Warns%20binary-parser%20Bug%20Allows%20Node.js%20Privilege-Level%20Code%20Execution&amp;severity=low&amp;id=69713bc44623b1157ceb89a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1035-time-of-check-time-of-use-toctou-rac-efd74a5e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1035%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69706cf44623b1157caadc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68133-cwe-770-allocation-of-resources-wit-438f1390</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68133%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69703f0f4623b1157c7a66a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15521-cwe-639-authorization-bypass-throug-3e14deb7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15521%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kodezen%20Academy%20LMS%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Complete%20eLearning%20Solution&amp;severity=critical&amp;id=697034844623b1157c6ef998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-21-b5fc2622</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-21&amp;severity=medium&amp;id=69716d324623b1157cf762b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66960-na-3112dbf8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66960%3A%20n%2Fa&amp;severity=high&amp;id=697124574623b1157ce65285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69766-na-9df1087a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69766%3A%20n%2Fa&amp;severity=critical&amp;id=697112004623b1157ce0cb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69763-na-85537788</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69763%3A%20n%2Fa&amp;severity=critical&amp;id=697112004623b1157ce0cb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69762-na-c4c5b90b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69762%3A%20n%2Fa&amp;severity=critical&amp;id=697112004623b1157ce0cb16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66959-na-a4479d1a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66959%3A%20n%2Fa&amp;severity=high&amp;id=697112004623b1157ce0cb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70648-na-335c59fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70648%3A%20n%2Fa&amp;severity=high&amp;id=6971006e4623b1157cd9ee56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70646-na-41918022</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70646%3A%20n%2Fa&amp;severity=high&amp;id=6971006e4623b1157cd9ee53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70644-na-799a175d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70644%3A%20n%2Fa&amp;severity=high&amp;id=6971006e4623b1157cd9ee50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57681-na-c648da61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57681%3A%20n%2Fa&amp;severity=medium&amp;id=6970fced4623b1157cd8d88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70645-na-300b9da7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70645%3A%20n%2Fa&amp;severity=high&amp;id=6970f5e14623b1157cd6df2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70651-na-b5bef8ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70651%3A%20n%2Fa&amp;severity=high&amp;id=6970eedc4623b1157cd51a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70650-na-e01576e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70650%3A%20n%2Fa&amp;severity=high&amp;id=6970eedc4623b1157cd51a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-21-30f656d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-21&amp;severity=low&amp;id=6970cb7a4623b1157ccb77d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0933-cwe-20-improper-input-validation-in--e11883af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0933%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Cloudflare%20Wrangler&amp;severity=high&amp;id=69700a534623b1157c5370e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21990-easily-exploitable-vulnerability-al-286a413f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21990%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21989-easily-exploitable-vulnerability-al-cfc663e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21989%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20VM%20VirtualBox%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21988-easily-exploitable-vulnerability-al-ec6ca141</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21988%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21987-easily-exploitable-vulnerability-al-eb2c9c41</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21987%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21986-easily-exploitable-vulnerability-al-3bd5b1d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21986%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21985-easily-exploitable-vulnerability-al-5ef01372</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21985%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=696ffc4f4623b1157c51a09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21984-difficult-to-exploit-vulnerability--fe7a613a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21984%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4d4623b1157c51a085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21983-difficult-to-exploit-vulnerability--b085c980</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21983%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4d4623b1157c51a082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21982-difficult-to-exploit-vulnerability--90063dc0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21982%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20access%20to%20the%20physical%20communication%20segment%20attached%20to%20the%20hardware%20where%20the%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4d4623b1157c51a07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21981-easily-exploitable-vulnerability-al-20a5cc5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21981%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20VM%20VirtualBox%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=696ffc4d4623b1157c51a07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21980-easily-exploitable-vulnerability-al-cc1de427</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21980%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Central%20Coding.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20Central%20Coding%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20Central%20Coding%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Central%20Coding&amp;severity=medium&amp;id=696ffc4d4623b1157c51a079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21979-easily-exploitable-vulnerability-al-f3da128b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21979%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service%20executes%20to%20compromise%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service&amp;severity=medium&amp;id=696ffc4d4623b1157c51a076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21978-easily-exploitable-vulnerability-al-7b80eadc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21978%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20FLEXCUBE%20Universal%20Banking.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20FLEXCUBE%20Universal%20Banking%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20FLEXCUBE%20Universal%20Banking&amp;severity=medium&amp;id=696ffc4d4623b1157c51a073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21977-difficult-to-exploit-vulnerability--22d07212</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21977%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Oracle%20Zero%20Data%20Loss%20Recovery%20Appliance%20Software.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Zero%20Data%20Loss%20Recovery%20Appliance%20Software%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Zero%20Data%20Loss%20Recovery%20Appliance%20Software&amp;severity=low&amp;id=696ffc4d4623b1157c51a070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21976-easily-exploitable-vulnerability-al-8b9d1d4a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21976%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Business%20Intelligence%20Enterprise%20Edition&amp;severity=high&amp;id=696ffc4d4623b1157c51a06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21975-easily-exploitable-vulnerability-al-ed4d81df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21975%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20Authenticated%20User%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Java%20VM.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Java%20VM.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=696ffc4d4623b1157c51a06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21974-easily-exploitable-vulnerability-al-3981a982</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21974%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Central%20Designer.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20Central%20Designer%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Central%20Designer&amp;severity=medium&amp;id=696ffc4c4623b1157c519ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21973-easily-exploitable-vulnerability-al-c1c5c53b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21973%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20FLEXCUBE%20Investor%20Servicing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20FLEXCUBE%20Investor%20Servicing%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20FLEXCUBE%20Investor%20Servicing%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20FLEXCUBE%20Investor%20Servicing&amp;severity=high&amp;id=696ffc4c4623b1157c519ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21972-easily-exploitable-vulnerability-al-cae52fe2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21972%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Configurator.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Configurator%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Configurator&amp;severity=medium&amp;id=696ffc4c4623b1157c519fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21971-easily-exploitable-vulnerability-al-b2d0c287</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21971%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20SCM%20Purchasing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20SCM%20Purchasing%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20SCM%20Purchasing%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20SCM%20Purchasing&amp;severity=medium&amp;id=696ffc4c4623b1157c519feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21970-easily-exploitable-vulnerability-al-786618a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21970%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Central%20Designer.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Life%20Sciences%20Central%20Designer%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Central%20Designer&amp;severity=medium&amp;id=696ffc4c4623b1157c519fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21969-easily-exploitable-vulnerability-al-f836f94b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21969%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process.%20in%20Oracle%20Corporation%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process&amp;severity=critical&amp;id=696ffc4c4623b1157c519fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21968-easily-exploitable-vulnerability-al-34ab7cdd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21968%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4c4623b1157c519fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21967-easily-exploitable-vulnerability-al-d0405106</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21967%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hospitality%20OPERA%205.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Hospitality%20OPERA%205%20accessible%20data%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Hospitality%20OPERA%205%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Hospitality%20OPERA%205.%20in%20Oracle%20Corporation%20Oracle%20Hospitality%20OPERA%205&amp;severity=high&amp;id=696ffc4c4623b1157c519fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21966-easily-exploitable-vulnerability-al-3baff4ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21966%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hospitality%20OPERA%205%20Property%20Services.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Hospitality%20OPERA%205%20Property%20Services%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Hospitality%20OPERA%205%20Property%20Services%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Hospitality%20OPERA%205%20Property%20Services%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Hospitality%20OPERA%205%20Property%20Services&amp;severity=medium&amp;id=696ffc4c4623b1157c519fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21965-easily-exploitable-vulnerability-al-5dc370b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21965%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=696ffc4c4623b1157c519fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21964-easily-exploitable-vulnerability-al-ab1f98c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21964%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4b4623b1157c519fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21963-easily-exploitable-vulnerability-al-23f0f479</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21963%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=696ffc4b4623b1157c519fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21962-easily-exploitable-vulnerability-al-87e0e7b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21962%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in&amp;severity=critical&amp;id=696ffc4b4623b1157c519fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21961-easily-exploitable-vulnerability-al-c4d94fc6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21961%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources&amp;severity=medium&amp;id=696ffc4b4623b1157c519fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21960-easily-exploitable-vulnerability-al-8e5d871b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21960%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20DBA.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Applications%20DBA%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Applications%20DBA%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20DBA&amp;severity=medium&amp;id=696ffc4b4623b1157c519fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21959-easily-exploitable-vulnerability-al-c3eda9fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21959%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Workflow.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Workflow%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Workflow&amp;severity=medium&amp;id=696ffc4b4623b1157c519fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21957-difficult-to-exploit-vulnerability--b0ec6a45</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21957%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4b4623b1157c519fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21956-easily-exploitable-vulnerability-al-d46e3980</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21956%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4b4623b1157c519fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21955-easily-exploitable-vulnerability-al-6d6f1151</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21955%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4b4623b1157c519fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21952-easily-exploitable-vulnerability-al-b8d00778</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21952%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4b4623b1157c519fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21951-easily-exploitable-vulnerability-al-9c73b57a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21951%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=696ffc4a4623b1157c519f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21950-easily-exploitable-vulnerability-al-998ddc55</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21950%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4a4623b1157c519f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21949-easily-exploitable-vulnerability-al-b4e8290c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21949%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4a4623b1157c519f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21948-easily-exploitable-vulnerability-al-17cd5ac9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21948%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4a4623b1157c519f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21947-difficult-to-exploit-vulnerability--51063da3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21947%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=696ffc4a4623b1157c519f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21946-easily-exploitable-vulnerability-al-f91d44d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21946%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20JD%20Edwards%20EnterpriseOne%20Tools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=medium&amp;id=696ffc4a4623b1157c519f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21945-easily-exploitable-vulnerability-al-3aefbf11</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21945%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=696ffc4a4623b1157c519f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21944-easily-exploitable-vulnerability-al-427f26da</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21944%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process&amp;severity=medium&amp;id=696ffc4a4623b1157c519f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21943-easily-exploitable-vulnerability-al-e2645c5d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21943%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Scripting.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Scripting%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Scripting%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Scripting%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Scripting&amp;severity=medium&amp;id=696ffc4a4623b1157c519f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21942-easily-exploitable-vulnerability-al-522a29a9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21942%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=696ffc4a4623b1157c519f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21941-easily-exploitable-vulnerability-al-3c3d825b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21941%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc494623b1157c519f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21940-easily-exploitable-vulnerability-al-7135a85d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21940%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20PLM.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Agile%20PLM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Agile%20PLM&amp;severity=high&amp;id=696ffc494623b1157c519f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21939-difficult-to-exploit-vulnerability--10be1e95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21939%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20SQLcl%20executes%20to%20compromise%20SQLcl.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20SQLcl.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=696ffc494623b1157c519f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21938-easily-exploitable-vulnerability-al-d62e44cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21938%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=696ffc494623b1157c519f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21937-easily-exploitable-vulnerability-al-4ea13844</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21937%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc494623b1157c519f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21936-easily-exploitable-vulnerability-al-db4bee02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21936%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=696ffc494623b1157c519f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21935-easily-exploitable-vulnerability-al-b9eae403</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21935%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Solaris%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Solaris%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=696ffc494623b1157c519f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21934-easily-exploitable-vulnerability-al-c9ca5c3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21934%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=696ffc494623b1157c519f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21933-easily-exploitable-vulnerability-al-09eb3f5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21933%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=696ffc494623b1157c519f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21932-easily-exploitable-vulnerability-al-84389f17</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21932%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=696ffc494623b1157c519f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21931-easily-exploitable-vulnerability-al-5ed98fbe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21931%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20APEX%20Sample%20Applications.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20APEX%20Sample%20Applications%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20APEX%20Sample%20Applications%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20APEX%20Sample%20Applications%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20APEX%20Sample%20Applications&amp;severity=medium&amp;id=696ffc484623b1157c519f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21930-easily-exploitable-vulnerability-al-5f87bd1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21930%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20ZFS%20Storage%20Appliance%20Kit%20executes%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=low&amp;id=696ffc484623b1157c519f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21929-difficult-to-exploit-vulnerability--e538a1ad</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21929%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc484623b1157c519f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21928-easily-exploitable-vulnerability-al-e5fdbde0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21928%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20TCP%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Solaris%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=696ffc484623b1157c519f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21927-easily-exploitable-vulnerability-al-186325f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21927%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Solaris%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Solaris%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=696ffc484623b1157c519f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21926-easily-exploitable-vulnerability-al-99676c7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21926%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20TLS%20to%20compromise%20Siebel%20CRM%20Deployment.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Siebel%20CRM%20Deployment.%20in%20Oracle%20Corporation%20Siebel%20CRM%20Deployment&amp;severity=high&amp;id=696ffc484623b1157c519f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21925-difficult-to-exploit-vulnerability--7c5f6502</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21925%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=696ffc484623b1157c519f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21924-easily-exploitable-vulnerability-al-085bfeae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21924%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Utilities%20Application%20Framework.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Utilities%20Application%20Framework%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Utilities%20Application%20Framework%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Utilities%20Application%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Utilities%20Application%20Framework&amp;severity=medium&amp;id=696ffc484623b1157c519f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21923-easily-exploitable-vulnerability-al-7a0c01f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21923%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Central%20Designer.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20Central%20Designer%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20Central%20Designer%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Central%20Designer&amp;severity=medium&amp;id=696ffc484623b1157c519f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21922-easily-exploitable-vulnerability-al-778abe53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21922%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service%20executes%20to%20compromise%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service&amp;severity=medium&amp;id=696ffc484623b1157c519f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0672-cwe-93-in-python-software-foundation-cb778f2f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0672%3A%20CWE-93%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ffc4f4623b1157c51a0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15367-cwe-77-improper-neutralization-of-s-e14cec26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15367%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff8c24623b1157c513cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15366-cwe-77-improper-neutralization-of-s-c3bc02df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15366%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff8c24623b1157c513cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58744-cwe-1392-use-of-default-credentials-e4ae3bf3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58744%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Milner%20ImageDirector%20Capture&amp;severity=medium&amp;id=696ff8c24623b1157c513d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58743-cwe-327-use-of-a-broken-or-risky-cr-287c36b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58743%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Milner%20ImageDirector%20Capture&amp;severity=high&amp;id=696ff8c24623b1157c513d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58742-cwe-522-insufficiently-protected-cr-a9461b24</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58742%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Milner%20ImageDirector%20Capture&amp;severity=high&amp;id=696ff8c24623b1157c513d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58741-cwe-522-insufficiently-protected-cr-90b50c7b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58741%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Milner%20ImageDirector%20Capture&amp;severity=high&amp;id=696ff8c24623b1157c513d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58740-cwe-321-use-of-hard-coded-cryptogra-5bd55c1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58740%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Milner%20ImageDirector%20Capture&amp;severity=high&amp;id=696ff8c24623b1157c513d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15282-cwe-93-in-python-software-foundatio-2d93208e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15282%3A%20CWE-93%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff8c24623b1157c513cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0865-cwe-74-improper-neutralization-of-sp-9ee85127</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0865%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff53d4623b1157c50c98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11468-vulnerability-in-python-software-fo-fdd11c16</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11468%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff1b84623b1157c50674b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21642-vulnerability-in-revive-revive-adse-240357fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21642%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=696fee344623b1157c4ffe99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21664-vulnerability-in-revive-revive-adse-087d7668</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21664%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=696fee344623b1157c4ffe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21663-vulnerability-in-revive-revive-adse-33a353f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21663%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=696fee344623b1157c4ffe9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21640-vulnerability-in-revive-revive-adse-c0751329</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21640%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=low&amp;id=696fee344623b1157c4ffe93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21641-vulnerability-in-revive-revive-adse-21c80503</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21641%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=696fee344623b1157c4ffe96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21636-vulnerability-in-nodejs-node-744e621d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21636%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=696feab04623b1157c4e3b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59466-vulnerability-in-nodejs-node-871b635d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59466%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=696feab04623b1157c4e3b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55132-vulnerability-in-nodejs-node-10f44743</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55132%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=696feab04623b1157c4e3b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59464-vulnerability-in-nodejs-node-b2db4c87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59464%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=696feab04623b1157c4e3b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55131-vulnerability-in-nodejs-node-816d9968</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55131%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=696feab04623b1157c4e3b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55130-vulnerability-in-nodejs-node-92974a3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55130%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=696feab04623b1157c4e3b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21637-vulnerability-in-nodejs-node-015df57b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21637%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=696feab04623b1157c4e3b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59465-vulnerability-in-nodejs-node-7a6d1e9c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59465%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=696feab04623b1157c4e3b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0622-cwe-798-use-of-hard-coded-credential-98c12f6e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0622%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20NewPlane%20open5GS&amp;severity=medium&amp;id=696fe03c4623b1157c4c7680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eu-plans-phase-out-of-high-risk-telecom-suppliers--7a3bbb82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EU%20Plans%20Phase%20Out%20of%20High%20Risk%20Telecom%20Suppliers%2C%20in%20Proposals%20Seen%20as%20Targeting%20China&amp;severity=high&amp;id=696fdff14623b1157c4c655a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-hackers-target-developers-via-m-823eb1ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Linked%20Hackers%20Target%20Developers%20via%20Malicious%20VS%20Code%20Projects&amp;severity=medium&amp;id=697042a44623b1157c81b943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33231-cwe-427-uncontrolled-search-path-el-831f1a30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33231%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20CUDA%20Toolkit&amp;severity=medium&amp;id=696fc4054623b1157c437288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33230-cwe-78-improper-neutralization-of-s-4a0c844f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33230%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20CUDA%20Toolkit&amp;severity=high&amp;id=696fc4054623b1157c437283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-multi-stage-windows-malware-campaign-f45533e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20Multi-Stage%20Windows%20Malware%20Campaign&amp;severity=medium&amp;id=696fc78c4623b1157c44328d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33229-cwe-427-uncontrolled-search-path-el-abeb2425</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33229%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20CUDA%20Toolkit&amp;severity=high&amp;id=696fc0884623b1157c42b9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33228-cwe-78-improper-neutralization-of-s-bca140b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33228%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20CUDA%20Toolkit&amp;severity=high&amp;id=696fc0884623b1157c42b9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33233-cwe-94-improper-control-of-generati-8007c869</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33233%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Merlin%20Transformers4Rec&amp;severity=high&amp;id=696fc0884623b1157c42b9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36419-cwe-550-server-generated-error-mess-68da459e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36419%3A%20CWE-550%20Server-generated%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20ApplinX&amp;severity=medium&amp;id=696fa7e44623b1157c3d36b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36418-cwe-347-improper-verification-of-cr-4bfcf813</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36418%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20IBM%20ApplinX&amp;severity=high&amp;id=696fa7e44623b1157c3d36b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36411-cwe-352-cross-site-request-forgery--09ab87fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36411%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20ApplinX&amp;severity=low&amp;id=696fa4614623b1157c3ca9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36410-cwe-602-client-side-enforcement-of--3daf47d0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36410%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20ApplinX&amp;severity=low&amp;id=696fa4614623b1157c3ca99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36409-cwe-79-improper-neutralization-of-i-1104e2ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36409%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20ApplinX&amp;severity=medium&amp;id=696fa4614623b1157c3ca99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36408-cwe-79-improper-neutralization-of-i-47614318</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36408%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20ApplinX&amp;severity=medium&amp;id=696fa4614623b1157c3ca998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36397-cwe-80-improper-neutralization-of-s-1ea05f87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36397%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Application%20Gateway&amp;severity=medium&amp;id=696fa0dc4623b1157c3be2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36396-cwe-79-improper-neutralization-of-i-a1375ab9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Application%20Gateway&amp;severity=medium&amp;id=696fa0dc4623b1157c3be2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36115-cwe-384-session-fixation-in-ibm-ste-6e3effef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36115%3A%20CWE-384%20Session%20Fixation%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696fa0dc4623b1157c3be2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36113-cwe-79-improper-neutralization-of-i-b37e645e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36113%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696f9d594623b1157c3b500c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36066-cwe-79-improper-neutralization-of-i-61acc7dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36066%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696f9d594623b1157c3b5008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36065-cwe-613-insufficient-session-expira-84eab96e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36065%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696f9d594623b1157c3b5004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36063-cwe-613-insufficient-session-expira-8b06691f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36063%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696f9d594623b1157c3b5000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36058-cwe-538-insertion-of-sensitive-info-621430b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36058%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20IBM%20Business%20Automation%20Workflow%20containers&amp;severity=medium&amp;id=696f9d594623b1157c3b4ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36059-cwe-250-execution-with-unnecessary--cb28676c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36059%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Business%20Automation%20Workflow%20containers&amp;severity=medium&amp;id=696f9d594623b1157c3b4ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33015-cwe-434-unrestricted-upload-of-file-ab0f1575</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33015%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20Concert&amp;severity=high&amp;id=696f9d594623b1157c3b4ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1722-cwe-244-improper-clearing-of-heap-me-64a1026e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1722%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=696fab6a4623b1157c3dc078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1719-cwe-244-improper-clearing-of-heap-me-59acc0a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1719%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=696fab6a4623b1157c3dc075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14115-cwe-798-use-of-hard-coded-credentia-54544291</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14115%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Sterling%20Connect%3ADirect%20for%20UNIX%20Container&amp;severity=high&amp;id=696fa7e44623b1157c3d36ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13925-cwe-532-insertion-of-sensitive-info-671f1d95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13925%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Aspera%20Console&amp;severity=medium&amp;id=696fa4614623b1157c3ca9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12985-cwe-732-incorrect-permission-assign-33cf65e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12985%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20IBM%20Licensing%20Operator&amp;severity=high&amp;id=696f99d64623b1157c3aa443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54817-cwe-79-improper-neutralization-of-i-ad569384</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54817%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53516-cwe-79-improper-neutralization-of-i-c83bec1e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53516%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54495-cwe-79-improper-neutralization-of-i-f08a9420</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54495%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54157-cwe-79-improper-neutralization-of-i-a10ac56a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54157%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54778-cwe-79-improper-neutralization-of-i-9b9b1f5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54778%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46270-cwe-79-improper-neutralization-of-i-5dc7a4f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46270%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55071-cwe-79-improper-neutralization-of-i-3b53f97d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55071%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54852-cwe-79-improper-neutralization-of-i-efc4e67a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54852%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54814-cwe-79-improper-neutralization-of-i-15e94dee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54814%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54861-cwe-79-improper-neutralization-of-i-c9e24a0a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54861%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57881-cwe-79-improper-neutralization-of-i-ce23c5b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57881%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58080-cwe-79-improper-neutralization-of-i-85f3cea8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58080%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53854-cwe-79-improper-neutralization-of-i-857489eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53854%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57787-cwe-79-improper-neutralization-of-i-43b16ee1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57787%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53707-cwe-79-improper-neutralization-of-i-e5a2da59</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53707%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54853-cwe-79-improper-neutralization-of-i-38cf8451</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54853%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57786-cwe-79-improper-neutralization-of-i-d2916df0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57786%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44000-cwe-79-improper-neutralization-of-i-15b3c7f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44000%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58095-cwe-79-improper-neutralization-of-i-515298bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58095%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58094-cwe-79-improper-neutralization-of-i-57115763</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58094%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58093-cwe-79-improper-neutralization-of-i-b90c1369</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58093%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58092-cwe-79-improper-neutralization-of-i-36aa0151</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58092%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58091-cwe-79-improper-neutralization-of-i-bf91f2ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58091%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58090-cwe-79-improper-neutralization-of-i-c335cb63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58090%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58089-cwe-79-improper-neutralization-of-i-a2507d1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58089%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58088-cwe-79-improper-neutralization-of-i-ea4cde92</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58088%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58087-cwe-79-improper-neutralization-of-i-3912417d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58087%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36556-cwe-79-improper-neutralization-of-i-b810fcbe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36556%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53912-cwe-73-external-control-of-file-nam-360f8c62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53912%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=critical&amp;id=696f99d64623b1157c3aa458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0554-cwe-862-missing-authorization-in-wpd-e2a85e55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0554%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20NotificationX%20%E2%80%93%20FOMO%2C%20Live%20Sales%20Notification%2C%20WooCommerce%20Sales%20Popup%2C%20GDPR%2C%20Social%20Proof%2C%20Announcement%20Banner%20%26%20Floating%20Notification%20Bar&amp;severity=medium&amp;id=696f99da4623b1157c3aa4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15380-cwe-79-improper-neutralization-of-i-eece158f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15380%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20NotificationX%20%E2%80%93%20FOMO%2C%20Live%20Sales%20Notification%2C%20WooCommerce%20Sales%20Popup%2C%20GDPR%2C%20Social%20Proof%2C%20Announcement%20Banner%20%26%20Floating%20Notification%20Bar&amp;severity=high&amp;id=696f99da4623b1157c3aa4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0608-cwe-79-improper-neutralization-of-in-caf468e9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Head%20Meta%20Data&amp;severity=medium&amp;id=696f99da4623b1157c3aa4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15347-cwe-862-missing-authorization-in-ge-101457d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15347%3A%20CWE-862%20Missing%20Authorization%20in%20getwpfunnels%20Creator%20LMS%20%E2%80%93%20Online%20Courses%20and%20eLearning%20Plugin&amp;severity=high&amp;id=696f99da4623b1157c3aa4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15043-cwe-862-missing-authorization-in-st-39a4c2fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15043%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=696f99da4623b1157c3aa4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0690-cwe-79-improper-neutralization-of-in-87ab9f23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flatboy%20FlatPM%20%E2%80%93%20Ad%20Manager%2C%20AdSense%20and%20Custom%20Code&amp;severity=medium&amp;id=696fd2e84623b1157c48f85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0548-cwe-862-missing-authorization-in-the-f215f582</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0548%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=696fd2e84623b1157c48f856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0726-cwe-502-deserialization-of-untrusted-1ef0db0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0726%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20posimyththemes%20Nexter%20Extension%20%E2%80%93%20Security%2C%20Performance%2C%20Code%20Snippets%20%26%20Site%20Toolkit&amp;severity=high&amp;id=696fd2e84623b1157c48f867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chainlit-vulnerabilities-may-leak-sensitive-inform-766fd2bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chainlit%20Vulnerabilities%20May%20Leak%20Sensitive%20Information&amp;severity=medium&amp;id=696f8f154623b1157c388ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9283-cwe-400-uncontrolled-resource-consum-6bc05e45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9283%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c38995d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9282-cwe-400-uncontrolled-resource-consum-84b369f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9282%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c38995a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9281-cwe-400-uncontrolled-resource-consum-227ba6ff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9281%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c389957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22844-cwe-78-improper-neutralization-of-s-f111d1cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22844%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Node&amp;severity=critical&amp;id=696f8f574623b1157c389960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9280-cwe-400-uncontrolled-resource-consum-d9de11aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9280%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c389954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14027-cwe-401-missing-release-of-memory-a-248db821</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14027%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Rockwell%20Automation%20ControlLogix%C2%AE%20Redundancy%20Enhanced%20Module&amp;severity=high&amp;id=696f8f574623b1157c38994b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9279-cwe-400-uncontrolled-resource-consum-f70cf7ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9279%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c389951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9278-cwe-400-uncontrolled-resource-consum-796b063b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9278%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c38994e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-flaws-in-anthropic-mcp-git-server-enable-fil-7e6f95b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20Flaws%20in%20Anthropic%20MCP%20Git%20Server%20Enable%20File%20Access%20and%20Code%20Execution&amp;severity=medium&amp;id=697042a44623b1157c81b946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9466-cwe-400-uncontrolled-resource-consum-6df0d75b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9466%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8bc44623b1157c380871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11743-cwe-1284-improper-validation-of-spe-9dedfa1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11743%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Rockwell%20Automation%20CompactLogix%C2%AE%205370&amp;severity=high&amp;id=696f8bc44623b1157c380868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9465-cwe-400-uncontrolled-resource-consum-44efe858</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9465%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8bc44623b1157c38086e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9464-cwe-400-uncontrolled-resource-consum-0917fda7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9464%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8bc44623b1157c38086b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-linkedin-messages-to-spread-rat-malwar-306504ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20LinkedIn%20Messages%20to%20Spread%20RAT%20Malware%20Through%20DLL%20Sideloading&amp;severity=medium&amp;id=697042a44623b1157c81b949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15281-cwe-908-use-of-uninitialized-resour-e8ed20c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15281%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=696f88404623b1157c375430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14377-cwe-312-cleartext-storage-of-sensit-e65ecda4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14377%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Rockwell%20Automation%20Verve%20Asset%20Manager&amp;severity=high&amp;id=696f88404623b1157c37542d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14376-cwe-922-insecure-storage-of-sensiti-d3acf0e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14376%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Rockwell%20Automation%20Verve%20Asset%20Manager&amp;severity=high&amp;id=696f88404623b1157c37542a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1180-server-side-request-forgery-ssrf-in--ef903439</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1180%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=696f7db44623b1157c343c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41081-79-in-zuinq-studio-ismygym-b2bdda51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41081%3A%2079%20in%20Zuinq%20Studio%20IsMyGym&amp;severity=medium&amp;id=696f733b4623b1157c323b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-grade-pdfsider-malware-used-by-ransomware-grou-0bab322b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT-Grade%20PDFSider%20Malware%20Used%20by%20Ransomware%20Groups&amp;severity=critical&amp;id=696f72f54623b1157c323102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1183-cwe-79-improper-neutralization-of-in-40b6fe9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Botble%20TransP&amp;severity=medium&amp;id=696f733b4623b1157c323b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-hidden-risk-of-orphan-accounts-ee7b1657</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Hidden%20Risk%20of%20Orphan%20Accounts&amp;severity=medium&amp;id=697042a44623b1157c81b94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40679-cwe-79-improper-neutralization-of-i-07d15956</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40679%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bdtask%20Isshue&amp;severity=medium&amp;id=696f6fa34623b1157c31ae77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14369-cwe-190-integer-overflow-or-wraparo-204ea851</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14369%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20mackron%20dr_flac&amp;severity=medium&amp;id=696f6fa34623b1157c31ae7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evelyn-stealer-malware-abuses-vs-code-extensions-t-ff049e88</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evelyn%20Stealer%20Malware%20Abuses%20VS%20Code%20Extensions%20to%20Steal%20Developer%20Credentials%20and%20Crypto&amp;severity=medium&amp;id=697042a44623b1157c81b94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40644-cwe-79-improper-neutralization-of-i-75d28e09</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Riftzilla%20QRGen&amp;severity=medium&amp;id=696f6c204623b1157c2f9b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-fixes-acme-validation-bug-allowing-waf--2d0bd150</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Fixes%20ACME%20Validation%20Bug%20Allowing%20WAF%20Bypass%20to%20Origin%20Servers&amp;severity=low&amp;id=697042a44623b1157c81b952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weaponized-invite-enabled-calendar-data-theft-via--7f6db054</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weaponized%20Invite%20Enabled%20Calendar%20Data%20Theft%20via%20Google%20Gemini&amp;severity=low&amp;id=696f61614623b1157c2d8570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-secrets-in-javascript-bundles-are-still-being--933f5cc0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Secrets%20in%20JavaScript%20Bundles%20are%20Still%20Being%20Missed&amp;severity=low&amp;id=697042a44623b1157c81b955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/add-punycode-to-your-threat-hunting-routine-tue-ja-4049a96c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Add%20Punycode%20to%20your%20Threat%20Hunting%20Routine%2C%20(Tue%2C%20Jan%2020th)&amp;severity=medium&amp;id=696f53534623b1157c2a1bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-evidence-that-the-era-of-advanced-ai-gene-2663b4cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%3A%20Evidence%20That%20the%20Era%20of%20Advanced%20AI-Generated%20Malware%20Has%20Begun&amp;severity=high&amp;id=696f4c7d4623b1157c2840d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14533-cwe-269-improper-privilege-manageme-27146680</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14533%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20hwk-fr%20Advanced%20Custom%20Fields%3A%20Extended&amp;severity=critical&amp;id=696f4c7c4623b1157c28405e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41084-cwe-79-improper-neutralization-of-i-78137fbc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SESAME%20LABS%20S.L%20Sesame&amp;severity=medium&amp;id=696f48f94623b1157c2703fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-nomad-leopard-targeted-spear-phishing-ca-67a5880d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Nomad%20Leopard%3A%20Targeted%20Spear-Phishing%20Campaign%20Against%20Government%20Entities%20in%20Afghanistan&amp;severity=medium&amp;id=696f45734623b1157c251817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-covert-access-weaponized-lnk-based-spear-9fbfc26b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Covert%20Access%3A%20Weaponized%20LNK-Based%20Spear-Phishing%20Targeting%20Argentina&apos;s%20Judicial%20Sector%20to%20Deploy%20a%20Covert%20RAT&amp;severity=medium&amp;id=696f41ef4623b1157c23df6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-extension-to-infection-an-in-depth-analysis-o-9add08a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Extension%20to%20Infection%3A%20An%20In-Depth%20Analysis%20of%20the%20Evelyn%20Stealer%20Campaign%20Targeting%20Software%20Developers&amp;severity=medium&amp;id=696f41ef4623b1157c23df7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41768-cwe-79-improper-neutralization-of-i-bde1a0cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41768%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Beckhoff%20Automation%20TwinCAT.HMI.Server&amp;severity=medium&amp;id=696f3ae84623b1157c221ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tudou-guarantee-marketplace-halts-telegram-transac-88a0abce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tudou%20Guarantee%20Marketplace%20Halts%20Telegram%20Transactions%20After%20Processing%20Over%20%2412%20Billion&amp;severity=low&amp;id=697042a44623b1157c81b958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0895-cwe-502-deserialization-of-untrusted-eeaff6f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0895%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20TYPO3%20Extension%20%22Mailqueue%22&amp;severity=medium&amp;id=696f305c4623b1157c1fe251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66523-cwe-79-improper-neutralization-of-i-8abb25b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66523%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20na1.foxitesign.foxit.com&amp;severity=medium&amp;id=696f29544623b1157c1d8b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1223-cwe-522-insufficiently-protected-cre-7fa74124</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1223%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20BROWAN%20COMMUNICATIONS%20PrismX%20MX100%20AP%20controller&amp;severity=medium&amp;id=696f25d04623b1157c1cfd10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1222-cwe-434-unrestricted-upload-of-file--6c68ee5e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1222%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20BROWAN%20COMMUNICATIONS%20PrismX%20MX100%20AP%20controller&amp;severity=high&amp;id=696f25d04623b1157c1cfd0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1221-cwe-798-use-of-hard-coded-credential-3c079632</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1221%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20BROWAN%20COMMUNICATIONS%20PrismX%20MX100%20AP%20controller&amp;severity=critical&amp;id=696f25d04623b1157c1cfd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12573-cwe-862-missing-authorization-in-bo-7eb7f990</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12573%3A%20CWE-862%20Missing%20Authorization%20in%20Bookingor&amp;severity=medium&amp;id=696f1ec84623b1157c1b768d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1218-xml-external-entity-reference-in-bjs-fce5ca1c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1218%3A%20XML%20External%20Entity%20Reference%20in%20Bjskzy%20Zhiyou%20ERP&amp;severity=medium&amp;id=696f143c4623b1157c18a4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1042-cwe-79-improper-neutralization-of-in-e82bc02a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1042%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20norcross%20WP%20Hello%20Bar&amp;severity=medium&amp;id=696f143c4623b1157c18a4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1045-cwe-79-improper-neutralization-of-in-dbd41b33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nhomcaodem%20Viet%20contact&amp;severity=medium&amp;id=696f143c4623b1157c18a4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14348-cwe-285-improper-authorization-in-w-bd6da9de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14348%3A%20CWE-285%20Improper%20Authorization%20in%20wedevs%20weMail%3A%20Email%20Marketing%2C%20Email%20Automation%2C%20Newsletters%2C%20Subscribers%20%26%20Email%20Optins%20for%20WooCommerce&amp;severity=medium&amp;id=696f09b14623b1157c16d2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14977-cwe-284-improper-access-control-in--1cc76d8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14977%3A%20CWE-284%20Improper%20Access%20Control%20in%20dokaninc%20Dokan%3A%20AI%20Powered%20WooCommerce%20Multivendor%20Marketplace%20Solution%20%E2%80%93%20Build%20Your%20Own%20Amazon%2C%20eBay%2C%20Etsy&amp;severity=high&amp;id=696f09b14623b1157c16d2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0908-use-after-free-in-google-chrome-efb532a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0908%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=696f02a94623b1157c1371df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0907-incorrect-security-ui-in-google-chro-bf30fd0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0907%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=critical&amp;id=696f02a94623b1157c1371db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0906-incorrect-security-ui-in-google-chro-8a76b9b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0906%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=critical&amp;id=696f02a94623b1157c1371d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0905-insufficient-policy-enforcement-in-g-39f68743</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0905%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=critical&amp;id=696f02a94623b1157c1371d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0904-incorrect-security-ui-in-google-chro-69280570</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0904%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=696f02a94623b1157c1371cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0903-insufficient-validation-of-untrusted-54774e87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0903%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=696f02a94623b1157c1371cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0902-inappropriate-implementation-in-goog-859e95f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0902%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=696f02a94623b1157c1371c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0901-inappropriate-implementation-in-goog-61e02cfc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0901%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=696f02a94623b1157c1371c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0900-inappropriate-implementation-in-goog-861f579a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0900%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=696f02a94623b1157c1371bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0899-out-of-bounds-memory-access-in-googl-da67c015</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0899%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=696f02a94623b1157c1371bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14798-cwe-862-missing-authorization-in-th-8a10d4f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14798%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=696eff234623b1157c12c80f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14351-cwe-862-missing-authorization-in-br-323247da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14351%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20Custom%20Fonts%20%E2%80%93%20Host%20Your%20Fonts%20Locally&amp;severity=medium&amp;id=696eff234623b1157c12c80a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1051-cwe-352-cross-site-request-forgery-c-df41460c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1051%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20satollo%20Newsletter%20%E2%80%93%20Send%20awesome%20emails%20from%20WordPress&amp;severity=medium&amp;id=696edf804623b1157ce5dbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14978-cwe-862-missing-authorization-in-pe-a5b54227</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14978%3A%20CWE-862%20Missing%20Authorization%20in%20peachpay%20PeachPay%20%E2%80%94%20Payments%20%26%20Express%20Checkout%20for%20WooCommerce%20(supports%20Stripe%2C%20PayPal%2C%20Square%2C%20Authorize.net%2C%20NMI)&amp;severity=medium&amp;id=696edf804623b1157ce5dbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1203-improper-authentication-in-crmeb-720d3e24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1203%3A%20Improper%20Authentication%20in%20CRMEB&amp;severity=medium&amp;id=696ed8794623b1157ce40baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1202-improper-authentication-in-crmeb-3ada72fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1202%3A%20Improper%20Authentication%20in%20CRMEB&amp;severity=medium&amp;id=696ed8794623b1157ce40ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23950-cwe-176-improper-handling-of-unicod-6c92c833</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23950%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20isaacs%20node-tar&amp;severity=high&amp;id=696ed8794623b1157ce40bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23949-cwe-22-improper-limitation-of-a-pat-bf009faf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23949%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jaraco%20jaraco.context&amp;severity=high&amp;id=696ed1704623b1157cdcb267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1197-information-disclosure-in-mineadmin-1dfdacd5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1197%3A%20Information%20Disclosure%20in%20MineAdmin&amp;severity=low&amp;id=696ed1704623b1157cdcb25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1196-information-disclosure-in-mineadmin-ab931eb7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1196%3A%20Information%20Disclosure%20in%20MineAdmin&amp;severity=low&amp;id=696ed1704623b1157cdcb257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23947-cwe-77-improper-neutralization-of-s-06e21c4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23947%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20orval-labs%20orval&amp;severity=critical&amp;id=696ed1704623b1157cdcb263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1195-insufficient-verification-of-data-au-9dcf731e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1195%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20MineAdmin&amp;severity=low&amp;id=696ed1704623b1157cdcb251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-20-53ae9522</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-20&amp;severity=medium&amp;id=69701bb24623b1157c582d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63648-na-1a1c0bc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63648%3A%20n%2Fa&amp;severity=high&amp;id=696ff1b84623b1157c50675d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63647-na-96cf075e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63647%3A%20n%2Fa&amp;severity=high&amp;id=696ff1b84623b1157c506758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57156-na-abe6d93a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57156%3A%20n%2Fa&amp;severity=high&amp;id=696ff1b84623b1157c506753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57155-na-40748d36</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57155%3A%20n%2Fa&amp;severity=high&amp;id=696ff1b84623b1157c50674f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66902-na-63e61a49</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66902%3A%20n%2Fa&amp;severity=high&amp;id=696fe72e4623b1157c4db15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66692-na-84b035d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66692%3A%20n%2Fa&amp;severity=high&amp;id=696fe72e4623b1157c4db157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66803-na-c06459c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66803%3A%20n%2Fa&amp;severity=medium&amp;id=696fce914623b1157c4804ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56005-na-86fb57c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56005%3A%20n%2Fa&amp;severity=critical&amp;id=696fcb0c4623b1157c474bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67263-na-6f842cbf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67263%3A%20n%2Fa&amp;severity=medium&amp;id=696fc4054623b1157c43728d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67261-na-4adc5829</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67261%3A%20n%2Fa&amp;severity=medium&amp;id=696fc0884623b1157c42b9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55423-na-531d2084</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55423%3A%20n%2Fa&amp;severity=critical&amp;id=696fc0884623b1157c42b9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56353-na-32df9eef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56353%3A%20n%2Fa&amp;severity=high&amp;id=696fa4614623b1157c3ca9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67824-na-9538daad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67824%3A%20n%2Fa&amp;severity=medium&amp;id=696fa0dc4623b1157c3be2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65482-na-7f36f5b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65482%3A%20n%2Fa&amp;severity=critical&amp;id=696fa0dc4623b1157c3be2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64087-na-310a1f67</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64087%3A%20n%2Fa&amp;severity=critical&amp;id=696f9d594623b1157c3b500f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-20-ef3981cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-20&amp;severity=low&amp;id=696f22164623b1157c1c2079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1194-information-disclosure-in-mineadmin-3c889f08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1194%3A%20Information%20Disclosure%20in%20MineAdmin&amp;severity=medium&amp;id=696ebfdb4623b1157cd409c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15466-cwe-862-missing-authorization-in-wp-8b192c5d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15466%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=696ebfdb4623b1157cd409c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1193-improper-authorization-in-mineadmin-60bd2aaa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1193%3A%20Improper%20Authorization%20in%20MineAdmin&amp;severity=medium&amp;id=696ebc584623b1157cd378e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1192-command-injection-in-tosei-online-st-b3422b82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1192%3A%20Command%20Injection%20in%20Tosei%20Online%20Store%20Management%20System%20%E3%83%8D%E3%83%83%E3%83%88%E5%BA%97%E8%88%97%E7%AE%A1%E7%90%86%E3%82%B7%E3%82%B9%E3%83%86%E3%83%A0&amp;severity=medium&amp;id=696ebc584623b1157cd378dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1179-sql-injection-in-yonyou-ksoa-d554ad49</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1179%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696eb5504623b1157cd294c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1178-sql-injection-in-yonyou-ksoa-39f660ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1178%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696fd2e84623b1157c48f86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1177-sql-injection-in-yonyou-ksoa-a7307cbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1177%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696ea73f4623b1157cd0166e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23944-cwe-306-missing-authentication-for--73956320</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23944%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20getarcaneapp%20arcane&amp;severity=high&amp;id=696ea3bc4623b1157ccf9456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23885-cwe-95-improper-neutralization-of-d-81bfe90b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23885%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20AlchemyCMS%20alchemy_cms&amp;severity=medium&amp;id=696ea0384623b1157ccf2ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1176-sql-injection-in-itsourcecode-school-20708627</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1176%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=696fd2e84623b1157c48f87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23886-cwe-20-improper-input-validation-in-52adf544</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23886%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20swift-otel%20swift-w3c-trace-context&amp;severity=medium&amp;id=696fd2e84623b1157c48f889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23880-cwe-20-improper-input-validation-in-adf94f5b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23880%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20HackUCF%20OnboardLite&amp;severity=high&amp;id=696e9cb34623b1157cce9c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23877-cwe-25-path-traversal-filedir-in-sw-f0672a80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23877%3A%20CWE-25%3A%20Path%20Traversal%3A%20&apos;%2F..%2Ffiledir&apos;%20in%20swingmx%20swingmusic&amp;severity=medium&amp;id=696e9cb34623b1157cce9c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23848-cwe-807-reliance-on-untrusted-input-454b8437</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23848%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20franklioxygen%20MyTube&amp;severity=medium&amp;id=696e99304623b1157cce4b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1175-information-exposure-through-error-m-6bd679ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1175%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20birkir%20prime&amp;severity=medium&amp;id=696e99304623b1157cce4b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23837-cwe-863-incorrect-authorization-in--0478ceb7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23837%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20franklioxygen%20MyTube&amp;severity=critical&amp;id=696e92284623b1157ccc1f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1174-resource-consumption-in-birkir-prime-e9d8867d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1174%3A%20Resource%20Consumption%20in%20birkir%20prime&amp;severity=medium&amp;id=696e92284623b1157ccc1f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23852-cwe-94-improper-control-of-generati-314581fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23852%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=696e92284623b1157ccc1f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23851-cwe-22-improper-limitation-of-a-pat-1945b84c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23851%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=696e8ea44623b1157ccb6c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23850-cwe-22-improper-limitation-of-a-pat-2366c511</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23850%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=696e8ea44623b1157ccb6c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23847-cwe-79-improper-neutralization-of-i-f1f72ba5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23847%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=low&amp;id=696e8b204623b1157cb6228a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23846-cwe-598-use-of-get-request-method-w-99a5a2f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23846%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Quenary%20tugtainer&amp;severity=high&amp;id=696e8b204623b1157cb62286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1173-denial-of-service-in-birkir-prime-e9ed6038</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1173%3A%20Denial%20of%20Service%20in%20birkir%20prime&amp;severity=medium&amp;id=696e8b204623b1157cb6228f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21696-cwe-400-uncontrolled-resource-consu-24dfb9fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21696%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20pterodactyl%20wings&amp;severity=high&amp;id=696e879b4623b1157cadb4ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69199-cwe-400-uncontrolled-resource-consu-e5728fc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69199%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20pterodactyl%20panel&amp;severity=high&amp;id=696e879b4623b1157cadb4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69198-cwe-400-uncontrolled-resource-consu-8f4121c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69198%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20pterodactyl%20panel&amp;severity=medium&amp;id=696e84184623b1157caa879f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1172-denial-of-service-in-birkir-prime-2ae77b03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1172%3A%20Denial%20of%20Service%20in%20birkir%20prime&amp;severity=medium&amp;id=696e84184623b1157caa87a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23845-cwe-918-server-side-request-forgery-78006982</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23845%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=696e84184623b1157caa87a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23843-cwe-639-authorization-bypass-throug-c677224f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23843%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20sibercii6-crypto%20teklifolustur_app&amp;severity=high&amp;id=696e7e76a027839b3dbe5ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23842-cwe-400-uncontrolled-resource-consu-ecacd388</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23842%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20gunthercox%20ChatterBot&amp;severity=high&amp;id=696e7e76a027839b3dbe5eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23841-cwe-20-improper-input-validation-in-0318b06b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23841%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20leepeuker%20movary&amp;severity=critical&amp;id=696e7e76a027839b3dbe5eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23840-cwe-20-improper-input-validation-in-ef9517e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23840%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20leepeuker%20movary&amp;severity=critical&amp;id=696e7e76a027839b3dbe5eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1171-denial-of-service-in-birkir-prime-8b4c44b8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1171%3A%20Denial%20of%20Service%20in%20birkir%20prime&amp;severity=medium&amp;id=696e7ae9d302b072d9d1c2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23839-cwe-20-improper-input-validation-in-bf755fab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23839%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20leepeuker%20movary&amp;severity=critical&amp;id=696e7ae9d302b072d9d1c2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23838-cwe-538-insertion-of-sensitive-info-2b71c14a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23838%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20NixOS%20nixpkgs&amp;severity=high&amp;id=696e7765d302b072d9d13d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55252-cwe-521-weak-password-requirements--28509510</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55252%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e7765d302b072d9d13d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55250-cwe-209-generation-of-error-message-008cc225</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55250%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e7765d302b072d9d13d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23878-cwe-201-insertion-of-sensitive-info-339bab7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23878%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20kohler%20hotcrp&amp;severity=medium&amp;id=696e7765d302b072d9d13d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23836-cwe-20-improper-input-validation-in-bf76f28c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23836%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20kohler%20hotcrp&amp;severity=critical&amp;id=696e73e1d302b072d9cff0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52661-cwe-613-insufficient-session-expira-8433459b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52661%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e73e1d302b072d9cff099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1170-information-disclosure-in-birkir-pri-7f5edbe1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1170%3A%20Information%20Disclosure%20in%20birkir%20prime&amp;severity=medium&amp;id=696e73e1d302b072d9cff09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55249-cwe-693-protection-mechanism-failur-94b327ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55249%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e73e1d302b072d9cff09c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52659-cwe-525-use-of-web-browser-cache-co-07d973a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52659%3A%20CWE-525%3A%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e73e1d302b072d9cff0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23721-cwe-862-missing-authorization-in-op-00770019</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23721%3A%20CWE-862%3A%20Missing%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=696e73e1d302b072d9cff0ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52660-cwe-644-improper-neutralization-of--de9cf97d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52660%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e705dd302b072d9cf653c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23646-cwe-488-exposure-of-data-element-to-666177d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23646%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20opf%20openproject&amp;severity=medium&amp;id=696e705dd302b072d9cf6544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23625-cwe-79-improper-neutralization-of-i-34bbb971</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23625%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opf%20openproject&amp;severity=high&amp;id=696e705dd302b072d9cf653f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55251-cwe-434-unrestricted-upload-of-file-80885ae2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55251%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e6cd9d302b072d9ceaf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1169-cross-site-request-forgery-in-birkir-9f1103c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1169%3A%20Cross-Site%20Request%20Forgery%20in%20birkir%20prime&amp;severity=medium&amp;id=696e6cd9d302b072d9ceaf10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-the-year-2038-problem-and-how-can-business-b520128c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20the%20%E2%80%9Cyear%202038%20problem%E2%80%9D%2C%20and%20how%20can%20businesses%20fix%20it%3F&amp;severity=low&amp;id=696e6990d302b072d9ce40a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-gemini-prompt-injection-flaw-exposed-privat-b5ca02b2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Gemini%20Prompt%20Injection%20Flaw%20Exposed%20Private%20Calendar%20Data%20via%20Malicious%20Invites&amp;severity=medium&amp;id=696e89194623b1157cb26455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23522-cwe-284-improper-access-control-in--dd10c165</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23522%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20lobehub%20lobe-chat&amp;severity=low&amp;id=696e7feca027839b3dc01196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22850-cwe-89-improper-neutralization-of-s-c794663e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22850%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ibericode%20koko-analytics&amp;severity=high&amp;id=696e7feca027839b3dc01191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22037-cwe-177-improper-handling-of-url-en-91a97286</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22037%3A%20CWE-177%3A%20Improper%20Handling%20of%20URL%20Encoding%20(Hex%20Encoding)%20in%20fastify%20fastify-express&amp;severity=high&amp;id=696e7feca027839b3dc0118d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1162-buffer-overflow-in-utt-hiper-810-de9f9da2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1162%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810&amp;severity=critical&amp;id=696e624dd302b072d9cd3359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1161-cross-site-scripting-in-pbrong-hrms-d5aefaa8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1161%3A%20Cross%20Site%20Scripting%20in%20pbrong%20hrms&amp;severity=medium&amp;id=696e5b45d302b072d9cc4a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11044-cwe-770-allocation-of-resources-wit-eae70be5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11044%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20B%26R%20Industrial%20Automation%20GmbH%20Automation%20Runtime&amp;severity=high&amp;id=696e57c1d302b072d9cbb9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11043-cwe-295-improper-certificate-valida-72f34ad2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11043%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20B%26R%20Industrial%20Automation%20GmbH%20B%26R%20Automation%20Studio&amp;severity=critical&amp;id=696e543dd302b072d9cb38b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1160-sql-injection-in-phpgurukul-director-144b8000</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1160%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=696e543dd302b072d9cb38bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22031-cwe-177-improper-handling-of-url-en-7d9b0cd7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22031%3A%20CWE-177%3A%20Improper%20Handling%20of%20URL%20Encoding%20(Hex%20Encoding)%20in%20fastify%20middie&amp;severity=high&amp;id=696e50b9d302b072d9ca67b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68616-cwe-601-url-redirection-to-untruste-f9f184dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68616%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Kozea%20WeasyPrint&amp;severity=high&amp;id=696e50b9d302b072d9ca67ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61684-cwe-20-improper-input-validation-in-2519e307</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61684%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20h2o%20quicly&amp;severity=high&amp;id=696e50b9d302b072d9ca67a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1159-sql-injection-in-itsourcecode-online-d55f312a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1159%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=696e49b1d302b072d9c92239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-vulnerability-exposing-vigi-camera-4ceba506</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20Vulnerability%20Exposing%20VIGI%20Cameras%20to%20Remote%20Hacking&amp;severity=medium&amp;id=696e4276d302b072d9c77a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1158-buffer-overflow-in-totolink-lr350-26d2f0de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1158%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=696e462dd302b072d9c86a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1007-cwe-863-incorrect-authorization-in-d-a5f97450</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1007%3A%20CWE-863%20Incorrect%20Authorization%20in%20Devolutions%20Server&amp;severity=high&amp;id=696e462dd302b072d9c86a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0610-cwe-89-improper-neutralization-of-sp-c6273948</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0610%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Devolutions%20Server&amp;severity=critical&amp;id=696e462dd302b072d9c86a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1157-buffer-overflow-in-totolink-lr350-cfd05245</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1157%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=696e3ba2d302b072d9c4ca7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jordanian-admits-in-us-court-to-selling-access-to--c9452baa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jordanian%20Admits%20in%20US%20Court%20to%20Selling%20Access%20to%2050%20Enterprise%20Networks&amp;severity=medium&amp;id=696e37ead302b072d9c38b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solyximmortal-information-stealer-emerges-1b3c5829</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98SolyxImmortal%E2%80%99%20Information%20Stealer%20Emerges&amp;severity=medium&amp;id=696e3468d302b072d9c21d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1156-buffer-overflow-in-totolink-lr350-496be870</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1156%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=696e34b4d302b072d9c24fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-fortinet-exploits-redline-clipjack-nt-69321376</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Fortinet%20Exploits%2C%20RedLine%20Clipjack%2C%20NTLM%20Crack%2C%20Copilot%20Attack%20%26%20More&amp;severity=medium&amp;id=696e89194623b1157cb26458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1155-buffer-overflow-in-totolink-lr350-67260ea7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1155%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=696e3115d302b072d9c0bd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1154-basic-cross-site-scripting-in-source-2677ba61</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1154%3A%20Basic%20Cross%20Site%20Scripting%20in%20SourceCodester%20E-Learning%20System&amp;severity=medium&amp;id=696e2a0dd302b072d9befabf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-reports-reinforce-cyberattacks-role-in-maduro--ed4d0592</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Reports%20Reinforce%20Cyberattack%E2%80%99s%20Role%20in%20Maduro%20Capture%20Blackout&amp;severity=medium&amp;id=696e2656d302b072d9bd897a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1153-cross-site-request-forgery-in-techni-00d4cb6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1153%3A%20Cross-Site%20Request%20Forgery%20in%20technical-laohu%20mpay&amp;severity=medium&amp;id=696e2305d302b072d9bca30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1181-cwe-79-improper-neutralization-of-in-8bf35ca0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1181%3A%20CWE-942%20%E2%80%93%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Altium%20Altium%20365&amp;severity=critical&amp;id=696e2305d302b072d9bca312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/devops-saas-downtime-the-high-and-hidden-costs-for-52a7b973</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DevOps%20%26%20SaaS%20Downtime%3A%20The%20High%20(and%20Hidden)%20Costs%20for%20Cloud-First%20Businesses&amp;severity=high&amp;id=696e89194623b1157cb2645b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1152-unrestricted-upload-in-technical-lao-aef95de8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1152%3A%20Unrestricted%20Upload%20in%20technical-laohu%20mpay&amp;severity=medium&amp;id=696e1879d302b072d9b45f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stackwarp-hardware-flaw-breaks-amd-sev-snp-pro-651a803c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20StackWarp%20Hardware%20Flaw%20Breaks%20AMD%20SEV-SNP%20Protections%20on%20Zen%201%E2%80%935%20CPUs&amp;severity=low&amp;id=696e89194623b1157cb2645e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-chrome-extension-crashes-browser-in-clic-293e1cf1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Chrome%20Extension%20Crashes%20Browser%20in%20ClickFix%20Variant%20%E2%80%98CrashFix%E2%80%99&amp;severity=medium&amp;id=696e113ed302b072d9b2509a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1151-cross-site-scripting-in-technical-la-e85a5d23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1151%3A%20Cross%20Site%20Scripting%20in%20technical-laohu%20mpay&amp;severity=medium&amp;id=696e1183d302b072d9b263f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/42000-impacted-by-ingram-micro-ransomware-attack-930a7a38</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=42%2C000%20Impacted%20by%20Ingram%20Micro%20Ransomware%20Attack&amp;severity=medium&amp;id=696e0dbad302b072d9b1633d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1150-command-injection-in-totolink-lr350-efe38033</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1150%3A%20Command%20Injection%20in%20Totolink%20LR350&amp;severity=medium&amp;id=696e0e02d302b072d9b17754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1149-command-injection-in-totolink-lr350-50896775</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1149%3A%20Command%20Injection%20in%20Totolink%20LR350&amp;severity=medium&amp;id=696e06e5d302b072d9adddaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-threat-analysis-c2-compiled-kernel-rootki-0e6f44ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%20threat%20analysis%3A%20C2-compiled%20kernel%20rootkits%20discovered&amp;severity=medium&amp;id=696dffddd302b072d99f3a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1148-cross-site-request-forgery-in-source-4840f573</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1148%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=696dfc59d302b072d996adb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crashfix-chrome-extension-delivers-modelorat-using-79f33478</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrashFix%20Chrome%20Extension%20Delivers%20ModeloRAT%20Using%20ClickFix-Style%20Browser%20Crash%20Lures&amp;severity=medium&amp;id=696e89194623b1157cb26461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1147-cross-site-scripting-in-sourcecodest-29609f78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1147%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=696df8d5d302b072d99485f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/19th-january-threat-intelligence-report-0634a84e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=19th%20January%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=696df1cfd302b072d99017d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59355-cwe-532-insertion-of-sensitive-info-7e49b741</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59355%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Linkis&amp;severity=medium&amp;id=696df1ced302b072d99017b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29847-cwe-20-improper-input-validation-in-395bb59d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29847%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Linkis&amp;severity=high&amp;id=696df1ced302b072d99017b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1146-cross-site-scripting-in-sourcecodest-44567d54</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1146%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=696df1ced302b072d99017b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1145-heap-based-buffer-overflow-in-quickj-98b95235</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1145%3A%20Heap-based%20Buffer%20Overflow%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=696deac5d302b072d98c4bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1144-use-after-free-in-quickjs-ng-quickjs-0cd87907</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1144%3A%20Use%20After%20Free%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=696de039d302b072d97ad5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1143-buffer-overflow-in-totolink-a3700r-95001bfa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1143%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3700R&amp;severity=high&amp;id=696dd96ad302b072d9756c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-bug-in-stealc-malware-panel-let-researche-d2bf6694</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Bug%20in%20StealC%20Malware%20Panel%20Let%20Researchers%20Spy%20on%20Threat%20Actor%20Operations&amp;severity=low&amp;id=696de206d302b072d97cda09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1142-cross-site-request-forgery-in-phpgur-29272b30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1142%3A%20Cross-Site%20Request%20Forgery%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=696dd229d302b072d97088d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1141-improper-authorization-in-phpgurukul-1cf5a46a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1141%3A%20Improper%20Authorization%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=696dcea5d302b072d96ebb61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1140-buffer-overflow-in-utt-520w-858eb2b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1140%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696dc419d302b072d967f4fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1139-buffer-overflow-in-utt-520w-5b385d26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1139%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696dbd11d302b072d963bfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1138-buffer-overflow-in-utt-520w-a01790f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1138%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696db98dd302b072d96213ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1137-buffer-overflow-in-utt-520w-8eaa2ff8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1137%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696db609d302b072d96094e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1136-cross-site-scripting-in-lcg0124-boot-35d880f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1136%3A%20Cross%20Site%20Scripting%20in%20lcg0124%20BootDo&amp;severity=medium&amp;id=696daf01d302b072d95cfc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1135-cross-site-scripting-in-itsourcecode-a07b806f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1135%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=696da475d302b072d93ab117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0943-cwe-1395-dependency-on-vulnerable-th-92420570</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0943%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20JV%20HarfBuzz%3A%3AShaper&amp;severity=high&amp;id=696da475d302b072d93ab10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1134-cross-site-scripting-in-itsourcecode-ae87bb25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1134%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=696da475d302b072d93ab110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1133-sql-injection-in-yonyou-ksoa-321aaef2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1133%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d99ead302b072d92fe5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1132-sql-injection-in-yonyou-ksoa-2d2461f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1132%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d8bd9d302b072d91e235b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1131-sql-injection-in-yonyou-ksoa-a9365c0f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1131%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d8bd9d302b072d91e2355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1130-sql-injection-in-yonyou-ksoa-f8606018</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1130%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d7dc9d302b072d910517a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1129-sql-injection-in-yonyou-ksoa-ee78d5c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1129%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d7dc9d302b072d9105174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-19-55db824f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-19&amp;severity=medium&amp;id=696eca324623b1157cd58ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-19-64771da3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-19&amp;severity=low&amp;id=696e91f24623b1157ccc069c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22797-cwe-290-authentication-bypass-by-sp-f03c6f4d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22797%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20OpenStack%20keystonemiddleware&amp;severity=critical&amp;id=696e6cd9d302b072d9ceaf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15539-denial-of-service-in-open5gs-5c4023b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15539%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=696d6fb9d302b072d906e96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23829-cwe-93-improper-neutralization-of-c-0f5c2e2b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23829%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=696d6fb9d302b072d906e976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15538-use-after-free-in-open-asset-import-af2c01e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15538%3A%20Use%20After%20Free%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=696d68b1d302b072d904d55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23733-cwe-94-improper-control-of-generati-47bf2030</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23733%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20lobehub%20lobe-chat&amp;severity=medium&amp;id=696d68b1d302b072d904d564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23644-cwe-22-improper-limitation-of-a-pat-5343f367</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23644%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=696d652dd302b072d904091e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23525-cwe-79-improper-neutralization-of-i-1a269f0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23525%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%201Panel&amp;severity=medium&amp;id=696d5e25d302b072d901c778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pdfsider-malware-exploitation-of-dll-side-loading--dbdaaaca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PDFSIDER%20Malware%20-%20Exploitation%20of%20DLL%20Side-Loading%20for%20AV%20and%20EDR%20Evasion&amp;severity=medium&amp;id=696df8d5d302b072d994859a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-poseidon-spear-phishing-attacks-abusing--19c91f8b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Poseidon%3A%20Spear-Phishing%20Attacks%20Abusing%20Google%20Ads%20Redirection%20Mechanisms&amp;severity=medium&amp;id=696df8d5d302b072d99485ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1126-unrestricted-upload-in-lwj-flow-b2609e5c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1126%3A%20Unrestricted%20Upload%20in%20lwj%20flow&amp;severity=medium&amp;id=696d0d49d302b072d9e29e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1125-command-injection-in-d-link-dir-823x-ee237734</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1125%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=696d0641d302b072d9df180c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0863-cwe-95-improper-neutralization-of-di-cc02e93e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0863%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)&amp;severity=high&amp;id=696cff39d302b072d9dc4a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1124-sql-injection-in-yonyou-ksoa-b958e1da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1124%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696cff39d302b072d9dc4a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1123-sql-injection-in-yonyou-ksoa-a99d2889</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1123%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696cf831d302b072d9d9a04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1122-sql-injection-in-yonyou-ksoa-495f0987</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1122%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696cea21d302b072d9d213f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1121-sql-injection-in-yonyou-ksoa-525a4367</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1121%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696ce69dd302b072d9cf67dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1120-sql-injection-in-yonyou-ksoa-84b74f7f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1120%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696cdf95d302b072d9cc70e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1119-sql-injection-in-itsourcecode-societ-b0dcd35f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1119%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=696cc6f9d302b072d9c20926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1118-sql-injection-in-itsourcecode-societ-073109c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1118%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=696cb8e9d302b072d9bcd5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15537-heap-based-buffer-overflow-in-mapni-c667c348</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15537%3A%20Heap-based%20Buffer%20Overflow%20in%20Mapnik&amp;severity=medium&amp;id=696cb1e1d302b072d9ba4f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15536-heap-based-buffer-overflow-in-byvoi-9e5bdd2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15536%3A%20Heap-based%20Buffer%20Overflow%20in%20BYVoid%20OpenCC&amp;severity=medium&amp;id=696ca3d1d302b072d9b4cb87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-many-states-are-there-in-the-united-statesx3f--164ad160</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22How%20many%20states%20are%20there%20in%20the%20United%20States%26%23x3f%3B%22%2C%20(Sun%2C%20Jan%2018th)&amp;severity=medium&amp;id=696c90d0d302b072d9add233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15535-null-pointer-dereference-in-nicbark-decd3d67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15535%3A%20NULL%20Pointer%20Dereference%20in%20nicbarker%20clay&amp;severity=medium&amp;id=696c8eb9d302b072d9ab8a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15534-integer-overflow-in-raysan5-raylib-7e50daf2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15534%3A%20Integer%20Overflow%20in%20raysan5%20raylib&amp;severity=medium&amp;id=696c842dd302b072d9a6f20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1112-improper-authorization-in-sanluan-pu-c8c1dd44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1112%3A%20Improper%20Authorization%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=696c7d25d302b072d9a388f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1111-path-traversal-in-sanluan-publiccms-16fc67d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1111%3A%20Path%20Traversal%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=696c7299d302b072d99c1488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15533-heap-based-buffer-overflow-in-raysa-1fbd1e6c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15533%3A%20Heap-based%20Buffer%20Overflow%20in%20raysan5%20raylib&amp;severity=medium&amp;id=696c6b91d302b072d998d84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1110-buffer-overflow-in-cijliu-librtsp-1f126549</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1110%3A%20Buffer%20Overflow%20in%20cijliu%20librtsp&amp;severity=medium&amp;id=696c6489d302b072d993616c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1109-buffer-overflow-in-cijliu-librtsp-3f693a13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1109%3A%20Buffer%20Overflow%20in%20cijliu%20librtsp&amp;severity=medium&amp;id=696c52f7d302b072d965579e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1108-buffer-overflow-in-cijliu-librtsp-9b066441</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1108%3A%20Buffer%20Overflow%20in%20cijliu%20librtsp&amp;severity=medium&amp;id=696c87f2d302b072d9a7fc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1107-unrestricted-upload-in-eyoucms-557dee46</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1107%3A%20Unrestricted%20Upload%20in%20EyouCMS&amp;severity=medium&amp;id=696c2fcdd302b072d943efc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1106-improper-authorization-in-chamilo-lm-35c659ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1106%3A%20Improper%20Authorization%20in%20Chamilo%20LMS&amp;severity=medium&amp;id=696c2fcdd302b072d943efbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-18-0b9a0e70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-18&amp;severity=low&amp;id=696de197d302b072d97b9b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-18-09ef788a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-18&amp;severity=medium&amp;id=696d768bd302b072d90acd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1105-sql-injection-in-easycms-bc0bb837</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1105%3A%20SQL%20Injection%20in%20EasyCMS&amp;severity=medium&amp;id=696c1e39d302b072d936e490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1066-command-injection-in-kalcaddle-kodbo-02d02574</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1066%3A%20Command%20Injection%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=696bfb11d302b072d92a0937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1064-command-injection-in-bastillion-io-b-aecfd7ae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1064%3A%20Command%20Injection%20in%20bastillion-io%20Bastillion&amp;severity=medium&amp;id=696bf409d302b072d9283c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1063-command-injection-in-bastillion-io-b-c2e322de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1063%3A%20Command%20Injection%20in%20bastillion-io%20Bastillion&amp;severity=medium&amp;id=696bed01d302b072d925799f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1062-server-side-request-forgery-in-xiwei-2bc1384d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1062%3A%20Server-Side%20Request%20Forgery%20in%20xiweicheng%20TMS&amp;severity=medium&amp;id=696be5f9d302b072d920ccc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1061-unrestricted-upload-in-xiweicheng-tm-7e56bc3c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1061%3A%20Unrestricted%20Upload%20in%20xiweicheng%20TMS&amp;severity=medium&amp;id=696bdef1d302b072d91db3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1059-sql-injection-in-feminer-wms-3269ddf8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1059%3A%20SQL%20Injection%20in%20FeMiner%20wms&amp;severity=medium&amp;id=696c87f2d302b072d9a7fc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1050-sql-injection-in-risesoft-y9-digital-670158f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1050%3A%20SQL%20Injection%20in%20risesoft-y9%20Digital-Infrastructure&amp;severity=medium&amp;id=696bd466d302b072d9195c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1049-cross-site-scripting-in-ligerosmart-8956a4c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1049%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=696bc9d9d302b072d913c1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1048-cross-site-scripting-in-ligerosmart-a407efdf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1048%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=696bc2d1d302b072d90f8557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15532-resource-consumption-in-open5gs-8f2df7c4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15532%3A%20Resource%20Consumption%20in%20Open5GS&amp;severity=medium&amp;id=696bbf4dd302b072d90ebe7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15531-reachable-assertion-in-open5gs-d158390f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15531%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=696bb4c1d302b072d90bbe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-crashfix-a-new-toy-b036240c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20CrashFix%3A%20KongTuke&apos;s%20New%20Toy&amp;severity=medium&amp;id=696df8d5d302b072d9948582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15530-reachable-assertion-in-open5gs-ec8c11fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15530%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=696b6e71d302b072d9eca41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tennessee-man-pleads-guilty-to-repeatedly-hacking--a1a98251</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tennessee%20Man%20Pleads%20Guilty%20to%20Repeatedly%20Hacking%20Supreme%20Court%E2%80%99s%20Filing%20System&amp;severity=medium&amp;id=696c909dd302b072d9ada35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-463-released-sat-jan-17th-f896022a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.6.3%20Released%2C%20(Sat%2C%20Jan%2017th)&amp;severity=medium&amp;id=696c90d0d302b072d9add236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8615-cwe-79-improper-neutralization-of-in-f1c8b8d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cubewp1211%20CubeWP%20Framework&amp;severity=medium&amp;id=696b47c6d302b072d9dc16f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14078-cwe-862-missing-authorization-in-sh-b41caf50</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14078%3A%20CWE-862%20Missing%20Authorization%20in%20shoheitanaka%20PAYGENT%20for%20WooCommerce&amp;severity=medium&amp;id=696b47c6d302b072d9dc16e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0725-cwe-79-improper-neutralization-of-in-9f16db15</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberlord92%20Integrate%20Dynamics%20365%20CRM&amp;severity=medium&amp;id=696b47c6d302b072d9dc16f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10484-cwe-288-authentication-bypass-using-34c05e32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10484%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20FmeAddons%20Registration%20%26%20Login%20with%20Mobile%20Phone%20Number%20for%20WooCommerce&amp;severity=critical&amp;id=696b47c6d302b072d9dc16e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14478-cwe-611-improper-restriction-of-xml-012de3a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14478%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20kraftplugins%20Demo%20Importer%20Plus&amp;severity=high&amp;id=696b3d39d302b072d9bbd705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12129-cwe-200-exposure-of-sensitive-infor-882077dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12129%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cubewp1211%20CubeWP%20Framework&amp;severity=medium&amp;id=696b3d39d302b072d9bbd701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0808-cwe-602-client-side-enforcement-of-s-c67a8d95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0808%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20bdthemes%20Spin%20Wheel%20%E2%80%93%20Interactive%20spinning%20wheel%20that%20offers%20coupons&amp;severity=medium&amp;id=696b3178b22c7ad86896536b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0691-cwe-79-improper-neutralization-of-in-63f3efac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0691%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20E-Mail%20Blacklist%20%E2%80%93%20Simple%20email%20filtering%20for%20safer%20registration&amp;severity=medium&amp;id=696b3178b22c7ad868965365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12984-cwe-89-improper-neutralization-of-s-f06a6d8b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12984%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=medium&amp;id=696b3178b22c7ad868965360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0833-cwe-79-improper-neutralization-of-in-ca53308c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0833%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Team%20Section%20Block%20%E2%80%93%20Showcase%20Team%20Members%20with%20Layout%20Options&amp;severity=medium&amp;id=696b3178b22c7ad868965371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12825-cwe-862-missing-authorization-in-ze-47e9feff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12825%3A%20CWE-862%20Missing%20Authorization%20in%20zealopensource%20User%20Registration%20Using%20Contact%20Form%207&amp;severity=medium&amp;id=696b1558b22c7ad86881e276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12168-cwe-862-missing-authorization-in-me-2e0a6334</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12168%3A%20CWE-862%20Missing%20Authorization%20in%20memsource%20Phrase%20TMS%20Integration%20for%20WordPress&amp;severity=medium&amp;id=696b1558b22c7ad86881e272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14029-cwe-862-missing-authorization-in-ja-1e342df2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14029%3A%20CWE-862%20Missing%20Authorization%20in%20jackdewey%20Community%20Events&amp;severity=medium&amp;id=696b1558b22c7ad86881e27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14463-cwe-862-missing-authorization-in-na-fd9f46bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14463%3A%20CWE-862%20Missing%20Authorization%20in%20naa986%20Payment%20Button%20for%20PayPal&amp;severity=medium&amp;id=696b0749b22c7ad868788fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13725-cwe-22-improper-limitation-of-a-pat-2d78fca4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13725%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thimpress%20Thim%20Blocks&amp;severity=medium&amp;id=696b0749b22c7ad868788fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0682-cwe-918-server-side-request-forgery--930ba4bf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0682%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20andy_moyle%20Church%20Admin&amp;severity=low&amp;id=696b0749b22c7ad868788fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0820-cwe-862-missing-authorization-in-swe-31cb7adc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0820%3A%20CWE-862%20Missing%20Authorization%20in%20sweetdaisy86%20RepairBuddy%20%E2%80%93%20Repair%20Shop%20CRM%20%26%20Booking%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=696b0749b22c7ad868788fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12002-cwe-22-improper-limitation-of-a-pat-bb6f54dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12002%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Awesome%20Motive%20YouTube%20Feed%20Pro&amp;severity=medium&amp;id=696af5b4b22c7ad86850279d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12718-cwe-20-improper-input-validation-in-38ef34ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12718%3A%20CWE-20%20Improper%20Input%20Validation%20in%20saadiqbal%20Quick%20Contact%20Form&amp;severity=medium&amp;id=696af5b4b22c7ad8685027a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14632-cwe-434-unrestricted-upload-of-file-0ff81a95</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14632%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpchill%20Filr%20%E2%80%93%20Secure%20document%20library&amp;severity=medium&amp;id=696af5b4b22c7ad8685027b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15403-cwe-269-improper-privilege-manageme-87b5283a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15403%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=critical&amp;id=696af5b4b22c7ad8685027bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14450-cwe-862-missing-authorization-in-wp-851d4a21</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14450%3A%20CWE-862%20Missing%20Authorization%20in%20wpswings%20Wallet%20System%20for%20WooCommerce%20%E2%80%93%20Digital%20Wallet%2C%20Buy%20Now%20Pay%20Later%20(BNPL)%2C%20Instant%20Cashback%2C%20Referral%20program%2C%20Partial%20%26%20Subscription%20Payments&amp;severity=medium&amp;id=696af5b4b22c7ad8685027b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14075-cwe-200-exposure-of-sensitive-infor-befc1c4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14075%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thimpress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=696af5b4b22c7ad8685027aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0519-vulnerability-in-absolute-security-s-9306082e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0519%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=696aeb28b22c7ad8683b8232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0518-vulnerability-in-absolute-security-s-df7d9f27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0518%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=696aeb28b22c7ad8683b822f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0517-vulnerability-in-absolute-security-s-2c33b004</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0517%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=696b37a7d302b072d9b4c42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/siklu-etherhaul-series-eh-8010-remote-command-exec-48e9e28c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Siklu%20EtherHaul%20Series%20EH-8010%20-%20Remote%20Command%20Execution&amp;severity=medium&amp;id=696c9008d302b072d9ad2abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/siklu-etherhaul-series-eh-8010-arbitrary-file-uplo-ee37f024</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Siklu%20EtherHaul%20Series%20EH-8010%20-%20Arbitrary%20File%20Upload&amp;severity=medium&amp;id=696c9008d302b072d9ad2ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rpi-jukebox-rfid-280-remote-command-execution-438f2ff1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RPi-Jukebox-RFID%202.8.0%20-%20Remote%20Command%20Execution&amp;severity=medium&amp;id=696c9008d302b072d9ad2ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-17-8f6db1a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-17&amp;severity=medium&amp;id=696c250bd302b072d93b5acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15529-denial-of-service-in-open5gs-223f10b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15529%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=696ab9f0b22c7ad868fb1a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15528-denial-of-service-in-open5gs-c9708e24</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15528%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=696ab9f0b22c7ad868fb1a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23745-cwe-22-improper-limitation-of-a-pat-efba1e80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23745%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=696ab9f0b22c7ad868fb1aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21223-cwe-269-improper-privilege-manageme-812815e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21223%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=696ab2f1b22c7ad868f75ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20960-cwe-285-improper-authorization-in-m-29f6cc2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20960%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20Power%20Apps%20Desktop%20Client&amp;severity=high&amp;id=696ab2f1b22c7ad868f75dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23800-cwe-266-incorrect-privilege-assignm-c0405f66</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23800%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Modular%20DS&amp;severity=critical&amp;id=696aa4d9b22c7ad868ee9e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/december-2025-infostealer-trend-report-f997717b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=December%202025%20Infostealer%20Trend%20Report&amp;severity=medium&amp;id=696df8d5d302b072d99485c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23744-cwe-306-missing-authentication-for--e4efbddd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23744%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MCPJam%20inspector&amp;severity=critical&amp;id=696a9dd0b22c7ad868e95256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23742-cwe-94-improper-control-of-generati-f487f23e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23742%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20zalando%20skipper&amp;severity=high&amp;id=696a9dd0b22c7ad868e95251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23735-cwe-362-concurrent-execution-using--6cc6fd42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23735%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20graphql-hive%20graphql-modules&amp;severity=high&amp;id=696a9dd0b22c7ad868e9524b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23731-cwe-1021-improper-restriction-of-re-11bda56f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23731%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a9a4cb22c7ad868e6ff27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23730-cwe-601-url-redirection-to-untruste-aba9d8b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23730%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23729-cwe-601-url-redirection-to-untruste-f73d8863</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23729%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23728-cwe-601-url-redirection-to-untruste-e0169b5a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23728%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23727-cwe-601-url-redirection-to-untruste-2ca4d83b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23727%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23726-cwe-601-url-redirection-to-untruste-32fb4400</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23726%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23725-cwe-79-improper-neutralization-of-i-8225a3ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23725%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23724-cwe-79-improper-neutralization-of-i-ab9e5f84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23724%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23722-cwe-79-improper-neutralization-of-i-e6cd8bcb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23722%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=696a9344b22c7ad868dc8352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23723-cwe-89-improper-neutralization-of-s-0b58a728</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23723%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=696a9344b22c7ad868dc8355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23645-cwe-79-improper-neutralization-of-i-05b2cd3c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23645%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=696a8fc2b22c7ad868d78294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23535-cwe-22-improper-limitation-of-a-pat-55cce8b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23535%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20wlc&amp;severity=high&amp;id=696a8fc2b22c7ad868d78299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48647-vulnerability-in-google-google-devi-e266be15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48647%3A%20Vulnerability%20in%20Google%20Google%20Devices&amp;severity=high&amp;id=696a8534b22c7ad868cd4e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15032-cwe-1021-improper-restriction-of-re-9e94c4fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15032%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20The%20Browser%20Company%20of%20New%20York%20Dia&amp;severity=high&amp;id=696a81b1b22c7ad868cae2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gootloader-malware-uses-5001000-concatenated-zip-a-680f3c5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GootLoader%20Malware%20Uses%20500%E2%80%931%2C000%20Concatenated%20ZIP%20Archives%20to%20Evade%20Detection&amp;severity=medium&amp;id=696b427ed302b072d9d1fe25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0629-cwe-287-improper-authentication-in-t-6479c158</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0629%3A%20CWE-287%20Improper%20Authentication%20in%20TP-Link%20Systems%20Inc.%20VIGI%20InSight%20Sx45%20Series%20(S245%2FS345%2FS445)&amp;severity=high&amp;id=696a7724b22c7ad868c4289e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31186-an-app-may-be-able-to-bypass-privac-bc9d706d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31186%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20Xcode&amp;severity=low&amp;id=696a73a1b22c7ad868c2e46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24090-an-app-may-be-able-to-enumerate-a-u-dc1877c3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24090%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=696a73a1b22c7ad868c2e46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43508-an-app-may-be-able-to-access-sensit-2875b2fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43508%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=696a73a1b22c7ad868c2e472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44210-an-app-may-be-able-to-access-user-s-72932ec2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44210%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=696a73a1b22c7ad868c2e460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24089-an-app-may-be-able-to-enumerate-a-u-dfb76829</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24089%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=696a73a1b22c7ad868c2e469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54556-a-user-may-be-able-to-view-restrict-166ac3b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54556%3A%20A%20user%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=696a73a1b22c7ad868c2e466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44238-an-app-may-be-able-to-corrupt-copro-1c471c8b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44238%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=696a73a1b22c7ad868c2e463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23529-cwe-73-external-control-of-file-nam-ad7e4019</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23529%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Aiven-Open%20bigquery-connector-for-apache-kafka&amp;severity=high&amp;id=696a701db22c7ad868c0d111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/key-attack-scenarios-involving-brand-impersonation-96cc02f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Key%20attack%20scenarios%20involving%20brand%20impersonation&amp;severity=medium&amp;id=696a6cd4b22c7ad868bf68c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23528-cwe-80-improper-neutralization-of-s-0c949789</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23528%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20dask%20distributed&amp;severity=medium&amp;id=696a701db22c7ad868c0d10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23523-cwe-94-improper-control-of-generati-76d45acb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23523%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenAgentPlatform%20Dive&amp;severity=critical&amp;id=696a6c98b22c7ad868bf5936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0949-improper-neutralization-of-input-dur-bd621056</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EnterpriseDB%20Postgres%20Enterprise%20Manager%20(PEM)&amp;severity=medium&amp;id=696a6c98b22c7ad868bf5933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-fortisiem-flaw-exploited-sean-planke-6edc2350</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20FortiSIEM%20Flaw%20Exploited%2C%20Sean%20Plankey%20Renominated%2C%20Russia%E2%80%99s%20Polish%20Grid%20Attack&amp;severity=medium&amp;id=696a655db22c7ad868bc2bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29943-cwe-123-write-what-where-condition--de625fa5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29943%3A%20CWE-123%20%20Write-what-where%20Condition%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=696a5e8ab22c7ad868b8032c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21625-cwe-434-unrestricted-upload-of-file-d3e5782e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21625%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Stackideas.com%20EasyDiscuss%20extension%20for%20Joomla&amp;severity=medium&amp;id=696a5780b22c7ad868b44185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21624-cwe-79-improper-neutralization-of-i-bc4c653a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stackideas.com%20EasyDiscuss%20extension%20for%20Joomla&amp;severity=critical&amp;id=696a5780b22c7ad868b44182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21623-cwe-79-improper-neutralization-of-i-e6f5f1d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stackideas.com%20EasyDiscuss%20extension%20for%20Joomla&amp;severity=critical&amp;id=696a5780b22c7ad868b4417f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-malicious-chrome-extensions-impersonate-workd-28054f94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20Malicious%20Chrome%20Extensions%20Impersonate%20Workday%20and%20NetSuite%20to%20Hijack%20Accounts&amp;severity=medium&amp;id=696b427ed302b072d9d1fe28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0696-cwe-1004-sensitive-cookie-without-ht-db579a0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0696%3A%20CWE-1004%20Sensitive%20Cookie%20Without%20&apos;HttpOnly&apos;%20Flag%20in%20ConnectWise%20PSA&amp;severity=medium&amp;id=696a4268b22c7ad868a8d100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0695-cwe-79-improper-neutralization-of-in-3b545ad4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ConnectWise%20PSA&amp;severity=high&amp;id=696a4268b22c7ad868a8d0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14510-cwe-303-incorrect-implementation-of-047752f2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14510%3A%20CWE-303%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20ABB%20ABB%20Ability%20OPTIMAX&amp;severity=high&amp;id=696a3b60b22c7ad868a461fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0615-cwe-497-exposure-of-sensitive-system-271e46e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0615%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TheLibrarian%20TheLibrarian.io&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0616-cwe-497-exposure-of-sensitive-system-d0f5d01f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0616%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TheLibrarian%20TheLibrarian.io&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0613-cwe-497-exposure-of-sensitive-system-046ddc2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0613%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TheLibrarian%20TheLibrarian.io&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0612-cwe-497-exposure-of-sensitive-system-6bc20f0a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0612%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TheLibrarian%20TheLibrarian.io&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14894-cwe-434-unrestricted-upload-of-file-67dc654f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14894%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bee%20interactive%20Livewire%20Filemanager&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/750000-impacted-by-data-breach-at-canadian-investm-119347f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=750%2C000%20Impacted%20by%20Data%20Breach%20at%20Canadian%20Investment%20Watchdog&amp;severity=medium&amp;id=696a30a3b22c7ad8689f3fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-social-engineering-aaa35ce5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20Social%20Engineering&amp;severity=high&amp;id=696a30a3b22c7ad8689f3fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whisperpair-attack-leaves-millions-of-bluetooth-ac-3959fbce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhisperPair%20Attack%20Leaves%20Millions%20of%20Audio%20Accessories%20Open%20to%20Hijacking&amp;severity=critical&amp;id=696a2615b22c7ad86898d8da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-firms-react-to-chinas-reported-softw-89e2ae3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20Firms%20React%20to%20China%E2%80%99s%20Reported%20Software%20Ban&amp;severity=medium&amp;id=696a2291b22c7ad868981805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/your-digital-footprint-can-lead-right-to-your-fron-df1404ff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Your%20Digital%20Footprint%20Can%20Lead%20Right%20to%20Your%20Front%20Door&amp;severity=medium&amp;id=696a1803b22c7ad8688eb76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lotuslite-backdoor-targets-us-policy-entities-usin-13384cc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LOTUSLITE%20Backdoor%20Targets%20U.S.%20Policy%20Entities%20Using%20Venezuela-Themed%20Spear%20Phishing&amp;severity=medium&amp;id=696b427ed302b072d9d1fe2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68675-cwe-532-insertion-of-sensitive-info-09ada261</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68675%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=696a14b5b22c7ad8688c7da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59870-vulnerability-in-hcl-software-myxal-d9275429</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59870%3A%20Vulnerability%20in%20HCL%20Software%20MyXalytics&amp;severity=high&amp;id=696a1130b22c7ad8688a3518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68438-cwe-200-exposure-of-sensitive-infor-7325dea7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68438%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=696a1130b22c7ad8688a351b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-vulnerability-exploited-by-chinese-h-93286da1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Vulnerability%20Exploited%20by%20Chinese%20Hackers&amp;severity=medium&amp;id=696a09f6b22c7ad86863a064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14844-cwe-639-authorization-bypass-throug-db5a2ea6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14844%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=high&amp;id=696a06a5b22c7ad8685c6d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12007-cwe-347-improper-verification-of-cr-07b92303</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12007%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SMCI%20X13SEM-F&amp;severity=high&amp;id=6969fa2a7c726673b6148cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60021-cwe-77-improper-neutralization-of-s-829a2013</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60021%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20bRPC&amp;severity=critical&amp;id=6969fa2a7c726673b6148cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14757-cwe-862-missing-authorization-in-st-6258ed63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14757%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Cost%20Calculator%20Builder&amp;severity=medium&amp;id=6969fa2a7c726673b6148ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12006-cwe-347-improper-verification-of-cr-cadba4f0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12006%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SMCI%20X12STW-F&amp;severity=high&amp;id=6969fa2a7c726673b6148cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0913-cwe-79-improper-neutralization-of-in-38a53d62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20User%20Submitted%20Posts%20%E2%80%93%20Enable%20Users%20to%20Submit%20Posts%20from%20the%20Front%20End&amp;severity=medium&amp;id=6969f6a67c726673b6129c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1004-cwe-862-missing-authorization-in-wpd-b081ce7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1004%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=6969f6a67c726673b6129c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22876-improper-limitation-of-a-pathname-t-1389f4a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22876%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20TOA%20Corporation%20Multiple%20Network%20Cameras%20TRIFORA%203%20series&amp;severity=medium&amp;id=6969f6a67c726673b6129c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20894-cross-site-scripting-xss-in-toa-cor-69babe07</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20894%3A%20Cross-site%20scripting%20(XSS)%20in%20TOA%20Corporation%20Multiple%20Network%20Cameras%20TRIFORA%203%20series&amp;severity=medium&amp;id=6969f6a67c726673b6129c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20759-improper-neutralization-of-special--69ac3303</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20759%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOA%20Corporation%20Multiple%20Network%20Cameras%20TRIFORA%203%20series&amp;severity=high&amp;id=6969f6a67c726673b6129c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14375-cwe-79-improper-neutralization-of-i-e277c6ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14375%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=6969e8957c726673b6094b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1003-cwe-862-missing-authorization-in-rox-cf1776ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1003%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20GetGenie%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%20%26%20SEO%20Tracking%20Tools&amp;severity=medium&amp;id=6969e8957c726673b6094b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-exploits-sitecore-zero-day-in-att-cf9a6aa8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT%20Exploited%20Sitecore%20Zero-Day%20in%20Critical%20Infrastructure%20Intrusion&amp;severity=critical&amp;id=696a0eecb22c7ad8687e4515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14793-cwe-918-server-side-request-forgery-fad94df4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14793%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20torstenbulk%20DK%20PDF%20%E2%80%93%20WordPress%20PDF%20Generator&amp;severity=medium&amp;id=6969e18d7c726673b6064126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14853-cwe-352-cross-site-request-forgery--2fc831cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14853%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smings%20LEAV%20Last%20Email%20Address%20Validator&amp;severity=medium&amp;id=6969e18d7c726673b606412d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0939-cwe-345-insufficient-verification-of-516891f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0939%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20linknacional%20Rede%20Ita%C3%BA%20for%20WooCommerce%20%E2%80%94%20Payment%20PIX%2C%20Credit%20Card%20and%20Debit&amp;severity=medium&amp;id=6969e18d7c726673b6064137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0942-cwe-306-missing-authentication-for-c-a7be5941</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0942%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20linknacional%20Rede%20Ita%C3%BA%20for%20WooCommerce%20%E2%80%94%20Payment%20PIX%2C%20Credit%20Card%20and%20Debit&amp;severity=medium&amp;id=6969e18d7c726673b606413d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0916-cwe-79-improper-neutralization-of-in-f08982e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0916%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20keesiemeijer%20Related%20Posts%20by%20Taxonomy&amp;severity=medium&amp;id=6969e18d7c726673b6064133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0975-cwe-77-improper-neutralization-of-sp-238d7ef3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0975%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Delta%20Electronics%20DIAView&amp;severity=high&amp;id=6969d7017c726673b6feabd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-zero-day-rce-exploited-by-china-link-9a3a7456</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Zero-Day%20RCE%20Exploited%20by%20China-Linked%20APT%20in%20Secure%20Email%20Gateways&amp;severity=medium&amp;id=696a0eecb22c7ad8687e4518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23769-cwe-79-improper-neutralization-of-i-0e86a5ab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NAVER%20lucy-xss-filter&amp;severity=medium&amp;id=6969cc767c726673b6f69cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23768-cwe-918-server-side-request-forgery-c92d77e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23768%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20NAVER%20lucy-xss-filter&amp;severity=medium&amp;id=6969cc767c726673b6f69cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0858-stored-xss-in-netsourceforgeplantuml-fd195677</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0858%3A%20Stored%20XSS%20in%20net.sourceforge.plantuml%3Aplantuml&amp;severity=medium&amp;id=6969c8f27c726673b6f36687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14384-cwe-862-missing-authorization-in-sm-d7b57653</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14384%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20All%20in%20One%20SEO%20%E2%80%93%20Powerful%20SEO%20Plugin%20to%20Boost%20SEO%20Rankings%20%26%20Increase%20Traffic&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1000-cwe-862-missing-authorization-in-mai-8c02be30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1000%3A%20CWE-862%20Missing%20Authorization%20in%20mailerlite%20MailerLite%20%E2%80%93%20WooCommerce%20integration&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15370-cwe-639-authorization-bypass-throug-ef7ad2b2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15370%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12957-cwe-434-unrestricted-upload-of-file-a1ed58c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12957%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=high&amp;id=6969c56d7c726673b6f0ba61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12641-cwe-862-missing-authorization-in-aw-c733352b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12641%3A%20CWE-862%20Missing%20Authorization%20in%20awesomesupport%20Awesome%20Support%20%E2%80%93%20WordPress%20HelpDesk%20%26%20Support%20Plugin&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15526-cwe-209-generation-of-error-message-4394609b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15526%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15527-cwe-200-exposure-of-sensitive-infor-bbaff840</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15527%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14982-cwe-862-missing-authorization-in-wp-c6c3f78b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14982%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1023-cwe-306-missing-authentication-for-c-90d98653</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1023%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Gotac%20Statistics%20Database%20System&amp;severity=high&amp;id=6969b75e7c726673b6e69b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1022-cwe-23-relative-path-traversal-in-go-152a9f2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1022%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Gotac%20Statistics%20Database%20System&amp;severity=high&amp;id=6969b75e7c726673b6e69b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1021-cwe-434-unrestricted-upload-of-file--c0c2c5ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1021%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Gotac%20Police%20Statistics%20Database%20System&amp;severity=critical&amp;id=6969b0567c726673b6c490b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1020-cwe-36-absolute-path-traversal-in-go-dbe01ed1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1020%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Gotac%20Police%20Statistics%20Database%20System&amp;severity=medium&amp;id=6969b0567c726673b6c490b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1019-cwe-306-missing-authentication-for-c-041a882b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1019%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Gotac%20Police%20Statistics%20Database%20System&amp;severity=critical&amp;id=6969b0567c726673b6c490ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1018-cwe-36-absolute-path-traversal-in-go-74dae460</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1018%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Gotac%20Police%20Statistics%20Database%20System&amp;severity=high&amp;id=6969a5c97c726673b6b924fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62581-cwe-321-use-of-hard-coded-cryptogra-18c1d511</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62581%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Delta%20Electronics%20DIAView&amp;severity=critical&amp;id=6969a5c97c726673b6b924f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62582-cwe-306-missing-authentication-for--d3b61dc7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62582%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Delta%20Electronics%20DIAView&amp;severity=critical&amp;id=6969a5c97c726673b6b924f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64769-cwe-319-in-aveva-process-optimizati-e10ec928</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64769%3A%20CWE-319%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65117-cwe-676-in-aveva-process-optimizati-5836ab29</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65117%3A%20CWE-676%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64729-cwe-862-in-aveva-process-optimizati-48fb5bf2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64729%3A%20CWE-862%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65118-cwe-427-in-aveva-process-optimizati-5718ed1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65118%3A%20CWE-427%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61943-cwe-89-in-aveva-process-optimizatio-60e63e2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61943%3A%20CWE-89%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64691-cwe-94-in-aveva-process-optimizatio-91c6aca2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64691%3A%20CWE-94%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61937-cwe-94-in-aveva-process-optimizatio-3b3044cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61937%3A%20CWE-94%20in%20AVEVA%20Process%20Optimization&amp;severity=critical&amp;id=696989a97c726673b69cdac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-16-432be40f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-16&amp;severity=medium&amp;id=696ad256b22c7ad868047d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56451-na-1b45e936</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56451%3A%20n%2Fa&amp;severity=medium&amp;id=696aaf65b22c7ad868f5fee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69581-na-cd6c2092</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69581%3A%20n%2Fa&amp;severity=medium&amp;id=696a9344b22c7ad868dc834e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68924-cwe-829-inclusion-of-functionality--0050f6aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68924%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Umbraco%20Forms&amp;severity=high&amp;id=696a88b8b22c7ad868ce94a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61873-na-d817035a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61873%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20bestpractical%20Request%20Tracker&amp;severity=low&amp;id=696a81b1b22c7ad868cae2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43904-cwe-863-incorrect-authorization-in--8c27b2c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43904%3A%20CWE-863%20Incorrect%20Authorization%20in%20SchedMD%20Slurm&amp;severity=medium&amp;id=696a7e2cb22c7ad868c7aa07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51602-na-dfdedc72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51602%3A%20CWE-125%20Out-of-bounds%20Read%20in%20VideoLAN%20VLC%20media%20player&amp;severity=medium&amp;id=696a7e2cb22c7ad868c7aa03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24531-cwe-393-return-of-wrong-status-code-e5a061cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24531%3A%20CWE-393%20Return%20of%20Wrong%20Status%20Code%20in%20OpenSC%20project%20pam_pkcs11&amp;severity=medium&amp;id=696a7aa9b22c7ad868c5764a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31510-cwe-79-improper-neutralization-of-i-5e295fcf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31510%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20lemonldap-ng%20LemonLDAP%3A%3ANG&amp;severity=high&amp;id=696a7aa9b22c7ad868c57647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24528-cwe-190-integer-overflow-or-wraparo-ed44f9a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24528%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20MIT%20Kerberos%205&amp;severity=high&amp;id=696a7724b22c7ad868c4289a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70746-na-deaef130</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70746%3A%20n%2Fa&amp;severity=high&amp;id=696a620db22c7ad868babe09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71020-na-6800fcaf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71020%3A%20n%2Fa&amp;severity=high&amp;id=696a5b05b22c7ad868b74e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68921-na-2a1c9855</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68921%3A%20n%2Fa&amp;severity=high&amp;id=696a5078b22c7ad868b11dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14237-cwe-787-out-of-bounds-write-in-cano-abf0cbe0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14237%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697f1e7c726673b68c4162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14236-cwe-787-out-of-bounds-write-in-cano-e90be9e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14236%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14235-cwe-787-out-of-bounds-write-in-cano-86d77d6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14235%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14234-cwe-787-out-of-bounds-write-in-cano-d160e8dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14234%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14233-cwe-763-release-of-invalid-pointer--26aac043</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14233%3A%20CWE-763%3A%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14232-cwe-787-out-of-bounds-write-in-cano-73d64ac5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14232%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14231-cwe-787-out-of-bounds-write-in-cano-064e172c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14231%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1011-cwe-79-improper-neutralization-of-in-3c3d4f6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1011%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Altium%20Altium%20Live&amp;severity=medium&amp;id=696978157c726673b6895f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1010-cwe-79-improper-neutralization-of-in-37663ca5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1010%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Altium%20Altium%20Enterprise%20Server&amp;severity=high&amp;id=696974917c726673b6855148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22864-cwe-77-improper-neutralization-of-s-6edc20a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22864%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=696974917c726673b685514b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22863-cwe-325-missing-cryptographic-step--3361159c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22863%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20denoland%20deno&amp;severity=critical&amp;id=696974917c726673b6855151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1009-cwe-79-improper-neutralization-of-in-0988a46f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1009%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Altium%20Altium%20Live&amp;severity=critical&amp;id=6969710d7c726673b6836a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68671-cwe-294-authentication-bypass-by-ca-fae84d96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68671%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20treeverse%20lakeFS&amp;severity=medium&amp;id=6969710d7c726673b6836a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1008-cwe-79-improper-neutralization-of-in-bd59933a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1008%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Altium%20Altium%20Live&amp;severity=high&amp;id=69696d897c726673b67e92cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0915-cwe-908-use-of-uninitialized-resourc-945e6348</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0915%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=696966817c726673b661c89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21921-cwe-416-use-after-free-in-juniper-n-a76791a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21921%3A%20CWE-416%20Use%20After%20Free%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=696951f81ab3796b10539d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21920-cwe-252-unchecked-return-value-in-j-78aeb347</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21920%3A%20CWE-252%20Unchecked%20Return%20Value%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=696951f81ab3796b10539cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21918-cwe-415-double-free-in-juniper-netw-7963ee06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21918%3A%20CWE-415%20Double%20Free%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=696951f81ab3796b10539cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21917-cwe-1286-improper-validation-of-syn-b1f662ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21917%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=696951f81ab3796b10539cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21914-cwe-667-improper-locking-in-juniper-6bbb1d2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21914%3A%20CWE-667%20Improper%20Locking%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e771ab3796b1050015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21913-cwe-1419-incorrect-initialization-o-6d6acb31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21913%3A%20CWE-1419%20Incorrect%20Initialization%20of%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e771ab3796b10500157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21912-cwe-367-time-of-check-time-of-use-t-48ab73a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21912%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e771ab3796b10500153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21911-cwe-682-incorrect-calculation-in-ju-f9e2c67c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21911%3A%20CWE-682%20Incorrect%20Calculation%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=69694e771ab3796b1050014f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21910-cwe-754-improper-check-for-unusual--565e570b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21910%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e771ab3796b1050014b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21909-cwe-401-missing-release-of-memory-a-f10fdd96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21909%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e771ab3796b10500147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21908-cwe-416-use-after-free-in-juniper-n-f96611ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21908%3A%20CWE-416%20Use%20After%20Free%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e771ab3796b10500143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21907-cwe-327-use-of-a-broken-or-risky-cr-e0f690bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21907%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=69694e771ab3796b1050013f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21906-cwe-755-improper-handling-of-except-02d5cac0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21906%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e761ab3796b1050010e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21905-cwe-835-loop-with-unreachable-exit--0e61f2b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21905%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e761ab3796b1050010a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21903-cwe-121-stack-based-buffer-overflow-c722cbf1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21903%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b10500106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0203-cwe-755-improper-handling-of-excepti-980f4f2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0203%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b10500102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60011-cwe-754-improper-check-for-unusual--6c07a66e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60011%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b105000fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60007-cwe-476-null-pointer-dereference-in-511d4875</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60007%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b105000f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60003-cwe-126-buffer-over-read-in-juniper-d2abf351</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60003%3A%20CWE-126%20Buffer%20Over-read%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e761ab3796b105000f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59961-cwe-732-incorrect-permission-assign-00405344</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59961%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b105000ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59960-cwe-754-improper-check-for-unusual--f0b21a74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59960%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e761ab3796b105000ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59959-cwe-822-untrusted-pointer-dereferen-de77e745</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59959%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69695d667c726673b645f26e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52987-cwe-1021-improper-restriction-of-re-896bfca5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52987%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Juniper%20Networks%20Paragon%20Automation%20(Pathfinder%2C%20Planner%2C%20Insights)&amp;severity=medium&amp;id=69695d667c726673b645f26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23746-cwe-306-missing-authentication-for--3ee3d0fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23746%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Entrust%20Corporation%20Instant%20Financial%20Issuance%20(IF)&amp;severity=critical&amp;id=6969476c1ab3796b1034af87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aws-codebuild-misconfiguration-exposed-github-repo-8d88a99d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AWS%20CodeBuild%20Misconfiguration%20Exposed%20GitHub%20Repos%20to%20Potential%20Supply%20Chain%20Attacks&amp;severity=critical&amp;id=696964ea7c726673b65bc225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23622-cwe-352-cross-site-request-forgery--29cd7f09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23622%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alextselegidis%20easyappointments&amp;severity=high&amp;id=6969476c1ab3796b1034af96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23527-cwe-444-inconsistent-interpretation-8672415e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23527%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20h3js%20h3&amp;severity=high&amp;id=6969476c1ab3796b1034af92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23520-cwe-78-improper-neutralization-of-s-a885c742</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23520%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20getarcaneapp%20arcane&amp;severity=critical&amp;id=6969476c1ab3796b1034af8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23766-b3f40f23</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23766&amp;severity=null&amp;id=6990b91cc9e1ff5ad8a36ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23519-cwe-208-observable-timing-discrepan-0c871956</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23519%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20RustCrypto%20utils&amp;severity=high&amp;id=6969476c1ab3796b1034af9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22775-cwe-405-asymmetric-resource-consump-a140cbfe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22775%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20sveltejs%20devalue&amp;severity=high&amp;id=69693b3453752d4047d52868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22774-cwe-405-asymmetric-resource-consump-350cc646</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22774%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20sveltejs%20devalue&amp;severity=high&amp;id=69693b3453752d4047d5286d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0227-cwe-754-improper-check-for-unusual-o-59ec22cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0227%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=69693e4b1ab3796b101b8835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22803-cwe-789-memory-allocation-with-exce-39b2be76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22803%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20sveltejs%20kit&amp;severity=high&amp;id=69693e4b1ab3796b101b8838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67647-cwe-248-uncaught-exception-in-svelt-82550457</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67647%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20sveltejs%20kit&amp;severity=high&amp;id=6969342c53752d4047cfdaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13845-cwe-416-use-after-free-in-schneider-0cd394f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13845%3A%20CWE-416%20Use%20After%20Free%20in%20Schneider%20Electric%20EcoStruxure%20Power%20Build%20Rapsody&amp;severity=high&amp;id=6969342c53752d4047cfdaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13844-cwe-415-double-free-in-schneider-el-8351af62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13844%3A%20CWE-415%20Double%20Free%20in%20Schneider%20Electric%20EcoStruxure%20Power%20Build%20Rapsody&amp;severity=high&amp;id=6969342c53752d4047cfdadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stackwarp-attack-threatens-confidential-vms-on-005abf70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98StackWarp%E2%80%99%20Attack%20Threatens%20Confidential%20VMs%20on%20AMD%20Processors&amp;severity=critical&amp;id=69692cf153752d4047c83ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36911-information-disclosure-in-google-an-ff46e1a8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36911%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=696929a053752d4047c61cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9014-cwe-20-improper-input-validation-in--61beb757</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9014%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20TL-WR841N%20v14&amp;severity=medium&amp;id=696929a053752d4047c61cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-coding-tested-ai-agents-nail-sqli-but-fail-mi-3d1039bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vibe%20Coding%20Tested%3A%20AI%20Agents%20Nail%20SQLi%20but%20Fail%20Miserably%20on%20Security%20Controls&amp;severity=medium&amp;id=696921fb53752d4047a62dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/humint-operations-uncover-cryptojacking-campaign-d-3649a378</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HUMINT%20Operations%20Uncover%20Cryptojacking%20Campaign%3A%20Discord-Based%20Distribution%20of%20Clipboard%20Hijacking%20Malware%20Targeting%20Cryptocurrency%20Communities&amp;severity=medium&amp;id=696a3ee4b22c7ad868a7522f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62193-cwe-78-improper-neutralization-of-s-5ff62ee0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62193%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20National%20Oceanic%20and%20Atmospheric%20Administration%20(NOAA)%20Live%20Access%20Server%20(LAS)&amp;severity=critical&amp;id=69691b9253752d4047972530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20075-improper-neutralization-of-input-du-954de297</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20075%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=69691b9253752d404797253f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20047-improper-neutralization-of-script-r-997c95f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20047%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69691b9253752d404797253c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20076-improper-neutralization-of-input-du-2c2b760e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69691b9253752d4047972542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22867-cwe-79-improper-neutralization-of-i-03fd4933</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22867%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20suitenumerique%20docs&amp;severity=high&amp;id=696916c94c611209ad420daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66417-cwe-89-improper-neutralization-of-s-6a1ea466</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66417%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=high&amp;id=696916c94c611209ad420d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66292-cwe-22-improper-limitation-of-a-pat-88df64f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66292%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20donknap%20dpanel&amp;severity=high&amp;id=696916c94c611209ad420d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64516-cwe-284-improper-access-control-in--98125ae4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64516%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20glpi-project%20glpi&amp;severity=high&amp;id=696913454c611209ad3d9faf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-malware-analysis-full-execution-break-57f30e94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Malware%20Analysis%3A%20Full%20Execution%20Breakdown&amp;severity=medium&amp;id=69690c3d4c611209ad343769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-wordpress-modular-ds-plugin-flaw-actively-25b680c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20WordPress%20Modular%20DS%20Plugin%20Flaw%20Actively%20Exploited%20to%20Gain%20Admin%20Access&amp;severity=critical&amp;id=6969216753752d4047a49a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hunting-lazarus-inside-the-contagious-interview-c2-ba092a78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hunting%20Lazarus%3A%20Inside%20the%20Contagious%20Interview%20C2%20Infrastructure&amp;severity=medium&amp;id=69690c3d4c611209ad343777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-desktop-window-manager-zero-day-vulnerab-46f9d36a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Desktop%20Window%20Manager%20Zero-Day%20Vulnerability%20(CVE-2026-20805)%20Actively%20Exploited%3B%20Urgent%20Patch%20Released&amp;severity=high&amp;id=6969064c4c611209ad2d78bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/command-evade-turlas-kazuar-v3-loader-5ae953d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Command%20%26%20Evade%3A%20Turla&apos;s%20Kazuar%20v3%20Loader&amp;severity=medium&amp;id=696908b84c611209ad2ef0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61973-cwe-284-improper-access-control-in--aefac3ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61973%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Epic%20Games%20Epic%20Games%20Store&amp;severity=high&amp;id=696908b94c611209ad2ef133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-powered-sextortion-a-new-threat-to-privacy-kasp-12b568bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-powered%20sextortion%3A%20a%20new%20threat%20to%20privacy%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=696905724c611209ad2b6595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-reveal-reprompt-attack-allowing-single-d2213d98</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Reveal%20Reprompt%20Attack%20Allowing%20Single-Click%20Data%20Exfiltration%20From%20Microsoft%20Copilot&amp;severity=low&amp;id=6969216753752d4047a49a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0992-uncontrolled-resource-consumption-in-62b16cbd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0992%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=low&amp;id=6968faa94c611209ad23897a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0989-uncontrolled-recursion-in-red-hat-re-f874fb4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0989%3A%20Uncontrolled%20Recursion%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=low&amp;id=6968faa94c611209ad238972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0990-uncontrolled-recursion-in-red-hat-re-4f0050ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0990%3A%20Uncontrolled%20Recursion%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=6968faa94c611209ad238976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0897-cwe-770-allocation-of-resources-with-da1bfc54</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0897%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Google%20Keras&amp;severity=high&amp;id=6968f7254c611209ad1c4a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-voice-cloning-exploit-wi-fi-9921f37b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Voice%20Cloning%20Exploit%2C%20Wi-Fi%20Kill%20Switch%2C%20PLC%20Vulns%2C%20and%2014%20More%20Stories&amp;severity=medium&amp;id=6969216753752d4047a49a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13859-cwe-862-missing-authorization-in-wp-d4f33893</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13859%3A%20CWE-862%20Missing%20Authorization%20in%20wpcenter%20AffiliateX%20%E2%80%93%20Amazon%20Affiliate%20Plugin&amp;severity=medium&amp;id=6968ec9a4c611209ad10ace4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13062-cwe-434-unrestricted-upload-of-file-75b879c4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13062%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20divisupreme%20Supreme%20Modules%20Lite%20%E2%80%93%20Divi%20Theme%2C%20Extra%20Theme%20and%20Divi%20Builder&amp;severity=high&amp;id=6968ec9a4c611209ad10ace0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12895-cwe-862-missing-authorization-in-la-2326194c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12895%3A%20CWE-862%20Missing%20Authorization%20in%20Laborator%20Kalium%203%20%7C%20Creative%20WordPress%20%26%20WooCommerce%20Theme&amp;severity=medium&amp;id=6968ec9a4c611209ad10acdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22646-cwe-209-generation-of-error-message-42b8f4f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22646%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20SICK%20AG%20Incoming%20Goods%20Suite&amp;severity=medium&amp;id=6968ec9b4c611209ad10ad41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22645-cwe-200-exposure-of-sensitive-infor-8a1b00cb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22645%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SICK%20AG%20Incoming%20Goods%20Suite&amp;severity=medium&amp;id=6968ec9b4c611209ad10ad39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22644-cwe-598-use-of-get-request-method-w-f9cade54</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22644%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20SICK%20AG%20Incoming%20Goods%20Suite&amp;severity=medium&amp;id=6968ec9a4c611209ad10ad19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22643-cwe-20-improper-input-validation-in-371b592c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22643&amp;severity=null&amp;id=6968ec9a4c611209ad10ad11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22642-cwe-601-url-redirection-to-untruste-3c957cb1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22642&amp;severity=null&amp;id=6968ec9a4c611209ad10ad09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22641-cwe-285-improper-authorization-in-s-fdb80616</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22641&amp;severity=null&amp;id=6968ec9a4c611209ad10ad01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22640-cwe-284-improper-access-control-in--1338975e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22640&amp;severity=null&amp;id=6968ec9a4c611209ad10acf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22639-cwe-200-exposure-of-sensitive-infor-81002f0a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22639&amp;severity=null&amp;id=6968ec9a4c611209ad10acf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22638-cwe-601-url-redirection-to-untruste-9b73a328</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22638&amp;severity=null&amp;id=6968ec9a4c611209ad10ace9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22637-cwe-79-improper-neutralization-of-i-6e859694</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22637&amp;severity=null&amp;id=6968e9244c611209ad0e7136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0713-cwe-863-incorrect-authorization-in-s-380c37bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0713&amp;severity=null&amp;id=6968e9244c611209ad0e712e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0712-cwe-601-url-redirection-to-untrusted-0ab8d3d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0712&amp;severity=null&amp;id=6968e9244c611209ad0e7126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22920-cwe-1391-use-of-weak-credentials-in-0cee6b9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22920%3A%20CWE-1391%20Use%20of%20Weak%20Credentials%20in%20SICK%20AG%20TDC-X401GL&amp;severity=low&amp;id=6968e9254c611209ad0e71b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22919-cwe-79-improper-neutralization-of-i-7652367f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22919%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SICK%20AG%20TDC-X401GL&amp;severity=low&amp;id=6968e9254c611209ad0e71a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22918-cwe-1021-improper-restriction-of-re-b14062af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22918%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e71a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22917-cwe-770-allocation-of-resources-wit-aaaced2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22917%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e7198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22916-cwe-266-incorrect-privilege-assignm-d6f06f95</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22916%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e7190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22915-cwe-497-exposure-of-sensitive-syste-bee82d8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22915%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e7188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22914-cwe-266-incorrect-privilege-assignm-4e1a484c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22914%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e7180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22913-cwe-79-improper-neutralization-of-i-7e7b681e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9244c611209ad0e716e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isverified-emerges-from-stealth-with-voice-deepfak-5a56747b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=isVerified%20Emerges%20From%20Stealth%20With%20Voice%20Deepfake%20Detection%20Apps&amp;severity=medium&amp;id=6968e8e24c611209ad0d75b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22912-cwe-601-url-redirection-to-untruste-0836dc15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22912%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9244c611209ad0e7166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22911-cwe-798-use-of-hard-coded-credentia-f9297156</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22911%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9244c611209ad0e715e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22910-cwe-1391-use-of-weak-credentials-in-c48b460f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22910%3A%20CWE-1391%20Use%20of%20Weak%20Credentials%20in%20SICK%20AG%20TDC-X401GL&amp;severity=high&amp;id=6968e9244c611209ad0e7156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22909-cwe-284-improper-access-control-in--38bfe6ce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22909%3A%20CWE-284%20Improper%20Access%20Control%20in%20SICK%20AG%20TDC-X401GL&amp;severity=high&amp;id=6968e9244c611209ad0e714e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22908-cwe-266-incorrect-privilege-assignm-12035fba</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22908%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SICK%20AG%20TDC-X401GL&amp;severity=critical&amp;id=6968e9244c611209ad0e7146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22907-cwe-266-incorrect-privilege-assignm-26174fb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22907%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SICK%20AG%20TDC-X401GL&amp;severity=critical&amp;id=6968e9244c611209ad0e713e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-reprompt-attack-silently-siphons-microsoft-cop-70050aef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98Reprompt%E2%80%99%20Attack%20Silently%20Siphons%20Microsoft%20Copilot%20Data&amp;severity=low&amp;id=6968dad24c611209addfcef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0976-improper-input-validation-in-red-hat-6af7e9f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0976%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=6968db144c611209ade073ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targeted-espionage-leveraging-geopolitical-themes-1b4a1cae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targeted%20espionage%20leveraging%20geopolitical%20themes&amp;severity=medium&amp;id=696dfc59d302b072d996ad70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-chinas-hosting-ecosystem-18000-malware-c2-s-85e5f7b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20China&apos;s%20Hosting%20Ecosystem%3A%2018%2C000%2B%20Malware%20C2%20Servers%20Mapped%20Across%20Major%20ISPs&amp;severity=medium&amp;id=696df551d302b072d9926058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/model-security-is-the-wrong-frame-the-real-risk-is-f4112a00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Model%20Security%20Is%20the%20Wrong%20Frame%20%E2%80%93%20The%20Real%20Risk%20Is%20Workflow%20Security&amp;severity=low&amp;id=6969216753752d4047a49a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/battling-cryptojacking-botnets-and-iabs-x5bguest-d-2930c78d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Battling%20Cryptojacking%2C%20Botnets%2C%20and%20IABs%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Thu%2C%20Jan%2015th)&amp;severity=medium&amp;id=6968c8f10b074b1fa504091f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/central-maine-healthcare-data-breach-impacts-14500-be42e222</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Central%20Maine%20Healthcare%20Data%20Breach%20Impacts%20145%2C000%20Individuals&amp;severity=medium&amp;id=6968c5de0b074b1fa50040a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-legal-action-disrupts-redvds-cybercrime--d893183d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Legal%20Action%20Disrupts%20RedVDS%20Cybercrime%20Infrastructure%20Used%20for%20Online%20Fraud&amp;severity=low&amp;id=6968b75b0b074b1fa5e95ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-linux-malware-framework-targets-cloud-env-9d3bab6a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%20Linux%20Malware%20Framework%20Targets%20Cloud%20Environments&amp;severity=medium&amp;id=6968b76f0b074b1fa5e9ef87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-601393fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Fixed%20by%20Siemens%2C%20Schneider%2C%20Aveva%2C%20Phoenix%20Contact&amp;severity=medium&amp;id=6968b0550b074b1fa5d7b269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/traveler-information-stolen-in-eurail-data-breach-28d4714f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Traveler%20Information%20Stolen%20in%20Eurail%20Data%20Breach&amp;severity=medium&amp;id=6968a5c90b074b1fa5b3e28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/palo-alto-fixes-globalprotect-dos-flaw-that-can-cr-7a63a1ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Palo%20Alto%20Fixes%20GlobalProtect%20DoS%20Flaw%20That%20Can%20Crash%20Firewalls%20Without%20Login&amp;severity=high&amp;id=6968e1514c611209ad042ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14457-cwe-862-missing-authorization-in-gl-9efade58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14457%3A%20CWE-862%20Missing%20Authorization%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=low&amp;id=696891250b074b1fa58c19b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14448-cwe-79-improper-neutralization-of-i-9b530d45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=69687bcc0b074b1fa56e40e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67823-na-d453dfa5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67823%3A%20n%2Fa&amp;severity=high&amp;id=696a048eb22c7ad86858d3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-15-747be9e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-15&amp;severity=medium&amp;id=6969826b7c726673b691eb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67822-na-0432bac0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67822%3A%20n%2Fa&amp;severity=critical&amp;id=69695f797c726673b6518731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65368-na-d3cc52d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65368%3A%20n%2Fa&amp;severity=medium&amp;id=696958ff1ab3796b105ce50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67025-na-8103763e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67025%3A%20n%2Fa&amp;severity=medium&amp;id=6969557c1ab3796b1059780a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70893-na-2592c988</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70893%3A%20n%2Fa&amp;severity=high&amp;id=696951f81ab3796b10539cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70892-na-68687072</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70892%3A%20n%2Fa&amp;severity=critical&amp;id=696951f81ab3796b10539ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70891-na-8a5af78d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70891%3A%20n%2Fa&amp;severity=medium&amp;id=696951f81ab3796b10539ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70890-na-118b9885</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70890%3A%20n%2Fa&amp;severity=medium&amp;id=69694e761ab3796b105000fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65349-na-a0c6bc03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65349%3A%20n%2Fa&amp;severity=medium&amp;id=69694af11ab3796b104b1134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48077-na-7a20d12f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48077%3A%20n%2Fa&amp;severity=high&amp;id=6969476c1ab3796b1034af99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70303-na-9b8b01e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70303%3A%20n%2Fa&amp;severity=medium&amp;id=6969342c53752d4047cfdaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70302-na-d18ea1ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70302%3A%20n%2Fa&amp;severity=medium&amp;id=696930ac53752d4047cbfe72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70299-na-7c51b7c3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70299%3A%20n%2Fa&amp;severity=medium&amp;id=69692d3453752d4047c938cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70307-na-eadaa7a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70307%3A%20n%2Fa&amp;severity=high&amp;id=6969261c53752d4047c39ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70305-na-d3f062d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70305%3A%20n%2Fa&amp;severity=medium&amp;id=69691f1453752d40479e43e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70656-na-31371b51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70656%3A%20n%2Fa&amp;severity=high&amp;id=69691b9253752d4047972539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70298-na-841e237f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70298%3A%20n%2Fa&amp;severity=high&amp;id=69691b9253752d4047972536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70310-na-80f722d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70310%3A%20n%2Fa&amp;severity=medium&amp;id=696916c94c611209ad420da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70308-na-a598fbf7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70308%3A%20n%2Fa&amp;severity=high&amp;id=696916c94c611209ad420da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70304-na-f4ac57cf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70304%3A%20n%2Fa&amp;severity=high&amp;id=696916c94c611209ad420da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70309-na-3a33ddb9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70309%3A%20n%2Fa&amp;severity=medium&amp;id=696913454c611209ad3d9fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67246-na-c14e6dd7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67246%3A%20n%2Fa&amp;severity=high&amp;id=69690fc14c611209ad3adf0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67079-na-ee86966e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67079%3A%20n%2Fa&amp;severity=critical&amp;id=696908b94c611209ad2ef142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67078-na-40adadd0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67078%3A%20n%2Fa&amp;severity=medium&amp;id=696908b94c611209ad2ef13e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67077-na-fd090e1d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67077%3A%20n%2Fa&amp;severity=high&amp;id=696908b94c611209ad2ef13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67076-na-7a0522c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67076%3A%20n%2Fa&amp;severity=high&amp;id=696908b94c611209ad2ef136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67084-na-fb5e13bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67084%3A%20n%2Fa&amp;severity=critical&amp;id=696905364c611209ad2b4f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67083-na-be4e7ab4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67083%3A%20n%2Fa&amp;severity=medium&amp;id=696905364c611209ad2b4f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67082-na-d4d11422</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67082%3A%20n%2Fa&amp;severity=medium&amp;id=696905364c611209ad2b4f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67081-na-38911281</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67081%3A%20n%2Fa&amp;severity=medium&amp;id=696905364c611209ad2b4f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71019-na-3b79885b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71019%3A%20n%2Fa&amp;severity=high&amp;id=6968fe2e4c611209ad26113d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70744-na-02d37615</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70744%3A%20n%2Fa&amp;severity=high&amp;id=6968fe2e4c611209ad26113a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-15-17cfb709</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-15&amp;severity=low&amp;id=6968748e0b074b1fa5681360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0600-cwe-918-server-side-request-forgery--86bb8623</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0600%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=69681d11f809b25a98e646e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12166-cwe-89-improper-neutralization-of-s-c0bbbf6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12166%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69681d11f809b25a98e646db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14058-cwe-306-missing-authentication-for--f0f32602</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14058%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Lenovo%20Tab%20M11%20TB330FU%20TB330XU&amp;severity=low&amp;id=69681d11f809b25a98e646e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0421-cwe-252-unchecked-return-value-in-le-969dbc15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0421%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20Lenovo%20ThinkPad%20L13%20Gen%206%20BIOS&amp;severity=high&amp;id=6968198df809b25a98d552a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13455-cwe-290-authentication-bypass-by-sp-80e9a103</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13455%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Lenovo%20ThinkPlus%20FU100&amp;severity=high&amp;id=6968198df809b25a98d5529d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13454-cwe-319-cleartext-transmission-of-s-72e52ef0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13454%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Lenovo%20ThinkPlus%20FU100&amp;severity=medium&amp;id=6968198df809b25a98d5529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13453-cwe-311-missing-encryption-of-sensi-42865113</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13453%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Lenovo%20ThinkPlus%20FU100&amp;severity=medium&amp;id=6968198df809b25a98d55297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13154-cwe-59-improper-link-resolution-bef-c3602914</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13154%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=6968198df809b25a98d55294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0601-cwe-79-improper-neutralization-of-in-b5543384</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0601%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=69681608f809b25a98cc777c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0861-cwe-190-integer-overflow-or-wraparou-82abbb78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0861%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=696807fbf809b25a9881d78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23512-cwe-426-untrusted-search-path-in-su-529632de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23512%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=high&amp;id=696800f0f809b25a9857d26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0961-cwe-787-out-of-bounds-write-in-wires-cba205f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0961%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6967fd6ff809b25a98440574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0962-cwe-787-out-of-bounds-write-in-wires-1e32079b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0962%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6967fd6ff809b25a98440578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0960-cwe-835-loop-with-unreachable-exit-c-11784e4f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0960%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6967fd6ff809b25a98440570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0959-cwe-787-out-of-bounds-write-in-wires-6093b375</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0959%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6967fd6ff809b25a9844056c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-redvds-how-a-single-virtual-desktop-provide-81604c60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20RedVDS%3A%20How%20a%20single%20virtual%20desktop%20provider%20fueled%20worldwide%20cybercriminal%20operations&amp;severity=medium&amp;id=6968d02b0b074b1fa510bc12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22036-cwe-770-allocation-of-resources-wit-1655d009</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22036%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nodejs%20undici&amp;severity=medium&amp;id=6967ebd9f809b25a98d9ca09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-null-route-over-550-kimwolf-and-aisuru-e976d1a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Null-Route%20Over%20550%20Kimwolf%20and%20Aisuru%20Botnet%20Command%20Servers&amp;severity=medium&amp;id=69682be609a9118869f2d64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14557-cwe-79-improper-neutralization-of-i-ed1922b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14557%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Facebook%20Pixel&amp;severity=medium&amp;id=6967e85ff809b25a98c7765e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14556-cwe-79-improper-neutralization-of-i-44c620b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14556%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Flag&amp;severity=medium&amp;id=6967e85ff809b25a98c77656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33206-cwe-78-improper-neutralization-of-s-28460223</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33206%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20NSIGHT%20Graphics&amp;severity=high&amp;id=6967e189d0ff220b953a1231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23497-cwe-79-improper-neutralization-of-i-f0c46ca1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23497%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=low&amp;id=6967e189d0ff220b953a1236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infection-repeatedly-adds-scheduled-tasks-and-incr-69db298f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infection%20repeatedly%20adds%20scheduled%20tasks%20and%20increases%20traffic%20to%20the%20same%20C2%20domain%2C%20(Wed%2C%20Jan%2014th)&amp;severity=medium&amp;id=6967f375f809b25a98068854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23477-cwe-269-improper-privilege-manageme-39fd5320</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23477%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20RocketChat%20Rocket.Chat&amp;severity=high&amp;id=6967de03d0ff220b953260fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22819-cwe-366-race-condition-within-a-thr-2b5443e2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22819%3A%20CWE-366%3A%20Race%20Condition%20within%20a%20Thread%20in%20akinloluwami%20outray&amp;severity=medium&amp;id=6967de03d0ff220b953260fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22787-cwe-79-improper-neutralization-of-i-9574b0d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22787%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eKoopmans%20html2pdf.js&amp;severity=high&amp;id=6967e9c5f809b25a98cd9f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22779-cwe-113-improper-neutralization-of--173940b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22779%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20Neoteroi%20BlackSheep&amp;severity=medium&amp;id=6967e9c5f809b25a98cd9f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21889-cwe-284-improper-access-control-in--1c6049c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21889%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=6967c8edd0ff220b95d99078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37181-vulnerability-in-hewlett-packard-en-fae182dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37181%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=high&amp;id=6967c568d0ff220b95b357e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37185-vulnerability-in-hewlett-packard-en-ecdfaf9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37185%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=medium&amp;id=6967c568d0ff220b95b357ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37184-vulnerability-in-hewlett-packard-en-f41d52da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37184%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=critical&amp;id=6967c568d0ff220b95b357ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37183-vulnerability-in-hewlett-packard-en-29fa7cd5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37183%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=high&amp;id=6967c568d0ff220b95b357e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37182-vulnerability-in-hewlett-packard-en-45744db8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37182%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=high&amp;id=6967c568d0ff220b95b357e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14242-integer-overflow-or-wraparound-in-r-c62b4962</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14242%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6967b759d0ff220b956d62cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-agents-are-becoming-privilege-escalation-paths-13828f5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Agents%20Are%20Becoming%20Authorization%20Bypass%20Paths&amp;severity=medium&amp;id=6967bf72d0ff220b959531d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22820-cwe-367-time-of-check-time-of-use-t-8ccdd136</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22820%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20akinloluwami%20outray&amp;severity=medium&amp;id=6967b3d8d0ff220b954bfaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redvds-cybercrime-service-disrupted-by-microsoft-a-c57ccfa2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RedVDS%20Cybercrime%20Service%20Disrupted%20by%20Microsoft%20and%20Law%20Enforcement&amp;severity=medium&amp;id=6967b01cd0ff220b952e52dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22240-cwe-312-cleartext-storage-of-sensit-5905588f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22240%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967b065d0ff220b95304c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22239-cwe-400-uncontrolled-resource-consu-fbd10b94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22239%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967accdd0ff220b951852aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22238-cwe-306-missing-authentication-for--9047ed73</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22238%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967accdd0ff220b951852a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22237-cwe-200-exposure-of-sensitive-infor-f5ddd129</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22237%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967accdd0ff220b951852a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22236-cwe-287-improper-authentication-in--2b9aa917</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22236%3A%20CWE-287%20Improper%20Authentication%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967accdd0ff220b951852a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9142-cwe-22-improper-limitation-of-a-path-8bdd81d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9142%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;).%20in%20checkpoint%20Hramony%20SASE&amp;severity=high&amp;id=6967accdd0ff220b9518529e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sicarii-ransomware-truth-vs-myth-235251a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sicarii%20Ransomware%3A%20Truth%20vs%20Myth&amp;severity=medium&amp;id=6967a966d0ff220b9507e8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-c-ares-dll-side-loading-to-bypass--52eff2b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20c-ares%20DLL%20Side-Loading%20to%20Bypass%20Security%20and%20Deploy%20Malware&amp;severity=medium&amp;id=6967a91cd0ff220b9503dcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/predator-spyware-turns-failed-attacks-into-intelli-48a342df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Predator%20Spyware%20Turns%20Failed%20Attacks%20Into%20Intelligence%20for%20Future%20Exploits&amp;severity=medium&amp;id=6967a1d08330e067166c873f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14317-cwe-359-exposure-of-private-persona-8d49fc92</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14317%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Emaintenance%20Crazy%20Bubble%20Tea&amp;severity=high&amp;id=69679e808330e0671667a5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13175-cwe-549-missing-password-field-mask-102e56e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13175%3A%20CWE-549%20Missing%20Password%20Field%20Masking%20in%20YSoft%20SafeQ%206&amp;severity=medium&amp;id=696790718330e067162c1a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14338-cwe-284-improper-access-control-in--b3e41c5b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14338%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20https%3A%2F%2Fgithub.com%2FShadowBlip%20inputplumber&amp;severity=high&amp;id=696785e78330e06716fcefd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66005-cwe-863-improper-authorization-in-h-069d8bbd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66005%3A%20CWE-863%3A%20Improper%20Authorization%20in%20https%3A%2F%2Fgithub.com%2FShadowBlip%20inputplumber&amp;severity=high&amp;id=696785e78330e06716fcefd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fixes-critical-fortisiem-flaw-allowing-un-978a6498</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Fixes%20Critical%20FortiSIEM%20Flaw%20Allowing%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=6967bf72d0ff220b959531d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66169-cypher-injection-in-apache-software-7709fb01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66169%3A%20Cypher%20Injection%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20Neo4j&amp;severity=medium&amp;id=696785e78330e06716fcefdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67859-cwe-287-improper-authentication-in--cbf2ed7a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67859%3A%20CWE-287%3A%20Improper%20Authentication%20in%20https%3A%2F%2Fgithub.com%2Flinrunner%20TLP&amp;severity=medium&amp;id=696782608330e06716f2b246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-64-of-3rd-party-applications-access-s-12ef4635</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Research%3A%2064%25%20of%203rd-Party%20Applications%20Access%20Sensitive%20Data%20Without%20Justification&amp;severity=medium&amp;id=6967bf72d0ff220b959531d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0647-cwe-226-sensitive-information-in-res-be4654e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0647%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20Arm%20Neoverse-N2&amp;severity=high&amp;id=6967aad3d0ff220b950c94e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/robo-advisor-betterment-discloses-data-breach-d4f5764f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Robo-Advisor%20Betterment%20Discloses%20Data%20Breach&amp;severity=medium&amp;id=696777a08330e06716d4231f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0532-cwe-918-server-side-request-forgery--12583095</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0532%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=696770cc8330e06716a7ebca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0529-cwe-129-improper-validation-of-array-7a873c8b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0529%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69676d488330e0671697f6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-vulnerabilities-in-forti-ed3747fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20Vulnerabilities%20in%20FortiFone%2C%20FortiSIEM&amp;severity=critical&amp;id=696769928330e067167f6c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-144-firefox-147-patch-high-severity-vulnera-87319021</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20144%2C%20Firefox%20147%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=696769928330e067167f6c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-fixes-114-windows-flaws-in-january-2026--f28a2b16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Fixes%20114%20Windows%20Flaws%20in%20January%202026%20Patch%2C%20One%20Actively%20Exploited&amp;severity=critical&amp;id=6967bf72d0ff220b959531d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-nodejs-vulnerability-can-cause-server-cra-6450e38b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Node.js%20Vulnerability%20Can%20Cause%20Server%20Crashes%20via%20async_hooks%20Stack%20Overflow&amp;severity=critical&amp;id=6967bf72d0ff220b959531dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15475-cwe-862-missing-authorization-in-pa-598bd777</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15475%3A%20CWE-862%20Missing%20Authorization%20in%20payhere%20PayHere%20Payment%20Gateway&amp;severity=medium&amp;id=69673f948330e06716b84f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15376-cwe-352-cross-site-request-forgery--7e0ceddc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15376%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rndsand81%20Stopwords%20for%20comments&amp;severity=medium&amp;id=69673f948330e06716b84f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14173-cwe-862-missing-authorization-in-pe-02506ee5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14173%3A%20CWE-862%20Missing%20Authorization%20in%20perfitdev%20Perfit%20WooCommerce&amp;severity=medium&amp;id=69673f948330e06716b84f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14846-cwe-352-cross-site-request-forgery--57a0ae63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14846%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20socialchampio%20Auto%20Post%20to%20Social%20Media%20from%20Social%20Champ&amp;severity=medium&amp;id=69673f948330e06716b84f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15513-cwe-863-incorrect-authorization-in--da9ac488</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15513%3A%20CWE-863%20Incorrect%20Authorization%20in%20floattechnologies%20Float%20Payment%20Gateway&amp;severity=medium&amp;id=69673f948330e06716b84f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0741-cwe-79-improper-neutralization-of-in-dba929c6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0741%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20electric-studio%20Electric%20Studio%20Download%20Counter&amp;severity=medium&amp;id=69673f948330e06716b84fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15512-cwe-862-missing-authorization-in-ap-2489c516</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15512%3A%20CWE-862%20Missing%20Authorization%20in%20aplazopayment%20Aplazo%20Payment%20Gateway&amp;severity=medium&amp;id=69673f948330e06716b84f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0813-cwe-79-improper-neutralization-of-in-4d411496</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasannasp%20Short%20Link&amp;severity=medium&amp;id=69673f958330e06716b84fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0734-cwe-79-improper-neutralization-of-in-dba6a60d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0734%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dfieldfl%20WP%20Allowed%20Hosts&amp;severity=medium&amp;id=69673f948330e06716b84f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0812-cwe-79-improper-neutralization-of-in-b6ee1ce6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0812%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20guillaumev%20LinkedIn%20SC&amp;severity=medium&amp;id=69673f958330e06716b84fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14770-cwe-89-improper-neutralization-of-s-d50da540</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14770%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tridenttechnolabs%20Shipping%20Rate%20By%20Cities&amp;severity=high&amp;id=69673f948330e06716b84f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0739-cwe-79-improper-neutralization-of-in-520ad265</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webbu%20WMF%20Mobile%20Redirector&amp;severity=medium&amp;id=69673f948330e06716b84fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pluggyape-malware-uses-signal-and-whatsapp-to-targ-c63e8573</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PLUGGYAPE%20Malware%20Uses%20Signal%20and%20WhatsApp%20to%20Target%20Ukrainian%20Defense%20Forces&amp;severity=medium&amp;id=6967bf72d0ff220b959531df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15486-cwe-79-improper-neutralization-of-i-3bc01800</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kunzemarketing%20Kunze%20Law&amp;severity=medium&amp;id=69672e018330e067168f4031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14502-cwe-22-improper-limitation-of-a-pat-fd560aec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14502%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20vaghasia3%20News%20and%20Blog%20Designer%20Bundle&amp;severity=critical&amp;id=69672e008330e067168f3fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14854-cwe-862-missing-authorization-in-no-eccb7f97</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14854%3A%20CWE-862%20Missing%20Authorization%20in%20nofearinc%20WP-CRM%20System%20%E2%80%93%20Manage%20Clients%20and%20Projects&amp;severity=medium&amp;id=69672e018330e067168f400f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12178-cwe-79-improper-neutralization-of-i-f1518670</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aankit%20SpiceForms%20Form%20Builder&amp;severity=medium&amp;id=69672e008330e067168f3fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14613-cwe-918-server-side-request-forgery-7dc03cb7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14613%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20daschmi%20GetContentFromURL&amp;severity=high&amp;id=69672e008330e067168f3fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15021-cwe-79-improper-neutralization-of-i-38ba238a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15021%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gothamdev%20Gotham%20Block%20Extra%20Light&amp;severity=medium&amp;id=69672e018330e067168f401c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15266-cwe-79-improper-neutralization-of-i-d3581586</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ahmadgb%20GeekyBot%20%E2%80%94%20Generate%20AI%20Content%20Without%20Prompt%2C%20Chatbot%20and%20Lead%20Generation&amp;severity=high&amp;id=69672e018330e067168f4020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15020-cwe-22-improper-limitation-of-a-pat-e8336307</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15020%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gothamdev%20Gotham%20Block%20Extra%20Light&amp;severity=medium&amp;id=69672e018330e067168f4018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14464-cwe-200-exposure-of-sensitive-infor-2135fa14</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14464%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kiwicommerce%20PDF%20Resume%20Parser&amp;severity=medium&amp;id=69672e008330e067168f3fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14880-cwe-862-missing-authorization-in-ne-57f16c66</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14880%3A%20CWE-862%20Missing%20Authorization%20in%20netcashpaynow%20Netcash%20WooCommerce%20Payment%20Gateway&amp;severity=medium&amp;id=69672e018330e067168f4014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14482-cwe-862-missing-authorization-in-cr-8f4a578b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14482%3A%20CWE-862%20Missing%20Authorization%20in%20crushpics%20Crush.pics%20Image%20Optimizer%20%E2%80%93%20Image%20Compression%20and%20Optimization&amp;severity=medium&amp;id=69672e008330e067168f3fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0635-cwe-862-missing-authorization-in-tec-7cefa81a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0635%3A%20CWE-862%20Missing%20Authorization%20in%20techknowprime%20Responsive%20Accordion%20Slider&amp;severity=medium&amp;id=69672e028330e067168f4045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15378-cwe-79-improper-neutralization-of-i-ba2c79e8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajseidl%20AJS%20Footnotes&amp;severity=high&amp;id=69672e018330e067168f402d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0678-cwe-89-improper-neutralization-of-sp-4acf0e73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0678%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20logiceverest%20Shipping%20Rates%20by%20City%20for%20WooCommerce&amp;severity=medium&amp;id=69672e028330e067168f4049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15283-cwe-79-improper-neutralization-of-i-8dbfdf0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15283%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeroenpeters1986%20Name%20Directory&amp;severity=high&amp;id=69672e018330e067168f4024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14379-cwe-79-improper-neutralization-of-i-585950f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adoncreatives%20Testimonials%20Creator&amp;severity=medium&amp;id=69672e008330e067168f3fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15377-cwe-352-cross-site-request-forgery--141ac85c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15377%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20abage%20Sosh%20Share%20Buttons&amp;severity=medium&amp;id=69672e018330e067168f4029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14301-cwe-22-improper-limitation-of-a-pat-07697570</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14301%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20woosaai%20Integration%20Opvius%20AI%20for%20WooCommerce&amp;severity=critical&amp;id=69672e008330e067168f3fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0680-cwe-79-improper-neutralization-of-in-74800aee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0680%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vk011%20Real%20Post%20Slider%20Lite&amp;severity=medium&amp;id=69672e028330e067168f404e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14725-cwe-79-improper-neutralization-of-i-c566dc8a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sablab%20Internal%20Link%20Builder&amp;severity=medium&amp;id=69672e008330e067168f3fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0717-cwe-200-exposure-of-sensitive-inform-07f89079</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0717%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20lottiefile%20LottieFiles&amp;severity=medium&amp;id=69672e028330e067168f4053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14389-cwe-352-cross-site-request-forgery--33d20633</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14389%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20obridgeacademy%20WPBlogSyn&amp;severity=medium&amp;id=69672e008330e067168f3fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14615-cwe-352-cross-site-request-forgery--8be6ea33</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14615%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dashboardbuilder%20DASHBOARD%20BUILDER%20%E2%80%93%20WordPress%20plugin%20for%20Charts%20and%20Graphs&amp;severity=high&amp;id=69672e008330e067168f3fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0594-cwe-79-improper-neutralization-of-in-52c6a368</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0594%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mallsop%20List%20Site%20Contributors&amp;severity=medium&amp;id=69672e018330e067168f4036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22718-cwe-78-improper-neutralization-of-s-645c1589</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22718%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Spring%20CLI%20VSCode%20Extension&amp;severity=medium&amp;id=696726f68330e067167ea630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68959-cwe-200-exposure-of-sensitive-infor-f3b7fdc2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68959%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68970-cwe-20-improper-input-validation-in-1bf861b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68970%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703d08330e06716e6ab01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68963-cwe-521-weak-password-requirements--931fa1d2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68963%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68967-cwe-264-permissions-privileges-and--b0d80b56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68967%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703d08330e06716e6aaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68966-cwe-200-exposure-of-sensitive-infor-5d3172db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68966%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68965-cwe-200-exposure-of-sensitive-infor-63635eaf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68965%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68964-cwe-20-improper-input-validation-in-3736734f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68964%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68969-cwe-362-concurrent-execution-using--e9d3a639</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68969%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703d08330e06716e6aafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68968-cwe-6-j2ee-misconfiguration-insuffi-0c867b76</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68968%3A%20CWE-6%20J2EE%20Misconfiguration%3A%20Insufficient%20Session-ID%20Length%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=696703d08330e06716e6aaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68962-cwe-362-concurrent-execution-using--28159f71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68962%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68961-cwe-362-concurrent-execution-using--e1ba188a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68961%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68960-cwe-362-concurrent-execution-using--a25faefa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68960%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=696703cf8330e06716e6aac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68958-cwe-362-concurrent-execution-using--21022c2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68958%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=696703cf8330e06716e6aab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68957-cwe-362-concurrent-execution-using--a12d414e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68957%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=696703cf8330e06716e6aab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68956-cwe-362-concurrent-execution-using--b5b1cfa8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68956%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6966f9438330e06716ca9adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68955-cwe-362-concurrent-execution-using--bc6a8cd6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68955%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6966f9438330e06716ca9ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12053-cwe-787-out-of-bounds-write-in-insy-7102c50c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12053%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O%20tools&amp;severity=high&amp;id=6966f9438330e06716ca9ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12052-cwe-787-out-of-bounds-write-in-insy-83483d0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12052%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O%20tools&amp;severity=high&amp;id=6966f9438330e06716ca9ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12051-cwe-787-out-of-bounds-write-in-insy-75e654b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12051%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O%20tools&amp;severity=high&amp;id=6966f9438330e06716ca9ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12050-cwe-787-out-of-bounds-write-in-insy-fd31fbc4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12050%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O%20tools&amp;severity=high&amp;id=6966eeb78330e067167d7c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-14-0f81328d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-14&amp;severity=medium&amp;id=69682fce09a911886913344a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67835-na-8c02ea3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67835%3A%20n%2Fa&amp;severity=medium&amp;id=6967e9c5f809b25a98cd9f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67834-na-25eaab25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67834%3A%20n%2Fa&amp;severity=medium&amp;id=6967e9c5f809b25a98cd9f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67833-na-0aadd67f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67833%3A%20n%2Fa&amp;severity=medium&amp;id=6967e9c5f809b25a98cd9f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70747-na-6eceb0b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70747%3A%20n%2Fa&amp;severity=high&amp;id=6967d6fcd0ff220b9516d4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63644-na-aa49f809</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63644%3A%20n%2Fa&amp;severity=medium&amp;id=6967d6fcd0ff220b9516d49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71021-na-70779c9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71021%3A%20n%2Fa&amp;severity=high&amp;id=6967d378d0ff220b95084e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65397-na-bf9b57ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65397%3A%20n%2Fa&amp;severity=medium&amp;id=6967d378d0ff220b95084e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65396-na-f02ae953</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65396%3A%20n%2Fa&amp;severity=medium&amp;id=6967d002d0ff220b95fb6486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67399-na-e9d40e90</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67399%3A%20n%2Fa&amp;severity=medium&amp;id=6967c1ebd0ff220b95a1807b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70968-na-945bbebb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70968%3A%20n%2Fa&amp;severity=critical&amp;id=6967c1ebd0ff220b95a18078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56226-na-a4085a93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56226%3A%20n%2Fa&amp;severity=medium&amp;id=6967accdd0ff220b9518529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-14-ed203902</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-14&amp;severity=low&amp;id=696757fa8330e0671614d4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22686-cwe-693-protection-mechanism-failur-1e5297be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22686%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20agentfront%20enclave&amp;severity=critical&amp;id=6966d4a6a60475309fc2e5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0716-buffer-access-with-incorrect-length--6cbd3f80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0716%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6966d122a60475309fc20b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23478-cwe-602-client-side-enforcement-of--103cf445</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23478%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20calcom%20cal.com&amp;severity=critical&amp;id=6966bf90a60475309fb963d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68947-cwe-862-missing-authorization-in-ns-af41b690</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68947%3A%20CWE-862%20Missing%20Authorization%20in%20NSecsoft%20NSecKrnl&amp;severity=medium&amp;id=6966b887a60475309fb6f589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0543-cwe-20-improper-input-validation-in--f0bbf8e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0543%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=6966b887a60475309fb6f593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0531-cwe-770-allocation-of-resources-with-c6d54bb3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0531%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=6966b887a60475309fb6f590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0530-cwe-770-allocation-of-resources-with-639320fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0530%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=6966b503a60475309fb63c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0528-cwe-129-improper-validation-of-array-9efcc787</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0528%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Metricbeat&amp;severity=medium&amp;id=6966b503a60475309fb63c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-exploited-windows-zero-day-111-o-50da8e88</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Exploited%20Windows%20Zero-Day%2C%20111%20Other%20Vulnerabilities&amp;severity=medium&amp;id=6966a33da60475309fab3bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22871-cwe-22-improper-limitation-of-a-pat-7c90d0ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22871%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DataDog%20guarddog&amp;severity=high&amp;id=6966b182a60475309fb4b276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22870-cwe-409-improper-handling-of-highly-2e700db7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22870%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20DataDog%20guarddog&amp;severity=high&amp;id=6966b182a60475309fb4b272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15056-cwe-74-improper-neutralization-of-s-63bac5ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Slab%20Quill&amp;severity=medium&amp;id=6966b182a60475309fb4b26e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22869-cwe-94-improper-control-of-generati-ef740212</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22869%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20eigent-ai%20eigent&amp;severity=high&amp;id=6966adfba60475309fb28999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22868-cwe-20-improper-input-validation-in-8854a076</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22868%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ethereum%20go-ethereum&amp;severity=high&amp;id=6966adfba60475309fb28995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22862-cwe-20-improper-input-validation-in-81bb4629</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22862%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ethereum%20go-ethereum&amp;severity=high&amp;id=6966adfba60475309fb28991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22861-cwe-252-unchecked-return-value-in-i-cb241259</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22861%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6966bf90a60475309fb963cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21301-null-pointer-dereference-cwe-476-in-31260b18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21301%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=6966bf90a60475309fb963e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21299-out-of-bounds-write-cwe-787-in-adob-dab34463</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21299%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=6966bf90a60475309fb963e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21298-out-of-bounds-write-cwe-787-in-adob-d04f0a45</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21298%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=6966bc0ba60475309fb87b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21300-null-pointer-dereference-cwe-476-in-b283b402</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21300%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=6966e30ba60475309f63f224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21303-out-of-bounds-read-cwe-125-in-adobe-3f2489e0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21303%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=6966e30ba60475309f63f22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21302-out-of-bounds-read-cwe-125-in-adobe-aac579fa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21302%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=6966e30ba60475309f63f227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37186-vulnerability-in-hewlett-packard-en-ffaa4463</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37186%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Virtual%20Intranet%20Access%20(VIA)&amp;severity=high&amp;id=6966e30ba60475309f63f221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37179-vulnerability-in-hewlett-packard-en-57d0742d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37179%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=6966aa78a60475309fb0883d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37178-vulnerability-in-hewlett-packard-en-2fe753cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37178%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=6966aa78a60475309fb0883a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37177-vulnerability-in-hewlett-packard-en-b5cd1b64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37177%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=6966aa78a60475309fb08837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37176-vulnerability-in-hewlett-packard-en-ac7edbf4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37176%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=6966aa78a60475309fb08834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37175-vulnerability-in-hewlett-packard-en-c6d1e731</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37175%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb08831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21308-out-of-bounds-read-cwe-125-in-adobe-bd88ab9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21308%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=6966aa79a60475309fb08853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21307-out-of-bounds-write-cwe-787-in-adob-8d50c26a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21307%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=6966aa79a60475309fb08850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/direct-and-reverse-nfc-relay-attacks-being-used-to-2de4fe54</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Direct%20and%20reverse%20NFC%20relay%20attacks%20being%20used%20to%20steal%20money%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6966a72ea60475309faf515d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37174-vulnerability-in-hewlett-packard-en-7b5a2eb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37174%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb0882e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37173-vulnerability-in-hewlett-packard-en-17519006</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37173%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb0882b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37172-vulnerability-in-hewlett-packard-en-3026c02b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37172%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb08828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37171-vulnerability-in-hewlett-packard-en-03bd6576</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37171%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb08825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37170-vulnerability-in-hewlett-packard-en-d82bf12b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37170%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb08822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37169-vulnerability-in-hewlett-packard-en-6bff60b2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37169%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966a6f3a60475309faf46db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37168-vulnerability-in-hewlett-packard-en-2c275581</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37168%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966a6f3a60475309faf46d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21306-out-of-bounds-write-cwe-787-in-adob-eac442d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21306%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Sampler&amp;severity=high&amp;id=6966e30ba60475309f63f22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-critical-apache-tika-bug-in-coldfusi-0df4d5be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Critical%20Apache%20Tika%20Bug%20in%20ColdFusion&amp;severity=critical&amp;id=6966a33da60475309fab3baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22817-cwe-347-improper-verification-of-cr-d41263e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22817%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20honojs%20hono&amp;severity=high&amp;id=6966a38da60475309fabea79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22818-cwe-347-improper-verification-of-cr-8537c4c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22818%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20honojs%20hono&amp;severity=high&amp;id=6966a38da60475309fabea7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21287-use-after-free-cwe-416-in-adobe-sub-3bd7fe33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21287%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6966a38da60475309fabea76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22814-cwe-915-improperly-controlled-modif-4d391c99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22814%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20adonisjs%20lucid&amp;severity=high&amp;id=6966a38da60475309fabea81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-magecart-network-uncovered-disrupting-online-s-4ec647ba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Magecart%20Network%20Uncovered%3A%20Disrupting%20Online%20Shoppers%20Worldwide&amp;severity=medium&amp;id=696777e78330e06716d549fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22809-cwe-1333-inefficient-regular-expres-f95190c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22809%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20AmauriC%20tarteaucitron.js&amp;severity=medium&amp;id=69669feba60475309fa994da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21305-out-of-bounds-write-cwe-787-in-adob-64ad7065</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21305%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=69669feba60475309fa994d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68925-cwe-347-improper-verification-of-cr-5efac3a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68925%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20samrocketman%20jervis&amp;severity=medium&amp;id=69669feba60475309fa994ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68704-cwe-330-use-of-insufficiently-rando-e98de218</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68704%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669feba60475309fa994ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68703-cwe-326-inadequate-encryption-stren-990b39e6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68703%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669feba60475309fa994e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68702-cwe-327-use-of-a-broken-or-risky-cr-f132ccf1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68702%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669feba60475309fa994e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68701-cwe-327-use-of-a-broken-or-risky-cr-4c22d348</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68701%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669feba60475309fa994de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68931-cwe-287-improper-authentication-in--2b2fc86c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68931%3A%20CWE-287%3A%20Improper%20Authentication%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669c68a60475309fa82b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68698-cwe-327-use-of-a-broken-or-risky-cr-b21acaf5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68698%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669c68a60475309fa82b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/january-2026-microsoft-patch-tuesday-summary-tue-j-0a0405a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=January%202026%20Microsoft%20Patch%20Tuesday%20Summary%2C%20(Tue%2C%20Jan%2013th)&amp;severity=medium&amp;id=696698b5a60475309fa620ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21283-heap-based-buffer-overflow-cwe-122--ef8206b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21283%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=696698e5a60475309fa629b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21281-heap-based-buffer-overflow-cwe-122--54422115</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21281%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69669561a60475309fa56558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68949-cwe-134-use-of-externally-controlle-38c1a8e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68949%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69669561a60475309fa56543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21280-untrusted-search-path-cwe-426-in-ad-c0a78b01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21280%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69669561a60475309fa56555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21288-null-pointer-dereference-cwe-476-in-24b1dbbe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21288%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=69669561a60475309fa5655b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21277-heap-based-buffer-overflow-cwe-122--099a2ea6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21277%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69669561a60475309fa5654f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21304-heap-based-buffer-overflow-cwe-122--1e19d0a3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21304%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69669561a60475309fa5655e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21275-access-of-uninitialized-pointer-cwe-66ab4305</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21275%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69669561a60475309fa56549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21278-out-of-bounds-read-cwe-125-in-adobe-7916f80b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21278%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=69669561a60475309fa56552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21276-access-of-uninitialized-pointer-cwe-d7c4dc57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21276%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69669561a60475309fa5654c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68271-cwe-95-improper-neutralization-of-d-1211a650</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68271%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20OpenC3%20cosmos&amp;severity=critical&amp;id=69669561a60475309fa56540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21267-improper-neutralization-of-special--6f519a3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21267%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21271-improper-input-validation-cwe-20-in-85aaadc2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21271%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21274-incorrect-authorization-cwe-863-in--714788af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21274%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21272-improper-input-validation-cwe-20-in-c05090a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21272%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21268-improper-input-validation-cwe-20-in-ef4cc6cb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21268%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21226-cwe-502-deserialization-of-untruste-4efdfff3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21226%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20Core%20shared%20client%20library%20for%20Python&amp;severity=high&amp;id=69668e5fa60475309fa0810b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20941-cwe-59-improper-link-resolution-bef-c8d2e5a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20941%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae4a60475309f9ae208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20958-cwe-918-server-side-request-forgery-a336cafb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20958%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69668ae6a60475309f9ae265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20957-cwe-191-integer-underflow-wrap-or-w-beace7a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20957%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae6a60475309f9ae262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20952-cwe-416-use-after-free-in-microsoft-148a371b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20952%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20950-cwe-416-use-after-free-in-microsoft-49c6cffa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20950%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20949-cwe-284-improper-access-control-in--f5d5f45b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20949%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20948-cwe-822-untrusted-pointer-dereferen-af2d5ad6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20948%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20939-cwe-200-exposure-of-sensitive-infor-f6b76fca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20939%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae4a60475309f9ae202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20937-cwe-200-exposure-of-sensitive-infor-7471f287</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20937%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae4a60475309f9ae1fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20936-cwe-125-out-of-bounds-read-in-micro-fe2e6d31</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20936%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae4a60475309f9ae1f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20935-cwe-822-untrusted-pointer-dereferen-727d597e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20935%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=69668ae4a60475309f9ae1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20931-cwe-73-external-control-of-file-nam-d54e259d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20931%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20929-cwe-284-improper-access-control-in--e2a17c27</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20929%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20874-cwe-362-concurrent-execution-using--37162a65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20874%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae1a60475309f9ae16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20873-cwe-362-concurrent-execution-using--ba55325a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20873%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae1a60475309f9ae16c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20872-cwe-73-external-control-of-file-nam-11a37ee2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20872%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae1a60475309f9ae169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20871-cwe-416-use-after-free-in-microsoft-bfbec2c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20871%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69668ae1a60475309f9ae166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20870-cwe-416-use-after-free-in-microsoft-2d7ed236</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20870%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae1a60475309f9ae163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20868-cwe-122-heap-based-buffer-overflow--bc12b543</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20868%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae13c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20867-cwe-362-concurrent-execution-using--2fb4c3f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20867%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20866-cwe-362-concurrent-execution-using--06e586bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20866%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20863-cwe-415-double-free-in-microsoft-wi-29a97616</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20863%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69668ae0a60475309f9ae12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20862-cwe-200-exposure-of-sensitive-infor-f29a4bfa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20862%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69668ae0a60475309f9ae12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20861-cwe-362-concurrent-execution-using--6d97d24b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20861%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21219-cwe-416-use-after-free-in-microsoft-32eb6c70</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21219%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20SDK&amp;severity=high&amp;id=69668ae6a60475309f9ae274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20854-cwe-416-use-after-free-in-microsoft-6a50b1f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20854%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae0a60475309f9ae0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20853-cwe-362-concurrent-execution-using--5ea47f9c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20853%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20849-cwe-807-reliance-on-untrusted-input-9e4224ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20849%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20848-cwe-362-concurrent-execution-using--ca362173</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20848%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20843-cwe-284-improper-access-control-in--64bb6f45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20843%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adea60475309f9ae0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20947-cwe-89-improper-neutralization-of-s-0db09315</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20947%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69668ae5a60475309f9ae22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21224-cwe-121-stack-based-buffer-overflow-61104c02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21224%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=69668ae6a60475309f9ae27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21221-cwe-362-concurrent-execution-using--975da00a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21221%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae6a60475309f9ae277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20830-cwe-362-concurrent-execution-using--95441eb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20830%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%20Server%202025&amp;severity=high&amp;id=69668adda60475309f9adfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20963-cwe-502-deserialization-of-untruste-a7ea6daa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20963%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=critical&amp;id=69668ae6a60475309f9ae26e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20959-cwe-79-improper-neutralization-of-i-fd5c91f6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20959%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69668ae6a60475309f9ae268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20956-cwe-822-untrusted-pointer-dereferen-ab8c056c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20956%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae6a60475309f9ae25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20955-cwe-822-untrusted-pointer-dereferen-7f81c789</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20955%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20953-cwe-416-use-after-free-in-microsoft-f245d44e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20953%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20951-cwe-20-improper-input-validation-in-ba0ca05b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20951%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69668ae5a60475309f9ae23b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20946-cwe-125-out-of-bounds-read-in-micro-902c6400</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20946%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20944-cwe-125-out-of-bounds-read-in-micro-c19f96ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20944%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20943-cwe-426-untrusted-search-path-in-mi-2b8c5ec3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20943%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Microsoft%20Office%202016&amp;severity=high&amp;id=69668ae4a60475309f9ae20b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20940-cwe-822-untrusted-pointer-dereferen-95beac17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20940%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae4a60475309f9ae205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20938-cwe-822-untrusted-pointer-dereferen-78e0153f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20938%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69668ae4a60475309f9ae1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20934-cwe-362-concurrent-execution-using--ef76d3ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20934%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae4a60475309f9ae1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20932-cwe-200-exposure-of-sensitive-infor-cb74b003</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20932%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae4a60475309f9ae1f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20927-cwe-362-concurrent-execution-using--66aed030</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20927%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae3a60475309f9ae1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20926-cwe-362-concurrent-execution-using--645ca07f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20926%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20925-cwe-73-external-control-of-file-nam-36e34a31</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20925%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae3a60475309f9ae1cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20924-cwe-416-use-after-free-in-microsoft-8d0061e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20924%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae3a60475309f9ae1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20923-cwe-416-use-after-free-in-microsoft-2035408f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20923%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae3a60475309f9ae1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20922-cwe-122-heap-based-buffer-overflow--dbc11d35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20922%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20921-cwe-362-concurrent-execution-using--88a80120</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20921%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20920-cwe-416-use-after-free-in-microsoft-a1bff524</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20920%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69668ae3a60475309f9ae1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20919-cwe-362-concurrent-execution-using--d977d261</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20919%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae1a60475309f9ae17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20918-cwe-362-concurrent-execution-using--8643b6f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20918%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae1a60475309f9ae17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20877-cwe-416-use-after-free-in-microsoft-f6917a76</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20877%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae1a60475309f9ae178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20876-cwe-122-heap-based-buffer-overflow--52744e00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20876%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=69668ae1a60475309f9ae175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20875-cwe-476-null-pointer-dereference-in-4a071c7c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20875%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae1a60475309f9ae172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20869-cwe-362-concurrent-execution-using--e8bd4abd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20869%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20865-cwe-416-use-after-free-in-microsoft-c0ec4798</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20865%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20864-cwe-122-heap-based-buffer-overflow--344e47f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20864%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20860-cwe-843-access-of-resource-using-in-cd4b05aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20860%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20859-cwe-416-use-after-free-in-microsoft-6ca956c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20859%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae0a60475309f9ae10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20858-cwe-416-use-after-free-in-microsoft-0d710ae0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20858%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20857-cwe-822-untrusted-pointer-dereferen-358eda2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20857%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20856-cwe-20-improper-input-validation-in-2ac6a21a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20856%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20852-cwe-266-incorrect-privilege-assignm-a2ac47df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20852%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20851-cwe-125-out-of-bounds-read-in-micro-8ff7b70d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20851%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69668ae0a60475309f9ae0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20847-cwe-200-exposure-of-sensitive-infor-f86fc0ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20847%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adea60475309f9ae0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20844-cwe-416-use-after-free-in-microsoft-30bd69d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20844%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adea60475309f9ae0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20842-cwe-416-use-after-free-in-microsoft-6b3ebf07</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20842%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69668adea60475309f9ae09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20840-cwe-122-heap-based-buffer-overflow--82f0ae34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20840%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adea60475309f9ae09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20839-cwe-284-improper-access-control-in--901aa39c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20839%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adea60475309f9ae097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20838-cwe-209-generation-of-error-message-b965f687</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20838%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=69668adea60475309f9ae094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20837-cwe-122-heap-based-buffer-overflow--7fb07bde</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20837%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668adea60475309f9ae091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20836-cwe-362-concurrent-execution-using--af7fa2bf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20836%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adea60475309f9ae08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20835-cwe-125-out-of-bounds-read-in-micro-e51ca40b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20835%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69668adea60475309f9ae08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20834-cwe-36-absolute-path-traversal-in-m-286b7b9c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20834%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adda60475309f9adff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20833-cwe-327-use-of-a-broken-or-risky-cr-02f04bb4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20833%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=69668adda60475309f9adff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20832-cwe-415-double-free-in-microsoft-wi-7f9e3ab4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20832%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adda60475309f9adfed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20831-cwe-367-time-of-check-time-of-use-t-cb44d8e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20831%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adda60475309f9adfea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20829-cwe-125-out-of-bounds-read-in-micro-39bfeac9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20829%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69668adda60475309f9adfe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20828-cwe-125-out-of-bounds-read-in-micro-20d87af8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20828%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adda60475309f9adfe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20827-cwe-200-exposure-of-sensitive-infor-0d63ab39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20827%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adda60475309f9adfde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20826-cwe-362-concurrent-execution-using--6a9445aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20826%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adda60475309f9adfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20825-cwe-284-improper-access-control-in--703830df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20825%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69668adda60475309f9adfd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20824-cwe-693-protection-mechanism-failur-f69f8ff3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20824%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adba60475309f9adfa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20823-cwe-200-exposure-of-sensitive-infor-067b7234</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20823%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adba60475309f9adfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20822-cwe-416-use-after-free-in-microsoft-0fcc9563</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20822%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adba60475309f9adfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20821-cwe-200-exposure-of-sensitive-infor-738c00a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20821%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adba60475309f9adf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20820-cwe-122-heap-based-buffer-overflow--dbea749a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20820%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adba60475309f9adf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20819-cwe-822-untrusted-pointer-dereferen-e80e9055</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20819%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=69668adba60475309f9adf97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20818-cwe-532-insertion-of-sensitive-info-f651f2b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20818%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=69668adba60475309f9adf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20817-cwe-280-improper-handling-of-insuff-db913280</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20817%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69668adba60475309f9adf91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20816-cwe-367-time-of-check-time-of-use-t-07436142</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20816%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adba60475309f9adf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20815-cwe-362-concurrent-execution-using--bf377b09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20815%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668adba60475309f9adf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20814-cwe-362-concurrent-execution-using--0592d606</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20814%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adaa60475309f9adf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20812-cwe-20-improper-input-validation-in-fcd02ec4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20812%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adaa60475309f9adf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20811-cwe-843-access-of-resource-using-in-11467ead</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20811%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69668adaa60475309f9adf4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20810-cwe-590-free-of-memory-not-on-the-h-606ebe1b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20810%3A%20CWE-590%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668adaa60475309f9adf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20809-cwe-367-time-of-check-time-of-use-t-2ee5fd97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20809%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adaa60475309f9adf40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20808-cwe-362-concurrent-execution-using--d5b3c16c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20808%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668adaa60475309f9adf3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20805-cwe-200-exposure-of-sensitive-infor-5ffd2065</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20805%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adaa60475309f9adf3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20804-cwe-266-incorrect-privilege-assignm-e0828e3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20804%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adaa60475309f9adf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20965-cwe-347-improper-verification-of-cr-c652ba2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20965%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Windows%20Admin%20Center%20in%20Azure%20Portal&amp;severity=high&amp;id=69668ae6a60475309f9ae271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20803-cwe-306-missing-authentication-for--5085f96c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20803%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20(GDR)&amp;severity=high&amp;id=69668adaa60475309f9adf34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0386-cwe-284-improper-access-control-in-m-c9a25aee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0386%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=69668adaa60475309f9adf31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21265-cwe-1329-reliance-on-component-that-4c5b2422</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21265%3A%20CWE-1329%20-%20Reliance%20on%20Component%20That%20is%20Not%20Updateable%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae7a60475309f9ae299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20962-cwe-908-use-of-uninitialized-resour-df000b33</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20962%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69668ae6a60475309f9ae26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37166-vulnerability-in-hewlett-packard-en-6f8b03b2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37166%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Instant%20On&amp;severity=high&amp;id=69668750a60475309f98298f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37165-vulnerability-in-hewlett-packard-en-4b4e9567</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37165%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Instant%20On&amp;severity=high&amp;id=69668750a60475309f98298c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/long-running-web-skimming-campaign-steals-credit-c-759ec50f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Long-Running%20Web%20Skimming%20Campaign%20Steals%20Credit%20Cards%20From%20Online%20Checkout%20Pages&amp;severity=medium&amp;id=6966f7db8330e06716c60389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10865-cwe-416-use-after-free-in-imaginati-6a65b1a6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10865%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=696683cba60475309f96bab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-chrome-extension-steals-mexc-api-keys-by-c3a58eea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Chrome%20Extension%20Steals%20MEXC%20API%20Keys%20by%20Masquerading%20as%20Trading%20Tool&amp;severity=medium&amp;id=69668011a60475309f936e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gobruteforcer-botnet-targeting-crypto-blockchain-p-47c3e17d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoBruteforcer%20Botnet%20Targeting%20Crypto%2C%20Blockchain%20Projects&amp;severity=medium&amp;id=69668026a60475309f9370f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/after-goldman-jpmorgan-discloses-law-firm-data-bre-6ccb5b67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=After%20Goldman%2C%20JPMorgan%20Discloses%20Law%20Firm%20Data%20Breach&amp;severity=high&amp;id=69667c91a60475309f91e05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-external-attack-surface-manage-d414178f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20External%20Attack%20Surface%20Management&amp;severity=medium&amp;id=69667c91a60475309f91e061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58411-cwe-416-use-after-free-in-imaginati-ec4e5c38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58411%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69667940a60475309f8fa685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58409-cwe-cwe-119-improper-restriction-of-54854673</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58409%3A%20CWE%20-%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=low&amp;id=69667940a60475309f8fa694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62182-cwe-434-unrestricted-upload-of-file-6a1e4239</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62182%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69667940a60475309f8fa69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46685-cwe-378-creation-of-temporary-file--bc94129f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46685%3A%20CWE-378%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Dell%20SupportAssist%20OS%20Recovery&amp;severity=high&amp;id=69667940a60475309f8fa68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8090-cwe-476-null-pointer-dereference-in--6bfd7f9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8090%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20BlackBerry%20Ltd%20QNX%20Software%20Development%20Platform&amp;severity=medium&amp;id=69667941a60475309f8fa6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25249-execute-unauthorized-code-or-comman-3d27fe27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25249%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSwitchManager&amp;severity=high&amp;id=69667940a60475309f8fa68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47855-improper-access-control-in-fortinet-68522f01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47855%3A%20Improper%20access%20control%20in%20Fortinet%20FortiFone&amp;severity=critical&amp;id=69667940a60475309f8fa691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67685-improper-access-control-in-fortinet-90f881f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67685%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSandbox&amp;severity=low&amp;id=69667941a60475309f8fa6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58693-execute-unauthorized-code-or-comman-1e3177e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58693%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiVoice&amp;severity=medium&amp;id=69667940a60475309f8fa697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59922-execute-unauthorized-code-or-comman-792f3b01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59922%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=69667940a60475309f8fa69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64155-execute-unauthorized-code-or-comman-f410151b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64155%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=critical&amp;id=69667941a60475309f8fa6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25176-cwe-668-exposure-of-resource-to-wro-61b7925a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25176%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=critical&amp;id=69667940a60475309f8fa688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46684-cwe-378-creation-of-temporary-file--80177220</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46684%3A%20CWE-378%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Dell%20SupportAssist%20OS%20Recovery%2C&amp;severity=medium&amp;id=69667237a60475309f879e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowreactor-text-only-staging-net-reactor-and-in-251b7c29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SHADOW%23REACTOR%20%E2%80%93%20Text-Only%20Staging%2C%20.NET%20Reactor%2C%20and%20In-Memory%20Remcos%20RAT%20Deployments&amp;severity=medium&amp;id=69667238a60475309f879f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0404-cwe-20-improper-input-validation-in--bddf293f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0404%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20RBRE960&amp;severity=medium&amp;id=69667237a60475309f879e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0408-cwe-287-improper-authentication-in-n-beccef9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0408%3A%20CWE-287%20Improper%20Authentication%20in%20NETGEAR%20EX5000&amp;severity=medium&amp;id=69667237a60475309f879ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0407-cwe-287-improper-authentication-in-n-f2489e2b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0407%3A%20CWE-287%20Improper%20Authentication%20in%20NETGEAR%20EX5000&amp;severity=medium&amp;id=69667237a60475309f879ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0406-cwe-20-improper-input-validation-in--29284271</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0406%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20XR1000v2&amp;severity=medium&amp;id=69667237a60475309f879eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0405-cwe-287-improper-authentication-in-n-30e6359b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0405%3A%20CWE-287%20Improper%20Authentication%20in%20NETGEAR%20RBE970&amp;severity=medium&amp;id=69667237a60475309f879e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0403-cwe-20-improper-input-validation-in--470465b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0403%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20RBR750&amp;severity=low&amp;id=69667237a60475309f879e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12548-missing-authentication-for-critical-ed788dc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12548%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Dev%20Spaces%20(RHOSDS)%203.22&amp;severity=critical&amp;id=696667b3a60475309f7ab4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68812-dd52420d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68812&amp;severity=null&amp;id=69cfe09b0a160ebd923e33d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68789-a37e1fae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68789&amp;severity=null&amp;id=698b1e0c4b57a58fa101b8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22755-cwe-77-improper-neutralization-of-s-1e56c0a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22755%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Vivotek%20Affected%20device%20model%20numbers%20are%20FD8365%2C%20FD8365v2%2C%20FD9165%2C%20FD9171%2C%20FD9187%2C%20FD9189%2C%20FD9365%2C%20FD9371%2C%20FD9381%2C%20FD9387%2C%20FD9389%2C%20FD9391%2CFE9180%2CFE9181%2C%20FE9191%2C%20FE9381%2C%20FE9382%2C%20FE9391%2C%20FE9582%2C%20IB9365%2C%20IB93587LPR%2C%20IB9371%2CIB9381%2C%20IB9387%2C%20IB9389%2C%20IB939%2CIP9165%2CIP9171%2C%20IP9172%2C%20IP9181%2C%20IP9191%2C%20IT9389%2C%20MA9321%2C%20MA9322%2C%20MS9321%2C%20MS9390%2C%20TB9330&amp;severity=critical&amp;id=69666427a60475309f6cdbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36640-cwe-269-improper-privilege-manageme-af9418e0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36640%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Tenable%20Nessus%20Agent&amp;severity=high&amp;id=69666427a60475309f6cdbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13447-improper-neutralization-of-special--5a4b73a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13447%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(%E2%80%98OS%20Command%20Injection%E2%80%99)%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=6966bf90a60475309fb963dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13444-improper-neutralization-of-special--77de4d98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13444%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(%E2%80%98OS%20Command%20Injection%E2%80%99)%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=6966bf90a60475309fb963d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11669-cwe-862-missing-authorization-in-zo-724214ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11669%3A%20CWE-862%20Missing%20Authorization%20in%20Zohocorp%20ManageEngine%20PAM360&amp;severity=high&amp;id=6966562fa60475309f43a465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/broadcom-wi-fi-chipset-flaw-allows-hackers-to-disr-0206332a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Broadcom%20Wi-Fi%20Chipset%20Flaw%20Allows%20Hackers%20to%20Disrupt%20Networks&amp;severity=low&amp;id=696655e4a60475309f434006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-cloud-native-malware-framework-ecbed222</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Cloud-Native%20Malware%20Framework&amp;severity=medium&amp;id=69666b30a60475309f804a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14507-cwe-200-exposure-of-sensitive-infor-9112b77d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14507%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=69664f10a60475309f2ea2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0684-cwe-863-incorrect-authorization-in-c-5b13dd45</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0684%3A%20CWE-863%20Incorrect%20Authorization%20in%20codepeople%20CP%20Image%20Store%20with%20Slideshow&amp;severity=medium&amp;id=69664f10a60475309f2ea2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-agentic-ai-from-mcps-and-tool-access-to-s-dd229501</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20Agentic%20AI%3A%20From%20MCPs%20and%20Tool%20Access%20to%20Shadow%20API%20Key%20Sprawl&amp;severity=low&amp;id=6966f7db8330e06716c6038c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9427-cwe-79-improper-neutralization-of-in-3ad08fb3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Lemonsoft%20WordPress%20add-on&amp;severity=high&amp;id=69664f10a60475309f2ea2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11250-cwe-290-authentication-bypass-by-sp-31d0f606</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11250%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Zohocorp%20ManageEngine%20ADSelfService%20Plus&amp;severity=critical&amp;id=69664f10a60475309f2ea2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0892-vulnerability-in-mozilla-firefox-1157939b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0892%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69664f11a60475309f2ea33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0891-vulnerability-in-mozilla-firefox-c08e04a4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0891%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f11a60475309f2ea335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0890-vulnerability-in-mozilla-firefox-d91c4f97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0890%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0889-vulnerability-in-mozilla-firefox-c19e8484</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0889%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f11a60475309f2ea32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0888-vulnerability-in-mozilla-firefox-a799450f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0888%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0887-vulnerability-in-mozilla-firefox-b5bf8224</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0887%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0886-vulnerability-in-mozilla-firefox-455bedfa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0886%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0885-vulnerability-in-mozilla-firefox-147b2e6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0885%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0884-vulnerability-in-mozilla-firefox-f8f10b5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0884%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69664f11a60475309f2ea313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0883-vulnerability-in-mozilla-firefox-48090893</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0883%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0882-vulnerability-in-mozilla-firefox-86ba16c7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0882%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f10a60475309f2ea2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0881-vulnerability-in-mozilla-firefox-ebe6a0d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0881%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69664f10a60475309f2ea2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0880-vulnerability-in-mozilla-firefox-f691ebc9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0880%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f10a60475309f2ea2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0879-vulnerability-in-mozilla-firefox-70135ce7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0879%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69664f10a60475309f2ea2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0878-vulnerability-in-mozilla-firefox-f20e910c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0878%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f10a60475309f2ea2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0877-vulnerability-in-mozilla-firefox-52c9d00a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0877%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f10a60475309f2ea2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9435-cwe-22-improper-limitation-of-a-path-8ebb819b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9435%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zohocorp%20ManageEngine%20ADManager%20Plus&amp;severity=medium&amp;id=69664b8ba60475309f2116b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13774-cwe-89-improper-neutralization-of-s-316c0137</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13774%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Progress%20Software%20Flowmon%20ADS&amp;severity=high&amp;id=6966562fa60475309f43a468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/saps-january-2026-security-updates-patch-critical--f6b732fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%E2%80%99s%20January%202026%20Security%20Updates%20Patch%20Critical%20Vulnerabilities&amp;severity=critical&amp;id=696639c3a60475309febac2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-advanced-linux-voidlink-malware-targets-cloud--d0914fd6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Advanced%20Linux%20VoidLink%20Malware%20Targets%20Cloud%20and%20container%20Environments&amp;severity=medium&amp;id=6966f7db8330e06716c6038f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-should-we-learn-from-how-attackers-leveraged--45d98537</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20Should%20We%20Learn%20From%20How%20Attackers%20Leveraged%20AI%20in%202025%3F&amp;severity=medium&amp;id=696632baa60475309fdb65a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0859-cwe-502-deserialization-of-untrusted-05d55b62</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0859%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=69663672a60475309fe49827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59022-cwe-862-missing-authorization-in-ty-c6fc6833</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59022%3A%20CWE-862%20Missing%20Authorization%20in%20TYPO3%20TYPO3%20CMS&amp;severity=high&amp;id=69663672a60475309fe49821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59021-cwe-862-missing-authorization-in-ty-d2447066</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59021%3A%20CWE-862%20Missing%20Authorization%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=69663672a60475309fe4981b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59020-cwe-863-incorrect-authorization-in--f531f3c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59020%3A%20CWE-863%20Incorrect%20Authorization%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=69663672a60475309fe49815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-port-hacker-sentenced-to-prison-701774d2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20Port%20Hacker%20Sentenced%20to%20Prison&amp;severity=medium&amp;id=696632d8a60475309fdc8ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/servicenow-patches-critical-ai-platform-flaw-allow-e4021d47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ServiceNow%20Patches%20Critical%20AI%20Platform%20Flaw%20Allowing%20Unauthenticated%20User%20Impersonation&amp;severity=critical&amp;id=696632baa60475309fdb65a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14001-cwe-862-missing-authorization-in-ni-8efab0e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14001%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20WP%20Duplicate%20Page&amp;severity=medium&amp;id=69662f6ba60475309fd33d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spanish-energy-company-endesa-hacked-521d8746</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spanish%20Energy%20Company%20Endesa%20Hacked&amp;severity=medium&amp;id=696624aca60475309fc1fee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40944-cwe-400-uncontrolled-resource-consu-ae6588f9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40944%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Siemens%20SIMATIC%20ET%20200AL%20IM%20157-1%20PN&amp;severity=high&amp;id=696616cfa60475309f9ce613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40942-cwe-250-execution-with-unnecessary--c991f78f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40942%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Siemens%20TeleControl%20Server%20Basic&amp;severity=high&amp;id=696616cfa60475309f9ce60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40805-cwe-639-authorization-bypass-throug-65406d33</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40805%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Siemens%20Industrial%20Edge%20Cloud%20Device%20(IECD)&amp;severity=critical&amp;id=696616cfa60475309f9ce608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-campaign-delivers-remcos-rat-through-m-9fb43d9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Malware%20Campaign%20Delivers%20Remcos%20RAT%20Through%20Multi-Stage%20Windows%20Attack&amp;severity=low&amp;id=6966f7db8330e06716c60392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-fraud-overtakes-ransomware-as-top-ceo-concer-1e5b19e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Fraud%20Overtakes%20Ransomware%20as%20Top%20CEO%20Concern%3A%20WEF&amp;severity=medium&amp;id=69660184a60475309f5f3bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41717-cwe-94-improper-control-of-generati-8b7f95c2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41717%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Phoenix%20Contact%20TC%20ROUTER%203002T-3G&amp;severity=high&amp;id=6965faafa60475309f41c759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-exploitation-of-gogs-vulnerab-9dfef5b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Exploitation%20of%20Gogs%20Vulnerability%20Enabling%20Code%20Execution&amp;severity=high&amp;id=6966f7db8330e06716c60395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unveiling-voidlink-a-stealthy-cloud-native-linux-m-b6da384d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unveiling%20VoidLink%20%E2%80%93%20A%20Stealthy%2C%20Cloud-Native%20Linux%20Malware%20Framework&amp;severity=medium&amp;id=6965e91ba60475309ffb8736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14829-cwe-862-missing-authorization-in-e--73c33d17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14829%3A%20CWE-862%20Missing%20Authorization%20in%20E-xact%20%7C%20Hosted%20Payment%20%7C&amp;severity=critical&amp;id=6965e214a60475309fe0da9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10915-cwe-862-missing-authorization-in-dr-ef19f079</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10915%3A%20CWE-862%20Missing%20Authorization%20in%20Dreamer%20Blog&amp;severity=critical&amp;id=6965e214a60475309fe0da99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66177-vulnerability-in-hikvision-ds-96xxx-8679cdd9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66177%3A%20Vulnerability%20in%20Hikvision%20DS-96xxxNI-Hx&amp;severity=high&amp;id=6965b0daa60475309ff8e4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66176-vulnerability-in-hikvision-ds-k1t33-eda72d38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66176%3A%20Vulnerability%20in%20Hikvision%20DS-K1T331&amp;severity=high&amp;id=6965b0daa60475309ff8e4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0514-cwe-79-improper-neutralization-of-in-209301b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0514%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6965a2cda60475309fcd6857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0513-cwe-601-url-redirection-to-untrusted-6bfbb03e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0513%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(SICF%20Handler%20in%20SRM%20Catalog)&amp;severity=medium&amp;id=6965a2cda60475309fcd6853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0511-cwe-862-missing-authorization-in-sap-dcd1fde6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0511%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=high&amp;id=6965a2cda60475309fcd684f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0510-cwe-326-inadequate-encryption-streng-cbf3ae75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0510%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20SAP_SE%20NW%20AS%20Java%20UME%20User%20Mapping&amp;severity=low&amp;id=6965a2cda60475309fcd684b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0507-cwe-78-improper-neutralization-of-sp-64c6f1f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0507%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20SAP_SE%20SAP%20Application%20Server%20for%20ABAP%20and%20SAP%20NetWeaver%20RFCSDK&amp;severity=high&amp;id=6965a2cda60475309fcd6847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0506-cwe-862-missing-authorization-in-sap-c60cc951</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0506%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=high&amp;id=6965a2cda60475309fcd6843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0504-cwe-943-improper-neutralization-of-s-d54d7599</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0504%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20SAP_SE%20SAP%20Identity%20Management&amp;severity=low&amp;id=6965a2cda60475309fcd683f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0503-cwe-862-missing-authorization-in-sap-da5f56c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0503%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20ERP%20Central%20Component%20and%20SAP%20S%2F4HANA%20(SAP%20EHS%20Management)&amp;severity=medium&amp;id=6965a2cda60475309fcd683b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0501-cwe-89-improper-neutralization-of-sp-98703910</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0501%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20S%2F4HANA%20Private%20Cloud%20and%20On-Premise%20(Financials%20%EF%BF%BD%20General%20Ledger)&amp;severity=critical&amp;id=6965a2cda60475309fcd6837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0500-cwe-94-improper-control-of-generatio-03cfe97c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0500%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Wily%20Introscope%20Enterprise%20Manager%20(WorkStation)&amp;severity=critical&amp;id=6965a2cca60475309fcd6829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0499-cwe-79-improper-neutralization-of-in-1626a96a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0499%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal&amp;severity=medium&amp;id=6965a2cca60475309fcd6825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0498-cwe-94-improper-control-of-generatio-20b85674</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0498%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20and%20On-Premise)&amp;severity=critical&amp;id=6965a2cca60475309fcd6821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0497-cwe-862-missing-authorization-in-sap-9c6a1d92</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0497%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20Business%20Server%20Pages%20Application%20(Product%20Designer%20Web%20UI)&amp;severity=medium&amp;id=6965a2cca60475309fcd681d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0496-cwe-434-unrestricted-upload-of-file--720a373e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0496%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6965a2cca60475309fcd6819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0495-cwe-15-external-control-of-system-or-57bf771a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0495%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6965a2cca60475309fcd6815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0494-cwe-497-exposure-of-sensitive-system-e3bdc7b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0494%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6965a2cca60475309fcd6811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0493-cwe-352-cross-site-request-forgery-i-9296ebe0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0493%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6965a2cca60475309fcd680d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0492-cwe-306-missing-authentication-for-c-97a1a64f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0492%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SAP_SE%20SAP%20HANA%20database&amp;severity=high&amp;id=6965a2cca60475309fcd6809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0491-cwe-94-improper-control-of-generatio-6c6ef53c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0491%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Landscape%20Transformation&amp;severity=critical&amp;id=6965a2cca60475309fcd6805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-13-36782745</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-13&amp;severity=medium&amp;id=6966defda60475309fc8a4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68707-na-8a0b7acb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68707%3A%20n%2Fa&amp;severity=high&amp;id=69667941a60475309f8fa6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25652-na-0ab4d48e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25652%3A%20n%2Fa&amp;severity=high&amp;id=69667940a60475309f8fa681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65783-na-2391eadf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65783%3A%20n%2Fa&amp;severity=critical&amp;id=69667237a60475309f879ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65784-na-e4c3fa10</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65784%3A%20n%2Fa&amp;severity=medium&amp;id=69667237a60475309f879e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70753-na-9f172076</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70753%3A%20n%2Fa&amp;severity=high&amp;id=69666eb2a60475309f84037f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69992-na-ab29e6dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69992%3A%20n%2Fa&amp;severity=critical&amp;id=69666eb2a60475309f84037c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69991-na-4982ee1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69991%3A%20n%2Fa&amp;severity=critical&amp;id=69666eb2a60475309f840379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69990-na-8c6037d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69990%3A%20n%2Fa&amp;severity=critical&amp;id=69666eb2a60475309f840376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71027-na-1ea15405</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71027%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71026-na-e1a62762</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71026%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71025-na-74f0b9b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71025%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71024-na-6618dd02</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71024%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71023-na-07aee9e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71023%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66698-na-6c1d3bbf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66698%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54855-na-d6cd7b88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54855%3A%20n%2Fa&amp;severity=medium&amp;id=696667b3a60475309f7ab4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55462-na-627451d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55462%3A%20n%2Fa&amp;severity=medium&amp;id=69665d1fa60475309f5854cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58340-cwe-1333-inefficient-regular-expres-d42d439b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58340%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20LangChain%20AI%20LangChain&amp;severity=high&amp;id=69658281da2266e838450d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14021-cwe-502-deserialization-of-untruste-ffe8f337</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14021%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20run-llama%20llama_index&amp;severity=high&amp;id=69658281da2266e838450d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58339-cwe-770-allocation-of-resources-wit-c49016b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58339%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20run-llama%20llama_index&amp;severity=high&amp;id=69658281da2266e838450d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22214-cwe-121-stack-based-buffer-overflow-50ccce35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22214%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20RIOT%20RIOT%20OS&amp;severity=medium&amp;id=69658281da2266e838450d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22213-cwe-121-stack-based-buffer-overflow-484218fe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22213%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20RIOT%20RIOT%20OS&amp;severity=low&amp;id=69658281da2266e838450d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22801-cwe-125-out-of-bounds-read-in-pnggr-4a6fb606</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22801%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69657efdda2266e83842302f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22695-cwe-125-out-of-bounds-read-in-pnggr-931ee5d7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22695%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69657efdda2266e838423029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22813-cwe-79-improper-neutralization-of-i-b67efd3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22813%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anomalyco%20opencode&amp;severity=critical&amp;id=69657efdda2266e838423035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22812-cwe-306-missing-authentication-for--06adb808</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22812%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20anomalyco%20opencode&amp;severity=high&amp;id=69657efdda2266e838423032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22804-cwe-269-improper-privilege-manageme-aa2b68a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22804%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Termix-SSH%20Termix&amp;severity=high&amp;id=69657471da2266e83834ab9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22800-cwe-352-cross-site-request-forgery--c92cb401</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22800%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20THM-Health%20PILOS&amp;severity=low&amp;id=69657471da2266e83834ab9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22798-cwe-532-insertion-of-sensitive-info-ceca105a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22798%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20softwarepub%20hermes&amp;severity=medium&amp;id=696570edda2266e83831189d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22794-cwe-346-origin-validation-error-in--7f185239</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22794%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20appsmithorg%20appsmith&amp;severity=critical&amp;id=696570edda2266e8383118a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22789-cwe-434-unrestricted-upload-of-file-ec23b47c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22789%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SMEWebify%20WebErpMesv2&amp;severity=medium&amp;id=69656d69da2266e8382e9812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22788-cwe-306-missing-authentication-for--7ba39fa6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22788%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SMEWebify%20WebErpMesv2&amp;severity=high&amp;id=69656d69da2266e8382e9816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12420-vulnerability-in-servicenow-now-ass-62928d94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12420%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20ServiceNow%20Now%20Assist%20AI%20Agents&amp;severity=critical&amp;id=696569e5da2266e8382bb6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22786-cwe-434-unrestricted-upload-of-file-838371a8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22786%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20flipped-aurora%20gin-vue-admin&amp;severity=high&amp;id=69656661da2266e838286f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22772-cwe-918-server-side-request-forgery-dad33e76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22772%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sigstore%20fulcio&amp;severity=medium&amp;id=696562ddda2266e83825fa01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-a-multi-stage-asyncrat-campaign-via-mana-cc911a22</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20a%20Multi-Stage%20AsyncRAT%20Campaign%20via%20Managed%20Detection%20and%20Response&amp;severity=medium&amp;id=69666eb2a60475309f84032c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reflecting-on-ai-in-2025-faster-attacks-same-old-t-59e7b24a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reflecting%20on%20AI%20in%202025%3A%20Faster%20Attacks%2C%20Same%20Old%20Tradecraft&amp;severity=medium&amp;id=69666eb2a60475309f840324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/activity-masking-infostealer-dropper-kaspersky-off-099213ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Activity-masking%20infostealer%20dropper%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69655508da2266e83813d37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22785-cwe-77-improper-neutralization-of-s-2adc68dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22785%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20orval-labs%20orval&amp;severity=critical&amp;id=6965433ada2266e838fe6b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22784-cwe-863-incorrect-authorization-in--cc21530a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22784%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=6965433ada2266e838fe6b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22200-cwe-74-improper-neutralization-of-s-86015e71</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22200%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Enhancesoft%20osTicket&amp;severity=high&amp;id=6965433ada2266e838fe6b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22783-cwe-434-unrestricted-upload-of-file-39504cea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22783%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dfir-iris%20iris-web&amp;severity=critical&amp;id=69653fb6da2266e838f91b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22781-cwe-78-improper-neutralization-of-s-9e75e136</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22781%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=69653fb6da2266e838f91b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22776-cwe-409-improper-handling-of-highly-b276e0d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22776%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69653fb6da2266e838f91b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22771-cwe-94-improper-control-of-generati-23e3aa96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22771%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20envoyproxy%20gateway&amp;severity=high&amp;id=69653c31da2266e838f5b98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22252-cwe-285-improper-authorization-in-d-2b686608</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22252%3A%20CWE-285%3A%20Improper%20Authorization%20in%20danny-avila%20LibreChat&amp;severity=critical&amp;id=69653c31da2266e838f5b98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22251-cwe-200-exposure-of-sensitive-infor-747cdcb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22251%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WeblateOrg%20wlc&amp;severity=medium&amp;id=696538adda2266e838f1b6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22250-cwe-295-improper-certificate-valida-b7bb3e6c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22250%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20WeblateOrg%20wlc&amp;severity=low&amp;id=696538adda2266e838f1b6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22033-cwe-79-improper-neutralization-of-i-c388acd1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22033%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HumanSignal%20label-studio&amp;severity=high&amp;id=696538adda2266e838f1b6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68657-cwe-415-double-free-in-espressif-es-c3ddf34d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68657%3A%20CWE-415%3A%20Double%20Free%20in%20espressif%20esp-usb&amp;severity=medium&amp;id=6965433ada2266e838fe6b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68656-cwe-416-use-after-free-in-espressif-26c23c45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68656%3A%20CWE-416%3A%20Use%20After%20Free%20in%20espressif%20esp-usb&amp;severity=medium&amp;id=696531a5da2266e838e9c377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22050-639-in-netapp-ontap-9-37cbb899</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22050%3A%20639%20in%20NETAPP%20ONTAP%209&amp;severity=medium&amp;id=696531a5da2266e838e9c37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68622-cwe-121-stack-based-buffer-overflow-365b9324</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68622%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20espressif%20esp-usb&amp;severity=medium&amp;id=69652e21da2266e838e2547e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n8n-supply-chain-attack-abuses-community-nodes-to--2cbbd375</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=n8n%20Supply%20Chain%20Attack%20Abuses%20Community%20Nodes%20to%20Steal%20OAuth%20Tokens&amp;severity=low&amp;id=69656ba9da2266e8382d8192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71063-cwe-295-improper-certificate-valida-bed4a106</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71063%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20mrvladus%20Errands&amp;severity=high&amp;id=69651c8dda2266e838cf6d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41078-cwe-863-incorrect-authorization-in--26f58e79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41078%3A%20CWE-863%20Incorrect%20Authorization%20in%20Viafirma%20Viafirma%20Documents&amp;severity=high&amp;id=69650e81da2266e838bdb80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41077-cwe-639-authorization-bypass-throug-3aee7e91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41077%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Viafirma%20Inbox&amp;severity=high&amp;id=69650e81da2266e838bdb809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41006-cwe-89-improper-neutralization-of-s-07740c69</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41006%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Imaster%20MEMS%20Events%20CRM&amp;severity=critical&amp;id=69650af9da2266e838b9ce85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41005-cwe-89-improper-neutralization-of-s-63afbb7a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41005%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Imaster%20MEMS%20Events%20CRM&amp;severity=high&amp;id=69650af9da2266e838b9ce82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/instagram-fixes-password-reset-vulnerability-amid--60be51ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Instagram%20Fixes%20Password%20Reset%20Vulnerability%20Amid%20User%20Data%20Leak&amp;severity=low&amp;id=696503beda2266e838b232fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41004-cwe-89-improper-neutralization-of-s-c1bc818a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41004%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Imaster%20Patient%20Record%20Management%20System&amp;severity=high&amp;id=6965006dda2266e838af18b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41003-cwe-79-improper-neutralization-of-i-a7cb6fab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41003%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Imaster%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6964fcfbda2266e838a66dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-ai-automation-exploits-telecom-espion-8d716900</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20AI%20Automation%20Exploits%2C%20Telecom%20Espionage%2C%20Prompt%20Poaching%20%26%20More&amp;severity=medium&amp;id=6964fcb5da2266e838a5f536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russias-apt28-targeting-energy-research-defense-co-d821d563</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%E2%80%99s%20APT28%20Targeting%20Energy%20Research%2C%20Defense%20Collaboration%20Entities&amp;severity=medium&amp;id=6964eb22da2266e8388fbedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/llms-in-attacker-crosshairs-warns-threat-intel-fir-fbde6ae6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LLMs%20in%20Attacker%20Crosshairs%2C%20Warns%20Threat%20Intel%20Firm&amp;severity=medium&amp;id=6964e41ada2266e83885b4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40978-cwe-79-improper-neutralization-of-i-6d195fc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40978%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WorkDo%20eCommerceGo%20SaaS&amp;severity=medium&amp;id=6964dd45da2266e83875f342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40977-cwe-79-improper-neutralization-of-i-9df5a55c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40977%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WorkDo%20eCommerceGo%20SaaS&amp;severity=medium&amp;id=6964dd45da2266e83875f33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40976-cwe-79-improper-neutralization-of-i-6141dc21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40976%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WorkDo%20TicketGo&amp;severity=medium&amp;id=6964dd45da2266e83875f33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40975-cwe-79-improper-neutralization-of-i-7c82a7b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40975%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WorkDo%20HRMGo&amp;severity=medium&amp;id=6964dd45da2266e83875f339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gobruteforcer-botnet-targets-crypto-project-databa-d9999070</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoBruteforcer%20Botnet%20Targets%20Crypto%20Project%20Databases%20by%20Exploiting%20Weak%20Credentials&amp;severity=medium&amp;id=69656baada2266e8382d8195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/12th-january-threat-intelligence-report-9a9c5f3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=12th%20January%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6964c82eda2266e83846a841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-launches-claude-ai-for-healthcare-with-s-9beed601</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20Launches%20Claude%20AI%20for%20Healthcare%20with%20Secure%20Health%20Record%20Access&amp;severity=low&amp;id=69656baada2266e8382d8198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14279-cwe-346-origin-validation-error-in--b6200423</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14279%3A%20CWE-346%20Origin%20Validation%20Error%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=6964af91da2266e83826df6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-service-providers-fueling-indu-b97a9f02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20Service%20Providers%20Fueling%20Industrial-Scale%20Pig%20Butchering%20Fraud&amp;severity=medium&amp;id=69656baada2266e8382d819b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0855-cwe-78-improper-neutralization-of-sp-1ab86f60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0855%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Merit%20LILIN%20P2&amp;severity=high&amp;id=69649dfdda2266e838104fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14579-cwe-79-cross-site-scripting-xss-in--95b08dfb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14579%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Quiz%20Maker&amp;severity=medium&amp;id=69648fedda2266e838f9f65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0854-cwe-78-improper-neutralization-of-sp-923c0f9e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0854%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Merit%20LILIN%20DH032&amp;severity=high&amp;id=69648fedda2266e838f9f662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69276-cwe-502-deserialization-of-untruste-a9d1ef15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69276%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=low&amp;id=696481ddda2266e838e784ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69275-cwe-1395-dependency-on-vulnerable-t-7aa11158</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69275%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=high&amp;id=696481ddda2266e838e784e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69274-cwe-639-authorization-bypass-throug-ecfb37cc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69274%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=low&amp;id=696481ddda2266e838e784e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69273-cwe-287-improper-authentication-in--85d3d68e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69273%3A%20CWE-287%20Improper%20Authentication%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=high&amp;id=69647e59da2266e838e3846b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69272-cwe-319-cleartext-transmission-of-s-53ff48e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69272%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=medium&amp;id=69647e59da2266e838e38468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69271-cwe-522-insufficiently-protected-cr-4a67b129</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69271%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=low&amp;id=69647e59da2266e838e38465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69270-cwe-598-information-exposure-throug-07a13a77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69270%3A%20CWE-598%20Information%20Exposure%20Through%20Query%20Strings%20in%20GET%20Request%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=low&amp;id=69647e59da2266e838e38462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69269-cwe-78-improper-neutralization-of-s-87aeac8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69269%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=high&amp;id=69647751da2266e838db8762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69268-cwe-79-improper-neutralization-of-i-d78046a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=medium&amp;id=69647750da2266e838db875f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69267-cwe-22-improper-limitation-of-a-pat-67b8db09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69267%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=high&amp;id=69647750da2266e838db875c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0853-cwe-497-exposure-of-sensitive-system-14983d1d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0853%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20A-Plus%20Video%20Technologies%20AP-RM864P&amp;severity=medium&amp;id=69647049da2266e838bbbd18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52694-vulnerability-in-advantech-iotsuite-9175176d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52694%3A%20Vulnerability%20in%20Advantech%20IoTSuite%20and%20IoT%20Edge%20Products&amp;severity=critical&amp;id=69646941da2266e8387b4dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-accessed-university-of-hawaii-cancer-cente-ebdb8a71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Accessed%20University%20of%20Hawaii%20Cancer%20Center%20Patient%20Data%3B%20They%20Weren%E2%80%99t%20Immediately%20Notified&amp;severity=medium&amp;id=69645afeda2266e83834c747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-january-12th-2026-httpsis-16180210</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20January%2012th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9762%2C%20(Mon%2C%20Jan%2012th)&amp;severity=medium&amp;id=6964577ada2266e8381ec7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0852-sql-injection-in-code-projects-onlin-2d32b4d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0852%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69644295da2266e838c90f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-12-06bcd262</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-12&amp;severity=medium&amp;id=69658cd7da2266e838514171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29329-na-b59d45bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29329%3A%20n%2Fa&amp;severity=critical&amp;id=69656d69da2266e8382e981a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67146-na-5093ee06</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67146%3A%20n%2Fa&amp;severity=critical&amp;id=69656661da2266e838286f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67147-na-e401f39b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67147%3A%20n%2Fa&amp;severity=critical&amp;id=696562ddda2266e83825f9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51567-na-6c53af1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51567%3A%20n%2Fa&amp;severity=critical&amp;id=69654dc5da2266e8380b35d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66802-na-a933d092</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66802%3A%20n%2Fa&amp;severity=critical&amp;id=69654a41da2266e83806dde7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66689-na-fcb70365</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66689%3A%20n%2Fa&amp;severity=medium&amp;id=6965433ada2266e838fe6b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63314-na-ebfc7bb5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63314%3A%20n%2Fa&amp;severity=critical&amp;id=69652e21da2266e838e25479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46070-na-3478a295</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46070%3A%20n%2Fa&amp;severity=critical&amp;id=69652719da2266e838dbf0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46068-na-8358d1d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46068%3A%20n%2Fa&amp;severity=high&amp;id=69652719da2266e838dbf0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46067-na-38da9646</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46067%3A%20n%2Fa&amp;severity=high&amp;id=69652396da2266e838d748ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46066-na-1779a1b2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46066%3A%20n%2Fa&amp;severity=critical&amp;id=69652396da2266e838d748a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66939-na-c920ad5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66939%3A%20n%2Fa&amp;severity=medium&amp;id=69651c8dda2266e838cf6d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67813-na-7eb13817</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67813%3A%20n%2Fa&amp;severity=medium&amp;id=69651909da2266e838cc4bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65553-na-5687711a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65553%3A%20n%2Fa&amp;severity=medium&amp;id=69650e81da2266e838bdb813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65552-na-07be22b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65552%3A%20n%2Fa&amp;severity=critical&amp;id=69650e81da2266e838bdb80f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0851-sql-injection-in-code-projects-onlin-571698dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0851%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69643809da2266e8389ee33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0850-sql-injection-in-code-projects-inter-a7d01122</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0850%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=69643101da2266e83885d1f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-depth-analysis-of-trojanized-winrar-installer-d-cd0c688f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-depth%20Analysis%20of%20Trojanized%20WinRAR%20Installer%20Distributing%20Winzipper%20Malware&amp;severity=high&amp;id=6963ca3eda2266e838fd16ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/greynoise-labs-weekly-oast-report-mcp-server-comma-250aa7f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GreyNoise%20Labs%20Weekly%20OAST%20Report%3A%20MCP%20Server%20Command%20Injection%20and%20React2Shell%20Exploitation%20Campaigns%20%E2%80%93%20Week%20Ending%202026-01-09&amp;severity=high&amp;id=6963c58cda2266e838e6b48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detailed-analysis-and-poc-for-cve-2026-21440-criti-b09b0b41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detailed%20Analysis%20and%20PoC%20for%20CVE-2026-21440%3A%20Critical%20Path%20Traversal%20in%20AdonisJS%20Multipart%20Upload&amp;severity=high&amp;id=6963b421da2266e8389e4129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breachforums-hack-exposes-complete-user-database-o-10b1fe43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BreachForums%20Hack%20Exposes%20Complete%20User%20Database%20of%20Major%20Dark%20Web%20Forum&amp;severity=high&amp;id=6963b286da2266e83896b62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68493-cwe-112-missing-xml-validation-in-a-4c72d466</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68493%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Struts&amp;severity=high&amp;id=696406d1da2266e838e19a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yara-x-1110-release-hash-function-warnings-sun-jan-2c39521a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YARA-X%201.11.0%20Release%3A%20Hash%20Function%20Warnings%2C%20(Sun%2C%20Jan%2011th)&amp;severity=medium&amp;id=6963880dda2266e838ea0556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15506-out-of-bounds-read-in-academysoftwa-fd492ba7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15506%3A%20Out-of-Bounds%20Read%20in%20AcademySoftwareFoundation%20OpenColorIO&amp;severity=medium&amp;id=69638841da2266e838eaba6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0843-sql-injection-in-jiujiujia-jjjfood-363d4f88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0843%3A%20SQL%20Injection%20in%20jiujiujia%20jjjfood&amp;severity=medium&amp;id=6963689dda2266e8386cdffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0842-missing-authentication-in-flycatcher-655b5122</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0842%3A%20Missing%20Authentication%20in%20Flycatcher%20Toys%20smART%20Sketcher&amp;severity=medium&amp;id=69635e11da2266e83844dcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0841-buffer-overflow-in-utt-520w-c35591d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0841%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69635385da2266e8381701f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0840-buffer-overflow-in-utt-520w-8dcd4355</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0840%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69634575da2266e838e49e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0839-buffer-overflow-in-utt-520w-5eb5141d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0839%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696341f1da2266e838d6cea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0838-buffer-overflow-in-utt-520w-184f8330</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0838%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69633ae9da2266e838b6f459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0837-buffer-overflow-in-utt-520w-94dfca02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0837%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=6963305cda2266e838a3d63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0836-buffer-overflow-in-utt-520w-ee5a5350</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0836%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69632cd8da2266e8389b679b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15505-cross-site-scripting-in-luxul-xwr-6-31807ed8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15505%3A%20Cross%20Site%20Scripting%20in%20Luxul%20XWR-600&amp;severity=medium&amp;id=6963062cda2266e8382ec9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-11-a4613dfe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-11&amp;severity=medium&amp;id=69643b57da2266e838ab12c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0824-cross-site-scripting-in-questdb-ui-50677978</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0824%3A%20Cross%20Site%20Scripting%20in%20questdb%20ui&amp;severity=medium&amp;id=69626638f2400df44e63e552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13393-cwe-918-server-side-request-forgery-c5f37460</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13393%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=69625bacf2400df44e52a8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12379-cwe-79-improper-neutralization-of-i-ed9d3dab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=69625bacf2400df44e52a8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0822-heap-based-buffer-overflow-in-quickj-5c9cd8a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0822%3A%20Heap-based%20Buffer%20Overflow%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=69625828f2400df44e4e54f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yet-another-leak-of-chinas-contractor-driven-cyber-9e20e930</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Yet%20Another%20Leak%20of%20China&apos;s%20Contractor-Driven%20Cyber-Espionage%20Ecosystem&amp;severity=medium&amp;id=6964e460da2266e838862f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0821-heap-based-buffer-overflow-in-quickj-492bea30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0821%3A%20Heap-based%20Buffer%20Overflow%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=69625120f2400df44e458d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14555-cwe-79-improper-neutralization-of-i-3ef8c944</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14555%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Countdown%20Timer%20%E2%80%93%20Widget%20Countdown&amp;severity=medium&amp;id=69624d9bf2400df44e29ca76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15504-null-pointer-dereference-in-lief-pr-8f4a2417</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15504%3A%20NULL%20Pointer%20Dereference%20in%20lief-project%20LIEF&amp;severity=medium&amp;id=69623af0545d6fe9686cca16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14506-cwe-79-improper-neutralization-of-i-3e133689</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imtiazrayhan%20ConvertForce%20Popup%20Builder&amp;severity=medium&amp;id=69623af0545d6fe9686cca20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-launches-rustywater-rat-via-spear-phish-e42d1e2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20Launches%20RustyWater%20RAT%20via%20Spear-Phishing%20Across%20Middle%20East%20Sectors&amp;severity=medium&amp;id=69624c67f2400df44e25edb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52435-cwe-5-j2ee-misconfiguration-data-tr-031c323e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52435%3A%20CWE-5%20J2EE%20Misconfiguration%3A%20Data%20Transmission%20Without%20Encryption%20in%20Apache%20Software%20Foundation%20Apache%20Mynewt%20NimBLE&amp;severity=high&amp;id=69622254545d6fe9682dfba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53470-cwe-125-out-of-bounds-read-in-apach-105deab2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53470%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Apache%20Software%20Foundation%20Apache%20Mynewt%20NimBLE&amp;severity=low&amp;id=69622254545d6fe9682dfba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53477-cwe-476-null-pointer-dereference-in-15f9a1ce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53477%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Apache%20Software%20Foundation%20Apache%20Mynewt%20NimBLE&amp;severity=high&amp;id=69622254545d6fe9682dfbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62235-cwe-290-authentication-bypass-by-sp-3aad4363</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62235%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Apache%20Software%20Foundation%20Apache%20Mynewt%20NimBLE&amp;severity=high&amp;id=69622254545d6fe9682dfbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0831-cwe-863-incorrect-authorization-in-w-98686f30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0831%3A%20CWE-863%20Incorrect%20Authorization%20in%20wpdevteam%20Templately%20%E2%80%93%20Elementor%20%26%20Gutenberg%20Template%20Library%3A%206500%2B%20Free%20%26%20Pro%20Ready%20Templates%20And%20Cloud!&amp;severity=medium&amp;id=69621eda545d6fe96820a5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15503-unrestricted-upload-in-sangfor-oper-a37d1a7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15503%3A%20Unrestricted%20Upload%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=medium&amp;id=69621ae8c540fa4b549251c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europol-arrests-34-black-axe-members-in-spain-over-49e78d7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europol%20Arrests%2034%20Black%20Axe%20Members%20in%20Spain%20Over%20%E2%82%AC5.9M%20Fraud%20and%20Organized%20Crime&amp;severity=medium&amp;id=69622835545d6fe9683f8f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14976-cwe-352-cross-site-request-forgery--0f853673</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14976%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69621061c540fa4b547cca6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15502-os-command-injection-in-sangfor-ope-a8fe9b82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15502%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=medium&amp;id=69620954c540fa4b54731a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14948-cwe-862-missing-authorization-in-cy-18261d16</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14948%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20miniOrange%20OTP%20Verification%20and%20SMS%20Notification%20for%20WooCommerce&amp;severity=medium&amp;id=6961fec8c540fa4b54639bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22777-cwe-93-improper-neutralization-of-c-6225e01b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22777%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Comfy-Org%20ComfyUI-Manager&amp;severity=high&amp;id=6961f7c0c540fa4b54565841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22773-cwe-770-allocation-of-resources-wit-d959c300</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22773%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=6961f7c0c540fa4b5456583e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14943-cwe-863-incorrect-authorization-in--19f73930</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14943%3A%20CWE-863%20Incorrect%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=6961f7c0c540fa4b54565839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22704-cwe-79-improper-neutralization-of-i-ef07962f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22704%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20haxtheweb%20issues&amp;severity=high&amp;id=6961f43cc540fa4b54400bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22705-cwe-1240-use-of-a-cryptographic-pri-c008e8a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22705%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20RustCrypto%20signatures&amp;severity=medium&amp;id=6961f0b8c540fa4b5432ba01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22703-cwe-345-insufficient-verification-o-c63a5814</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22703%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20sigstore%20cosign&amp;severity=medium&amp;id=6961f0b8c540fa4b5432b9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22702-cwe-59-improper-link-resolution-bef-e945b11f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22702%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20pypa%20virtualenv&amp;severity=medium&amp;id=6961f0b8c540fa4b5432b9f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22701-cwe-59-improper-link-resolution-bef-b81aed94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22701%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20tox-dev%20filelock&amp;severity=medium&amp;id=6961ed34c540fa4b542a0971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22689-cwe-1385-missing-origin-validation--13d8cc60</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22689%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20axllent%20mailpit&amp;severity=medium&amp;id=6961e9bac540fa4b541edd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22685-cwe-22-improper-limitation-of-a-pat-b1b9695d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22685%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DevToys-app%20DevToys&amp;severity=high&amp;id=6961e9bac540fa4b541edcf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22611-cwe-20-improper-input-validation-in-348733b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22611%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20aws%20aws-sdk-net&amp;severity=low&amp;id=6961e73719784dcf52f13f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22700-cwe-20-improper-input-validation-in-f32d064d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22700%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20RustCrypto%20elliptic-curves&amp;severity=high&amp;id=6961e3b319784dcf52ed6559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22699-cwe-20-improper-input-validation-in-8bd765fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22699%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20RustCrypto%20elliptic-curves&amp;severity=high&amp;id=6961e3b319784dcf52ed6554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22698-cwe-331-insufficient-entropy-in-rus-fea75a65</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22698%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20RustCrypto%20elliptic-curves&amp;severity=high&amp;id=6961e3b319784dcf52ed654c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22691-cwe-1333-inefficient-regular-expres-e399fa40</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22691%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20py-pdf%20pypdf&amp;severity=low&amp;id=6961dcab19784dcf52e61fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22690-cwe-400-uncontrolled-resource-consu-26e94a29</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22690%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=low&amp;id=6961dcab19784dcf52e61fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22688-cwe-77-improper-neutralization-of-s-404bc99e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22688%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=critical&amp;id=6961d21f19784dcf52da7b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22687-cwe-89-improper-neutralization-of-s-df06a02b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22687%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=6961d21f19784dcf52da7b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13457-cwe-639-authorization-bypass-throug-6de3db01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13457%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20woocommerce%20WooCommerce%20Square&amp;severity=high&amp;id=6961cb1719784dcf52be20ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61674-cwe-79-improper-neutralization-of-i-4519ffe2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61674%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=6961cb1719784dcf52be20d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61676-cwe-79-improper-neutralization-of-i-74991bdb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61676%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=6961cb1719784dcf52be20d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65091-cwe-89-improper-neutralization-of-s-5017f49b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65091%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki-contrib%20macro-fullcalendar&amp;severity=critical&amp;id=6961cb1719784dcf52be20dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65090-cwe-200-exposure-of-sensitive-infor-33219640</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65090%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xwiki-contrib%20macro-fullcalendar&amp;severity=medium&amp;id=6961cb1719784dcf52be20d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22597-cwe-918-server-side-request-forgery-3b835494</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22597%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TryGhost%20Ghost&amp;severity=medium&amp;id=6961c40f19784dcf52acebdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22596-cwe-89-improper-neutralization-of-s-666f06d8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22596%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TryGhost%20Ghost&amp;severity=medium&amp;id=6961c40f19784dcf52ace87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22595-cwe-863-incorrect-authorization-in--3f0ce617</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22595%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=6961c40f19784dcf52ace878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22594-cwe-287-improper-authentication-in--fe262f90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22594%3A%20CWE-287%3A%20Improper%20Authentication%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=6961c40f19784dcf52ace873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22030-cwe-346-origin-validation-error-in--0f93f67d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22030%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20remix-run%20react-router&amp;severity=medium&amp;id=6961c40f19784dcf52ace870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22029-cwe-79-improper-neutralization-of-i-1944a18c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22029%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remix-run%20react-router&amp;severity=high&amp;id=6961c40f19784dcf52ace86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21884-cwe-79-improper-neutralization-of-i-0def8d25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21884%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remix-run%20react-router&amp;severity=high&amp;id=6961c40f19784dcf52ace86a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61686-cwe-22-improper-limitation-of-a-pat-74207ab3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61686%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20remix-run%20react-router&amp;severity=critical&amp;id=6961c40f19784dcf52ace864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59057-cwe-79-improper-neutralization-of-i-eaa6ce70</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59057%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remix-run%20react-router&amp;severity=high&amp;id=6961c40f19784dcf52ace861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68470-cwe-601-url-redirection-to-untruste-022f4f9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68470%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20remix-run%20react-router&amp;severity=medium&amp;id=6961c40f19784dcf52ace867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22612-cwe-502-deserialization-of-untruste-85e6c743</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22612%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b007ed32c7f018eb901e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22609-cwe-184-incomplete-list-of-disallow-e3282f46</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22609%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b006ed32c7f018eb9002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22608-cwe-184-incomplete-list-of-disallow-6db587b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22608%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b006ed32c7f018eb8ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22607-cwe-184-incomplete-list-of-disallow-99461a0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22607%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b006ed32c7f018eb8ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22606-cwe-184-incomplete-list-of-disallow-9e29139b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22606%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b006ed32c7f018eb8ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22605-cwe-284-improper-access-control-in--d1ab303d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22605%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20opf%20openproject&amp;severity=medium&amp;id=6961b006ed32c7f018eb8fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22604-cwe-200-exposure-of-sensitive-infor-b70f4bda</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22604%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20opf%20openproject&amp;severity=medium&amp;id=6961b006ed32c7f018eb8fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22603-cwe-307-improper-restriction-of-exc-22d84d42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22603%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20opf%20openproject&amp;severity=medium&amp;id=6961b006ed32c7f018eb8fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22602-cwe-200-exposure-of-sensitive-infor-30882214</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22602%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20opf%20openproject&amp;severity=low&amp;id=6961b006ed32c7f018eb8fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22601-cwe-77-improper-neutralization-of-s-a36f0711</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22601%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20opf%20openproject&amp;severity=high&amp;id=6961b006ed32c7f018eb8fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22600-cwe-200-exposure-of-sensitive-infor-3257d9bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22600%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20opf%20openproject&amp;severity=critical&amp;id=6961b006ed32c7f018eb8fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22697-cwe-122-heap-based-buffer-overflow--fda69094</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22697%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f6ed32c7f018d59bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22027-cwe-122-heap-based-buffer-overflow--6ef01b9e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22027%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20nasa%20CryptoLib&amp;severity=medium&amp;id=6961a1f6ed32c7f018d59bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22026-cwe-789-memory-allocation-with-exce-8c44eca2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22026%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f6ed32c7f018d59bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22025-cwe-401-missing-release-of-memory-a-8f886709</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22025%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20nasa%20CryptoLib&amp;severity=medium&amp;id=6961a1f6ed32c7f018d59bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22024-cwe-401-missing-release-of-memory-a-ea3f7a46</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22024%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20nasa%20CryptoLib&amp;severity=medium&amp;id=6961a1f6ed32c7f018d59be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22023-cwe-125-out-of-bounds-read-in-nasa--168120da</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22023%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f5ed32c7f018d59be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21900-cwe-125-out-of-bounds-read-in-nasa--90270853</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21900%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f5ed32c7f018d59bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21899-cwe-125-out-of-bounds-read-in-nasa--aa6f3635</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21899%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nasa%20CryptoLib&amp;severity=medium&amp;id=6961a1f5ed32c7f018d59bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21898-cwe-125-out-of-bounds-read-in-nasa--3cc029c7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21898%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f5ed32c7f018d59bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21897-cwe-787-out-of-bounds-write-in-nasa-2dbd3726</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21897%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f5ed32c7f018d59bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-10-6a196e6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-10&amp;severity=medium&amp;id=6962e9d6da2266e838fdfbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15501-os-command-injection-in-sangfor-ope-69faae4f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15501%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=critical&amp;id=696183e045ea0302aa99be03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22584-cwe-94-improper-control-of-generati-639176ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22584%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Salesforce%20Uni2TS&amp;severity=critical&amp;id=6961805b45ea0302aa992bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15500-os-command-injection-in-sangfor-ope-5c54cb5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15500%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=critical&amp;id=696175d145ea0302aa963f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15499-os-command-injection-in-sangfor-ope-adcd5c2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15499%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=high&amp;id=696175d145ea0302aa963f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46297-an-app-may-be-able-to-access-protec-6b9b8ddd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46297%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20files%20within%20an%20App%20Sandbox%20container%20in%20Apple%20macOS&amp;severity=medium&amp;id=696175d145ea0302aa963f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62487-the-product-performs-an-authorizati-c1ea0f19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62487%3A%20The%20product%20performs%20an%20authorization%20check%20when%20an%20actor%20attempts%20to%20access%20a%20resource%20or%20perform%20an%20action%2C%20but%20it%20does%20not%20correctly%20perform%20the%20check.%20This%20allows%20attackers%20to%20bypass%20intended%20access%20restrictions.%20in%20Palantir%20com.palantir.acme%3Agotham-default-apps-bundle&amp;severity=low&amp;id=696175d145ea0302aa963f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46298-processing-maliciously-crafted-web--09009782</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46298%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=696175d145ea0302aa963f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46299-processing-maliciously-crafted-web--71789247</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46299%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20disclose%20internal%20states%20of%20the%20app%20in%20Apple%20Safari&amp;severity=medium&amp;id=696175d145ea0302aa963f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46286-restoring-from-a-backup-may-prevent-584becb7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46286%3A%20Restoring%20from%20a%20backup%20may%20prevent%20passcode%20from%20being%20required%20immediately%20after%20Face%20ID%20enrollment%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=696175d145ea0302aa963f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0830-cwe-78-improper-neutralization-of-sp-da0f7abf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0830%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AWS%20Kiro%20IDE&amp;severity=high&amp;id=6961724c45ea0302aa817a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-exploit-vmware-esxi-zero-days-8db6607d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Exploit%20VMware%20ESXi%20Zero-Days%20to%20Escape%20Virtual%20Machines&amp;severity=medium&amp;id=696159b2047de42cfc9a6d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15035-cwe-20-improper-input-validation-in-cf8edbfb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15035%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Archer%20AXE75%20v1.6&amp;severity=medium&amp;id=69613a016c9099d823001a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15496-sql-injection-in-guchengwuyue-yshop-726abf2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15496%3A%20SQL%20Injection%20in%20guchengwuyue%20yshopmall&amp;severity=medium&amp;id=6961367d6c9099d823eb7eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15495-unrestricted-upload-in-biggidroid-s-34e15769</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15495%3A%20Unrestricted%20Upload%20in%20BiggiDroid%20Simple%20PHP%20CMS&amp;severity=medium&amp;id=6961367d6c9099d823eb7ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15494-sql-injection-in-rainygao-docsys-b9ed3d2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15494%3A%20SQL%20Injection%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=696132fa6c9099d823e5607c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15493-sql-injection-in-rainygao-docsys-95bd2619</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15493%3A%20SQL%20Injection%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=696132fa6c9099d823e56075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69426-cwe-732-incorrect-permission-assign-df9b59f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69426%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20RUCKUS%20Networks%20vRIoT%20IOT%20Controller&amp;severity=critical&amp;id=69614e21047de42cfc77cc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46645-cwe-78-improper-neutralization-of-s-34ef8268</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46645%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20Feature%20Release&amp;severity=medium&amp;id=69614e21047de42cfc77cc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69425-cwe-306-missing-authentication-for--7c60bcd6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69425%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20RUCKUS%20Networks%20vRIoT%20IoT%20Controller&amp;severity=critical&amp;id=69614e21047de42cfc77cc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46643-cwe-122-heap-based-buffer-overflow--75a6fbb5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46643%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20Feature%20Release&amp;severity=low&amp;id=69612bfb6c9099d823dc1098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15492-sql-injection-in-rainygao-docsys-163271c2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15492%3A%20SQL%20Injection%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=69612bfb6c9099d823dc1091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-8000-ransomware-attacks-china-hacked-a4cdf4f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%208%2C000%20Ransomware%20Attacks%2C%20China%20Hacked%20US%20Gov%20Emails%2C%20IDHS%20Breach%20Impacts%20700k&amp;severity=medium&amp;id=69612822f9fa58d972817532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0817-cwe-862-missing-authorization-in-wik-ef87ed37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0817%3A%20CWE-862%20Missing%20Authorization%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20CampaignEvents%20extension&amp;severity=medium&amp;id=69612866f9fa58d97281823c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46676-cwe-200-exposure-of-sensitive-infor-cb1c8441</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46676%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20Feature%20Release&amp;severity=low&amp;id=69612866f9fa58d972818239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0803-sql-injection-in-phpgurukul-online-c-0b1019d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0803%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration%20System&amp;severity=medium&amp;id=6961214ef9fa58d9727fd834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46644-cwe-78-improper-neutralization-of-s-691fbffa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46644%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20Feature%20Release&amp;severity=medium&amp;id=6961214ef9fa58d9727fd82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt28-runs-credential-stealing-campaign-ta-61b75677</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT28%20Runs%20Credential-Stealing%20Campaign%20Targeting%20Energy%20and%20Policy%20Organizations&amp;severity=medium&amp;id=69613e3b6c9099d823010d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-north-korean-spear-phishing-attacks-use-malici-b8cc8ce1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20North%20Korean%20Spear-Phishing%20Attacks%20Use%20Malicious%20QR%20Codes&amp;severity=medium&amp;id=69611a12f9fa58d97269d5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-patches-critical-code-execution-flaw-i-38b01ac0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20Patches%20Critical%20Code%20Execution%20Flaw%20in%20Apex%20Central&amp;severity=critical&amp;id=69610d0e7a8fb5c58f6edc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-closes-10-emergency-directives-as-vulnerabili-3ee49b64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Closes%2010%20Emergency%20Directives%20as%20Vulnerability%20Catalog%20Takes%20Over&amp;severity=medium&amp;id=696106067a8fb5c58f6d4760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zombieagent-attack-let-researchers-take-over-chatg-13543cd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98ZombieAgent%E2%80%99%20Attack%20Let%20Researchers%20Take%20Over%20ChatGPT&amp;severity=medium&amp;id=6960f7f67a8fb5c58f55e0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14598-cwe-89-improper-neutralization-of-s-7e759583</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14598%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BeeS%20Software%20Solutions%20BET%20ePortal&amp;severity=critical&amp;id=6960f4a57a8fb5c58f4f0361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/377000-impacted-by-data-breach-at-texas-gas-statio-8254c4b2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=377%2C000%20Impacted%20by%20Data%20Breach%20at%20Texas%20Gas%20Station%20Firm&amp;severity=medium&amp;id=6960f0ee7a8fb5c58f4aff74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66052-cwe-78-improper-neutralization-of-s-1b7d1539</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66052%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Vivotek%20IP7137&amp;severity=high&amp;id=6960fbad7a8fb5c58f6b1a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66051-cwe-22-improper-limitation-of-a-pat-a0c98502</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66051%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Vivotek%20IP7137&amp;severity=medium&amp;id=6960eda77a8fb5c58f471d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66050-cwe-1393-use-of-default-password-in-cc64c4e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66050%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20Vivotek%20IP7137&amp;severity=critical&amp;id=6960eda77a8fb5c58f471d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66049-cwe-306-missing-authentication-for--bc9f6576</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66049%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vivotek%20IP7137&amp;severity=high&amp;id=6960eda77a8fb5c58f471d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploit-for-vmware-zero-day-flaws-likely-built-a-y-3c6cf8ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploit%20for%20VMware%20Zero-Day%20Flaws%20Likely%20Built%20a%20Year%20Before%20Public%20Disclosure&amp;severity=medium&amp;id=6960e884a48af7d8cea17a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7072-cwe-798-use-of-hard-coded-credential-c76f9088</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7072%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20KAON%20CG3000T&amp;severity=critical&amp;id=6960e8e3a48af7d8cea1877c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22082-cwe-384-session-fixation-in-tenda-3-7271f053</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22082%3A%20CWE-384%20Session%20Fixation%20in%20Tenda%20300Mbps%20Wireless%20Router%20F3%20and%20N300%20Easy%20Setup%20Router&amp;severity=high&amp;id=6960e8e3a48af7d8cea1877f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22081-cwe-1004-sensitive-cookie-without-h-6c2e9b06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22081%3A%20CWE-1004%20-%20Sensitive%20Cookie%20Without%20HttpOnly%20Flag%20in%20Tenda%20300Mbps%20Wireless%20Router%20F3%20and%20N300%20Easy%20Setup%20Router&amp;severity=high&amp;id=6960e8e4a48af7d8cea187dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11453-cwe-79-improper-neutralization-of-i-10cfd606</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anand_kumar%20Header%20and%20Footer%20Scripts&amp;severity=medium&amp;id=6960e8e3a48af7d8cea18782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13908-cwe-79-improper-neutralization-of-i-1a13649d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13908%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alobaidi%20The%20Tooltip&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13862-cwe-79-improper-neutralization-of-i-61acbe5e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20furqan-khanzada%20Menu%20Card&amp;severity=medium&amp;id=6960e8e3a48af7d8cea187a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14172-cwe-862-missing-authorization-in-in-89d22ceb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14172%3A%20CWE-862%20Missing%20Authorization%20in%20infosatech%20WP%20Page%20Permalink%20Extension&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13717-cwe-862-missing-authorization-in-as-1231bd29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13717%3A%20CWE-862%20Missing%20Authorization%20in%20ashishajani%20Contact%20Form%20vCard%20Generator&amp;severity=medium&amp;id=6960e8e3a48af7d8cea18792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13704-cwe-79-improper-neutralization-of-i-e986f136</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amirshk%20Autogen%20Headers%20Menu&amp;severity=medium&amp;id=6960e8e3a48af7d8cea1878b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13892-cwe-79-improper-neutralization-of-i-c01b2e51</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mountaingrafix%20MG%20AdvancedOptions&amp;severity=medium&amp;id=6960e8e3a48af7d8cea187a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13897-cwe-79-improper-neutralization-of-i-4b8014ef</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amu02aftab%20Client%20Testimonial%20Slider&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13854-cwe-79-improper-neutralization-of-i-0cf2cef3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13854%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20soniz%20Curved%20Text&amp;severity=medium&amp;id=6960e8e3a48af7d8cea1879e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13701-cwe-79-improper-neutralization-of-i-b624a523</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beshkin%20Shabat%20Keeper&amp;severity=medium&amp;id=6960e8e3a48af7d8cea18786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13967-cwe-79-improper-neutralization-of-i-2f50c770</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13967%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woodpeckerleadform%20Woodpecker%20for%20WordPress&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13852-cwe-79-improper-neutralization-of-i-53c97df4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13852%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20debtcom%20Debt.com%20Business%20in%20a%20Box&amp;severity=medium&amp;id=6960e8e3a48af7d8cea18799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13893-cwe-79-improper-neutralization-of-i-eb1710ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20burtrw%20Lesson%20Plan%20Book&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13903-cwe-79-improper-neutralization-of-i-664fb296</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13903%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ctietze%20PullQuote&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22080-cwe-319-cleartext-transmission-of-s-88d2d6d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22080%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Tenda%20300Mbps%20Wireless%20Router%20F3%20and%20N300%20Easy%20Setup%20Router&amp;severity=high&amp;id=6960e55ba48af7d8cea09102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22079-cwe-319-cleartext-transmission-of-s-d5dc5aa5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22079%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Tenda%20300Mbps%20Wireless%20Router%20F3%20and%20N300%20Easy%20Setup%20Router&amp;severity=high&amp;id=6960e1d7a48af7d8ce8b5d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cncert-risk-warning-regarding-the-black-cat-gangs--1c7bab1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CNCERT%3A%20Risk%20Warning%20Regarding%20the%20%22Black%20Cat%22%20Gang&apos;s%20Use%20of%20Search%20Engines%20to%20Spread%20Counterfeit%20Notepad%2B%2B%20Download%20Remote%20Control%20Backdoors&amp;severity=medium&amp;id=6960d845a48af7d8ce7d3bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64093-vulnerability-in-zenitel-icx500-a507f0a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64093%3A%20Vulnerability%20in%20Zenitel%20ICX500&amp;severity=critical&amp;id=6960d929a48af7d8ce7ea268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64092-vulnerability-in-zenitel-icx500-df6fe1d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64092%3A%20Vulnerability%20in%20Zenitel%20ICX500&amp;severity=high&amp;id=6960d929a48af7d8ce7ea264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-apex-central-rce-flaw-scores-98-cvss-i-a9c5b236</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20Apex%20Central%20RCE%20Flaw%20Scores%209.8%20CVSS%20in%20On-Prem%20Windows%20Versions&amp;severity=critical&amp;id=6960d422ecefc3cd7c1cf7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64091-vulnerability-in-zenitel-tcis-3-c7bac969</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64091%3A%20Vulnerability%20in%20Zenitel%20TCIS-3%2B&amp;severity=high&amp;id=6960d46aecefc3cd7c1d0dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64090-vulnerability-in-zenitel-tcis-3-397975fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64090%3A%20Vulnerability%20in%20Zenitel%20TCIS-3%2B&amp;severity=critical&amp;id=6960d46aecefc3cd7c1d0df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-research-phaltblyx-fake-bsods-and-trusted-b-7ff05388</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Research%3A%20PHALT%23BLYX%3A%20Fake%20BSODs%20and%20Trusted%20Build%20Tools&amp;severity=medium&amp;id=6960d469ecefc3cd7c1d0dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13895-cwe-79-improper-neutralization-of-i-be77849d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20top-position%20Top%20Position%20Google%20Finance&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13900-cwe-79-improper-neutralization-of-i-bb55912f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelocation%20WP%20Popup%20Magic&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13853-cwe-79-improper-neutralization-of-i-c9969000</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lnbadmin1%20Nearby%20Now%20Reviews&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13729-cwe-79-improper-neutralization-of-i-3375d11e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13729%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20greenshady%20Entry%20Views&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-retires-10-emergency-cybersecurity-directives-7fe43828</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Retires%2010%20Emergency%20Cybersecurity%20Directives%20Issued%20Between%202019%20and%202024&amp;severity=low&amp;id=6960e804a48af7d8cea16b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0627-cwe-79-improper-neutralization-of-in-7bd42955</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0627%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mohammed_kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages&amp;severity=medium&amp;id=6960bf3fecefc3cd7c1371c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-process-environment-block-manipulation-f-b9392057</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Process%20Environment%20Block%20Manipulation%2C%20(Fri%2C%20Jan%209th)&amp;severity=medium&amp;id=6960bb88ecefc3cd7c1243fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69195-stack-based-buffer-overflow-60838973</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69195%3A%20Stack-based%20Buffer%20Overflow&amp;severity=high&amp;id=6960b846ecefc3cd7c11645f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69194-improper-limitation-of-a-pathname-t-698382b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69194%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=6960b4b3ecefc3cd7c10677e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14657-cwe-862-missing-authorization-in-ar-02c706f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14657%3A%20CWE-862%20Missing%20Authorization%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Calendar%2C%20Event%20Registration%2C%20Tickets%20%26%20Booking%20(AI%20Powered)&amp;severity=high&amp;id=6960b130ecefc3cd7c0f7d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13753-cwe-863-incorrect-authorization-in--54e16daf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13753%3A%20CWE-863%20Incorrect%20Authorization%20in%20wptb%20WP%20Table%20Builder%20%E2%80%93%20Drag%20%26%20Drop%20Table%20Builder&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13935-cwe-862-missing-authorization-in-th-35a53dbc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13935%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13934-cwe-862-missing-authorization-in-th-dd05fa9e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13934%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14741-cwe-862-missing-authorization-in-sh-14527b14</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14741%3A%20CWE-862%20Missing%20Authorization%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=critical&amp;id=6960b130ecefc3cd7c0f7d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13628-cwe-862-missing-authorization-in-th-ec8db5ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13628%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14937-cwe-79-improper-neutralization-of-i-2cfd494a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=high&amp;id=6960b130ecefc3cd7c0f7d15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14146-cwe-862-missing-authorization-in-wp-a7fbbfd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14146%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21409-authorization-bypass-through-user-c-a279d64e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21409%3A%20Authorization%20bypass%20through%20user-controlled%20key%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70974-cwe-829-inclusion-of-functionality--fe198d2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70974%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Alibaba%20Fastjson&amp;severity=critical&amp;id=6960a6a3ecefc3cd7c0ce3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14574-cwe-200-exposure-of-sensitive-infor-f92e2b26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14574%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wedevs%20weDocs%3A%20AI%20Powered%20Knowledge%20Base%2C%20Docs%2C%20Documentation%2C%20Wiki%20%26%20AI%20Chatbot&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15055-cwe-79-improper-neutralization-of-i-34da0141</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15055%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=high&amp;id=6960a320ecefc3cd7c0b983f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15057-cwe-79-improper-neutralization-of-i-77ce3fde</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=high&amp;id=6960a320ecefc3cd7c0b9843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14718-cwe-862-missing-authorization-in-pu-59fa6d63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14718%3A%20CWE-862%20Missing%20Authorization%20in%20publishpress%20Schedule%20Post%20Changes%20With%20PublishPress%20Future%3A%20Unpublish%2C%20Delete%2C%20Change%20Status%2C%20Trash%2C%20Change%20Categories&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14720-cwe-862-missing-authorization-in-am-e419d6f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14720%3A%20CWE-862%20Missing%20Authorization%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b982a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0563-cwe-79-improper-neutralization-of-in-068f9f2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0563%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pagup%20WP%20Google%20Street%20View%20(with%20360%C2%B0%20virtual%20tour)%20%26%20Google%20maps%20%2B%20Local%20SEO&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14782-cwe-862-missing-authorization-in-wp-9c0238fd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14782%3A%20CWE-862%20Missing%20Authorization%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14980-cwe-200-exposure-of-sensitive-infor-603c451f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14980%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20%20Knowledge%20Base%20Docs%20%26%20FAQ%20Solution%20for%20Elementor%20%26%20Block%20Editor&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15019-cwe-79-improper-neutralization-of-i-43842cb2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15019%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pagup%20Bulk%20Auto%20Image%20Alt%20Text%20(Alt%20tag%2C%20Alt%20attribute)%20optimizer%20(image%20SEO)&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b983b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14736-cwe-269-improper-privilege-manageme-92ffb5c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14736%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=critical&amp;id=6960a320ecefc3cd7c0b982e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20976-cwe-20-improper-input-validation-in-b3ca800c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20976%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20975-cwe-280-improper-handling-of-insuff-5f046621</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20975%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20Samsung%20Cloud&amp;severity=low&amp;id=69609f9becefc3cd7c0ad50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20974-cwe-20-improper-input-validation-in-ba1bf244</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20974%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20973-cwe-125-out-of-bounds-read-in-samsu-534c343e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20973%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20972-cwe-926-improper-export-of-android--1fa5dbea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20972%3A%20CWE-926%20%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20971-cwe-416-use-after-free-in-samsung-m-f3fa5fc5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20971%3A%20CWE-416%20Use%20After%20Free%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69609f9becefc3cd7c0ad501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20970-cwe-284-improper-access-control-in--33a90e25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20970%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20969-cwe-20-improper-input-validation-in-b581d4b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20969%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=low&amp;id=69609f9becefc3cd7c0ad4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20968-cwe-416-use-after-free-in-samsung-m-28492dd4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20968%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14803-cwe-79-cross-site-scripting-xss-in--cf1816b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14803%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20NEX-Forms&amp;severity=medium&amp;id=69609c17ecefc3cd7c0a38d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-north-korean-hackers-using-malicious-qr--2bcf0954</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20North%20Korean%20Hackers%20Using%20Malicious%20QR%20Codes%20in%20Spear-Phishing&amp;severity=medium&amp;id=6960e804a48af7d8cea16b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13749-cwe-352-cross-site-request-forgery--d21b8837</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13749%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20creativemotion%20Clearfy%20Cache%20%E2%80%93%20WordPress%20optimization%20plugin%2C%20Minify%20HTML%2C%20CSS%20%26%20JS%2C%20Defer&amp;severity=medium&amp;id=69609510ecefc3cd7c07ebe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14886-cwe-862-missing-authorization-in-sh-cc2d8640</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14886%3A%20CWE-862%20Missing%20Authorization%20in%20shoheitanaka%20Japanized%20for%20WooCommerce&amp;severity=medium&amp;id=69608a83ecefc3cd7c041599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66315-cwe-269-improper-privilege-manageme-a0a2659f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66315%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ZTE%20MF258K&amp;severity=medium&amp;id=69606ae0ecefc3cd7ca6fe33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22712-cwe-116-improper-encoding-or-escapi-9829c07f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22712%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20ApprovedRevs%20Extension&amp;severity=low&amp;id=6960d929a48af7d8ce7ea26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22713-cwe-79-improper-neutralization-of-i-147e5abf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22713%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments%20Extension&amp;severity=low&amp;id=6960d929a48af7d8ce7ea270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-09-4176f191</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-09&amp;severity=medium&amp;id=69619ab7ed32c7f01844536f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51626-na-36e5ff99</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51626%3A%20n%2Fa&amp;severity=medium&amp;id=69616ec845ea0302aa7aa328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60538-na-bca78eef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60538%3A%20n%2Fa&amp;severity=medium&amp;id=69616b4445ea0302aa763b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66715-na-c08c1da4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66715%3A%20n%2Fa&amp;severity=medium&amp;id=6961693845ea0302aa73d9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67811-na-e528b345</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67811%3A%20n%2Fa&amp;severity=medium&amp;id=696158a2047de42cfc869267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67810-na-9be9a4f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67810%3A%20n%2Fa&amp;severity=medium&amp;id=696158a2047de42cfc869263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70161-na-6b8ba75d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70161%3A%20n%2Fa&amp;severity=critical&amp;id=69614fa0047de42cfc79a3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67070-na-b36c12eb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67070%3A%20n%2Fa&amp;severity=high&amp;id=69614b956c9099d8230406a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66744-na-b30d2a00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66744%3A%20n%2Fa&amp;severity=high&amp;id=69613a016c9099d823001aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69542-na-faa12c97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69542%3A%20n%2Fa&amp;severity=critical&amp;id=696132fa6c9099d823e56083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67004-na-6171f99b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67004%3A%20n%2Fa&amp;severity=medium&amp;id=696132fa6c9099d823e56070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56225-na-8c05ec57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56225%3A%20n%2Fa&amp;severity=high&amp;id=69612bfb6c9099d823dc109b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67282-na-614da349</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67282%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67281-na-6196c6e0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67281%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67280-na-f8428dcb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67280%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67279-na-d6d53ef7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67279%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67278-na-244bbf53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67278%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67133-na-0409a09e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67133%3A%20n%2Fa&amp;severity=high&amp;id=6961214ef9fa58d9727fd82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22714-cwe-79-improper-neutralization-of-i-35c83ce7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22714%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Monaco%20Skin&amp;severity=low&amp;id=696047b7ecefc3cd7c756a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22710-cwe-79-improper-neutralization-of-i-9fa0ef59</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22710%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikibase%20Extension&amp;severity=low&amp;id=69604433ecefc3cd7c741f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0733-sql-injection-in-phpgurukul-online-c-47e6a0d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0733%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration%20System&amp;severity=medium&amp;id=696040afecefc3cd7c736701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0732-command-injection-in-d-link-di-8200g-65e04b49</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0732%3A%20Command%20Injection%20in%20D-Link%20DI-8200G&amp;severity=medium&amp;id=696040afecefc3cd7c7366f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0731-null-pointer-dereference-in-totolink-587777cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0731%3A%20NULL%20Pointer%20Dereference%20in%20TOTOLINK%20WA1200&amp;severity=medium&amp;id=696039a7ecefc3cd7c720a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0730-cross-site-scripting-in-phpgurukul-s-d99fea42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0730%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Staff%20Leave%20Management%20System&amp;severity=medium&amp;id=6960329fecefc3cd7c7029a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0729-sql-injection-in-code-projects-inter-c0e5e154</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0729%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=6960248fecefc3cd7c4fa16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14436-cwe-79-improper-neutralization-of-i-ffe6b89c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14436%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neeraj_slit%20Brevo%20for%20WooCommerce&amp;severity=high&amp;id=6960248fecefc3cd7c4fa165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14505-cwe-1240-use-of-a-cryptographic-pri-da8a0e79</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14505%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Elliptic&amp;severity=medium&amp;id=69602115ecefc3cd7c4b694d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15464-cwe-926-improper-export-of-android--7aa6f84d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15464%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20yintibao%20Fun%20Print%20Mobile&amp;severity=high&amp;id=69602115ecefc3cd7c4b6952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0728-sql-injection-in-code-projects-inter-99e684ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0728%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=696015f101d35e5d0ca3affb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0747-cwe-200-exposure-of-sensitive-inform-698ec942</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0747%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=low&amp;id=69600ee901d35e5d0ca2a7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22253-cwe-863-incorrect-authorization-in--da7b9039</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22253%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20charmbracelet%20soft-serve&amp;severity=medium&amp;id=695ffd5601d35e5d0c85d737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21860-cwe-67-improper-handling-of-windows-8e57b3f9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21860%3A%20CWE-67%3A%20Improper%20Handling%20of%20Windows%20Device%20Names%20in%20pallets%20werkzeug&amp;severity=medium&amp;id=695ffd5601d35e5d0c85d733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22257-cwe-79-improper-neutralization-of-i-b7cea917</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22257%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=695ffd5601d35e5d0c85d73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22256-cwe-79-improper-neutralization-of-i-068fdb7d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22256%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=695ffd5601d35e5d0c85d73b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guloader-malware-being-disguised-as-employee-perfo-f9600c34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guloader%20Malware%20Being%20Disguised%20as%20Employee%20Performance%20Reports&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/boto-cor-de-rosa-campaign-reveals-astaroth-whatsap-2257bd3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Boto-Cor-de-Rosa%20campaign%20reveals%20Astaroth%20WhatsApp-based%20worm%20activity%20in%20Brazil&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reborn-in-rust-muddywater-evolves-tooling-with-rus-f2c886d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reborn%20in%20Rust%3A%20MuddyWater%20Evolves%20Tooling%20with%20RustyWater%20Implant&amp;severity=medium&amp;id=6960cd4fecefc3cd7c180bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21896-cwe-863-incorrect-authorization-in--4f04eaa7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21896%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20getkirby%20kirby&amp;severity=medium&amp;id=695ff65701d35e5d0c7d3f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22235-cwe-639-authorization-bypass-throug-cdd7f537</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22235%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20OPEXUS%20eComplaint&amp;severity=high&amp;id=695fe7de2717593a336ad51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22234-cwe-639-authorization-bypass-throug-cdf5684d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22234%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20OPEXUS%20eCase%20Portal&amp;severity=critical&amp;id=695fe7de2717593a336ad517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22233-cwe-79-improper-neutralization-of-i-f384c61e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22233%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE%20Audit&amp;severity=medium&amp;id=695fe7de2717593a336ad512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22232-cwe-79-improper-neutralization-of-i-a378ed30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22232%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE%20Audit&amp;severity=medium&amp;id=695fe7de2717593a336ad50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22231-cwe-79-improper-neutralization-of-i-5e71d6a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE%20Audit&amp;severity=medium&amp;id=695fe7de2717593a336ad508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22230-cwe-863-incorrect-authorization-in--e01a693b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22230%3A%20CWE-863%20Incorrect%20Authorization%20in%20OPEXUS%20eCASE%20Audit&amp;severity=high&amp;id=695fe7de2717593a336ad503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-worm-spreads-astaroth-banking-trojan-acro-8ed6135a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Worm%20Spreads%20Astaroth%20Banking%20Trojan%20Across%20Brazil%20via%20Contact%20Auto-Messaging&amp;severity=medium&amp;id=6960058501d35e5d0ca0a539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22587-cwe-79-improper-neutralization-of-i-6a2f2889</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22587%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ideagen%20DevonWay&amp;severity=medium&amp;id=695fe7de2717593a336ad51f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22486-cwe-862-missing-authorization-in-ha-2bfe4ed4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22486%3A%20CWE-862%20Missing%20Authorization%20in%20Re%20Gallery&amp;severity=medium&amp;id=695fe4612717593a336a2000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22487-cwe-862-missing-authorization-in-ba-639bdea8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22487%3A%20Missing%20Authorization%20in%20baqend%20Speed%20Kit&amp;severity=medium&amp;id=695fe4612717593a336a2003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22488-cwe-862-missing-authorization-in-id-e2898ba4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22488%3A%20Missing%20Authorization%20in%20IdeaBox%20Creations%20Dashboard%20Welcome%20for%20Beaver%20Builder&amp;severity=medium&amp;id=695fe4612717593a336a1fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22489-cwe-639-authorization-bypass-throug-b0f9ee3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22489%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Wptexture%20Image%20Slider%20Slideshow&amp;severity=medium&amp;id=695fe4612717593a336a1fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targets-high-value-telecommunications-infrastructu-12021b8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targets%20high%20value%20telecommunications%20infrastructure%20in%20South%20Asia&amp;severity=medium&amp;id=695fe4592717593a336a123a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22490-cwe-862-missing-authorization-in-ni-76cdc5bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22490%3A%20Missing%20Authorization%20in%20niklaslindemann%20Bulk%20Landing%20Page%20Creator%20for%20WordPress%20LPagery&amp;severity=medium&amp;id=695fe4612717593a336a1fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22492-cwe-862-missing-authorization-in-na-98391b73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22492%3A%20Missing%20Authorization%20in%20Nawawi%20Jamili%20Docket%20Cache&amp;severity=medium&amp;id=695fe4612717593a336a1ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22517-cwe-862-missing-authorization-in-pa-6bf9aae4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22517%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20GA4WP%3A%20Google%20Analytics%20for%20WordPress&amp;severity=medium&amp;id=695fe4612717593a336a1ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0671-cwe-79-improper-neutralization-of-in-6be47e30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0671%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20UploadWizard%20extension&amp;severity=medium&amp;id=695fd9d02717593a334c2bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22518-cwe-79-improper-neutralization-of-i-b8832fda</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pencilwp%20X%20Addons%20for%20Elementor&amp;severity=medium&amp;id=695fd9d02717593a334c2be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22519-cwe-79-improper-neutralization-of-i-3ebf74ce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22519%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddyDev%20MediaPress&amp;severity=medium&amp;id=695fd9d02717593a334c2be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22521-cwe-98-improper-control-of-filename-9b7efea9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22521%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20G5Theme%20Handmade%20Framework&amp;severity=high&amp;id=695fd9d02717593a334c2beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59468-vulnerability-in-veeam-backup-and-r-83f9e674</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59468%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=critical&amp;id=695fd9d02717593a334c2bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55125-vulnerability-in-veeam-backup-and-r-9da41fad</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55125%3A%20Vulnerability%20in%20Veeam%20Backup%20And%20Recovery&amp;severity=high&amp;id=695fd9d02717593a334c2bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59469-vulnerability-in-veeam-backup-and-r-110221a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59469%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=critical&amp;id=695fd9d02717593a334c2bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59470-vulnerability-in-veeam-backup-and-r-84fa8bde</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59470%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=critical&amp;id=695fd9d02717593a334c2bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22522-cwe-862-missing-authorization-in-mu-89d8f119</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22522%3A%20Missing%20Authorization%20in%20Munir%20Kamal%20Block%20Slider&amp;severity=medium&amp;id=695fd9d12717593a334c2c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21639-vulnerability-in-ubiquiti-inc-airma-3788a8cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21639%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20airMAX%20AC&amp;severity=medium&amp;id=695fd9d02717593a334c2be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21638-vulnerability-in-ubiquiti-inc-ubb-x-be288a3f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21638%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UBB-XG&amp;severity=high&amp;id=695fd9d02717593a334c2bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22255-cwe-20-improper-input-validation-in-8e0abdcb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22255%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695fd2d12717593a3341ed67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67858-cwe-88-improper-neutralization-of-a-e58bba60</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67858%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20https%3A%2F%2Fgithub.com%2FFoobarOy%2F%20Foomuuri&amp;severity=high&amp;id=695fceb6c901b06321fdd524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22244-cwe-1336-improper-neutralization-of-c40ee942</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22244%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20open-metadata%20OpenMetadata&amp;severity=high&amp;id=695fceb6c901b06321fdd528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22241-cwe-434-unrestricted-upload-of-file-2a85b330</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22241%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gunet%20openeclass&amp;severity=high&amp;id=695fcb32c901b06321fa8309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67603-cwe-285-improper-authorization-in-h-a946f8ac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67603%3A%20CWE-285%3A%20Improper%20Authorization%20in%20https%3A%2F%2Fgithub.com%2FFoobarOy%2F%20Foomuuri&amp;severity=medium&amp;id=695fcb32c901b06321fa8305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66003-cwe-73-external-control-of-file-nam-dc355c22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66003%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20https%3A%2F%2Fgithub.com%2FKDE%2F%20smb4k&amp;severity=high&amp;id=695fc7afc901b06321f9519d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4596-cwe-639-authorization-bypass-through-db2bb68a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4596%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Asseco%20AMDX&amp;severity=medium&amp;id=695fc7afc901b06321f9519a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-uat-7290-targets-telecoms-with-linux--dedf79ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20UAT-7290%20Targets%20Telecoms%20with%20Linux%20Malware%20and%20ORB%20Nodes&amp;severity=medium&amp;id=695fe16f2717593a3368db6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22041-cwe-704-incorrect-type-conversion-o-dde80bb4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22041%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20armurox%20loggingredactor&amp;severity=low&amp;id=695fc7afc901b06321f951a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22034-cwe-636-not-failing-securely-failin-e9d94fcf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22034%3A%20CWE-636%3A%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20jvoisin%20snuffleupagus&amp;severity=critical&amp;id=695fc7afc901b06321f951a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66002-cwe-88-improper-neutralization-of-a-0f312f8e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66002%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20https%3A%2F%2Fgithub.com%2FKDE%2F%20smb4k&amp;severity=medium&amp;id=695fc426c901b06321f8223e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deep-malware-and-phishing-analysis-breaking-down-a-8618ad40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deep%20Malware%20and%20Phishing%20Analysis%20-%20Breaking%20Down%20an%20Access-Code-Gated%20Malware%20Delivery%20Chain&amp;severity=medium&amp;id=695fc0a3c901b06321f657cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22028-cwe-843-access-of-resource-using-in-424e4a3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22028%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20preactjs%20preact&amp;severity=high&amp;id=695fc0a3c901b06321f657fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21895-cwe-703-improper-check-or-handling--6a8429b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21895%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20RustCrypto%20RSA&amp;severity=low&amp;id=695fbd1fc901b06321f46f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21891-cwe-287-improper-authentication-in--5685fcec</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21891%3A%20CWE-287%3A%20Improper%20Authentication%20in%20IceWhaleTech%20ZimaOS&amp;severity=critical&amp;id=695fb9abc901b06321f2a5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rethinking-security-for-agentic-ai-ed96c8db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rethinking%20Security%20for%20Agentic%20AI&amp;severity=medium&amp;id=695fb968c901b06321f28355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21885-cwe-918-server-side-request-forgery-0aafb775</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21885%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20miniflux%20v2&amp;severity=medium&amp;id=695fb9abc901b06321f2a5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14025-incorrect-execution-assigned-permis-ec02e850</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14025%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=high&amp;id=695fb9abc901b06321f2a5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8307-cwe-257-storing-passwords-in-a-recov-d90d2cb9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8307%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Asseco%20InfoMedica%20Plus&amp;severity=medium&amp;id=695fb9abc901b06321f2a5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8306-cwe-1220-insufficient-granularity-of-dbab0da2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8306%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Asseco%20InfoMedica%20Plus&amp;severity=medium&amp;id=695fb9abc901b06321f2a5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-patched-in-jspdf-f547f89e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20Patched%20in%20jsPDF&amp;severity=critical&amp;id=695faeddc901b06321ecc624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-exposes-n8n-instances-to-ta-7d28c0ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20Exposes%20n8n%20Instances%20to%20Takeover%20Attacks&amp;severity=critical&amp;id=695faeddc901b06321ecc628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69260-cwe-346-origin-validation-error-in--e0b42137</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69260%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=695fab8ac901b06321eb9687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69259-cwe-346-origin-validation-error-in--b364d952</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69259%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=695fab8ac901b06321eb9682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69258-cwe-290-authentication-bypass-by-sp-4c2c3579</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69258%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=critical&amp;id=695fab8ac901b06321eb967d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-rustfs-flaw-iranian-ops-webui--51511695</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20RustFS%20Flaw%2C%20Iranian%20Ops%2C%20WebUI%20RCE%2C%20Cloud%20Leaks%2C%20and%2012%20More%20Stories&amp;severity=medium&amp;id=695fe16f2717593a3368db6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-whill-wheelchair-safety-risks-v-6669d0f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20WHILL%20Wheelchair%20Safety%20Risks%20via%20Remote%20Hacking&amp;severity=low&amp;id=695fa7dec901b06321ea46d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0719-stack-based-buffer-overflow-in-red-h-79d4cd86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0719%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=695fab8ac901b06321eb968c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62877-cwe-1188-initialization-of-a-resour-55c4d7c5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62877%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20SUSE%20harvester&amp;severity=critical&amp;id=695fa483c901b06321e778f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-state-of-trusted-open-source-74a77711</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20State%20of%20Trusted%20Open%20Source&amp;severity=medium&amp;id=695f9d45c901b06321e3fba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-deliver-nodecordrat-57b5d428</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20NPM%20Packages%20Deliver%20NodeCordRAT&amp;severity=medium&amp;id=695fa482c901b06321e77866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bluedelta-evolves-credential-harvesting-f2bf1165</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BlueDelta%20Evolves%20Credential%20Harvesting&amp;severity=medium&amp;id=695fa482c901b06321e7786b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-browser-updates-targeting-wordpress-administr-6d53f235</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Browser%20Updates%20Targeting%20WordPress%20Administrators%20via%20Malicious%20Plugin&amp;severity=medium&amp;id=695fa482c901b06321e77875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-hpe-oneview-vulnerability-exploited-in-at-236d5b77</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20HPE%20OneView%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=695f92bcc901b06321dddc0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-ise-security-vulnerability-after-pub-7c9b7842</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20ISE%20Security%20Vulnerability%20After%20Public%20PoC%20Exploit%20Release&amp;severity=low&amp;id=695fe16f2717593a3368db70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-nodecordrat-hidden-in-npm-bitc-55f3fadd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20NodeCordRAT%20Hidden%20in%20npm%20Bitcoin-Themed%20Packages&amp;severity=low&amp;id=695fe16f2717593a3368db73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66001-cwe-295-improper-certificate-valida-1cc9c04d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66001%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20SUSE%20neuvector&amp;severity=high&amp;id=695f8862c901b06321d89e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21894-cwe-290-authentication-bypass-by-sp-abdc7b71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21894%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=695f815bc901b06321d3faf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coolify-discloses-11-critical-flaws-enabling-full--817621ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coolify%20Discloses%2011%20Critical%20Flaws%20Enabling%20Full%20Server%20Compromise%20on%20Self-Hosted%20Instances&amp;severity=critical&amp;id=695fe16f2717593a3368db76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21874-cwe-772-missing-release-of-resource-267725cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21874%3A%20CWE-772%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=695f815bc901b06321d3fb08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21873-cwe-79-improper-neutralization-of-i-e5235d5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21873%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=high&amp;id=695f815bc901b06321d3fb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21872-cwe-79-improper-neutralization-of-i-33e479c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21872%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=695f815bc901b06321d3fb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21871-cwe-79-improper-neutralization-of-i-75a4b0d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21871%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=695f815bc901b06321d3fafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14984-cwe-79-improper-neutralization-of-i-0cc71297</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14984%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20Form%20%E2%80%93%20Contact%20Form%20Builder%2C%20Booking%2C%20Reservation%2C%20Subscribe%20for%20Block%20Editor&amp;severity=medium&amp;id=695f7a58c901b06321d0bb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0676-missing-authorization-in-g5theme-zor-49fcece6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0676%3A%20Missing%20Authorization%20in%20G5Theme%20Zorka&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0675-exposure-of-sensitive-system-informa-eba9da76</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0675&amp;severity=null&amp;id=695f7a5cc901b06321d0bc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0674-missing-authorization-in-campaign-mo-9d15d4cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0674%3A%20Missing%20Authorization%20in%20Campaign%20Monitor%20Campaign%20Monitor%20for%20WordPress&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69169-improper-neutralization-of-script-r-002a22c9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69169%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Noor%20Alam%20Easy%20Media%20Download&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68892-improper-neutralization-of-input-du-f98ab1d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68892%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%40hotmail.com%20Scroll%20rss%20excerpt&amp;severity=high&amp;id=695f7a5cc901b06321d0bc62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68891-improper-neutralization-of-input-du-f4133803</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Sutana%20WP%20App%20Bar&amp;severity=high&amp;id=695f7a5cc901b06321d0bc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68890-improper-neutralization-of-input-du-8d192e59</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68890%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hands01%20e-shops&amp;severity=high&amp;id=695f7a5cc901b06321d0bc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68887-improper-neutralization-of-input-du-4e9ba80b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CMSJunkie%20-%20WordPress%20Business%20Directory%20Plugins%20WP-BusinessDirectory&amp;severity=high&amp;id=695f7a5cc901b06321d0bc59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68875-improper-neutralization-of-input-du-08f5807d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jcaruso001%20Flaming%20Password%20Reset&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68874-improper-neutralization-of-input-du-560bb713</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68874%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shahjada%20Visitor%20Stats%20Widget&amp;severity=high&amp;id=695f7a5bc901b06321d0bc2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68873-improper-neutralization-of-input-du-5671c8e6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68873%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chlo%C3%A9digital%20PRIMER%20by%20chlo%C3%A9digital&amp;severity=high&amp;id=695f7a5bc901b06321d0bc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68867-improper-neutralization-of-input-du-3d8da08e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68867%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anibalwainstein%20Effect%20Maker&amp;severity=medium&amp;id=695f7a5bc901b06321d0bc29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67937-improper-control-of-filename-for-in-35b85a68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67937%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Hendon&amp;severity=high&amp;id=695f7a5bc901b06321d0bc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67936-improper-control-of-filename-for-in-16578b3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67936%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Curly&amp;severity=high&amp;id=695f7a5bc901b06321d0bc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67935-improper-control-of-filename-for-in-47653ee3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67935%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Optimize&amp;severity=high&amp;id=695f7a5bc901b06321d0bc20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67934-improper-control-of-filename-for-in-ea2bd869</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67934%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Wellspring&amp;severity=high&amp;id=695f7a5bc901b06321d0bc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67932-improper-neutralization-of-input-du-22c8f156</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67932%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20Listeo%20Core&amp;severity=high&amp;id=695f7a5bc901b06321d0bc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67931-insertion-of-sensitive-information--805d24f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67931%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20AITpro%20BulletProof%20Security&amp;severity=high&amp;id=695f7a5bc901b06321d0bc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67930-improper-neutralization-of-input-du-77488d71</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vernon%20Systems%20Limited%20eHive%20Search&amp;severity=high&amp;id=695f7a5bc901b06321d0bc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67928-improper-neutralization-of-special--625fe5f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67928%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themesuite%20Automotive%20Listings&amp;severity=critical&amp;id=695f7a5ac901b06321d0bbf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67927-improper-neutralization-of-input-du-e1912707</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67927%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spencer%20Haws%20Link%20Whisper%20Free&amp;severity=high&amp;id=695f7a5ac901b06321d0bbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67926-missing-authorization-in-shahjahan--bd1e512f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67926%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20Fluent%20Support&amp;severity=medium&amp;id=695f7a5ac901b06321d0bbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67925-improper-control-of-filename-for-in-9899a226</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67925%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zozothemes%20Corpkit&amp;severity=high&amp;id=695f7a5ac901b06321d0bbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67924-unrestricted-upload-of-file-with-da-3e2ed3af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67924%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Corpkit&amp;severity=critical&amp;id=695f7a5ac901b06321d0bbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67922-improper-neutralization-of-input-du-fc31c3e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67922%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=high&amp;id=695f7a5ac901b06321d0bbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67921-improper-neutralization-of-special--86d74aed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67921%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VanKarWai%20Lobo&amp;severity=high&amp;id=695f7a5ac901b06321d0bbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67920-improper-control-of-filename-for-in-2662c706</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67920%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Neo%20Ocular&amp;severity=high&amp;id=695f7a5ac901b06321d0bbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67919-authorization-bypass-through-user-c-b1bd716b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67919%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WofficeIO%20Woffice%20Core&amp;severity=medium&amp;id=695f7a5ac901b06321d0bbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67918-improper-neutralization-of-input-du-741baa31</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WofficeIO%20Woffice&amp;severity=high&amp;id=695f7a5ac901b06321d0bbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67917-missing-authorization-in-shinetheme-4feea974</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67917%3A%20Missing%20Authorization%20in%20shinetheme%20Traveler&amp;severity=medium&amp;id=695f7a59c901b06321d0bbb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67916-improper-neutralization-of-input-du-455113d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67916%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20Jobify&amp;severity=high&amp;id=695f7a59c901b06321d0bbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67915-authentication-bypass-using-an-alte-31496ea3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67915%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Arraytics%20Timetics&amp;severity=high&amp;id=695f7a59c901b06321d0bbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67914-path-traversal-in-beeteam368-vidmov-8d0e5cfa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67914%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20beeteam368%20VidMov&amp;severity=high&amp;id=695f7a59c901b06321d0bbac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67913-missing-authorization-in-arubait-de-ae13f281</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67913%3A%20Missing%20Authorization%20in%20Aruba.it%20Dev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=695f7a59c901b06321d0bba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67911-deserialization-of-untrusted-data-i-1611c32e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67911%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tribulant%20Software%20Newsletters&amp;severity=critical&amp;id=695f7a59c901b06321d0bba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27004-improper-neutralization-of-input-du-901001d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Famous%20-%20Responsive%20Image%20And%20Video%20Grid%20Gallery%20WordPress%20Plugin&amp;severity=high&amp;id=695f7a59c901b06321d0bba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27002-improper-neutralization-of-input-du-cf552652</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27002%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20CountDown%20With%20Image%20or%20Video%20Background&amp;severity=high&amp;id=695f7a59c901b06321d0bba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23993-improper-neutralization-of-special--807b5bf9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23993%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RiceTheme%20Felan%20Framework&amp;severity=critical&amp;id=695f7a59c901b06321d0bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23504-authentication-bypass-using-an-alte-338b8f53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23504%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20RiceTheme%20Felan%20Framework&amp;severity=critical&amp;id=695f7a59c901b06321d0bb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22728-improper-neutralization-of-special--a1d3c18d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22728%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AmentoTech%20Workreap%20(theme&apos;s%20plugin)&amp;severity=high&amp;id=695f7a58c901b06321d0bb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22726-server-side-request-forgery-ssrf-in-d25250ea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22726%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20_nK%20nK%20Themes%20Helper&amp;severity=medium&amp;id=695f7a58c901b06321d0bb4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22725-improper-neutralization-of-input-du-22129f92</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22725%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20loopus%20WP%20Virtual%20Assistant&amp;severity=high&amp;id=695f7a58c901b06321d0bb4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22715-missing-authorization-in-loopus-wp--bb20f474</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22715%3A%20Missing%20Authorization%20in%20loopus%20WP%20Attractive%20Donations%20System%20-%20Easy%20Stripe%20%26%20Paypal%20donations&amp;severity=high&amp;id=695f7a58c901b06321d0bb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22713-improper-neutralization-of-special--f789e7b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22713%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vanquish%20WooCommerce%20Orders%20%26%20Customers%20Exporter&amp;severity=high&amp;id=695f7a58c901b06321d0bb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22712-improper-control-of-filename-for-in-f3c03723</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22712%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20QantumThemes%20Typify&amp;severity=high&amp;id=695f7a58c901b06321d0bb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22708-improper-control-of-filename-for-in-c75952d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22708%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Mitech&amp;severity=high&amp;id=695f7a58c901b06321d0bb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22707-improper-control-of-filename-for-in-9459765a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22707%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Moody&amp;severity=high&amp;id=695f7a58c901b06321d0bb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22509-improper-control-of-filename-for-in-ee6f4eee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22509%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TMRW-studio%20Atlas&amp;severity=high&amp;id=695f7a58c901b06321d0bb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14431-improper-control-of-filename-for-in-19773b5a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14431%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20THEMELOGI%20Navian&amp;severity=high&amp;id=695f7a56c901b06321d0bb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14430-improper-control-of-filename-for-in-799c0ebc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14430%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Brook&amp;severity=high&amp;id=695f7a56c901b06321d0bb08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14429-improper-control-of-filename-for-in-3357f4f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14429%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20AeroLand&amp;severity=high&amp;id=695f7a56c901b06321d0bb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14360-missing-authorization-in-kaira-bloc-3771edfd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14360%3A%20Missing%20Authorization%20in%20Kaira%20Blockons&amp;severity=high&amp;id=695f7a56c901b06321d0bb02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14359-improper-control-of-filename-for-in-397f90b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14359%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20brandexponents%20Oshine&amp;severity=high&amp;id=695f7a56c901b06321d0baff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14358-missing-authorization-in-sizam-rehu-4f69b90e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14358%3A%20Missing%20Authorization%20in%20sizam%20REHub%20Framework&amp;severity=high&amp;id=695f7a56c901b06321d0bafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13504-improper-neutralization-of-input-du-a40e55b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13504%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Real%20Estate%20Pro&amp;severity=high&amp;id=695f7a56c901b06321d0baf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12551-improper-neutralization-of-input-du-9ef8f551</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20ListingHub&amp;severity=high&amp;id=695f7a56c901b06321d0baf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12550-improper-control-of-filename-for-in-5b07e167</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12550%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20OchaHouse&amp;severity=high&amp;id=695f7a56c901b06321d0baf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12549-improper-control-of-filename-for-in-b8432961</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12549%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20Rozy%20-%20Flower%20Shop&amp;severity=high&amp;id=695f7a56c901b06321d0baf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0701-sql-injection-in-code-projects-inter-2e172073</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0701%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f68bec901b06321bec204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13679-cwe-862-missing-authorization-in-th-ad4d3464</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13679%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=695f5aaec901b06321b263ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0700-sql-injection-in-code-projects-inter-686078d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0700%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f5aaec901b06321b263b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-launches-chatgpt-health-with-isolated-encry-7f957863</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Launches%20ChatGPT%20Health%20with%20Isolated%2C%20Encrypted%20Health%20Data%20Controls&amp;severity=low&amp;id=695fe16f2717593a3368db79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0699-sql-injection-in-code-projects-inter-b85136f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0699%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f5022c901b06321a78445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0698-sql-injection-in-code-projects-inter-76fded15</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0698%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f4596c901b06321a377e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-microsoft-office-and-hpe-oneview-bugs-a-85288de4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Microsoft%20Office%20and%20HPE%20OneView%20Bugs%20as%20Actively%20Exploited&amp;severity=low&amp;id=695fe16f2717593a3368db7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0697-sql-injection-in-code-projects-inter-219dd5f0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0697%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f3786c901b063217f0239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21427-uncontrolled-search-path-element-in-aad0c32f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20PIONEER%20CORPORATION%20USB%20DAC%20Amplifier%20APS-DA101JS&amp;severity=high&amp;id=695f3089c901b0632175e2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0707-incorrect-behavior-order-authorizati-e87902c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0707%3A%20Incorrect%20Behavior%20Order%3A%20Authorization%20Before%20Parsing%20and%20Canonicalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=695f2d53e471bcf0302d1c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12640-cwe-862-missing-authorization-in-ga-44a422b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12640%3A%20CWE-862%20Missing%20Authorization%20in%20premio%20Folders%20%E2%80%93%20Unlimited%20Folders%20to%20Organize%20Media%20Library%20Folder%2C%20Pages%2C%20Posts%2C%20File%20Manager&amp;severity=medium&amp;id=695f1f43e471bcf0300999b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14275-cwe-79-improper-neutralization-of-i-01fc7803</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14275%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Kit%20for%20Elementor%20%E2%80%93%20Powerful%20Addons%20for%20Elementor%2C%20Widgets%20%26%20Templates%20for%20WordPress&amp;severity=medium&amp;id=695f1f43e471bcf0300999b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21877-cwe-94-improper-control-of-generati-ab77daef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21877%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=695f0dafe471bcf030f5212d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21868-cwe-1333-inefficient-regular-expres-5e63e72a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21868%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20FlagForgeCTF%20flagForge&amp;severity=high&amp;id=695efc26e471bcf030c50479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-using-gephi-with-dshield-sensor-data-wed--245fe4bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data%2C%20(Wed%2C%20Jan%207th)&amp;severity=medium&amp;id=695ef93a07b8a419a776ec28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-08-6ebd0adb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-08&amp;severity=medium&amp;id=69604781ecefc3cd7c74f1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68718-na-173f2be3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68718%3A%20n%2Fa&amp;severity=medium&amp;id=69602115ecefc3cd7c4b6955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68719-na-e1c0f72f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68719%3A%20n%2Fa&amp;severity=high&amp;id=6960197501d35e5d0ca49c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68716-na-0ad23b88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68716%3A%20n%2Fa&amp;severity=high&amp;id=696015f101d35e5d0ca3aff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68717-na-21140e62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68717%3A%20n%2Fa&amp;severity=critical&amp;id=6960126e01d35e5d0ca32a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65731-na-c6d28df0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65731%3A%20n%2Fa&amp;severity=medium&amp;id=696007e501d35e5d0ca11112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68715-na-e2ecb9a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68715%3A%20n%2Fa&amp;severity=critical&amp;id=696007e501d35e5d0ca1110e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66916-na-e51fb6f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66916%3A%20n%2Fa&amp;severity=critical&amp;id=696007e501d35e5d0ca11109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66913-na-091de65a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66913%3A%20n%2Fa&amp;severity=critical&amp;id=696007e501d35e5d0ca11105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67325-na-ab4cd6cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67325%3A%20n%2Fa&amp;severity=critical&amp;id=695ffd5601d35e5d0c85d72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65518-na-4a47a9ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65518%3A%20n%2Fa&amp;severity=high&amp;id=695ffd5601d35e5d0c85d72a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67825-na-4635c23b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67825%3A%20n%2Fa&amp;severity=medium&amp;id=695fe7de2717593a336ad4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61550-na-1073f50c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61550%3A%20n%2Fa&amp;severity=medium&amp;id=695fe4622717593a336a202c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61549-na-a8ca8bbf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61549%3A%20n%2Fa&amp;severity=medium&amp;id=695fe4622717593a336a2029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61548-na-d7c9e0d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61548%3A%20n%2Fa&amp;severity=critical&amp;id=695fe4622717593a336a2026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61547-na-ee49a114</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61547%3A%20n%2Fa&amp;severity=medium&amp;id=695fe4622717593a336a2023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61546-na-f0011f4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61546%3A%20n%2Fa&amp;severity=critical&amp;id=695fe4622717593a336a2020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50334-na-9d3e8590</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50334%3A%20n%2Fa&amp;severity=high&amp;id=695fe4622717593a336a2019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56425-na-4205a5a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56425%3A%20n%2Fa&amp;severity=critical&amp;id=695fe4612717593a336a1ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56424-na-35b7b549</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56424%3A%20n%2Fa&amp;severity=high&amp;id=695fe4612717593a336a1ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61246-na-22648793</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61246%3A%20n%2Fa&amp;severity=critical&amp;id=695fe4612717593a336a1fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67091-na-672ab351</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67091%3A%20n%2Fa&amp;severity=medium&amp;id=695fd2d12717593a3341ed63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67090-na-904d4e45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67090%3A%20n%2Fa&amp;severity=medium&amp;id=695fd2d12717593a3341ed5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67089-na-8b9c997f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67089%3A%20n%2Fa&amp;severity=high&amp;id=695fd2d12717593a3341ed5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63611-na-223c28fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63611%3A%20n%2Fa&amp;severity=high&amp;id=695fd2d12717593a3341ed56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21858-cwe-20-improper-input-validation-in-722f9002</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21858%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=695ef5ea07b8a419a7738b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21875-cwe-89-improper-neutralization-of-s-b0c482ce</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21875%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=critical&amp;id=695ef26a07b8a419a77247a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21869-cwe-787-out-of-bounds-write-in-ggml-e267ba1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21869%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=695eeee107b8a419a7712f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15346-cwe-306-missing-authentication-for--99034569</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15346%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20wolfSSL%20wolfSSL-py&amp;severity=critical&amp;id=695eeee107b8a419a7712f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21859-cwe-918-server-side-request-forgery-cc5f877d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21859%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=695eeee107b8a419a7712f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21695-cwe-915-improperly-controlled-modif-d4ca135e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21695%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20kromitgmbh%20titra&amp;severity=medium&amp;id=695eeee107b8a419a7712f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21694-cwe-284-improper-access-control-in--29f24380</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21694%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20kromitgmbh%20titra&amp;severity=medium&amp;id=695eeb5d07b8a419a75c0a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62224-cwe-451-user-interface-ui-misrepres-3f2120c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62224%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=695ee7de07b8a419a7566a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21697-cwe-362-concurrent-execution-using--3b069392</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21697%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20rezmoss%20axios4go&amp;severity=high&amp;id=695ee0db07b8a419a74d164c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21851-cwe-22-improper-limitation-of-a-pat-afbd0b53</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21851%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Project-MONAI%20MONAI&amp;severity=medium&amp;id=695ee0db07b8a419a74d1653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22047-cwe-20-improper-input-validation-in-22fbe620</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22047%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695edb802efadb62cf875e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12776-cwe-79-improper-neutralization-of-i-a457465f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12776%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Commvault%20WebConsole&amp;severity=low&amp;id=695edb802efadb62cf875e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22046-cwe-20-improper-input-validation-in-0728d445</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22046%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695edb802efadb62cf875e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21693-cwe-20-improper-input-validation-in-b2a76a3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21693%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ee29307b8a419a74fbfe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21692-cwe-20-improper-input-validation-in-e2089966</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21692%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ee29307b8a419a74fbfe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21691-cwe-20-improper-input-validation-in-3f0702c7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21691%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695ed7fb2efadb62cf86c40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21690-cwe-20-improper-input-validation-in-54e7f8fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21690%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695ed7fb2efadb62cf86c406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21689-cwe-20-improper-input-validation-in-d3f14076</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21689%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695ed7fb2efadb62cf86c415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21688-cwe-20-improper-input-validation-in-b11fd34e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21688%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed7fb2efadb62cf86c410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21687-cwe-20-improper-input-validation-in-05a2397a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21687%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed4782efadb62cf85dbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21686-cwe-20-improper-input-validation-in-3e125ec9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21686%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed4782efadb62cf85dbf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21685-cwe-20-improper-input-validation-in-dd5e1027</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21685%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed4782efadb62cf85dbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21684-cwe-20-improper-input-validation-in-4696263e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21684%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed0f72efadb62cf845619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69222-cwe-918-server-side-request-forgery-6b2634c3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69222%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20danny-avila%20LibreChat&amp;severity=critical&amp;id=695ed0f72efadb62cf84560f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13151-cwe-120-buffer-copy-without-checkin-c9bb9538</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13151%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20GnuTLS%20libtasn1&amp;severity=high&amp;id=695ed0f72efadb62cf84560b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21683-cwe-20-improper-input-validation-in-49152906</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21683%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed0f72efadb62cf845614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69221-cwe-862-missing-authorization-in-da-f1390c60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69221%3A%20CWE-862%3A%20Missing%20Authorization%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=695ecd702efadb62cf830358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21682-cwe-20-improper-input-validation-in-2596520c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21682%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed0f72efadb62cf84561e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69220-cwe-862-missing-authorization-in-da-78b98c56</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69220%3A%20CWE-862%3A%20Missing%20Authorization%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=695ec9ec2efadb62cf81f4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21681-cwe-20-improper-input-validation-in-efe8ad98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21681%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ec9ec2efadb62cf81f4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22187-cwe-502-deserialization-of-untruste-761986c4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22187%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Open%20Microscopy%20Environment%20Bio-Formats&amp;severity=medium&amp;id=695ec6692efadb62cf814038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22186-cwe-611-improper-restriction-of-xml-9cf3ffb6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22186%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Open%20Microscopy%20Environment%20Bio-Formats&amp;severity=medium&amp;id=695ec6692efadb62cf814033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22185-cwe-125-out-of-bounds-read-in-openl-149c6b1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22185%3A%20CWE-125%20Out-of-bounds%20Read%20in%20OpenLDAP%20Foundation%20OpenLDAP&amp;severity=medium&amp;id=695ec6692efadb62cf81402d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22184-cwe-120-buffer-copy-without-checkin-2d99f8c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22184%3A%20CWE-787%20Out-of-bounds%20Write%20in%20zlib%20software%20zlib&amp;severity=medium&amp;id=695ec6692efadb62cf814027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66620-cwe-553-command-shell-in-externally-ff6ed5ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66620%3A%20CWE-553%20Command%20Shell%20in%20Externally%20Accessible%20Directory%20in%20Columbia%20Weather%20Systems%20MicroServer&amp;severity=high&amp;id=695ebf602efadb62cf7fc350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64305-cwe-313-cleartext-storage-in-a-file-29a0875f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64305%3A%20CWE-313%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20Columbia%20Weather%20Systems%20MicroServer&amp;severity=high&amp;id=695ebf602efadb62cf7fc34c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61939-cwe-923-improper-restriction-of-com-04b70488</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61939%3A%20CWE-923%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Columbia%20Weather%20Systems%20MicroServer&amp;severity=high&amp;id=695ebbdb2efadb62cf6b2ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0670-cwe-79-improper-neutralization-of-in-ad1ac8dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20ProofreadPage%20Extension&amp;severity=medium&amp;id=695eb01e7349d0379dbd7dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21856-cwe-89-improper-neutralization-of-s-8cdebb6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21856%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20the-hideout%20tarkov-data-manager&amp;severity=high&amp;id=695ea9147349d0379dba5700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21855-cwe-79-improper-neutralization-of-i-ad553004</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21855%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20the-hideout%20tarkov-data-manager&amp;severity=critical&amp;id=695ea9147349d0379dba56fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21854-cwe-287-improper-authentication-in--7cc8c676</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21854%3A%20CWE-287%3A%20Improper%20Authentication%20in%20the-hideout%20tarkov-data-manager&amp;severity=critical&amp;id=695ea9147349d0379dba56f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21680-cwe-476-null-pointer-dereference-in-047e320f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21680%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e9e877349d0379db58c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0669-cwe-22-improper-limitation-of-a-path-051a3740</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0669%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20CSS%20extension&amp;severity=high&amp;id=695e9e877349d0379db58c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0668-cwe-1333-inefficient-regular-express-21491780</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0668%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20VisualData%20Extension&amp;severity=medium&amp;id=695e9e877349d0379db58c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66560-cwe-770-allocation-of-resources-wit-b1c6da4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66560%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20quarkusio%20quarkus&amp;severity=medium&amp;id=695e9b047349d0379db428c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61782-cwe-601-url-redirection-to-untruste-13f1c6b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61782%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20OpenCTI-Platform%20opencti&amp;severity=medium&amp;id=695e9b047349d0379db428c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58441-cwe-918-server-side-request-forgery-3b26c3ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58441%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20KnowageLabs%20Knowage-Server&amp;severity=medium&amp;id=695e97857349d0379db35c0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22539-cwe-201-insertion-of-sensitive-info-0d68abb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22539%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=medium&amp;id=695e97867349d0379db35c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21679-cwe-20-improper-input-validation-in-2c518fac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21679%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695e97867349d0379db35c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21678-cwe-20-improper-input-validation-in-0c47d3b9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21678%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695e97867349d0379db35c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21506-cwe-20-improper-input-validation-in-31f187d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21506%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97867349d0379db35c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21505-cwe-20-improper-input-validation-in-712baf89</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21505%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97867349d0379db35c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21503-cwe-20-improper-input-validation-in-1c4e70a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21503%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97867349d0379db35c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21504-cwe-122-heap-based-buffer-overflow--e39a2a83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21504%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97867349d0379db35c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21501-cwe-20-improper-input-validation-in-eead7bde</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21501%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21502-cwe-20-improper-input-validation-in-8e09d8ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21502%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21500-cwe-20-improper-input-validation-in-61e61046</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21500%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21499-cwe-20-improper-input-validation-in-13cb06df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21499%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21498-cwe-20-improper-input-validation-in-e0e991fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21498%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21496-cwe-20-improper-input-validation-in-19443145</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21496%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4677-cwe-613-insufficient-session-expirat-37530d49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4677%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20ABB%20WebPro%20SNMP%20Card%20PowerValue&amp;severity=medium&amp;id=695e97857349d0379db35c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/black-cat-behind-seo-poisoning-malware-campaign-ta-e273b63e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Black%20Cat%20Behind%20SEO%20Poisoning%20Malware%20Campaign%20Targeting%20Popular%20Software%20Searches&amp;severity=medium&amp;id=695ec4a92efadb62cf80eb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21497-cwe-20-improper-input-validation-in-5f20b0a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21497%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21495-cwe-20-improper-input-validation-in-cf10371c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21495%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22537-cwe-497-exposure-of-sensitive-syste-d934be58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22537%3A%20CWE-497%3A%20Exposure%20of%20sensitive%20system%20information%20to%20an%20unauthorized%20control%20sphere%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=medium&amp;id=695e93fd7349d0379db27899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4676-cwe-303-incorrect-implementation-of--73ca6166</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4676%3A%20CWE-303%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20ABB%20WebPro%20SNMP%20Card%20PowerValue&amp;severity=high&amp;id=695e93fd7349d0379db27893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0618-cwe-79-improper-neutralization-of-in-b2d96a0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Devolutions%20PowerShell%20Universal&amp;severity=medium&amp;id=695e93fd7349d0379db27896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4675-cwe-754-improper-check-for-unusual-o-57c617f2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4675%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20ABB%20WebPro%20SNMP%20Card%20PowerValue&amp;severity=medium&amp;id=695e93fd7349d0379db278a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22536-cwe-269-improper-privilege-manageme-73d1af88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22536%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=high&amp;id=695e93fd7349d0379db278ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22535-cwe-1366-frail-security-in-protocol-7dc80036</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22535%3A%20CWE-1366%3A%20Frail%20Security%20in%20Protocols%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=high&amp;id=695e90787349d0379db110ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20029-improper-restriction-of-xml-externa-18fc28d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20029%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=695e8cf77349d0379db03209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20027-exposure-of-sensitive-information-t-3a7e9bbe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20027%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=695e8cf77349d0379db03206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20026-double-free-in-cisco-cisco-secure-f-811fd0ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20026%3A%20Double%20Free%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=695e8cf77349d0379db03203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22544-cwe-319-cleartext-transmission-of-s-944ed6fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22544%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=high&amp;id=695e8cf77349d0379db0320c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22543-cwe-261-week-encoding-for-passwords-53f4a645</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22543%3A%20CWE-261%3A%20Week%20encoding%20for%20passwords%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=medium&amp;id=695e89727349d0379daecb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12543-improper-input-validation-in-red-ha-a7633912</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12543%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%204.14.4%20for%20Spring%20Boot%203.5.11&amp;severity=critical&amp;id=695e89727349d0379daecb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22542-cwe-400-uncontrolled-resource-consu-ef7dbc79</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22542%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=critical&amp;id=695e7ee47349d0379daa4383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62327-cwe-522-insufficiently-protected-cr-876f1fc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62327%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20HCLSoftware%20DevOps%20Deploy&amp;severity=medium&amp;id=695e7b617349d0379da9360d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22541-cwe-400-uncontrolled-resource-consu-e55d8252</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22541%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=high&amp;id=695e7b617349d0379da93610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-extensions-with-900000-downloads-caught-ste-bc653709</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Extensions%20With%20900%2C000%20Downloads%20Caught%20Stealing%20AI%20Chats&amp;severity=medium&amp;id=695e77a97349d0379da82ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22540-cwe-400-uncontrolled-resource-consu-2abb1104</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22540%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20EFACEC%20QC60%2F90%2F120&amp;severity=critical&amp;id=695e6d507349d0379da4e26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49335-cwe-918-server-side-request-forgery-ecdae545</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49335%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20minnur%20External%20Media&amp;severity=medium&amp;id=695e6d507349d0379da4e26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-totolink-range-extender-allows-de-5ce887e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20Totolink%20Range%20Extender%20Allows%20Device%20Takeover&amp;severity=low&amp;id=695e66157349d0379da2f167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-vulnerability-cvss-100-allows-unauthe-5ad0cf4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20n8n%20Vulnerability%20(CVSS%2010.0)%20Allows%20Unauthenticated%20Attackers%20to%20Take%20Full%20Control&amp;severity=critical&amp;id=695ec4a92efadb62cf80eb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/several-code-execution-flaws-patched-in-veeam-back-d3fbbb64</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Several%20Code%20Execution%20Flaws%20Patched%20in%20Veeam%20Backup%20%26%20Replication&amp;severity=medium&amp;id=695e62917349d0379da25619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15479-ngsurvey-enterprise-364-stored-xss--f860fbd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15479%3A%20NGSurvey%20Enterprise%203.6.4%20stored%20XSS%20via%20survey%20content%20enables%20arbitrary%20JavaScript%20execution%20in%20Data%20Illusion%20%20Zumbrunn%20NGSurvey&amp;severity=medium&amp;id=695e62d67349d0379da25d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-gobruteforcer-ai-generated-server-defaults--fb78f184</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20GoBruteforcer%3A%20AI-Generated%20Server%20Defaults%2C%20Weak%20Passwords%2C%20and%20Crypto-Focused%20Campaigns&amp;severity=medium&amp;id=695e5bc17349d0379da06cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6225-cwe-78-improper-neutralization-of-sp-9604023e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6225%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kieback%26Peter%20Neutrino-GLT&amp;severity=medium&amp;id=695e5f407349d0379da193fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47552-cwe-502-deserialization-of-untruste-379cd3b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47552%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Digital%20zoom%20studio%20DZS%20Video%20Gallery&amp;severity=critical&amp;id=695e5bc07349d0379da06c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46494-cwe-79-improper-neutralization-of-i-e942f792</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46494%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themesgrove%20WidgetKit%20Pro&amp;severity=high&amp;id=695e5bc07349d0379da06c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46434-cwe-862-missing-authorization-in-po-352c9581</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46434%3A%20Missing%20Authorization%20in%20POSIMYTH%20Innovation%20The%20Plus%20Addons%20for%20Elementor%20Pro&amp;severity=medium&amp;id=695e54ca7349d0379d8a6f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46256-cwe-35-path-traversal-in-sigmaplugi-a9b59d9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46256%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20SigmaPlugin%20Advanced%20Database%20Cleaner%20PRO&amp;severity=medium&amp;id=695e54ca7349d0379d8a6f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-zero-day-in-discontinued-d-link-de-18bfc2bb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Zero-Day%20in%20Discontinued%20D-Link%20Devices&amp;severity=critical&amp;id=695e54817349d0379d8a4f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32303-cwe-89-improper-neutralization-of-s-e8e6b759</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32303%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mojoomla%20WPCHURCH&amp;severity=critical&amp;id=695e54ca7349d0379d8a6f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32300-cwe-79-improper-neutralization-of-i-d9ebbb0b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32300%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Digital%20zoom%20studio%20DZS%20Video%20Gallery&amp;severity=high&amp;id=695e4dab7349d0379d7f2b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31643-cwe-266-incorrect-privilege-assignm-54b5b8f5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31643%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Dasinfomedia%20WPCHURCH&amp;severity=high&amp;id=695e4dab7349d0379d7f2b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69080-cwe-98-improper-control-of-filename-5d7b6f22</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69080%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20JanStudio%20Gecko&amp;severity=high&amp;id=695e4dab7349d0379d7f2b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69081-cwe-98-improper-control-of-filename-68382000</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69081%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Hope&amp;severity=high&amp;id=695e4c107349d0379d7d5646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69082-cwe-79-improper-neutralization-of-i-7cb8008a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69082%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Frenify%20Arlo&amp;severity=high&amp;id=695e4c107349d0379d7d5649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69333-cwe-862-missing-authorization-in-cr-8715fc87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69333%3A%20Missing%20Authorization%20in%20Crocoblock%20JetEngine&amp;severity=medium&amp;id=695e4c107349d0379d7d564c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69344-cwe-862-missing-authorization-in-th-7166ad74</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69344%3A%20Missing%20Authorization%20in%20themehunk%20Oneline%20Lite&amp;severity=medium&amp;id=695e4c107349d0379d7d564f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-actors-exploiting-complex-routing-scenari-85a18e07</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20actors%20exploiting%20complex%20routing%20scenarios%20and%20misconfigured%20spoof%20protections&amp;severity=medium&amp;id=695e48e2a55ed4ed99a6732f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/complex-routing-misconfigurations-exploited-for-do-a7e27402</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Complex%20Routing%2C%20Misconfigurations%20Exploited%20for%20Domain%20Spoofing%20in%20Phishing%20Attacks&amp;severity=medium&amp;id=695e452ca55ed4ed99a529de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n8n-warns-of-cvss-100-rce-vulnerability-affecting--56ace4da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=n8n%20Warns%20of%20CVSS%2010.0%20RCE%20Vulnerability%20Affecting%20Self-Hosted%20and%20Cloud%20Versions&amp;severity=critical&amp;id=695e5b897349d0379da03fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-future-of-cybersecurity-includes-non-human-emp-e322fd74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Future%20of%20Cybersecurity%20Includes%20Non-Human%20Employees&amp;severity=medium&amp;id=695e5b897349d0379da03fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/veeam-patches-critical-rce-vulnerability-with-cvss-e6b200e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Veeam%20Patches%20Critical%20RCE%20Vulnerability%20with%20CVSS%209.0%20in%20Backup%20%26%20Replication&amp;severity=critical&amp;id=695e5b897349d0379da03faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-misconfigured-email-routing-can-en-234c9c8f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20Misconfigured%20Email%20Routing%20Can%20Enable%20Internal%20Domain%20Phishing&amp;severity=medium&amp;id=695e5b897349d0379da03fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68637-cwe-297-improper-validation-of-cert-54595ab4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68637%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Uniffle&amp;severity=critical&amp;id=695e2cc2a55ed4ed999bf8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-phishing-campaign-with-qr-codes-rendered-using-a-712d9617</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table%2C%20(Wed%2C%20Jan%207th)&amp;severity=medium&amp;id=695e290ca55ed4ed999b4180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13722-cwe-862-missing-authorization-in-te-4e0569ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13722%3A%20CWE-862%20Missing%20Authorization%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=695e4c107349d0379d7d5664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14057-cwe-79-improper-neutralization-of-i-e0cbca8e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tugbucket%20Multi-column%20Tag%20Map&amp;severity=medium&amp;id=695e4c117349d0379d7d56b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14077-cwe-352-cross-site-request-forgery--993e8e7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14077%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20openchamp%20Simcast&amp;severity=medium&amp;id=695e4c137349d0379d7d5789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15058-cwe-80-improper-neutralization-of-s-684b5e13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15058%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20spwebguy%20Responsive%20Pricing%20Table&amp;severity=medium&amp;id=695e4c147349d0379d7d581e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14114-cwe-79-improper-neutralization-of-i-03ca8042</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14114%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chrisblackwell%201180px%20Shortcodes&amp;severity=medium&amp;id=695e4c137349d0379d7d57a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14460-cwe-862-missing-authorization-in-en-1f2470ec</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14460%3A%20CWE-862%20Missing%20Authorization%20in%20enartia%20Piraeus%20Bank%20WooCommerce%20Payment%20Gateway&amp;severity=medium&amp;id=695e4c147349d0379d7d5801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14122-cwe-79-improper-neutralization-of-i-b24e104e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14122%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anybodesign%20AD%20Sliding%20FAQ&amp;severity=medium&amp;id=695e4c137349d0379d7d57b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13974-cwe-79-improper-neutralization-of-i-e3145fcb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13974%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehigh%20Email%20Customizer%20for%20WooCommerce%20%7C%20Drag%20and%20Drop%20Email%20Templates%20Builder&amp;severity=medium&amp;id=695e4c117349d0379d7d5696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14121-cwe-79-improper-neutralization-of-i-f07bdc99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14121%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samikeijonen%20EDD%20Download%20Info&amp;severity=medium&amp;id=695e4c137349d0379d7d57ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14147-cwe-79-improper-neutralization-of-i-14e5718c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14147%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20corsonr%20Easy%20GitHub%20Gist%20Shortcodes&amp;severity=medium&amp;id=695e4c147349d0379d7d57f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13841-cwe-79-improper-neutralization-of-i-6a08a83f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clevelandwebdeveloper%20Smart%20App%20Banners&amp;severity=medium&amp;id=695e4c117349d0379d7d567d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13801-cwe-22-improper-limitation-of-a-pat-0c4d1947</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13801%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20yocoadmin%20Yoco%20Payments&amp;severity=high&amp;id=695e4c107349d0379d7d5668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14070-cwe-862-missing-authorization-in-xf-6996e1d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14070%3A%20CWE-862%20Missing%20Authorization%20in%20xfinitysoft%20Reviewify%20%E2%80%94%20Review%20Discounts%20%26%20Photo%2FVideo%20Reviews%20for%20WooCommerce&amp;severity=high&amp;id=695e4c137349d0379d7d5780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13990-cwe-352-cross-site-request-forgery--f7c6b6b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13990%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mamurjor%20Mamurjor%20Employee%20Info&amp;severity=medium&amp;id=695e4c117349d0379d7d569b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13419-cwe-862-missing-authorization-in-ah-6529d8c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13419%3A%20CWE-862%20Missing%20Authorization%20in%20aharonyan%20Guest%20posting%20%2F%20Frontend%20Posting%20%2F%20Front%20Editor%20%E2%80%93%20WP%20Front%20User%20Submit&amp;severity=medium&amp;id=695e4c107349d0379d7d5656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14465-cwe-352-cross-site-request-forgery--85ee642c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14465%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20praveentamil%20Sticky%20Action%20Buttons&amp;severity=medium&amp;id=695e4c147349d0379d7d5810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14144-cwe-79-improper-neutralization-of-i-6420e3c7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14144%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mstoic%20Mstoic%20Shortcodes&amp;severity=medium&amp;id=695e4c147349d0379d7d57e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14131-cwe-79-improper-neutralization-of-i-8e3976b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14131%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20damienoh%20WP%20Widget%20Changer&amp;severity=medium&amp;id=695e4c147349d0379d7d57e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14453-cwe-79-improper-neutralization-of-i-8bec3ccc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ruhul080%20My%20Album%20Gallery&amp;severity=medium&amp;id=695e4c147349d0379d7d57fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14113-cwe-79-improper-neutralization-of-i-588286bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14113%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20viitorcloudvc%20Viitor%20Button%20Shortcodes&amp;severity=medium&amp;id=695e4c137349d0379d7d579f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14112-cwe-79-improper-neutralization-of-i-24efc4e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14112%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mattiaspkallio%20Snillrik%20Restaurant%20Menu&amp;severity=medium&amp;id=695e4c137349d0379d7d579a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13418-cwe-79-improper-neutralization-of-i-e82a2746</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13418%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spwebguy%20Responsive%20Pricing%20Table&amp;severity=medium&amp;id=695e4c107349d0379d7d5652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14626-cwe-79-improper-neutralization-of-i-a822f052</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20www15to%20QR%20Code%20for%20WooCommerce%20order%20emails%2C%20PDF%20invoices%2C%20packing%20slips&amp;severity=medium&amp;id=695e4c147349d0379d7d5814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14130-cwe-79-improper-neutralization-of-i-eb7c6dd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14130%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cuvixsystem%20Post%20Like%20Dislike&amp;severity=medium&amp;id=695e4c147349d0379d7d57dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13849-cwe-79-improper-neutralization-of-i-24ef5430</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13849%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matiasanca%20Cool%20YT%20Player&amp;severity=medium&amp;id=695e4c117349d0379d7d568c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13887-cwe-79-improper-neutralization-of-i-92be4de5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wisdmlabs%20AI%20ChatBot%20for%20WordPress%20by%20AI%20BotKit%20%E2%80%93%20Live%20in%202%20Minutes%2C%20No%20Code&amp;severity=medium&amp;id=695e4c117349d0379d7d5691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14145-cwe-79-improper-neutralization-of-i-87c77c4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14145%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20djrowling%20Niche%20Hero%20%7C%20Beautifully-designed%20blocks%20in%20seconds&amp;severity=medium&amp;id=695e4c147349d0379d7d57ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14352-cwe-863-incorrect-authorization-in--be940e26</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14352%3A%20CWE-863%20Incorrect%20Authorization%20in%20nahian91%20Awesome%20Hotel%20Booking&amp;severity=medium&amp;id=695e4c147349d0379d7d57f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14110-cwe-79-improper-neutralization-of-i-f7464f82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14110%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pichel%20WP%20Js%20List%20Pages%20Shortcodes&amp;severity=medium&amp;id=695e4c137349d0379d7d5793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13848-cwe-79-improper-neutralization-of-i-91b471de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13848%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergiotoca%20STM%20Gallery%201.9&amp;severity=medium&amp;id=695e4c117349d0379d7d5687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14118-cwe-79-improper-neutralization-of-i-2f923a99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14118%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20callumalden%20Starred%20Review&amp;severity=medium&amp;id=695e4c137349d0379d7d57a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14028-cwe-79-improper-neutralization-of-i-354cf620</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14028%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bruterdregz%20Contact%20Us%20Simple%20Form&amp;severity=medium&amp;id=695e4c117349d0379d7d56a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14796-cwe-79-improper-neutralization-of-i-3cadd7e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14796%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ruhul080%20My%20Album%20Gallery&amp;severity=medium&amp;id=695e4c147349d0379d7d5819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14128-cwe-79-improper-neutralization-of-i-bd3a2d49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14128%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mitchoyoshitaka%20Stumble!%20for%20WordPress&amp;severity=medium&amp;id=695e4c147349d0379d7d57d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14127-cwe-79-improper-neutralization-of-i-867a4f66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fpcorso%20Testimonial%20Master&amp;severity=medium&amp;id=695e4c147349d0379d7d57d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13667-cwe-79-improper-neutralization-of-i-2a626003</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tomiup%20WP%20Recipe%20Manager&amp;severity=medium&amp;id=695e4c107349d0379d7d565a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14109-cwe-79-improper-neutralization-of-i-ba86c581</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14109%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ahecht%20AH%20Shortcodes&amp;severity=medium&amp;id=695e4c137349d0379d7d578e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13694-cwe-348-use-of-less-trusted-source--48900554</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13694%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20aaextensions%20AA%20Block%20country&amp;severity=medium&amp;id=695e4c107349d0379d7d565f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14053-cwe-79-improper-neutralization-of-i-d31b2fa2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jseto%20Travel%20Bucket%20List%20%E2%80%93%20Wish%20To%20Go&amp;severity=medium&amp;id=695e4c117349d0379d7d56ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13847-cwe-79-improper-neutralization-of-i-924ce35c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13847%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidangel%20PhotoFade&amp;severity=medium&amp;id=695e4c117349d0379d7d5682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15018-cwe-639-authorization-bypass-throug-608b91ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15018%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20djanym%20Optional%20Email&amp;severity=critical&amp;id=695e1b30a55ed4ed998cb6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13521-cwe-352-cross-site-request-forgery--c10ab985</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13521%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fulippo%20WP%20Status%20Notifier&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15158-cwe-434-unrestricted-upload-of-file-09cb5665</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15158%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20eastsidecode%20WP%20Enable%20WebP&amp;severity=high&amp;id=695e1b30a55ed4ed998cb6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13497-cwe-79-improper-neutralization-of-i-444d08b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13497%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zanderz%20Recras&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13496-cwe-862-missing-authorization-in-mo-d5f2da90</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13496%3A%20CWE-862%20Missing%20Authorization%20in%20moosend%20Moosend%20Landing%20Pages&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13520-cwe-352-cross-site-request-forgery--c72d1d69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13520%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mtcaptcha%20MTCaptcha%20WordPress%20Plugin&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13493-cwe-862-missing-authorization-in-we-8d11fb91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13493%3A%20CWE-862%20Missing%20Authorization%20in%20webrndexperts%20Latest%20Registered%20Users&amp;severity=high&amp;id=695e1b2fa55ed4ed998cb638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13527-cwe-352-cross-site-request-forgery--3518c67f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13527%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anwerashif%20xShare&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12958-cwe-285-improper-authorization-in-r-d4c90f9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12958%3A%20CWE-285%20Improper%20Authorization%20in%20rankology%20Rankology%20SEO%20and%20Analytics%20Tool&amp;severity=low&amp;id=695e1b2fa55ed4ed998cb634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13529-cwe-862-missing-authorization-in-co-72df2e41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13529%3A%20CWE-862%20Missing%20Authorization%20in%20codeclouds%20Unify&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14999-cwe-352-cross-site-request-forgery--366d1c1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14999%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kentothemes%20Latest%20Tabs&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12540-cwe-200-exposure-of-sensitive-infor-71dc33f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12540%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sharethis%20ShareThis%20Dashboard%20for%20Google%20Analytics&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12030-cwe-639-authorization-bypass-throug-d6bdac07</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12030%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20airesvsg%20ACF%20to%20REST%20API&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13519-cwe-352-cross-site-request-forgery--85353855</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13519%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smjrifle%20SVG%20Map%20by%20Smjrifle&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13531-cwe-79-improper-neutralization-of-i-964fbc77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13531%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hayyatapps%20Stylish%20Order%20Form%20Builder&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15000-cwe-79-improper-neutralization-of-i-0d095431</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tfrommen%20Page%20Keys&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11877-cwe-862-missing-authorization-in-so-268e505f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11877%3A%20CWE-862%20Missing%20Authorization%20in%20solwininfotech%20User%20Activity%20Log&amp;severity=high&amp;id=695e1b2fa55ed4ed998cb627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0980-vulnerability-in-nokia-sr-linux-ed11aff0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0980%3A%20Vulnerability%20in%20Nokia%20SR%20Linux&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31964-cwe-200-exposure-of-sensitive-infor-34926e9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31964%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCLSoftware%20BigFix%20IVR&amp;severity=low&amp;id=695e0d1ea55ed4ed99880feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14792-cwe-80-improper-neutralization-of-s-ae411024</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14792%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20audrasjb%20Key%20Figures&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12449-cwe-862-missing-authorization-in-ko-902abd76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12449%3A%20CWE-862%20Missing%20Authorization%20in%20kodezen%20aBlocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20User%20Dashboard%20Builder%2C%20Popup%20Builder%2C%20Form%20Builder%20%26%20Animation%20Builder&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13369-cwe-79-improper-neutralization-of-i-e09e33c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20premmerce%20Premmerce%20WooCommerce%20Customers%20Manager&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14802-cwe-639-authorization-bypass-throug-506830ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14802%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31963-cwe-306-missing-authentication-for--11fde0e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31963%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HCLSoftware%20BigFix%20IVR&amp;severity=low&amp;id=695e099ba55ed4ed9987094e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31962-cwe-613-insufficient-session-expira-dd8cbfbe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31962%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCLSoftware%20BigFix%20IVR&amp;severity=low&amp;id=695e0617a55ed4ed9985b33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14867-cwe-22-improper-limitation-of-a-pat-8013b993</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14867%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20liangshao%20Flashcard%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=695e0293a55ed4ed9984d542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14842-cwe-434-unrestricted-upload-of-file-5ab02e7e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14842%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=medium&amp;id=695e0293a55ed4ed9984d532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0656-cwe-862-missing-authorization-in-ipa-8561cb90</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0656%3A%20CWE-862%20Missing%20Authorization%20in%20ipaymu%20iPaymu%20Payment%20Gateway%20for%20WooCommerce&amp;severity=high&amp;id=695e0294a55ed4ed9984d573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13371-cwe-200-exposure-of-sensitive-infor-887a551f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13371%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20moneyspace%20Money%20Space&amp;severity=high&amp;id=695e0293a55ed4ed9984d522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14845-cwe-352-cross-site-request-forgery--47a4521d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14845%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nsthemes%20NS%20Ie%20Compatibility%20Fixer&amp;severity=medium&amp;id=695e0293a55ed4ed9984d539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14888-cwe-79-improper-neutralization-of-i-851eb1b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anjan011%20Simple%20User%20Meta%20Editor&amp;severity=medium&amp;id=695e0293a55ed4ed9984d553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13657-cwe-352-cross-site-request-forgery--67c6a973</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13657%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20helpdeskcom%20HelpDesk%20Contact%20Form&amp;severity=medium&amp;id=695e0293a55ed4ed9984d529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14887-cwe-79-improper-neutralization-of-i-3ce685be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcommerz%20twinklesmtp%20%E2%80%93%20Email%20Service%20Provider%20For%20WordPress&amp;severity=medium&amp;id=695e0293a55ed4ed9984d54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14370-cwe-862-missing-authorization-in-me-37f2f4c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14370%3A%20CWE-862%20Missing%20Authorization%20in%20metodiew%20Quote%20Comments&amp;severity=medium&amp;id=695e0293a55ed4ed9984d52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14875-cwe-79-improper-neutralization-of-i-e20c283d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hblpay%20HBLPAY%20Payment%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=695e0293a55ed4ed9984d546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14901-cwe-862-missing-authorization-in-bi-5ae1d686</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14901%3A%20CWE-862%20Missing%20Authorization%20in%20bitpressadmin%20Bit%20Form%20%E2%80%93%20Custom%20Contact%20Form%2C%20Multi%20Step%2C%20Conversational%20Form%20%26%20Payment%20Form%20builder&amp;severity=medium&amp;id=695e0293a55ed4ed9984d557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14904-cwe-352-cross-site-request-forgery--5e97b248</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14904%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anilankola%20Newsletter%20Email%20Subscribe&amp;severity=medium&amp;id=695e0294a55ed4ed9984d56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14804-cwe-73-external-control-of-file-nam-ac2e2a67</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14804%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Frontend%20File%20Manager%20Plugin&amp;severity=high&amp;id=695dfb8aa55ed4ed9983420a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14719-cwe-89-sql-injection-in-relevanssi-9a223d0d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14719%3A%20CWE-89%20SQL%20Injection%20in%20Relevanssi&amp;severity=medium&amp;id=695dfb8aa55ed4ed99834207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14835-cwe-80-improper-neutralization-of-s-524211cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14835%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20opajaap%20WP%20Photo%20Album%20Plus&amp;severity=high&amp;id=695df0fea55ed4ed9968749d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15474-cwe-770-allocation-of-resources-wit-3cd7a6ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15474%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20AuntyFey%20AuntyFey%20Smart%20Combination%20Lock&amp;severity=medium&amp;id=695de67da55ed4ed995516f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14468-cwe-352-cross-site-request-forgery--b6163dc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14468%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mohammed_kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages&amp;severity=medium&amp;id=695de67ca55ed4ed995516f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ongoing-attacks-exploiting-critical-rce-vulnerabil-cfdd79da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ongoing%20Attacks%20Exploiting%20Critical%20RCE%20Vulnerability%20in%20Legacy%20D-Link%20DSL%20Routers&amp;severity=critical&amp;id=695df29ca55ed4ed997953c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0650-cwe-306-missing-authentication-for-c-19273490</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0650%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20OpenFlagr%20Flagr&amp;severity=critical&amp;id=695de67da55ed4ed995516fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9611-cwe-749-exposed-dangerous-method-or--345ee18d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9611%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Microsoft%20Playwright&amp;severity=high&amp;id=695de3cb873865b86365f414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14059-cwe-73-external-control-of-file-nam-7f23642d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14059%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20roxnor%20EmailKit%20%E2%80%93%20Email%20Customizer%20for%20WooCommerce%20%26%20WP&amp;severity=medium&amp;id=695dd93f873865b8635a453f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14891-cwe-79-improper-neutralization-of-i-327f1b29</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=695dd93f873865b8635a4544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20893-origin-validation-error-in-fujitsu--bc6bdb8a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20893%3A%20Origin%20validation%20error%20in%20Fujitsu%20Client%20Computing%20Limited%20Fujitsu%20Security%20Solution%20AuthConductor%20Client%20Basic%20V2&amp;severity=high&amp;id=695dd93f873865b8635a454a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12648-cwe-552-files-or-directories-access-cb7dd16f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12648%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=695dc7b5873865b863116d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14631-cwe-476-null-pointer-dereference-in-f282dd7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14631%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE400&amp;severity=high&amp;id=695db4a0ee4c93a4aad5f9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0649-server-side-request-forgery-in-invoi-9ad906ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0649%3A%20Server-Side%20Request%20Forgery%20in%20invoiceninja&amp;severity=medium&amp;id=695dad98ee4c93a4aacc6451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14020-improperly-controlled-modification--f735b51d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14020%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20carboneio%20carbone&amp;severity=low&amp;id=695da690ee4c93a4aaaf9618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-07-ddc7a0e4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-07&amp;severity=medium&amp;id=695ef5b307b8a419a7735a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61492-na-50a9abe2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61492%3A%20n%2Fa&amp;severity=critical&amp;id=695ea20c7349d0379db7dc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67366-na-b149ee6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67366%3A%20n%2Fa&amp;severity=high&amp;id=695e93fd7349d0379db278a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66686-na-6458d2b2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66686%3A%20n%2Fa&amp;severity=medium&amp;id=695e93fd7349d0379db278a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61489-na-41ab4a6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61489%3A%20n%2Fa&amp;severity=medium&amp;id=695e93fd7349d0379db2789c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67364-na-9ea7ab90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67364%3A%20n%2Fa&amp;severity=high&amp;id=695e90787349d0379db110a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66786-na-f9fe9fa5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66786%3A%20n%2Fa&amp;severity=high&amp;id=695e8cf77349d0379db03200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65805-na-671e9204</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65805%3A%20n%2Fa&amp;severity=high&amp;id=695e8cf77349d0379db031fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66837-na-42137d50</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66837%3A%20n%2Fa&amp;severity=medium&amp;id=695e89727349d0379daecb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66838-na-93995104</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66838%3A%20n%2Fa&amp;severity=medium&amp;id=695e85eb7349d0379dadb731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0628-insufficient-policy-enforcement-in-g-6d67a575</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0628%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=high&amp;id=695da30cee4c93a4aaa68c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0643-unrestricted-upload-in-projectworlds-08c9d342</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0643%3A%20Unrestricted%20Upload%20in%20projectworlds%20House%20Rental%20and%20Property%20Listing&amp;severity=medium&amp;id=695d9de7ee4c93a4aa9fb410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47396-cwe-415-double-free-in-qualcomm-inc-579002be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47396%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93ce65deeab1b95d81d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47395-cwe-126-buffer-over-read-in-qualcom-4cd348e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47395%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93ce65deeab1b95d81ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47394-cwe-120-buffer-copy-without-checkin-242ed732</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47394%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47393-cwe-129-improper-validation-of-arra-9db5fa8f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47393%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47388-cwe-120-buffer-copy-without-checkin-aec82a55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47388%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47380-cwe-822-untrusted-pointer-dereferen-ec05184d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47380%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47369-cwe-200-information-exposure-in-qua-6cd0b00e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47369%3A%20CWE-200%20Information%20Exposure%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cd65deeab1b95d81b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47356-cwe-415-double-free-in-qualcomm-inc-3f7209f3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47356%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47348-cwe-457-use-of-uninitialized-variab-74ffcb5f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47348%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47346-cwe-787-out-of-bounds-write-in-qual-2ddbe3f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47346%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47345-cwe-323-reusing-a-nonce-key-pair-in-441b2f5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47345%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47344-cwe-367-time-of-check-time-of-use-t-c9eb249f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47344%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cd65deeab1b95d81a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47343-cwe-822-untrusted-pointer-dereferen-c381ff30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47343%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cc65deeab1b95d816f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47339-cwe-416-use-after-free-in-qualcomm--abf87fb2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47339%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cc65deeab1b95d816c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47337-cwe-416-use-after-free-in-qualcomm--3e476817</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47337%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47336-cwe-416-use-after-free-in-qualcomm--38bba7b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47336%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47335-cwe-120-buffer-copy-without-checkin-babe18dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47335%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47334-cwe-120-buffer-copy-without-checkin-3898b314</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47334%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47333-cwe-416-use-after-free-in-qualcomm--f5108cab</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47333%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d815d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47332-cwe-367-time-of-check-time-of-use-t-89bf8d55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47332%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d815a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47331-cwe-126-buffer-over-read-in-qualcom-5c35ae39</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47331%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47330-cwe-126-buffer-over-read-in-qualcom-1f7487a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47330%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0642-cross-site-scripting-in-projectworld-5c338b69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0642%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20House%20Rental%20and%20Property%20Listing&amp;severity=medium&amp;id=695d904765deeab1b948281c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11235-cwe-620-unverified-password-change--9232b481</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11235%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Progress%20MOVEit%20Transfer&amp;severity=low&amp;id=695d8cc265deeab1b941f6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15472-os-command-injection-in-trendnet-te-33c003d2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15472%3A%20OS%20Command%20Injection%20in%20TRENDnet%20TEW-811DRU&amp;severity=high&amp;id=695d893f65deeab1b93cbef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14625-cwe-427-uncontrolled-search-path-el-a32ce309</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14625%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=695d85c665deeab1b937e24c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14614-cwe-377-insecure-temporary-file-in--582fdc90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14614%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=695d85c665deeab1b937e249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15471-os-command-injection-in-trendnet-te-ae0e5fc4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15471%3A%20OS%20Command%20Injection%20in%20TRENDnet%20TEW-713RE&amp;severity=critical&amp;id=695d818706d60d7483a4bf75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14599-cwe-427-uncontrolled-search-path-el-e207da72</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14599%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=695d818706d60d7483a4bf72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14612-cwe-377-insecure-temporary-file-in--7e142a3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14612%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=695d818706d60d7483a4bf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14605-cwe-427-uncontrolled-search-path-el-43df8804</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14605%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=695d818706d60d7483a4bf7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31642-cwe-79-improper-neutralization-of-i-e1a634d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31642%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dasinfomedia%20WPCHURCH&amp;severity=high&amp;id=695d7e0406d60d7483a3d746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31051-cwe-497-exposure-of-sensitive-syste-f5818644</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31051%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20EngoTheme%20Plant%20-%20Gardening%20%26%20Houseplants%20WordPress%20Theme&amp;severity=medium&amp;id=695d7e0406d60d7483a3d743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14596-cwe-427-uncontrolled-search-path-el-b831b1dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14596%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=695d7e0406d60d7483a3d740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30996-cwe-434-unrestricted-upload-of-file-87255422</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30996%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themify%20Themify%20Sidepane%20WordPress%20Theme&amp;severity=critical&amp;id=695d7a7f06d60d7483a3454a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13744-cwe-79-improper-neutralization-of-i-0ec36f22</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13744%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=695d76fb06d60d7483a21fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30631-cwe-79-improper-neutralization-of-i-4e8a749d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30631%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AA-Team%20Woocommerce%20Sales%20Funnel%20Builder&amp;severity=high&amp;id=695d737806d60d7483a10a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29004-cwe-266-incorrect-privilege-assignm-c7e68fc0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29004%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20AA-Team%20Premium%20Age%20Verification%20%2F%20Restriction%20for%20WordPress&amp;severity=high&amp;id=695d737806d60d7483a10a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21492-cwe-252-unchecked-return-value-in-i-7e39f554</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21492%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d737806d60d7483a10a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7048-cwe-805-in-arista-networks-eos-fbb1d89d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7048%3A%20CWE-805%20in%20Arista%20Networks%20EOS&amp;severity=medium&amp;id=695d63fda7c70f178f8fbb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21491-cwe-122-heap-based-buffer-overflow--8b0a3ce7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21491%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d6079a7c70f178f8eabee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21490-cwe-122-heap-based-buffer-overflow--a486e590</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21490%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d6079a7c70f178f8eabe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0641-command-injection-in-totolink-wa300-4c595f84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0641%3A%20Command%20Injection%20in%20TOTOLINK%20WA300&amp;severity=medium&amp;id=695d63fda7c70f178f8fbb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21494-cwe-122-heap-based-buffer-overflow--8ca155ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21494%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d63fda7c70f178f8fbb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15382-cwe-125-out-of-bounds-read-in-wolfs-7c756e7f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15382%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20wolfSSL%20wolfSSH&amp;severity=medium&amp;id=695d4b63a7c70f178f7611fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32304-cwe-98-improper-control-of-filename-977da061</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32304%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mojoomla%20WPCHURCH&amp;severity=high&amp;id=695d4b63a7c70f178f761203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14942-cwe-287-improper-authentication-in--ede5eb61</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14942%3A%20CWE-287%20Improper%20Authentication%20in%20wolfSSL%20wolfSSH&amp;severity=critical&amp;id=695d4b63a7c70f178f761200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-chrome-extensions-caught-stealing-chatgpt-and--4521f6c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Chrome%20Extensions%20Caught%20Stealing%20ChatGPT%20and%20DeepSeek%20Chats%20from%20900%2C000%20Users&amp;severity=low&amp;id=695d4d51a7c70f178f8acfc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39477-cwe-862-missing-authorization-in-sf-a67962a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39477%3A%20CWE-862%20Missing%20Authorization%20in%20Sfwebservice%20InWave%20Jobs&amp;severity=critical&amp;id=695d40dfa7c70f178f66a0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31088-cwe-79-improper-neutralization-of-i-8bd58e51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WPShop.ru%20AdsPlace&apos;r%20%E2%80%93%20Ad%20Manager%2C%20Inserter%2C%20AdSense%20Ads&amp;severity=medium&amp;id=695d4299a7c70f178f68ea96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30547-cwe-79-improper-neutralization-of-i-529bdb61</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30547%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shazdeh%20Header%20Image%20Slider&amp;severity=high&amp;id=695d4299a7c70f178f68ea93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47553-cwe-502-deserialization-of-untruste-d51e5f94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47553%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Digital%20zoom%20studio%20DZS%20Video%20Gallery&amp;severity=high&amp;id=695d4299a7c70f178f68ea99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69083-cwe-98-improper-control-of-filename-0dd666fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69083%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Frapp%C3%A9&amp;severity=high&amp;id=695d4299a7c70f178f68ea9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69364-missing-authorization-in-cloudways--98b6513a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69364%3A%20Missing%20Authorization%20in%20Cloudways%20Breeze&amp;severity=medium&amp;id=695d3e3a326bcb029a44a09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69363-missing-authorization-in-cyberchimp-5d2dc9c7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69363%3A%20Missing%20Authorization%20in%20CyberChimps%20Responsive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=695d3e3a326bcb029a44a09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69362-improper-neutralization-of-input-du-bc5ff078</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69362%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20UiChemy&amp;severity=medium&amp;id=695d3e3a326bcb029a44a097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69361-missing-authorization-in-publishpre-2bbbf451</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69361%3A%20Missing%20Authorization%20in%20PublishPress%20Post%20Expirator&amp;severity=medium&amp;id=695d3e3a326bcb029a44a094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69360-improper-neutralization-of-input-du-668f3930</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20WPBakery)&amp;severity=medium&amp;id=695d3e3a326bcb029a44a091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69359-missing-authorization-in-wpfunnels--49f7f64c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69359%3A%20Missing%20Authorization%20in%20WPFunnels%20Creator%20LMS&amp;severity=medium&amp;id=695d3e3a326bcb029a44a08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69357-improper-neutralization-of-input-du-c62e4e0d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=medium&amp;id=695d3e39326bcb029a44a069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69356-improper-control-of-filename-for-in-d72f23c1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69356%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=high&amp;id=695d3e39326bcb029a44a066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69354-missing-authorization-in-bbr-plugin-809f608c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69354%3A%20Missing%20Authorization%20in%20BBR%20Plugins%20Better%20Business%20Reviews&amp;severity=medium&amp;id=695d3e39326bcb029a44a063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69352-missing-authorization-in-stellarwp--55ee216b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69352%3A%20Missing%20Authorization%20in%20StellarWP%20The%20Events%20Calendar&amp;severity=medium&amp;id=695d3e39326bcb029a44a060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69351-improper-neutralization-of-special--8ba1081c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69351%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjahan%20Jewel%20Ninja%20Tables&amp;severity=high&amp;id=695d3e39326bcb029a44a05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69350-improper-neutralization-of-input-du-a07201da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Accordion&amp;severity=medium&amp;id=695d3e39326bcb029a44a05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69349-missing-authorization-in-fahad-mahm-8a97ce50</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69349%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20RSS%20Feed%20Widget&amp;severity=medium&amp;id=695d3e39326bcb029a44a057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69348-missing-authorization-in-coolhappy--5da3f66a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69348%3A%20Missing%20Authorization%20in%20CoolHappy%20The%20Events%20Calendar%20Countdown%20Addon&amp;severity=medium&amp;id=695d3e39326bcb029a44a054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69346-missing-authorization-in-wpcenter-a-e1eb4fd9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69346%3A%20Missing%20Authorization%20in%20WPCenter%20AffiliateX&amp;severity=medium&amp;id=695d3e39326bcb029a44a051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69345-missing-authorization-in-boldgrid-p-f8421357</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69345%3A%20Missing%20Authorization%20in%20BoldGrid%20Post%20and%20Page%20Builder%20by%20BoldGrid&amp;severity=medium&amp;id=695d3e39326bcb029a44a04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69342-improper-control-of-filename-for-in-c625ad3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69342%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20VanKarWai%20Calafate&amp;severity=high&amp;id=695d3e39326bcb029a44a03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69341-missing-authorization-in-buddhathem-92fe0030</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69341%3A%20Missing%20Authorization%20in%20BuddhaThemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=medium&amp;id=695d3e39326bcb029a44a03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69336-missing-authorization-in-bdthemes-u-ccfe8362</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69336%3A%20Missing%20Authorization%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons&amp;severity=medium&amp;id=695d3e39326bcb029a44a037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69335-improper-neutralization-of-input-du-4b510941</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69335%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Team%20Showcase&amp;severity=medium&amp;id=695d3e39326bcb029a44a034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69334-improper-neutralization-of-input-du-88efc39c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69334%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=695d3e39326bcb029a44a031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69331-missing-authorization-in-jeroen-sch-c66ba793</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69331%3A%20Missing%20Authorization%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=medium&amp;id=695d3e39326bcb029a44a02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69327-missing-authorization-in-magepeople-f1e72b5c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69327%3A%20Missing%20Authorization%20in%20magepeopleteam%20Car%20Rental%20Manager&amp;severity=medium&amp;id=695d3e39326bcb029a44a02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69084-cwe-79-improper-neutralization-of-i-dd60f056</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69084%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gt3themes%20Photo%20Gallery&amp;severity=high&amp;id=695d3e39326bcb029a44a022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69085-cwe-79-improper-neutralization-of-i-315a15b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69085%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20JobBank&amp;severity=high&amp;id=695d3e39326bcb029a44a025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69086-cwe-98-improper-control-of-filename-069ab445</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69086%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20Issabella&amp;severity=high&amp;id=695d3e39326bcb029a44a028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36589-cwe-611-improper-restriction-of-xml-dac542b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36589%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=695d3ab2326bcb029a439109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63082-cwe-79-improper-neutralization-of-i-0f43ea4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=695d3ab2326bcb029a439110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63083-cwe-79-improper-neutralization-of-i-3e72fd6a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=695d3ab2326bcb029a439113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-firmware-flaw-exposes-totolink-ex200-to--76f46dab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20Firmware%20Flaw%20Exposes%20TOTOLINK%20EX200%20to%20Full%20Remote%20Device%20Takeover&amp;severity=low&amp;id=695d4d51a7c70f178f8acfc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0640-buffer-overflow-in-tenda-ac23-5438cf9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0640%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=695d2ca3326bcb029a2b303d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14979-cwe-732-incorrect-permission-assign-c5b90371</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14979%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20AirVPN%20Eddie&amp;severity=high&amp;id=695d3027326bcb029a4049de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46696-cwe-250-execution-with-unnecessary--eac32f54</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46696%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Secure%20Connect%20Gateway%20(SCG)%20Appliance&amp;severity=medium&amp;id=695d291f326bcb029a24f10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14026-cwe-1104-use-of-unmaintained-third--c8a0f57b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14026%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third-Party%20Components%20in%20Forcepoint%20Forcepoint%20One%20Endpoint%20(F1E)&amp;severity=high&amp;id=695d222d326bcb029a1be3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21493-cwe-188-reliance-on-datamemory-layo-991c7c73</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21493%3A%20CWE-188%3A%20Reliance%20on%20Data%2FMemory%20Layout%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d1b6b769e869ac5e3160b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-trap-scattered-lapsus-hunters-in-honey-c862e0a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Trap%20Scattered%20Lapsus%24%20Hunters%20in%20Honeypot&amp;severity=medium&amp;id=695d17b4769e869ac5da7742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21489-cwe-125-out-of-bounds-read-in-inter-6e33c750</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21489%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d17f6769e869ac5db8e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21488-cwe-122-heap-based-buffer-overflow--56374fc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21488%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d17f6769e869ac5db8e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-dolby-vulnerability-patched-in-android-c7b4bf7d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Dolby%20Vulnerability%20Patched%20in%20Android&amp;severity=critical&amp;id=695d1430769e869ac5d57dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-clickfix-campaign-targeting-hospital-3206c22c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20ClickFix%20Campaign%20Targeting%20Hospitality%20Sector&amp;severity=medium&amp;id=695d0ffb3839e441751b973e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dozens-of-major-data-breaches-linked-to-single-thr-14f7ef26</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dozens%20of%20Major%20Data%20Breaches%20Linked%20to%20Single%20Threat%20Actor&amp;severity=medium&amp;id=695d01eb3839e44175171c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-booking-emails-redirect-hotel-staff-to-fake-b-695fcbff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Booking%20Emails%20Redirect%20Hotel%20Staff%20to%20Fake%20BSoD%20Pages%20Delivering%20DCRat&amp;severity=medium&amp;id=695d1e21769e869ac5f7ef42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-identity-dark-matter-d6425cdf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20Identity%20Dark%20Matter%3F&amp;severity=low&amp;id=695d1e21769e869ac5f7ef45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vs-code-forks-recommend-missing-extensions-creatin-8f09575d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VS%20Code%20Forks%20Recommend%20Missing%20Extensions%2C%20Creating%20Supply%20Chain%20Risk%20in%20Open%20VSX&amp;severity=medium&amp;id=695d1e21769e869ac5f7ef48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nordvpn-denies-breach-after-hacker-leaks-data-e492eb55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NordVPN%20Denies%20Breach%20After%20Hacker%20Leaks%20Data&amp;severity=medium&amp;id=695cf3db3839e4417511a33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9318-cwe-89-improper-neutralization-of-sp-06a5609d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9318%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=695cd7ee3839e4417504db30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9637-cwe-862-missing-authorization-in-exp-acee29b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9637%3A%20CWE-862%20Missing%20Authorization%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=695cd7ee3839e4417504db34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14552-cwe-79-improper-neutralization-of-i-ac928f33</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14552%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20buddydev%20MediaPress&amp;severity=medium&amp;id=695cd7ee3839e4417504db2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5919-cwe-862-missing-authorization-in-arr-a46843a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5919%3A%20CWE-862%20Missing%20Authorization%20in%20arraytics%20Timetics%20%E2%80%93%20Appointment%20Booking%20%26%20Scheduling&amp;severity=medium&amp;id=695cc9de3839e44175ff5dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13964-cwe-862-missing-authorization-in-th-f315da6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13964%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=695cc9de3839e44175ff5dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9294-cwe-285-improper-authorization-in-ex-36eaa5a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9294%3A%20CWE-285%20Improper%20Authorization%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=695cc9de3839e44175ff5dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13766-cwe-862-missing-authorization-in-st-11a20e42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13766%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=695cc9de3839e44175ff5dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13812-cwe-862-missing-authorization-in-ru-a72e00aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13812%3A%20CWE-862%20Missing%20Authorization%20in%20rubengc%20GamiPress%20%E2%80%93%20Gamification%20plugin%20to%20reward%20points%2C%20achievements%2C%20badges%20%26%20ranks%20in%20WordPress&amp;severity=medium&amp;id=695cbbce3839e44175f9f00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12067-cwe-79-improper-neutralization-of-i-241d7a4a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12067%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonua%20Table%20Field%20Add-on%20for%20ACF%20and%20SCF&amp;severity=medium&amp;id=695cbbce3839e44175f9f00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14371-cwe-862-missing-authorization-in-st-6cde3bb0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14371%3A%20CWE-862%20Missing%20Authorization%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=695cbbce3839e44175f9f012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4776-cwe-79-improper-neutralization-of-in-ee2f4cf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4776%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Phlox&amp;severity=medium&amp;id=695cb1423839e44175f61ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13215-cwe-200-exposure-of-sensitive-infor-802342ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13215%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=695cb1423839e44175f61ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21411-authentication-bypass-using-an-alte-e5985135</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21411%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Plat&apos;Home%20Co.%2CLtd.%20OpenBlocks%20IoT%20DX1%20(FW5.0.x)&amp;severity=high&amp;id=695cb1423839e44175f61fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-n8n-vulnerability-99-cvss-lets-authenticated-u-86301403</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20n8n%20Vulnerability%20(9.9%20CVSS)%20Lets%20Authenticated%20Users%20Execute%20System%20Commands&amp;severity=critical&amp;id=695c9bf53839e44175edad18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14997-cwe-22-improper-limitation-of-a-pat-7765da9c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14997%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20buddydev%20BuddyPress%20Xprofile%20Custom%20Field%20Types&amp;severity=high&amp;id=695c95223839e44175ebc5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14120-cwe-79-improper-neutralization-of-i-90a28dc6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bww%20URL%20Image%20Importer&amp;severity=medium&amp;id=695c95223839e44175ebc598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14438-cwe-918-server-side-request-forgery-61e10ce7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14438%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20xagio%20Xagio%20SEO%20%E2%80%93%20AI%20Powered%20SEO&amp;severity=medium&amp;id=695c95223839e44175ebc59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14441-cwe-862-missing-authorization-in-ro-e2155daf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14441%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=medium&amp;id=695c95223839e44175ebc5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15001-cwe-639-authorization-bypass-throug-f4017150</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15001%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20fsylum%20FS%20Registration%20Password&amp;severity=critical&amp;id=695c95223839e44175ebc5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14996-cwe-639-authorization-bypass-throug-bc6c558f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14996%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aksharsoftsolutions%20AS%20Password%20Field%20In%20Default%20Registration%20Form&amp;severity=critical&amp;id=695c95223839e44175ebc5ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21486-cwe-122-heap-based-buffer-overflow--d070eb08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21486%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c8a973839e44175e8471a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-adonisjs-bodyparser-flaw-cvss-92-enables--8bc97d84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20AdonisJS%20Bodyparser%20Flaw%20(CVSS%209.2)%20Enables%20Arbitrary%20File%20Write%20on%20Servers&amp;severity=critical&amp;id=695d1e21769e869ac5f7ef4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21487-cwe-20-improper-input-validation-in-efa8cc59</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21487%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695c8a973839e44175e8471e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13746-cwe-79-improper-neutralization-of-i-579b0ada</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20ForumWP%20%E2%80%93%20Forum%20%26%20Discussion%20Board&amp;severity=medium&amp;id=695c838f3839e44175cef8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14034-cwe-862-missing-authorization-in-gh-2d65674f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14034%3A%20CWE-862%20Missing%20Authorization%20in%20ghera74%20ilGhera%20Support%20System%20for%20WooCommerce&amp;severity=medium&amp;id=695c838f3839e44175cef8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11370-cwe-862-missing-authorization-in-av-267d8a55</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11370%3A%20CWE-862%20Missing%20Authorization%20in%20averta%20Depicter%20%E2%80%94%20Popup%20%26%20Slider%20Builder&amp;severity=medium&amp;id=695c838f3839e44175cef8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14153-cwe-89-improper-neutralization-of-s-5d2fb565</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14153%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vikasratudi%20Page%20Expire%20Popup%2FRedirection%20for%20WordPress&amp;severity=medium&amp;id=695c838f3839e44175cef8f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0604-cwe-22-improper-limitation-of-a-path-8f1083b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0604%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ninjateam%20FastDup%20%E2%80%93%20Fastest%20WordPress%20Migration%20%26%20Duplicator&amp;severity=medium&amp;id=695c838f3839e44175cef8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13652-cwe-89-improper-neutralization-of-s-17a12da1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13652%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20manchumahara%20CBX%20Bookmark%20%26%20Favorite&amp;severity=medium&amp;id=695c838f3839e44175cef8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11723-cwe-330-use-of-insufficiently-rando-d1220129</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11723%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=695c838f3839e44175cef8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13409-cwe-89-improper-neutralization-of-s-e7abbb04</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13409%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpvibes%20Form%20Vibes%20%E2%80%93%20Database%20Manager%20for%20Forms&amp;severity=medium&amp;id=695c838f3839e44175cef8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21485-cwe-20-improper-input-validation-in-a42a5703</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21485%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c838f3839e44175cef903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21677-cwe-758-reliance-on-undefined-unspe-1020703d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21677%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c83903839e44175cef95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21676-cwe-122-heap-based-buffer-overflow--c38a7384</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21676%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c838f3839e44175cef908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12793-cwe-426-untrusted-search-path-in-as-e2a12dd5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12793%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20ASUS%20ASCI&amp;severity=high&amp;id=695c79023839e44175c0fa44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15364-cwe-353-missing-support-for-integri-b06e524c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15364%3A%20CWE-353%20Missing%20Support%20for%20Integrity%20Check%20in%20codename065%20Download%20Manager&amp;severity=high&amp;id=695c6e793839e44175bdd387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20807-cwe-190-integer-overflow-in-mediate-5ead14e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20807%3A%20CWE-190%20Integer%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20806-cwe-416-use-after-free-in-mediatek--7dac359c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20806%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20805-cwe-416-use-after-free-in-mediatek--1d1093f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20805%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20804-cwe-416-use-after-free-in-mediatek--f0d1048b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20804%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20803-cwe-190-integer-overflow-in-mediate-45033e8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20803%3A%20CWE-190%20Integer%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20787-cwe-416-use-after-free-in-mediatek--7966b391</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20787%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20786-cwe-415-double-free-in-mediatek-inc-156546ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20786%3A%20CWE-415%20Double%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20785-cwe-416-use-after-free-in-mediatek--01d4f91c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20785%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20784-cwe-457-use-of-uninitialized-variab-4287ec2d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20784%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20783-cwe-787-out-of-bounds-write-in-medi-07d2144f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20783%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20782-cwe-787-out-of-bounds-write-in-medi-c437775b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20782%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e793839e44175bdd3a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20781-cwe-415-double-free-in-mediatek-inc-ba9fe5e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20781%3A%20CWE-415%20Double%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e793839e44175bdd3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20780-cwe-416-use-after-free-in-mediatek--9b15d9e7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20780%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e793839e44175bdd39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20779-cwe-416-use-after-free-in-mediatek--aec567ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20779%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e793839e44175bdd39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20778-cwe-787-out-of-bounds-write-in-medi-e3e220f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20778%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e793839e44175bdd398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20802-cwe-416-use-after-free-in-mediatek--9280135a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20802%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20801-cwe-415-double-free-in-mediatek-inc-b697c26c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20801%3A%20CWE-415%20Double%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20800-cwe-787-out-of-bounds-write-in-medi-5022f732</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20800%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20799-cwe-416-use-after-free-in-mediatek--d7e5ea8a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20799%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20798-cwe-787-out-of-bounds-write-in-medi-cf229274</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20798%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20797-cwe-121-stack-overflow-in-mediatek--90788ce6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20797%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20796-cwe-1285-specified-index-position-o-2a4ef148</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20796%3A%20CWE-1285%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20760-cwe-617-reachable-assertion-in-medi-a9db1c6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20760%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e793839e44175bdd38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20761-cwe-754-improper-check-for-unusual--504655a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20761%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e793839e44175bdd392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20762-cwe-617-reachable-assertion-in-medi-7f1f3bff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20762%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e793839e44175bdd395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20793-cwe-476-null-pointer-dereference-in-95cfb7b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20793%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20794-cwe-121-stack-overflow-in-mediatek--9aff97c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20794%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20795-cwe-787-out-of-bounds-write-in-medi-2bb4d8fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20795%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21675-cwe-416-use-after-free-in-internati-4bcae5b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21675%3A%20CWE-416%3A%20Use%20After%20Free%20in%20InternationalColorConsortium%20iccDEV&amp;severity=critical&amp;id=695c6e7b3839e44175bdd443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15385-cwe-345-insufficient-verification-o-6c64a8b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15385%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20TECNO%20Mobile%20com.afmobi.boomplayer&amp;severity=critical&amp;id=695c6e793839e44175bdd38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21674-cwe-401-missing-release-of-memory-a-a5c54c14</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21674%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20InternationalColorConsortium%20iccDEV&amp;severity=low&amp;id=695c6e7b3839e44175bdd43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21673-cwe-190-integer-overflow-or-wraparo-b7e989c4</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21673%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c6e7b3839e44175bdd439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69197-cwe-287-improper-authentication-in--f8e3986d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69197%3A%20CWE-287%3A%20Improper%20Authentication%20in%20pterodactyl%20panel&amp;severity=medium&amp;id=695c5ce23839e44175a692c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68954-cwe-613-insufficient-session-expira-eff6b377</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68954%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20pterodactyl%20panel&amp;severity=high&amp;id=695c5ce23839e44175a692bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15444-cwe-1395-dependency-on-vulnerable-t-86571d52</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15444%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20IAMB%20Crypt%3A%3ASodium%3A%3AXS&amp;severity=critical&amp;id=695c595e3839e44175a2e0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21507-cwe-835-loop-with-unreachable-exit--9b0ec589</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21507%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c595e3839e44175a2e0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-06-18ab5f7d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-06&amp;severity=medium&amp;id=695da2d6ee4c93a4aaa5488b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60534-na-d17acec7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60534%3A%20n%2Fa&amp;severity=critical&amp;id=695d3ab2326bcb029a43910c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59379-na-f52e9a28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59379%3A%20n%2Fa&amp;severity=high&amp;id=695d33aa326bcb029a411f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60262-na-4fa768b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60262%3A%20n%2Fa&amp;severity=critical&amp;id=695d3027326bcb029a4049e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65212-na-412bd942</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65212%3A%20n%2Fa&amp;severity=critical&amp;id=695d2ca3326bcb029a2b3039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69230-cwe-779-logging-of-excessive-data-i-d313c817</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69230%3A%20CWE-779%3A%20Logging%20of%20Excessive%20Data%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=695d12c1769e869ac5d3c5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69229-cwe-770-allocation-of-resources-wit-a514f81d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69229%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c4ed43839e4417599068d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0607-sql-injection-in-code-projects-onlin-4f334ca8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0607%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=695c4ed43839e44175990692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69228-cwe-770-allocation-of-resources-wit-4454955f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69228%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c4ed43839e44175990689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69227-cwe-835-loop-with-unreachable-exit--6f6435a9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69227%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c4b4e3839e44175984995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69225-cwe-444-inconsistent-interpretation-7a9bf39b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69225%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=695c47ca3839e4417597a3bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0606-sql-injection-in-code-projects-onlin-8f75354e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0606%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=695d12c1769e869ac5d3c5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69226-cwe-22-improper-limitation-of-a-pat-a447a2c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69226%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c44473839e44175970366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69224-cwe-444-inconsistent-interpretation-ff126449</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69224%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c40c23839e4417595ee5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68456-cwe-770-allocation-of-resources-wit-f9cb2c6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68456%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20craftcms%20cms&amp;severity=high&amp;id=695c39ba3839e4417594b416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69223-cwe-409-improper-handling-of-highly-5fefff3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69223%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20aio-libs%20aiohttp&amp;severity=high&amp;id=695c36383839e44175942eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68455-cwe-470-use-of-externally-controlle-2b7374e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68455%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=695c36383839e44175942eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68454-cwe-1336-improper-neutralization-of-5dc1f666</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68454%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=medium&amp;id=695c36383839e44175942eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68437-cwe-918-server-side-request-forgery-fe43cee0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68437%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=695c36383839e44175942ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68436-cwe-200-exposure-of-sensitive-infor-54ac44b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68436%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20cms&amp;severity=medium&amp;id=695c32b23839e44175939730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68428-cwe-35-path-traversal-in-parallax-j-1307335d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68428%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20parallax%20jsPDF&amp;severity=critical&amp;id=695c32b23839e4417593972b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67732-cwe-200-exposure-of-sensitive-infor-ad487420</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67732%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20langgenius%20dify&amp;severity=high&amp;id=695c32b23839e44175939728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0625-cwe-78-improper-neutralization-of-sp-229a7d9e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0625%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20D-Link%20DSL-2640B&amp;severity=critical&amp;id=695c2bac3839e441759217e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0621-cwe-1333-inefficient-regular-express-a9d9d749</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0621%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Anthropic%20MCP%20TypeScript%20SDK&amp;severity=high&amp;id=695c28263839e441759152d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64425-cwe-644-improper-neutralization-of--0190a779</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64425%3A%20CWE-644%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20coollabsio%20coolify&amp;severity=high&amp;id=695c24a73839e441759038ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64424-cwe-77-improper-neutralization-of-s-1b0a13a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64424%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695c24a73839e441759038e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64423-cwe-287-improper-authentication-in--7dbc9d50</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64423%3A%20CWE-287%3A%20Improper%20Authentication%20in%20coollabsio%20coolify&amp;severity=high&amp;id=695c24a73839e441759038f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0605-sql-injection-in-code-projects-onlin-8c51d4cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0605%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=695c24a73839e441759038f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64422-cwe-770-allocation-of-resources-wit-b34c9f4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64422%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20coollabsio%20coolify&amp;severity=medium&amp;id=695c211f3839e441758f3419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64421-cwe-863-incorrect-authorization-in--e8147a1b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64421%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20coollabsio%20coolify&amp;severity=high&amp;id=695c16933839e441758db0b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64420-cwe-522-insufficiently-protected-cr-4ed45eac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64420%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695c0f8a3839e441758c3636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64419-cwe-77-improper-neutralization-of-s-667382e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64419%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695c0f8a3839e441758c3632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-aligned-hackers-abuse-viber-to-target-ukrai-3642f161</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-Aligned%20Hackers%20Abuse%20Viber%20to%20Target%20Ukrainian%20Military%20and%20Government&amp;severity=high&amp;id=695bff543839e4417589374f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61781-cwe-285-improper-authorization-in-o-07523d2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61781%3A%20CWE-285%3A%20Improper%20Authorization%20in%20OpenCTI-Platform%20opencti&amp;severity=high&amp;id=695bfdf63839e4417574ec20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-unlikely-in-communications-failure-tha-8cd79eae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20Unlikely%20in%20Communications%20Failure%20That%20Grounded%20Flights%20in%20Greece&amp;severity=medium&amp;id=695bfa413839e441756f45f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59955-cwe-201-insertion-of-sensitive-info-12aefdd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59955%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20coollabsio%20coolify&amp;severity=medium&amp;id=695bfa903839e441756fd45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59158-cwe-116-improper-encoding-or-escapi-c7a9e49a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59158%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695bfa903839e441756fd45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brightspeed-investigating-cyberattack-ecdd199a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brightspeed%20Investigating%20Cyberattack&amp;severity=medium&amp;id=695bfa413839e441756f45fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59157-cwe-78-improper-neutralization-of-s-bff58062</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59157%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695bfa903839e441756fd458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59156-cwe-78-improper-neutralization-of-s-c47641a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59156%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695bfa903839e441756fd455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55204-cwe-94-improper-control-of-generati-3cecd5f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55204%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20staniel359%20muffon&amp;severity=high&amp;id=695c017b3839e4417589846f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/risks-of-oob-access-via-ip-kvm-devices-mon-jan-5th-31f382af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices%2C%20(Mon%2C%20Jan%205th)&amp;severity=low&amp;id=695bf6ca3839e441756a5aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sedgwick-confirms-cyberattack-on-government-subsid-cf91fd40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sedgwick%20Confirms%20Cyberattack%20on%20Government%20Subsidiary&amp;severity=medium&amp;id=695bf6bb3839e441756a4e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10933-cwe-125-out-of-bounds-read-in-silab-5ca2b1de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10933%3A%20CWE-125%20Out-of-bounds%20Read%20in%20silabs.com%20Z-Wave%20Protocol%20Controller&amp;severity=medium&amp;id=695bf3783839e44175668256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39484-cwe-89-improper-neutralization-of-s-9f0af156</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39484%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Waituk%20Entrada&amp;severity=critical&amp;id=695bf018b7d6203139564fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39497-cwe-79-improper-neutralization-of-i-3c51e357</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39497%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dokan%20Dokan%20Pro&amp;severity=medium&amp;id=695bec94b7d62031395509b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39561-cwe-862-missing-authorization-in-ma-d7b7b22e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39561%3A%20CWE-862%20Missing%20Authorization%20in%20Marketing%20Fire%2C%20LLC%20LoginWP%20-%20Pro&amp;severity=medium&amp;id=695bec94b7d62031395509b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21635-vulnerability-in-ubiquiti-inc-unifi-c725f60b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21635%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Connect%20EV%20Station%20Lite&amp;severity=medium&amp;id=695bec94b7d62031395509e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21634-vulnerability-in-ubiquiti-inc-unifi-4f6b923c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21634%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Protect%20Application&amp;severity=medium&amp;id=695bec94b7d62031395509de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59467-vulnerability-in-ubiquiti-inc-ucrm--c7fadd3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59467%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UCRM%20Argentina%20AFIP%20invoices%20Plugin&amp;severity=high&amp;id=695bec94b7d62031395509d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21633-vulnerability-in-ubiquiti-inc-unifi-4ed99ac9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21633%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Protect%20Application&amp;severity=high&amp;id=695bec94b7d62031395509db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46255-cwe-862-missing-authorization-in-ma-73af8421</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46255%3A%20CWE-862%20Missing%20Authorization%20in%20Marketing%20Fire%20LLC%20LoginWP%20-%20Pro&amp;severity=high&amp;id=695bec94b7d62031395509bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53344-cwe-352-cross-site-request-forgery--04120430</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53344%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThimPress%20Thim%20Core&amp;severity=medium&amp;id=695bec94b7d62031395509c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53735-cwe-79-improper-neutralization-of-i-5c842eaf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53735%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20corourke%20iPhone%20Webclip%20Manager&amp;severity=high&amp;id=695bec94b7d62031395509b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-android-botnet-infects-over-2-million-devi-3c5ccac1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimwolf%20Android%20Botnet%20Infects%20Over%202%20Million%20Devices%20via%20Exposed%20ADB%20and%20Proxy%20Networks&amp;severity=medium&amp;id=695bff543839e44175893752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30516-cwe-1284-improper-validation-of-spe-cbc86df8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30516%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20SaasProject%20Booking%20Package&amp;severity=high&amp;id=695bec99b7d6203139550ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30461-cwe-79-improper-neutralization-of-i-6a667fd6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tumult%20Inc%20Tumult%20Hype%20Animations&amp;severity=high&amp;id=695bec94b7d62031395509e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14346-cwe-306-missing-authentication-for--166dc7e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14346%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WHILL%20Model%20C2%20Electric%20Wheelchair&amp;severity=critical&amp;id=695bde83b7d620313938fa7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-kev-catalog-expanded-20-in-2025-topping-1480--c65316d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20KEV%20Catalog%20Expanded%2020%25%20in%202025%2C%20Topping%201%2C480%20Entries&amp;severity=medium&amp;id=695bd5ff3dc84013b27dde6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15029-cwe-89-improper-neutralization-of-s-1cd247a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15029%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=critical&amp;id=695bcf2a3dc84013b27be7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0597-sql-injection-in-campcodes-supplier--6aa0c95b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0597%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=695bcf2a3dc84013b27be7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15026-cwe-306-missing-authentication-for--442b2314</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15026%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Centreon%20Infra%20Monitoring&amp;severity=critical&amp;id=695bcf2a3dc84013b27be7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12511-cwe-79-improper-neutralization-of-i-34aaad16</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12511%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=695bc8233dc84013b278cf70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68280-cwe-611-improper-restriction-of-xml-06cbf5fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68280%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20SIS&amp;severity=medium&amp;id=695bc49d3dc84013b27640fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12513-cwe-79-improper-neutralization-of-i-09abe926</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=695bc49d3dc84013b27640fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23511-cwe-79-improper-neutralization-of-i-92f21458</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23511%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder%20Lite&amp;severity=medium&amp;id=695bc49d3dc84013b27640f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0592-sql-injection-in-code-projects-onlin-0eb0fa02</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0592%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695bd93cb7d6203139313f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0591-sql-injection-in-code-projects-onlin-430f5a28</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0591%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695bba123dc84013b271744a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-iot-exploits-wallet-breaches-rogue-ex-9abc1faf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20IoT%20Exploits%2C%20Wallet%20Breaches%2C%20Rogue%20Extensions%2C%20AI%20Abuse%20%26%20More&amp;severity=medium&amp;id=695be3b2b7d62031395311c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-android-botnet-grows-through-residential-p-28019fcb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimwolf%20Android%20Botnet%20Grows%20Through%20Residential%20Proxy%20Networks&amp;severity=low&amp;id=695bb65b3dc84013b2709633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/5th-january-threat-intelligence-report-163db2f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=5th%20January%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=695bb30c3dc84013b26f70bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0590-sql-injection-in-code-projects-onlin-cdb3bf77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0590%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695bb30a3dc84013b26f706f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0589-improper-authentication-in-code-proj-93adb195</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0589%3A%20Improper%20Authentication%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695bd93cb7d6203139313f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-spotlights-whatsapp-metadata-leak-as-me-c3200f03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20Spotlights%20WhatsApp%20Metadata%20Leak%20as%20Meta%20Begins%20Rolling%20Out%20Fixes&amp;severity=medium&amp;id=695ba84b3dc84013b256f8ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0588-cross-site-scripting-in-xinhu-rainro-643f6b43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0588%3A%20Cross%20Site%20Scripting%20in%20Xinhu%20Rainrock%20RockOA&amp;severity=medium&amp;id=695ba4fa3dc84013b24fee12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0587-cross-site-scripting-in-xinhu-rainro-b93a727c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0587%3A%20Cross%20Site%20Scripting%20in%20Xinhu%20Rainrock%20RockOA&amp;severity=medium&amp;id=695b9cd2d0cafea50bf0271e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68865-cwe-89-improper-neutralization-of-s-47ae013b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68865%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Infility%20Infility%20Global&amp;severity=critical&amp;id=695b99acdb813ff03e48b58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68850-cwe-862-missing-authorization-in-co-6b3e8c7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68850%3A%20Missing%20Authorization%20in%20codepeople%20Sell%20Downloads&amp;severity=high&amp;id=695b99acdb813ff03e48b589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68547-cwe-862-missing-authorization-in-wp-86fa8eb7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68547%3A%20Missing%20Authorization%20in%20wpweb%20Follow%20My%20Blog%20Post&amp;severity=high&amp;id=695b99acdb813ff03e48b586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68044-cwe-639-authorization-bypass-throug-1601dac6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68044%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Rustaurius%20Five%20Star%20Restaurant%20Reservations&amp;severity=high&amp;id=695b99acdb813ff03e48b583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68033-cwe-201-insertion-of-sensitive-info-8e39e2bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68033%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Brecht%20Custom%20Related%20Posts&amp;severity=high&amp;id=695b99acdb813ff03e48b580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68029-cwe-201-insertion-of-sensitive-info-f1872075</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68029%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WP%20Swings%20Wallet%20System%20for%20WooCommerce&amp;severity=medium&amp;id=695b99acdb813ff03e48b57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68014-cwe-201-insertion-of-sensitive-info-378ff15b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68014%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20awethemes%20AweBooking&amp;severity=medium&amp;id=695b99acdb813ff03e48b57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0586-cross-site-scripting-in-code-project-11184c2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0586%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695b9617db813ff03e47ed9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31048-cwe-434-unrestricted-upload-of-file-3977fc78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31048%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themify%20Shopo&amp;severity=critical&amp;id=695b9617db813ff03e47ed97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31047-cwe-502-deserialization-of-untruste-ea5db360</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31047%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Themify%20Themify%20Edmin&amp;severity=high&amp;id=695b9617db813ff03e47ed94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31046-cwe-862-missing-authorization-in-wp-695ca694</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31046%3A%20CWE-862%20Missing%20Authorization%20in%20WPvibes%20AnyWhere%20Elementor%20Pro&amp;severity=medium&amp;id=695b9617db813ff03e47ed91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31044-cwe-89-improper-neutralization-of-s-a42ed9b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31044%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20Premium%20SEO%20Pack&amp;severity=high&amp;id=695b9617db813ff03e47ed8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30633-cwe-89-improper-neutralization-of-s-13bbada5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30633%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20Amazon%20Native%20Shopping%20Recommendations&amp;severity=critical&amp;id=695b9617db813ff03e47ed8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69087-cwe-98-improper-control-of-filename-61037791</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69087%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20FreeAgent&amp;severity=high&amp;id=695b9291db813ff03e4708a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12519-cwe-862-missing-authorization-in-ce-a154a52b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12519%3A%20CWE-862%20Missing%20Authorization%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=695b9291db813ff03e4708a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13056-cwe-79-improper-neutralization-of-i-97f39e09</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=695b9291db813ff03e4708a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5965-cwe-78-improper-neutralization-of-sp-5decf22f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5965%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=high&amp;id=695b8f06db813ff03e463837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0585-sql-injection-in-code-projects-onlin-c0ec63e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0585%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695b8f06db813ff03e46383a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitfinex-hack-convict-ilya-lichtenstein-released-e-ff2631ba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitfinex%20Hack%20Convict%20Ilya%20Lichtenstein%20Released%20Early%20Under%20U.S.%20First%20Step%20Act&amp;severity=medium&amp;id=695baa623dc84013b26b95e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0584-sql-injection-in-code-projects-onlin-d60ce6e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0584%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695b8b83db813ff03e454d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0583-sql-injection-in-code-projects-onlin-70e1b231</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0583%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695b847bdb813ff03e438308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66518-cwe-27-path-traversal-dirfilename-i-1922cceb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66518%3A%20CWE-27%20Path%20Traversal%3A%20&apos;dir%2F..%2F..%2Ffilename&apos;%20in%20Apache%20Software%20Foundation%20Apache%20Kyuubi&amp;severity=high&amp;id=695b7d73db813ff03e41d61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0582-sql-injection-in-itsourcecode-societ-54fc004d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0582%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=695b7d73db813ff03e41d61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15240-cwe-434-unrestricted-upload-of-file-7cc36ef1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15240%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=high&amp;id=695b79eedb813ff03e40d8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15239-cwe-89-improper-neutralization-of-s-e92bd6e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15239%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=high&amp;id=695b766adb813ff03e3fec89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0581-command-injection-in-tenda-ac1206-10bd5beb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0581%3A%20Command%20Injection%20in%20Tenda%20AC1206&amp;severity=medium&amp;id=695b766adb813ff03e3fec8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15238-cwe-89-improper-neutralization-of-s-bcd3d8b4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15238%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=high&amp;id=695b72e7db813ff03e3f5bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-vvs-stealer-malware-targets-discord-accounts-v-1de74c79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20VVS%20Stealer%20Malware%20Targets%20Discord%20Accounts%20via%20Obfuscated%20Python%20Code&amp;severity=medium&amp;id=695baa623dc84013b26b95eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15237-cwe-36-absolute-path-traversal-in-q-cfdfbb54</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15237%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=medium&amp;id=695b6f63db813ff03e3e8880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15236-cwe-36-absolute-path-traversal-in-q-f58b2236</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15236%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=medium&amp;id=695b6f63db813ff03e3e887c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0580-cross-site-scripting-in-sourcecodest-1896cf87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0580%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20API%20Key%20Manager%20App&amp;severity=medium&amp;id=695b6bdfdb813ff03e3dbaa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15235-cwe-862-missing-authorization-in-qu-4a3ee6ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15235%3A%20CWE-862%20Missing%20Authorization%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=high&amp;id=695b6bdfdb813ff03e3dbaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15462-buffer-overflow-in-utt-520w-b83561ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15462%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=695b64d6db813ff03e3bf10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15461-buffer-overflow-in-utt-520w-8bd73dbd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15461%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=695b5dcfdb813ff03e3996cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15460-buffer-overflow-in-utt-520w-54ddef69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15460%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=695b56c7db813ff03e37ad07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9543-cwe-79-cross-site-scripting-xss-in-f-f1e9d907</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9543%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20FlexTable&amp;severity=low&amp;id=695b56c7db813ff03e37ad0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14124-cwe-89-sql-injection-in-team-e0aaae6f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14124%3A%20CWE-89%20SQL%20Injection%20in%20Team&amp;severity=high&amp;id=695b56c7db813ff03e37ad04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15459-buffer-overflow-in-utt-520w-35aa842a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15459%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=695b4fbfdb813ff03e35d1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15458-improper-authentication-in-bg5sbk-m-864ac174</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15458%3A%20Improper%20Authentication%20in%20bg5sbk%20MiniCMS&amp;severity=medium&amp;id=695b48b6db813ff03e33445a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15457-improper-authentication-in-bg5sbk-m-6a343c28</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15457%3A%20Improper%20Authentication%20in%20bg5sbk%20MiniCMS&amp;severity=medium&amp;id=695b41aedb813ff03e31b0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15456-improper-authentication-in-bg5sbk-m-70de1b54</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15456%3A%20Improper%20Authentication%20in%20bg5sbk%20MiniCMS&amp;severity=medium&amp;id=695b3e2bdb813ff03e30af0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15455-improper-authentication-in-bg5sbk-m-fd5fb37e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15455%3A%20Improper%20Authentication%20in%20bg5sbk%20MiniCMS&amp;severity=medium&amp;id=695b3722db813ff03e2e334c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15454-cross-site-scripting-in-zhanglun-le-64f53889</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15454%3A%20Cross%20Site%20Scripting%20in%20zhanglun%20lettura&amp;severity=low&amp;id=695b2c97db813ff03e0dbd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15453-deserialization-in-milvus-b1a9e644</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15453%3A%20Deserialization%20in%20milvus&amp;severity=medium&amp;id=695b2c97db813ff03e0dbd54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15452-cross-site-scripting-in-xnx3-wangma-5a15d8fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15452%3A%20Cross%20Site%20Scripting%20in%20xnx3%20wangmarket&amp;severity=medium&amp;id=695b220adb813ff03e08439e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15451-cross-site-scripting-in-xnx3-wangma-02fd0ca0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15451%3A%20Cross%20Site%20Scripting%20in%20xnx3%20wangmarket&amp;severity=medium&amp;id=695b220adb813ff03e084398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15450-sql-injection-in-sfturing-hosporder-1683e20d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15450%3A%20SQL%20Injection%20in%20sfturing%20hosp_order&amp;severity=medium&amp;id=695b13fadb813ff03efd5859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15449-path-traversal-in-cld378632668-java-c79a73e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15449%3A%20Path%20Traversal%20in%20cld378632668%20JavaMall&amp;severity=medium&amp;id=695b0cf2db813ff03ef897b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5591-cwe-79-improper-neutralization-of-in-f992aea2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Kentico%20Xperience&amp;severity=high&amp;id=695b096fdb813ff03ef6b20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15448-unrestricted-upload-in-cld378632668-eb9aff55</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15448%3A%20Unrestricted%20Upload%20in%20cld378632668%20JavaMall&amp;severity=medium&amp;id=695b096fdb813ff03ef6b204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-05-15c584a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-05&amp;severity=medium&amp;id=695c52203839e44175999659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67419-na-c36685b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67419%3A%20n%2Fa&amp;severity=high&amp;id=695c1d9a3839e441758ea7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67427-na-04528a16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67427%3A%20n%2Fa&amp;severity=medium&amp;id=695c16933839e441758db0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52516-na-6253e4f7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52516%3A%20n%2Fa&amp;severity=medium&amp;id=695c08823839e441758ae8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43706-na-4ddd2c38</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43706%3A%20n%2Fa&amp;severity=high&amp;id=695c08823839e441758ae8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27807-na-960c7051</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27807%3A%20n%2Fa&amp;severity=critical&amp;id=695c08823839e441758ae8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67397-na-d23f3940</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67397%3A%20n%2Fa&amp;severity=critical&amp;id=695c05013839e441758a3892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53966-na-be553183</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53966%3A%20n%2Fa&amp;severity=high&amp;id=695c05013839e441758a388e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49495-na-b30b793a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49495%3A%20n%2Fa&amp;severity=high&amp;id=695c05013839e441758a388a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65922-na-17d6f126</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65922%3A%20n%2Fa&amp;severity=medium&amp;id=695c017b3839e44175898474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52517-na-ab2f5576</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52517%3A%20n%2Fa&amp;severity=medium&amp;id=695c017b3839e4417589846b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52515-na-802bdb41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52515%3A%20n%2Fa&amp;severity=medium&amp;id=695c017b3839e44175898467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52519-na-07c52c7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52519%3A%20n%2Fa&amp;severity=high&amp;id=695bf3783839e44175668259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57836-na-7a4447cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57836%3A%20n%2Fa&amp;severity=high&amp;id=695bec99b7d6203139550ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67316-na-ff1ad204</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67316%3A%20n%2Fa&amp;severity=medium&amp;id=695be90fb7d6203139541a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65328-na-2ccfef04</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65328%3A%20n%2Fa&amp;severity=medium&amp;id=695be58cb7d6203139538ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67303-na-2236ed72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67303%3A%20n%2Fa&amp;severity=high&amp;id=695be207b7d62031393eafe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67315-na-c4f59cdc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67315&amp;severity=null&amp;id=695be207b7d62031393eae0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66376-cwe-79-improper-neutralization-of-i-163928a6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zimbra%20Collaboration&amp;severity=high&amp;id=695bd2af3dc84013b27cfcec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15447-sql-injection-in-seeyon-zhiyuan-oa--6ddb354b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15447&amp;severity=null&amp;id=695afb5fdb813ff03ef1439b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15446-sql-injection-in-seeyon-zhiyuan-oa--dda8c3f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15446&amp;severity=null&amp;id=695af456db813ff03ef034af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0579-sql-injection-in-code-projects-onlin-5af30a32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0579%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a60afdb813ff03ed02ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0578-sql-injection-in-code-projects-onlin-b40a0b17</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0578%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a59a7db813ff03eceb68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15443-sql-injection-in-crmeb-d04c5dae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15443%3A%20SQL%20Injection%20in%20CRMEB&amp;severity=medium&amp;id=695a52a0db813ff03ecd5ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15442-sql-injection-in-crmeb-70a9a933</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15442%3A%20SQL%20Injection%20in%20CRMEB&amp;severity=medium&amp;id=695a4b97db813ff03ecbba64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0577-unrestricted-upload-in-code-projects-d1ce7073</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0577%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a367fdb813ff03ec78a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14830-cwe-79-improper-neutralization-of-i-362d4b4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20JFrog%20Artifactory%20(Workers)&amp;severity=medium&amp;id=695a32fadb813ff03ec70731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0576-sql-injection-in-code-projects-onlin-5004ce46</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0576%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a2f77db813ff03ec525e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0575-sql-injection-in-code-projects-onlin-4e9b35f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0575%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a0547db813ff03eb47238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptocurrency-scam-emails-and-web-pages-as-we-ent-45f003f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%20We%20Enter%202026%2C%20(Sun%2C%20Jan%204th)&amp;severity=medium&amp;id=6959effcdb813ff03eac9305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0574-improper-authorization-in-yeqifu-war-abcf8498</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0574%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6959cd06db813ff03e7f215f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-04-4b8cf66f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-04&amp;severity=medium&amp;id=695b0231db813ff03ef2c705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3660-improper-authorization-of-index-cont-3e60d3bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3660%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3654-improper-authorization-of-index-cont-b47f1f02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3654%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3653-improper-authorization-of-index-cont-2d7465bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3653%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3652-authentication-bypass-using-an-alter-7e33ab53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3652%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3646-missing-authentication-for-critical--eed88241</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3646%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15115-missing-authorization-in-petlibrio--7ec5e489</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15115%3A%20Missing%20Authorization%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34171-361be593</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34171%3A%20CWE-862%20Missing%20Authorization%20in%20IceWhale%20Tech%20CasaOS&amp;severity=medium&amp;id=6957f5dddb813ff03ef50c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/just-in-shinyhunters-claim-breach-of-us-cybersecur-83930754</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Just%20In%3A%20ShinyHunters%20Claim%20Breach%20of%20US%20Cybersecurity%20Firm%20Resecurity%2C%20Screenshots%20Show%20Internal%20Access&amp;severity=high&amp;id=69594ac4db813ff03e5f8456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-is-using-react2shell-to-hijack-tho-65dbbe4d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20is%20Using%20React2Shell%20to%20Hijack%20Thousands%20of%20Unpatched%20Devices&amp;severity=medium&amp;id=69593228db813ff03e5a2c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-coldfusion-exploit-attempts-spotted-d-eb527f74</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20ColdFusion%20exploit%20attempts%20spotted%20during%20Christmas%20holiday&amp;severity=high&amp;id=69592093db813ff03e5684c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-snakes-by-the-riverbank-ab557ee1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%3A%20Snakes%20by%20the%20riverbank&amp;severity=medium&amp;id=695b9dfc3dc84013b246d8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/longnosedgoblin-tries-to-sniff-out-governmental-af-95ee9be0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LongNosedGoblin%20tries%20to%20sniff%20out%20governmental%20affairs%20in%20Southeast%20Asia%20and%20Japan&amp;severity=medium&amp;id=695b9dfc3dc84013b246d8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/president-trump-orders-divestment-in-29-million-ch-bbc4edb7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=President%20Trump%20Orders%20Divestment%20in%20%242.9%20Million%20Chips%20Deal%20to%20Protect%20US%20Security%20Interests&amp;severity=medium&amp;id=6958f660db813ff03e4f426e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kermit-exploit-defeats-police-ai-podcast-your-righ-9068c77e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kermit%20Exploit%20Defeats%20Police%20AI%3A%20Podcast%20Your%20Rights%20to%20Challenge%20the%20Record%20Integrity&amp;severity=high&amp;id=6958ebd7db813ff03e4dd288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21484-cwe-203-observable-discrepancy-in-m-feea7b0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21484%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20Mintplex-Labs%20anything-llm&amp;severity=medium&amp;id=69587451db813ff03e162b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64124-cwe-78-improper-neutralization-of-s-8fd8727d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64124%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=high&amp;id=69586640db813ff03e0db0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64125-cwe-441-unintended-proxy-or-interme-b38ae03f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64125%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20in%20Nuvation%20Energy%20nCloud%20VPN%20Service&amp;severity=critical&amp;id=69586640db813ff03e0db0ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-03-c5d81326</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-03&amp;severity=medium&amp;id=6959b0b1db813ff03e7417d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64123-cwe-78-improper-neutralization-of-s-ade8ddce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64123%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=high&amp;id=69583c10db813ff03e02aa68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64122-cwe-522-insufficiently-protected-cr-7b6e64e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64122%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=high&amp;id=69583c10db813ff03e02aa65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64121-cwe-288-authentication-bypass-using-e870bc00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64121%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=critical&amp;id=69583c10db813ff03e02aa62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64120-cwe-78-improper-neutralization-of-s-dfeaa13c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64120%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=critical&amp;id=69583c10db813ff03e02aa6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64119-cwe-603-in-nuvation-energy-battery--a46ce8db</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64119%3A%20CWE-603%20in%20Nuvation%20Energy%20Battery%20Management%20System&amp;severity=critical&amp;id=6958388ddb813ff03e020325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21483-cwe-79-improper-neutralization-of-i-8206b461</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21483%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20knadh%20listmonk&amp;severity=medium&amp;id=69583509db813ff03e019c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21452-cwe-400-uncontrolled-resource-consu-f1c49e53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21452%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20msgpack%20msgpack-java&amp;severity=high&amp;id=69583184db813ff03e011ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0571-path-traversal-in-yeqifu-warehouse-94df3301</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0571%3A%20Path%20Traversal%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=695826f8db813ff03efea567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21445-cwe-306-missing-authentication-for--38cd4a1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21445%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69581c6edb813ff03efc8412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21444-cwe-327-use-of-a-broken-or-risky-cr-e643cca6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21444%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20stefanberger%20libtpms&amp;severity=medium&amp;id=69581901db813ff03efbfeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21440-cwe-22-improper-limitation-of-a-pat-1ab6f0b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21440%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20adonisjs%20core&amp;severity=critical&amp;id=69581901db813ff03efbfead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covenant-health-data-breach-after-ransomware-attac-a2a805de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Covenant%20Health%20data%20breach%20after%20ransomware%20attack%20impacted%20over%20478%2C000%20people&amp;severity=high&amp;id=695818e7db813ff03efbfbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0570-sql-injection-in-code-projects-onlin-1e0574c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0570%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69581901db813ff03efbfea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-10k-fortinet-firewalls-exposed-to-actively-ex-ab9c98b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2010K%20Fortinet%20firewalls%20exposed%20to%20actively%20exploited%202FA%20bypass&amp;severity=high&amp;id=695818e7db813ff03efbfbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tokyo-fm-data-breach-hacker-claims-over-3-million--03a7ef62</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tokyo%20FM%20Data%20Breach%3A%20Hacker%20Claims%20Over%203%20Million%20Records%20Stolen&amp;severity=high&amp;id=695811dedb813ff03efad351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0569-sql-injection-in-code-projects-onlin-b84c43d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0569%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=695811f1db813ff03efad660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0568-sql-injection-in-code-projects-onlin-45aee655</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0568%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69580ad8db813ff03ef98cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0567-sql-injection-in-code-projects-conte-5b243309</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0567%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=695803d0db813ff03ef8206e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15439-sql-injection-in-daptin-79e40f73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15439%3A%20SQL%20Injection%20in%20Daptin&amp;severity=medium&amp;id=6957fcc6db813ff03ef64afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69417-cwe-863-incorrect-authorization-in--ccf52c26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69417%3A%20CWE-863%20Incorrect%20Authorization%20in%20Plex%20plex.tv%20backend&amp;severity=medium&amp;id=6957fcc6db813ff03ef64b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69416-cwe-863-incorrect-authorization-in--97acdffa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69416%3A%20CWE-863%20Incorrect%20Authorization%20in%20Plex%20plex.tv%20backend&amp;severity=medium&amp;id=6957f952db813ff03ef5aecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69415-cwe-672-operation-on-a-resource-aft-2ac0c1e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69415%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20Plex%20Media%20Server&amp;severity=high&amp;id=6957f952db813ff03ef5aecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69414-cwe-863-incorrect-authorization-in--7df6bff5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69414%3A%20CWE-863%20Incorrect%20Authorization%20in%20Plex%20Media%20Server&amp;severity=high&amp;id=6957f965db813ff03ef5b265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0566-unrestricted-upload-in-code-projects-ec4488f8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0566%3A%20Unrestricted%20Upload%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=6957f965db813ff03ef5b268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59389-cwe-89-in-qnap-systems-inc-hyper-da-e848d35c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59389%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Hyper%20Data%20Protector&amp;severity=high&amp;id=6957eb35db813ff03ef35595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62842-cwe-73-in-qnap-systems-inc-hbs-3-hy-fad20694</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62842%3A%20CWE-73%20in%20QNAP%20Systems%20Inc.%20HBS%203%20Hybrid%20Backup%20Sync&amp;severity=high&amp;id=6957eb35db813ff03ef3559b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62840-cwe-209-in-qnap-systems-inc-hbs-3-h-5dc54d76</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62840%3A%20CWE-209%20in%20QNAP%20Systems%20Inc.%20HBS%203%20Hybrid%20Backup%20Sync&amp;severity=high&amp;id=6957eb35db813ff03ef35598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11837-cwe-94-in-qnap-systems-inc-malware--01b67e6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11837%3A%20CWE-94%20in%20QNAP%20Systems%20Inc.%20Malware%20Remover&amp;severity=high&amp;id=6957eb35db813ff03ef35592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69284-cwe-284-improper-access-control-in--b5b979e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69284%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20makeplane%20plane&amp;severity=medium&amp;id=6957eb35db813ff03ef355a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62852-cwe-121-in-qnap-systems-inc-qts-640e89f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62852%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957e42ddb813ff03ef241da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59387-cwe-89-in-qnap-systems-inc-mars-mul-365f7996</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59387%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20MARS%20(Multi-Application%20Recovery%20Service)&amp;severity=high&amp;id=6957e42ddb813ff03ef241d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59384-cwe-22-in-qnap-systems-inc-qfiling-283cc204</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59384%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qfiling&amp;severity=high&amp;id=6957e42ddb813ff03ef241d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59381-cwe-22-in-qnap-systems-inc-qts-3fa3e827</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59381%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e42ddb813ff03ef241d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59380-cwe-22-in-qnap-systems-inc-qts-91aa99af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59380%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e42ddb813ff03ef241ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53597-cwe-121-in-qnap-systems-inc-license-aaa1e91c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53597%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20License%20Center&amp;severity=low&amp;id=6957e42ddb813ff03ef241cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53594-cwe-22-in-qnap-systems-inc-qfinder--9c2c2ec3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53594%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qfinder%20Pro%20Mac&amp;severity=medium&amp;id=6957e42ddb813ff03ef241c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52871-cwe-125-in-qnap-systems-inc-license-2728acf0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52871%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20License%20Center&amp;severity=low&amp;id=6957e42ddb813ff03ef241c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48721-cwe-120-in-qnap-systems-inc-qts-78ba2fc1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48721%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957e42ddb813ff03ef241c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9110-cwe-497-in-qnap-systems-inc-qts-8028bbe6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9110%3A%20CWE-497%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957e42ddb813ff03ef241dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57705-cwe-770-in-qnap-systems-inc-qts-cc71e0c7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57705%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e0a8db813ff03ef1420b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54166-cwe-125-in-qnap-systems-inc-qts-5e64de99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54166%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e0a8db813ff03ef14208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54165-cwe-125-in-qnap-systems-inc-qts-6d7a0d62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54165%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e0a8db813ff03ef14205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54164-cwe-125-in-qnap-systems-inc-qts-8dca5c6a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54164%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957dd47db813ff03ef066bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53596-cwe-476-in-qnap-systems-inc-qts-9f8afab4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53596%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53593-cwe-121-in-qnap-systems-inc-qts-fa47faa3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53593%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53592-cwe-476-in-qnap-systems-inc-qts-95fe50f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53592%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53591-cwe-134-in-qnap-systems-inc-qts-ca58fadd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53591%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53590-cwe-476-in-qnap-systems-inc-qts-fe2f829b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53590%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53589-cwe-476-in-qnap-systems-inc-qts-8a57f6ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53589%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53414-cwe-476-in-qnap-systems-inc-qts-5cde872f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53414%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53405-cwe-476-in-qnap-systems-inc-qts-5d774bc8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53405%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef0667e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52872-cwe-120-in-qnap-systems-inc-qts-0bb94e21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52872%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef0667b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52864-cwe-120-in-qnap-systems-inc-qts-ffcf2f22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52864%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52863-cwe-120-in-qnap-systems-inc-qts-1b6925f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52863%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52431-cwe-476-in-qnap-systems-inc-qts-dc45854a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52431%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52430-cwe-476-in-qnap-systems-inc-qts-d36776bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52430%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef0666f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52426-cwe-476-in-qnap-systems-inc-qts-f2963f27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52426%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef0666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47208-cwe-770-in-qnap-systems-inc-qts-a829ed17</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47208%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957dd46db813ff03ef06669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44013-cwe-476-in-qnap-systems-inc-qts-ee5f2b21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44013%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transparent-tribe-launches-new-rat-attacks-against-7e20b52e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Transparent%20Tribe%20Launches%20New%20RAT%20Attacks%20Against%20Indian%20Government%20and%20Academia&amp;severity=high&amp;id=6957dd24db813ff03ef06173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62857-cwe-79-in-qnap-systems-inc-qumagie-e4cb0c7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62857%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20QuMagie&amp;severity=low&amp;id=6957dd47db813ff03ef066c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-kimwolf-botnet-is-stalking-your-local-network-8b22c4a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Kimwolf%20Botnet%20is%20Stalking%20Your%20Local%20Network&amp;severity=high&amp;id=6957dd24db813ff03ef0616f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15438-deserialization-in-pluxml-5717081c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15438%3A%20Deserialization%20in%20PluXml&amp;severity=medium&amp;id=6957d9a2db813ff03eef48ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0565-sql-injection-in-code-projects-conte-7aa41759</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0565%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=6957d298db813ff03eed8b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transparent-tribe-launches-new-rat-attacks-against-8ba4828c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Transparent%20Tribe%20Launches%20New%20RAT%20Attacks%20Against%20Indian%20Government%20and%20Academia&amp;severity=medium&amp;id=6957cf0ddb813ff03eec907e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vvs-discord-stealer-using-pyarmor-for-obfuscation--a634aa2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VVS%20Discord%20Stealer%20Using%20Pyarmor%20for%20Obfuscation%20and%20Detection%20Evasion&amp;severity=medium&amp;id=6957cf29db813ff03eec98a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flock-exposes-its-ai-enabled-surveillance-cameras-70340cff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flock%20Exposes%20Its%20AI-Enabled%20Surveillance%20Cameras&amp;severity=medium&amp;id=6957cf29db813ff03eec98a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-campaign-abuses-google-cloud-application--5d341205</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20campaign%20abuses%20Google%20Cloud%20Application%20to%20impersonate%20legitimate%20Google%20emails&amp;severity=medium&amp;id=6957cf29db813ff03eec989f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vvs-discord-stealer-using-pyarmor-for-obfuscation--c429a73c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VVS%20Discord%20Stealer%20Using%20Pyarmor%20for%20Obfuscation%20and%20Detection%20Evasion&amp;severity=medium&amp;id=6957f23cdb813ff03ef4a1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-registry-persistence-techniques-without-re-e0554d78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Registry%20Persistence%20Techniques%20without%20Registry%20Callbacks&amp;severity=medium&amp;id=6957c80cdb813ff03eeaffbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-us-cybersecurity-pros-plead-guilty-over-ransom-02a06284</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20US%20Cybersecurity%20Pros%20Plead%20Guilty%20Over%20Ransomware%20Attacks&amp;severity=medium&amp;id=6957b674db813ff03ee6876a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-roi-problem-in-attack-surface-management-9967b931</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20ROI%20Problem%20in%20Attack%20Surface%20Management&amp;severity=low&amp;id=6958603ddb813ff03e0a0a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-exploiting-react2shell-vulnerabili-bbaded6f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20Exploiting%20React2Shell%20Vulnerability&amp;severity=medium&amp;id=6957a863db813ff03ee2bb2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covenant-health-data-breach-impacts-478000-individ-0c946c66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Covenant%20Health%20Data%20Breach%20Impacts%20478%2C000%20Individuals&amp;severity=medium&amp;id=69579dd8db813ff03edf84fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-coldfusion-servers-targeted-in-coordinated-c-c049fe53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20ColdFusion%20Servers%20Targeted%20in%20Coordinated%20Campaign&amp;severity=medium&amp;id=69579a53db813ff03ede64e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0547-unrestricted-upload-in-phpgurukul-on-0b0384d6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0547%3A%20Unrestricted%20Upload%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=69579353db813ff03edc3e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-abuse-google-cloud-email-feature-in-b0852113</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Abuse%20Google%20Cloud%20Email%20Feature%20in%20Multi-Stage%20Phishing%20Campaign&amp;severity=medium&amp;id=6958603ddb813ff03e0a0a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0546-sql-injection-in-code-projects-conte-37323882</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0546%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=69578c4bdb813ff03edaa617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15437-cross-site-scripting-in-ligerosmart-24338344</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15437%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=69578543db813ff03ed9340b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15436-sql-injection-in-yonyou-ksoa-884c8d59</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15436%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=69577e3bdb813ff03ed8028d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15435-sql-injection-in-yonyou-ksoa-eb01c9b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15435%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=69577733db813ff03ed646cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15434-sql-injection-in-yonyou-ksoa-d865a8da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15434%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=6957702ddb813ff03ed46cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15432-path-traversal-in-yeqifu-carrental-59c46a94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15432%3A%20Path%20Traversal%20in%20yeqifu%20carRental&amp;severity=medium&amp;id=69576923db813ff03ed2f10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15431-buffer-overflow-in-utt-512w-986c5285</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15431%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=6957621bdb813ff03ed0f787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14072-cwe-287-improper-authentication-in--fcdd338c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14072%3A%20CWE-287%20Improper%20Authentication%20in%20Ninja%20Forms&amp;severity=medium&amp;id=6957621bdb813ff03ed0f784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13456-cwe-79-cross-site-scripting-xss-in--2ad540af</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13456%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20ShopBuilder&amp;severity=medium&amp;id=6957621bdb813ff03ed0f781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13153-cwe-79-cross-site-scripting-xss-in--8bd50900</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13153%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Logo%20Slider&amp;severity=medium&amp;id=6957621bdb813ff03ed0f77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12685-cwe-352-cross-site-request-forgery--052e8f12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12685%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPBookit&amp;severity=medium&amp;id=6957621bdb813ff03ed0f77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15430-buffer-overflow-in-utt-512w-b701d7fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15430%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=69575b13db813ff03ece591e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15429-buffer-overflow-in-utt-512w-1edbb386</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15429%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=6957578fdb813ff03ecd2435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15428-buffer-overflow-in-utt-512w-0eacf5ad</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15428%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=69575087db813ff03ecb9937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15427-sql-injection-in-seeyon-zhiyuan-oa--6893a432</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15427&amp;severity=null&amp;id=695745fadb813ff03ec87323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15426-unrestricted-upload-in-jackying-h-u-20044b21</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15426%3A%20Unrestricted%20Upload%20in%20jackying%20H-ui.admin&amp;severity=medium&amp;id=69574277db813ff03ec73231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15425-sql-injection-in-yonyou-ksoa-0317e057</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15425%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=695737ecdb813ff03ea62d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15424-sql-injection-in-yonyou-ksoa-35d7090b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15424%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=695737ecdb813ff03ea62d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15423-unrestricted-upload-in-empiresoft-e-e21ca2bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15423%3A%20Unrestricted%20Upload%20in%20EmpireSoft%20EmpireCMS&amp;severity=medium&amp;id=695843a1db813ff03e04a595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14998-cwe-639-authorization-bypass-throug-6c57fe02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14998%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpmudev%20Branda%20%E2%80%93%20White%20Label%20%26%20Branding%2C%20Free%20Login%20Page%20Customizer&amp;severity=critical&amp;id=695843a1db813ff03e04a584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14047-cwe-862-missing-authorization-in-ta-a3aa4d0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14047%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20User%20Frontend%3A%20AI%20Powered%20Frontend%20Posting%2C%20User%20Directory%2C%20Profile%2C%20Membership%20%26%20User%20Registration&amp;severity=medium&amp;id=695843a1db813ff03e04a577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15422-protection-mechanism-failure-in-emp-f6526326</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15422%3A%20Protection%20Mechanism%20Failure%20in%20EmpireSoft%20EmpireCMS&amp;severity=medium&amp;id=695722d3db813ff03e9b27ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/built-an-automated-red-team-tool-to-find-llm-vulne-c6daf098</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Built%20an%20automated%20red-team%20tool%20to%20find%20LLM%20vulnerabilities.%20Most%20AI%20apps%20are%20frighteningly%20easy%20to%20break.&amp;severity=critical&amp;id=69571f50db813ff03e988f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15421-sql-injection-in-yonyou-ksoa-15b66d8f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15421%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=69571bcbdb813ff03e966c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15420-sql-injection-in-yonyou-ksoa-8ff00d8a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15420%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=695714c3db813ff03e90983a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15419-denial-of-service-in-open5gs-a191d9a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15419%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=695714c3db813ff03e909831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-02-6e26c7bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-02&amp;severity=medium&amp;id=69585f31db813ff03e094b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65125-na-2d5f29b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65125%3A%20n%2Fa&amp;severity=critical&amp;id=695843a1db813ff03e04a572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45286-na-e23b921a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45286%3A%20n%2Fa&amp;severity=medium&amp;id=695843a1db813ff03e04a56c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67158-na-b31284cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67158%3A%20n%2Fa&amp;severity=high&amp;id=6957f965db813ff03ef5b260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67159-na-3d467c17</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67159%3A%20n%2Fa&amp;severity=high&amp;id=6957f602db813ff03ef51678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67160-na-7d2c9953</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67160%3A%20n%2Fa&amp;severity=high&amp;id=6957f23ddb813ff03ef4a1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67268-na-1196050b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67268%3A%20n%2Fa&amp;severity=critical&amp;id=6957eeb8db813ff03ef3fe94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67269-na-a3b7ad16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67269%3A%20n%2Fa&amp;severity=high&amp;id=6957eb35db813ff03ef3559e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55374-na-942b2e66</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55374%3A%20n%2Fa&amp;severity=medium&amp;id=6957e0a8db813ff03ef14201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15418-denial-of-service-in-open5gs-c29fc1bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15418%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=695706b3db813ff03e8adb84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15417-denial-of-service-in-open5gs-d3430b44</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15417%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=6956ffabdb813ff03e890340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15416-cross-site-scripting-in-xnx3-wangma-9067db30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15416%3A%20Cross%20Site%20Scripting%20in%20xnx3%20wangmarket&amp;severity=medium&amp;id=6956f8a3db813ff03e8725ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15415-unrestricted-upload-in-xnx3-wangmar-23fa7946</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15415%3A%20Unrestricted%20Upload%20in%20xnx3%20wangmarket&amp;severity=medium&amp;id=6956f1e1db813ff03e8571d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15414-server-side-request-forgery-in-go-s-014a07a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15414%3A%20Server-Side%20Request%20Forgery%20in%20go-sonic%20sonic&amp;severity=medium&amp;id=6956ea94db813ff03e836007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15413-memory-corruption-in-wasm3-ae72b50d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15413%3A%20Memory%20Corruption%20in%20wasm3&amp;severity=medium&amp;id=6956e38cdb813ff03e814b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15412-out-of-bounds-read-in-webassembly-w-cbc26af0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15412%3A%20Out-of-Bounds%20Read%20in%20WebAssembly%20wabt&amp;severity=medium&amp;id=6956dc84db813ff03e7ed0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15411-memory-corruption-in-webassembly-wa-c86fe015</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15411%3A%20Memory%20Corruption%20in%20WebAssembly%20wabt&amp;severity=medium&amp;id=6956ce74db813ff03e7b35a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15410-sql-injection-in-code-projects-onli-512f39ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15410%3A%20SQL%20Injection%20in%20code-projects%20Online%20Guitar%20Store&amp;severity=medium&amp;id=6956c76cdb813ff03e78cd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69203-cwe-290-authentication-bypass-by-sp-a082b007</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69203%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=6956c3e8db813ff03e77f10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68619-cwe-94-improper-control-of-generati-6e946495</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68619%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SignalK%20signalk-server&amp;severity=high&amp;id=6956c3e8db813ff03e77f102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15409-sql-injection-in-code-projects-onli-d88f38b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15409%3A%20SQL%20Injection%20in%20code-projects%20Online%20Guitar%20Store&amp;severity=medium&amp;id=6956f1e1db813ff03e8571dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55065-cwe-89-improper-neutralization-of-s-db8f01f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55065%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kopek%20Reem%20ReKord%20client&amp;severity=high&amp;id=6956f1e1db813ff03e8571e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68620-cwe-288-authentication-bypass-using-28a1205e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68620%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=6956c3e8db813ff03e77f106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68273-cwe-200-exposure-of-sensitive-infor-4aa8ca46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68273%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=6956bce0db813ff03e75fde5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68272-cwe-400-uncontrolled-resource-consu-b8c7fa57</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68272%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20SignalK%20signalk-server&amp;severity=high&amp;id=6956bce0db813ff03e75fdef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21437-cwe-353-missing-support-for-integri-b87ca50f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21437%3A%20CWE-353%3A%20Missing%20Support%20for%20Integrity%20Check%20in%20getsolus%20eopkg&amp;severity=low&amp;id=6956bce0db813ff03e75fdf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21436-cwe-24-path-traversal-filedir-in-ge-e0e1ea95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21436%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20getsolus%20eopkg&amp;severity=medium&amp;id=6956bce0db813ff03e75fdf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15408-sql-injection-in-code-projects-onli-b47ded96</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15408%3A%20SQL%20Injection%20in%20code-projects%20Online%20Guitar%20Store&amp;severity=medium&amp;id=6956bce0db813ff03e75fde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66398-cwe-78-improper-neutralization-of-s-ff983985</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66398%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=6956b95edb813ff03e75250c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21428-cwe-93-improper-neutralization-of-c-0e9b9e91</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21428%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=6956b5dbdb813ff03e73e079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15407-sql-injection-in-code-projects-onli-f357110b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15407%3A%20SQL%20Injection%20in%20code-projects%20Online%20Guitar%20Store&amp;severity=medium&amp;id=6956b256db813ff03e730128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15406-missing-authorization-in-phpgurukul-900eb7ed</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15406%3A%20Missing%20Authorization%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=6956ab4edb813ff03e6ffc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47411-cwe-269-improper-privilege-manageme-3f471c13</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47411%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20StreamPipes&amp;severity=high&amp;id=6956a7c9db813ff03e6f0ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14627-cwe-918-server-side-request-forgery-09da3e9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14627%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=medium&amp;id=6956a0c2db813ff03e6d157a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14428-cwe-862-missing-authorization-in-ga-62d49b42</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14428%3A%20CWE-862%20Missing%20Authorization%20in%20premio%20All-in-one%20Sticky%20Floating%20Contact%20Form%2C%20Call%2C%20Click%20to%20Chat%2C%20and%2050%2B%20Social%20Icon%20Tabs%20%20%E2%80%93%20My%20Sticky%20Elements&amp;severity=medium&amp;id=6956a0c2db813ff03e6d1573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48769-cwe-416-use-after-free-in-apache-so-56a89349</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48769%3A%20CWE-416%20Use%20After%20Free%20in%20Apache%20Software%20Foundation%20Apache%20NuttX%20RTOS&amp;severity=medium&amp;id=6956a0c2db813ff03e6d1584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48768-cwe-763-release-of-invalid-pointer--be0d46ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48768%3A%20CWE-763%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20NuttX%20RTOS&amp;severity=medium&amp;id=6956a0c2db813ff03e6d1580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ghostad-drain-macos-attacks-pr-55121ae2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20GhostAd%20Drain%2C%20macOS%20Attacks%2C%20Proxy%20Botnets%2C%20Cloud%20Exploits%2C%20and%2012%2B%20Stories&amp;severity=medium&amp;id=6956f86fdb813ff03e871356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15405-cross-site-request-forgery-in-phpem-2015e739</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15405%3A%20Cross-Site%20Request%20Forgery%20in%20PHPEMS&amp;severity=medium&amp;id=69568f2edb813ff03e66b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-story-of-a-perfect-exploit-chain-six-bugs-that-01b02b69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Story%20of%20a%20Perfect%20Exploit%20Chain%3A%20Six%20Bugs%20That%20Looked%20Harmless%20Until%20They%20Became%20Pre-Auth%20RCE%20in%20a%20Security%20Appliance&amp;severity=high&amp;id=69568bacdb813ff03e65d78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15404-unrestricted-upload-in-campcodes-sc-cbf79a7b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15404%3A%20Unrestricted%20Upload%20in%20campcodes%20School%20File%20Management%20System&amp;severity=medium&amp;id=69567a16db813ff03e61fb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-exploits-critical-react2shell-flaw-53322b34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20Exploits%20Critical%20React2Shell%20Flaw%20to%20Hijack%20IoT%20Devices%20and%20Web%20Servers&amp;severity=critical&amp;id=6956617adb813ff03e5b1417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-exploits-critical-react2shell-flaw-82c88218</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20Exploits%20Critical%20React2Shell%20Flaw%20to%20Hijack%20IoT%20Devices%20and%20Web%20Servers&amp;severity=critical&amp;id=6956f86fdb813ff03e871359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0544-sql-injection-in-itsourcecode-school-7b433049</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0544%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=69563ad1db813ff03e5276ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11157-cwe-502-deserialization-of-untruste-512c4e8b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11157%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20feast-dev%20feast-dev%2Ffeast&amp;severity=high&amp;id=6956f1e1db813ff03e8571ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13820-cwe-269-improper-privilege-manageme-eb286025</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13820%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Comments&amp;severity=medium&amp;id=695610a1db813ff03e43b0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-01-1e8a00ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-01&amp;severity=medium&amp;id=69570db0db813ff03e8cf12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69412-cwe-295-improper-certificate-valida-871316b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69412%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20KDE%20messagelib&amp;severity=low&amp;id=6955b1b6db813ff03e0732d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deedrat-unpacking-a-modern-backdoors-playbook-c3e3b2a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeedRAT%3A%20Unpacking%20a%20Modern%20Backdoor&apos;s%20Playbook&amp;severity=medium&amp;id=6957a4e6db813ff03ee16357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-claims-european-space-agency-breach-selling-e82f758b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Claims%20European%20Space%20Agency%20Breach%2C%20Selling%20200GB%20of%20Data&amp;severity=high&amp;id=6955aaaadb813ff03e06314c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67711-cwe-79-improper-neutralization-of-i-9cda60ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a72adb813ff03e05b24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67710-cwe-79-improper-neutralization-of-i-589cf50c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67710%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67709-cwe-79-improper-neutralization-of-i-072e1f66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67709%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67708-cwe-79-improper-neutralization-of-i-16ecd8a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67708%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67707-cwe-434-unrestricted-upload-of-file-c14974c1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67707%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67706-cwe-434-unrestricted-upload-of-file-9ed6311b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67706%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67705-cwe-79-improper-neutralization-of-i-c34ddd48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67704-cwe-79-improper-neutralization-of-i-0187848a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67703-cwe-79-improper-neutralization-of-i-aae6d110</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15398-weak-password-recovery-in-uasoft-ba-c23e7162</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15398%3A%20Weak%20Password%20Recovery%20in%20Uasoft%20badaso&amp;severity=medium&amp;id=6955a05adb813ff03e045d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69288-cwe-20-improper-input-validation-in-e6c8be90</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69288%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20kromitgmbh%20titra&amp;severity=critical&amp;id=6955a05adb813ff03e045d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69286-cwe-340-generation-of-predictable-n-5834d285</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69286%3A%20CWE-340%3A%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20infiniflow%20ragflow&amp;severity=high&amp;id=69559c9ddb813ff03e037d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7332-cwe-1284-improper-validation-of-spec-06c42df5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7332%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20pmmp%20PocketMine-MP&amp;severity=high&amp;id=69559919db813ff03e029ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68700-cwe-78-improper-neutralization-of-s-50efb60e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68700%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20infiniflow%20ragflow&amp;severity=high&amp;id=69559595db813ff03e01bb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7331-sql-injection-in-pkrystian-full-stac-9be4e667</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7331%3A%20SQL%20Injection%20in%20PKrystian%20Full-Stack-Bank&amp;severity=medium&amp;id=69559212db813ff03e014811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53235-cwe-79-improper-neutralization-of-i-7a64fbad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osuthorpe%20Easy%20Social&amp;severity=high&amp;id=69558786db813ff03eff62bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52739-cwe-79-improper-neutralization-of-i-00167716</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Sala&amp;severity=high&amp;id=69558402db813ff03efee310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50053-cwe-79-improper-neutralization-of-i-78586778</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50053%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nebelhorn%20Blappsta%20Mobile%20App%20Plugin%20%E2%80%93%20Your%20native%2C%20mobile%20iPhone%20App%20and%20Android%20App&amp;severity=high&amp;id=69558402db813ff03efee30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31054-cwe-352-cross-site-request-forgery--9885f2f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31054%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Themefy%20Bloggie&amp;severity=high&amp;id=69558402db813ff03efee30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30628-cwe-89-improper-neutralization-of-s-6b4c5419</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30628%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20Amazon%20Affiliates%20Addon%20for%20WPBakery%20Page%20Builder%20(formerly%20Visual%20Composer)&amp;severity=high&amp;id=69558402db813ff03efee307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28973-cwe-35-path-traversal-in-aa-team-pr-3a591040</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28973%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20AA-Team%20Pro%20Bulk%20Watermark%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69558402db813ff03efee304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28949-cwe-89-improper-neutralization-of-s-1677eae3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28949%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Codedraft%20Mediabay%20-%20WordPress%20Media%20Library%20Folders&amp;severity=high&amp;id=69558402db813ff03efee301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23757-cwe-79-improper-neutralization-of-i-87e49272</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23757%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Proloy%20Chakroborty%20ZD%20Scribd%20iPaper&amp;severity=high&amp;id=69558403db813ff03efee336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23719-cwe-79-improper-neutralization-of-i-5ebea873</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23719%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zckevin%20ZhinaTwitterWidget&amp;severity=high&amp;id=69558402db813ff03efee31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23707-cwe-79-improper-neutralization-of-i-03b9c366</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23707%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matamko%20En%20Masse&amp;severity=high&amp;id=69558402db813ff03efee319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23705-cwe-79-improper-neutralization-of-i-3f486cf1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23705%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Terry%20Zielke%20Zielke%20Design%20Project%20Gallery&amp;severity=high&amp;id=69558402db813ff03efee316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23667-cwe-79-improper-neutralization-of-i-6c7afbb3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23667%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Christopher%20Churchill%20custom-post-edit&amp;severity=high&amp;id=69558402db813ff03efee313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66144-cwe-862-missing-authorization-in-me-6a8938c1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66144%3A%20Missing%20Authorization%20in%20merkulove%20Worker%20for%20Elementor&amp;severity=medium&amp;id=6955807ddb813ff03efdb3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66145-cwe-862-missing-authorization-in-me-913f8fee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66145%3A%20Missing%20Authorization%20in%20merkulove%20Worker%20for%20WPBakery&amp;severity=medium&amp;id=6955807ddb813ff03efdb3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66146-cwe-862-missing-authorization-in-me-ee6451ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66146%3A%20Missing%20Authorization%20in%20merkulove%20Logger%20for%20Elementor&amp;severity=medium&amp;id=6955807ddb813ff03efdb3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66148-cwe-862-missing-authorization-in-me-204d435b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66148%3A%20Missing%20Authorization%20in%20merkulove%20Conformer%20for%20Elementor&amp;severity=medium&amp;id=6955807ddb813ff03efdb3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15394-code-injection-in-icms-6bc32797</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15394%3A%20Code%20Injection%20in%20iCMS&amp;severity=medium&amp;id=695575f2db813ff03efb6cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34467-cwe-667-improper-locking-in-fredtem-85d211dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34467%3A%20CWE-667%20Improper%20Locking%20in%20fredtempez%20ZwiiCMS&amp;severity=medium&amp;id=6955a05adb813ff03e045d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66149-cwe-862-missing-authorization-in-me-b17fe228</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66149%3A%20Missing%20Authorization%20in%20merkulove%20UnGrabber&amp;severity=medium&amp;id=6955a05adb813ff03e045d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66150-cwe-862-missing-authorization-in-me-78c0fb6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66150%3A%20Missing%20Authorization%20in%20merkulove%20Appender&amp;severity=medium&amp;id=6955a05adb813ff03e045d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66151-cwe-862-missing-authorization-in-me-b3b692d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66151%3A%20Missing%20Authorization%20in%20merkulove%20Countdowner%20for%20Elementor&amp;severity=medium&amp;id=6955a05adb813ff03e045d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66152-cwe-862-missing-authorization-in-me-4ccaa334</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66152%3A%20Missing%20Authorization%20in%20merkulove%20Criptopayer%20for%20Elementor&amp;severity=medium&amp;id=6955a05adb813ff03e045d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15393-code-injection-in-kohana-kodicms-e1c4a3c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15393%3A%20Code%20Injection%20in%20Kohana%20KodiCMS&amp;severity=medium&amp;id=6955a05adb813ff03e045d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66153-cwe-862-missing-authorization-in-me-8fe23e2d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66153%3A%20Missing%20Authorization%20in%20merkulove%20Headinger%20for%20Elementor&amp;severity=medium&amp;id=6955a05adb813ff03e045d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rogue-screenconnect-common-social-engineering-tact-98835fc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rogue%20ScreenConnect%3A%20Common%20Social%20Engineering%20Tactics%20Seen%20in%202025&amp;severity=medium&amp;id=6957a4e6db813ff03ee16364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15392-sql-injection-in-kohana-kodicms-40b92352</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15392%3A%20SQL%20Injection%20in%20Kohana%20KodiCMS&amp;severity=medium&amp;id=69556b65db813ff03ef8e00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15391-command-injection-in-d-link-dir-806-a1fb2a5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15391%3A%20Command%20Injection%20in%20D-Link%20DIR-806A&amp;severity=medium&amp;id=695560d9db813ff03ef63216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49355-cwe-79-improper-neutralization-of-i-8f87f78c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ikaes%20Accessibility%20Press&amp;severity=medium&amp;id=69555d55db813ff03ef562a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49337-cwe-79-improper-neutralization-of-i-3d4d9778</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49337%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20janhenckens%20Dashboard%20Beacon&amp;severity=medium&amp;id=69555d55db813ff03ef562a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59135-cwe-79-improper-neutralization-of-i-1e2cf793</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=medium&amp;id=69555d55db813ff03ef562ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62989-cwe-79-improper-neutralization-of-i-2b34650c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gora%20Tech%20Cooked&amp;severity=medium&amp;id=69555d55db813ff03ef562af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkspectre-browser-extension-campaigns-exposed-af-0d2585b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkSpectre%20Browser%20Extension%20Campaigns%20Exposed%20After%20Impacting%208.8%20Million%20Users%20Worldwide&amp;severity=high&amp;id=695559cedb813ff03ef4d8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-drain-39m-from-unleash-protocol-after-mult-085bde42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20drain%20%243.9M%20from%20Unleash%20Protocol%20after%20multisig%20hijack&amp;severity=high&amp;id=695559cedb813ff03ef4d8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-exploits-react2shell-flaw-to-breac-47841fbd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20botnet%20exploits%20React2Shell%20flaw%20to%20breach%20Next.js%20servers&amp;severity=high&amp;id=695559cedb813ff03ef4d8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23608-cwe-79-improper-neutralization-of-i-b2476142</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23608%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Omar%20Mohamed%20Mohamoud%20LIVE%20TV&amp;severity=high&amp;id=69555d55db813ff03ef562b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62088-cwe-918-server-side-request-forgery-eb9235e6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62088%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20extendons%20WordPress%20%26%20WooCommerce%20Scraper%20Plugin%2C%20Import%20Data%20from%20Any%20Site&amp;severity=medium&amp;id=69555a03db813ff03ef4dd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59138-cwe-918-server-side-request-forgery-367c4873</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59138%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Jthemes%20Genemy&amp;severity=medium&amp;id=69555a03db813ff03ef4dd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66154-cwe-862-missing-authorization-in-me-274a30f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66154%3A%20Missing%20Authorization%20in%20merkulove%20Couponer%20for%20Elementor&amp;severity=medium&amp;id=69555a03db813ff03ef4dd8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66155-cwe-862-missing-authorization-in-me-7a082f6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66155%3A%20Missing%20Authorization%20in%20merkulove%20Questionar%20for%20Elementor&amp;severity=medium&amp;id=69555a03db813ff03ef4dd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66156-cwe-862-missing-authorization-in-me-2c35169b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66156%3A%20Missing%20Authorization%20in%20merkulove%20Watcher%20for%20Elementor&amp;severity=medium&amp;id=69555a03db813ff03ef4dd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66157-cwe-862-missing-authorization-in-me-fa3c0c97</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66157%3A%20Missing%20Authorization%20in%20merkulove%20Sliper%20for%20Elementor&amp;severity=medium&amp;id=69555a03db813ff03ef4dd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66158-cwe-862-missing-authorization-in-me-1ff036e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66158%3A%20Missing%20Authorization%20in%20merkulove%20Gmaper%20for%20Elementor&amp;severity=medium&amp;id=69555650db813ff03ef42843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66159-cwe-862-missing-authorization-in-me-869c3d02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66159%3A%20Missing%20Authorization%20in%20merkulove%20Walker%20for%20Elementor&amp;severity=medium&amp;id=69555650db813ff03ef42846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66160-cwe-862-missing-authorization-in-me-3ef29876</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66160%3A%20Missing%20Authorization%20in%20merkulove%20Select%20Graphist%20for%20Elementor%09%20Graphist%20for%20Elementor&amp;severity=medium&amp;id=69555650db813ff03ef42849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63021-cwe-79-improper-neutralization-of-i-07278eea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63021%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codetipi%20Valenti%20Engine&amp;severity=medium&amp;id=69555650db813ff03ef42852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62874-cwe-862-missing-authorization-in-al-58848d62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62874%3A%20Missing%20Authorization%20in%20Alexander%20AnyComment&amp;severity=medium&amp;id=69555650db813ff03ef4284f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62099-cwe-862-missing-authorization-in-ap-a05285fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62099%3A%20Missing%20Authorization%20in%20approveme%20Signature%20Add-On%20for%20Gravity%20Forms&amp;severity=medium&amp;id=69555650db813ff03ef4284c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-leaks-1tb-of-stolen-asus-data-cbeaeca1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Leaks%201TB%20of%20Stolen%20ASUS%20Data&amp;severity=medium&amp;id=695552c7db813ff03ef38ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62101-cwe-352-cross-site-request-forgery--e283b53e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62101%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Omid%20Shamloo%20Pardakht%20Delkhah&amp;severity=medium&amp;id=695552dadb813ff03ef39011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63038-cwe-862-missing-authorization-in-no-03b772c7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63038%3A%20Missing%20Authorization%20in%20Northern%20Beaches%20Websites%20WP%20Custom%20Admin%20Interface&amp;severity=medium&amp;id=695552dadb813ff03ef3901d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62078-cwe-862-missing-authorization-in-fa-d0cb0aa8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62078%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20Easy%20Upload%20Files%20During%20Checkout&amp;severity=medium&amp;id=695552dadb813ff03ef3900b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49339-cwe-862-missing-authorization-in-di-67b9bb89</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49339%3A%20Missing%20Authorization%20in%20Digages%20Direct%20Payments%20WP&amp;severity=medium&amp;id=695552dadb813ff03ef39002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49340-cwe-497-exposure-of-sensitive-syste-4c7bbb15</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49340%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Digages%20Direct%20Payments%20WP&amp;severity=medium&amp;id=695552dadb813ff03ef39005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62083-cwe-497-exposure-of-sensitive-syste-0a947bc4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62083%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WP%20Messiah%20BoomDevs%20WordPress%20Coming%20Soon&amp;severity=medium&amp;id=695552dadb813ff03ef3900e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trust-wallet-chrome-extension-hack-drains-85m-via--cb4c99ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trust%20Wallet%20Chrome%20Extension%20Hack%20Drains%20%248.5M%20via%20Shai-Hulud%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=6955a5badb813ff03e056249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62113-cwe-352-cross-site-request-forgery--cc4c72e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62113%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20emendo_seb%20Co-marquage%20service-public.fr&amp;severity=medium&amp;id=695552dadb813ff03ef39014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62115-cwe-862-missing-authorization-in-th-741dfd42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62115%3A%20Missing%20Authorization%20in%20ThemeBoy%20Hide%20Plugins&amp;severity=medium&amp;id=695552dadb813ff03ef39017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62123-cwe-352-cross-site-request-forgery--a4c29170</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62123%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20inkthemes%20WP%20Gmail%20SMTP&amp;severity=medium&amp;id=695552dadb813ff03ef3901a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49352-cwe-639-authorization-bypass-throug-f24271a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49352%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20YoOhw%20Studio%20Order%20Cancellation%20%26%20Returns%20for%20WooCommerce&amp;severity=medium&amp;id=695552dadb813ff03ef39008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkspectre-browser-extension-campaigns-exposed-af-7a9aa111</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkSpectre%20Browser%20Extension%20Campaigns%20Exposed%20After%20Impacting%208.8%20Million%20Users%20Worldwide&amp;severity=medium&amp;id=69554f35db813ff03ef2ee0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62087-cwe-862-missing-authorization-in-we-47519fde</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62087%3A%20Missing%20Authorization%20in%20Web%20Builder%20143%20Sticky%20Notes%20for%20WP%20Dashboard&amp;severity=medium&amp;id=69554bc2db813ff03ef247f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63040-cwe-352-cross-site-request-forgery--cf7eb4f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63040%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saad%20Iqbal%20Post%20Snippets&amp;severity=medium&amp;id=69554bc2db813ff03ef2480b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49356-cwe-862-missing-authorization-in-my-f9f3b74e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49356%3A%20Missing%20Authorization%20in%20Mykola%20Lukin%20Orders%20Chat%20for%20WooCommerce&amp;severity=medium&amp;id=69554bc2db813ff03ef247f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63004-cwe-862-missing-authorization-in-sk-79f15563</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63004%3A%20Missing%20Authorization%20in%20Skynet%20Technologies%20USA%20LLC%20All%20in%20One%20Accessibility&amp;severity=medium&amp;id=69554bc2db813ff03ef24808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62130-cwe-862-missing-authorization-in-wp-6fca1b7d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62130%3A%20Missing%20Authorization%20in%20wpdiscover%20Accordion%20Slider%20Gallery&amp;severity=medium&amp;id=69554bc2db813ff03ef247f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62131-cwe-862-missing-authorization-in-st-fd5cae27</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62131%3A%20Missing%20Authorization%20in%20Strategy11%20Team%20Tasty%20Recipes%20Lite&amp;severity=medium&amp;id=69554bc2db813ff03ef247fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62132-cwe-862-missing-authorization-in-st-e1d606ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62132%3A%20Missing%20Authorization%20in%20Strategy11%20Team%20Tasty%20Recipes%20Lite&amp;severity=medium&amp;id=69554bc2db813ff03ef247ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62751-cwe-862-missing-authorization-in-ex-26e727a8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62751%3A%20Missing%20Authorization%20in%20extendthemes%20Vireo&amp;severity=medium&amp;id=69554bc2db813ff03ef24805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62133-cwe-352-cross-site-request-forgery--b7b8092c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62133%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20manidoraisamy%20FormFacade&amp;severity=medium&amp;id=69554bc2db813ff03ef24802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63014-cwe-352-cross-site-request-forgery--20991e06</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63014%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Serhii%20Pasyuk%20Gmedia%20Photo%20Gallery&amp;severity=medium&amp;id=6955483edb813ff03ef16423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62089-cwe-352-cross-site-request-forgery--9ef0262b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62089%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MERGADO%20Mergado%20Pack&amp;severity=medium&amp;id=6955483edb813ff03ef16420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62084-cwe-352-cross-site-request-forgery--f1f1889f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62084%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Imdad%20Next%20Web%20iNext%20Woo%20Pincode%20Checker&amp;severity=medium&amp;id=6955483edb813ff03ef1641d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62143-cwe-497-exposure-of-sensitive-syste-7525ddcf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62143%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20nicashmu%20Post%20Video%20Players&amp;severity=medium&amp;id=6955483edb813ff03ef1642c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62148-cwe-352-cross-site-request-forgery--fa6ccc15</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62148%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eugen%20Bobrowski%20Robots.txt%20rewrite&amp;severity=medium&amp;id=6955483edb813ff03ef1642f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62080-cwe-352-cross-site-request-forgery--d39198ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62080%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Channelize.io%20Team%20Live%20Shopping%20%26%20Shoppable%20Videos%20For%20WooCommerce&amp;severity=medium&amp;id=6955483edb813ff03ef16429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62150-cwe-862-missing-authorization-in-th-f41b7dae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62150%3A%20Missing%20Authorization%20in%20themesawesome%20History%20Timeline&amp;severity=medium&amp;id=6955483edb813ff03ef16432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62154-cwe-862-missing-authorization-in-re-b500927e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62154%3A%20Missing%20Authorization%20in%20recorp%20AI%20Content%20Writing%20Assistant%20(Content%20Writer%2C%20ChatGPT%2C%20Image%20Generator)%20All%20in%20One&amp;severity=medium&amp;id=695544badb813ff03ef0a0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62114-cwe-497-exposure-of-sensitive-syste-cbd7ccf1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62114%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20marcelotorres%20Download%20Media%20Library&amp;severity=medium&amp;id=695544badb813ff03ef0a09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62116-cwe-862-missing-authorization-in-qu-6fe2f561</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62116%3A%20Missing%20Authorization%20in%20quadlayers%20AI%20Copilot&amp;severity=medium&amp;id=695544badb813ff03ef0a0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62122-cwe-862-missing-authorization-in-so-bc691faa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62122%3A%20Missing%20Authorization%20in%20solwininfotech%20Trash%20Duplicate%20and%20301%20Redirect&amp;severity=medium&amp;id=695544badb813ff03ef0a0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62079-cwe-862-missing-authorization-in-da-aac35ccb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62079%3A%20Missing%20Authorization%20in%20Damian%20WP%20Export%20Categories%20%26%20Taxonomies&amp;severity=medium&amp;id=695544badb813ff03ef0a09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62126-cwe-201-insertion-of-sensitive-info-97ec1fe4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62126%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Razvan%20Stanga%20Varnish%2FNginx%20Proxy%20Caching&amp;severity=medium&amp;id=695544badb813ff03ef0a0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62747-cwe-862-missing-authorization-in-au-fb6d9152</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62747%3A%20Missing%20Authorization%20in%20Aum%20Watcharapon%20Featured%20Image%20Generator&amp;severity=medium&amp;id=695544badb813ff03ef0a0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15390-missing-authorization-in-phpgurukul-3f22c3e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15390%3A%20Missing%20Authorization%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=695544badb813ff03ef0a0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49334-cwe-639-authorization-bypass-throug-7ba91f31</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49334%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Eduardo%20Vill%C3%A3o%20MyD%20Delivery&amp;severity=medium&amp;id=695544badb813ff03ef0a0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59136-cwe-201-insertion-of-sensitive-info-302417cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59136%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Ef%C3%AD%20Bank%20Gerencianet%20Oficial&amp;severity=medium&amp;id=695544bbdb813ff03ef0a0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62129-cwe-862-missing-authorization-in-ma-e5a443c1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62129%3A%20Missing%20Authorization%20in%20Magnigenie%20RestroPress&amp;severity=medium&amp;id=695544bbdb813ff03ef0a0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62755-cwe-862-missing-authorization-in-gs-35d1ef43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62755%3A%20Missing%20Authorization%20in%20GS%20Plugins%20GS%20Portfolio%20for%20Envato&amp;severity=medium&amp;id=695544bbdb813ff03ef0a0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63031-cwe-862-missing-authorization-in-wp-d471de04</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63031%3A%20Missing%20Authorization%20in%20WP%20Grids%20EasyTest&amp;severity=medium&amp;id=69553db2db813ff03eef57de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62139-cwe-201-insertion-of-sensitive-info-8f4af0c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62139%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Vladimir%20Statsenko%20Terms%20descriptions&amp;severity=medium&amp;id=69553db2db813ff03eef57cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62141-cwe-862-missing-authorization-in-10-5817ecab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62141%3A%20Missing%20Authorization%20in%20Information%20Technology%20Wawp&amp;severity=medium&amp;id=69553db2db813ff03eef57cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63022-cwe-862-missing-authorization-in-il-175a2223</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63022%3A%20Missing%20Authorization%20in%20topdevs.net%20Simple%20Like%20Page&amp;severity=medium&amp;id=69553db2db813ff03eef57db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63016-cwe-862-missing-authorization-in-qu-27876358</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63016%3A%20Missing%20Authorization%20in%20quadlayers%20QuadLayers%20TikTok%20Feed&amp;severity=medium&amp;id=69553db2db813ff03eef57d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62145-cwe-862-missing-authorization-in-ne-64ee547d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62145%3A%20Missing%20Authorization%20in%20NewClarity%20DMCA%20Protection%20Badge&amp;severity=medium&amp;id=69553db2db813ff03eef57d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62147-cwe-862-missing-authorization-in-ni-505c3e00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62147%3A%20Missing%20Authorization%20in%20nikmelnik%20Realbig&amp;severity=medium&amp;id=69553db2db813ff03eef57d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62081-cwe-862-missing-authorization-in-ch-9e700cb1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62081%3A%20Missing%20Authorization%20in%20Channelize.io%20Team%20Live%20Shopping%20%26%20Shoppable%20Videos%20For%20WooCommerce&amp;severity=medium&amp;id=69553db2db813ff03eef57c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63053-cwe-639-authorization-bypass-throug-a6842a92</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63053%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69553db2db813ff03eef57e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63001-cwe-862-missing-authorization-in-ni-aea155ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63001%3A%20Missing%20Authorization%20in%20nicdark%20Hotel%20Booking&amp;severity=medium&amp;id=69553db2db813ff03eef57e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49349-cwe-862-missing-authorization-in-re-a8c7f477</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49349%3A%20Missing%20Authorization%20in%20Reuters%20News%20Agency%20Reuters%20Direct&amp;severity=medium&amp;id=69553a2edb813ff03eee80f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62098-cwe-862-missing-authorization-in-to-bde5c667</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62098%3A%20Missing%20Authorization%20in%20totalsoft%20Portfolio%20Gallery&amp;severity=medium&amp;id=69553a2edb813ff03eee80fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-spot-modified-shai-hulud-worm-testing--ce676bbe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Spot%20Modified%20Shai-Hulud%20Worm%20Testing%20Payload%20on%20npm%20Registry&amp;severity=high&amp;id=695536a7db813ff03eedc9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62091-cwe-862-missing-authorization-in-vo-d1af9184</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62091%3A%20Missing%20Authorization%20in%20Vollstart%20Serial%20Codes%20Generator%20and%20Validator%20with%20WooCommerce%20Support&amp;severity=medium&amp;id=69553327db813ff03eed15ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62108-cwe-862-missing-authorization-in-sa-a1859227</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62108%3A%20Missing%20Authorization%20in%20SaifuMak%20Add%20Custom%20Codes&amp;severity=medium&amp;id=69553327db813ff03eed15d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62888-cwe-862-missing-authorization-in-ma-98cb41ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62888%3A%20Missing%20Authorization%20in%20Marco%20Milesi%20WP%20Attachments&amp;severity=medium&amp;id=69553327db813ff03eed15d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62117-cwe-352-cross-site-request-forgery--8e4b073b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62117%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jayce53%20EasyIndex&amp;severity=medium&amp;id=69552c1edb813ff03eeb80d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62120-cwe-352-cross-site-request-forgery--f607646d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62120%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rick%20Beckman%20OpenHook&amp;severity=medium&amp;id=69552c1edb813ff03eeb80d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62134-cwe-352-cross-site-request-forgery--290dcac6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62134%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20A%20WP%20Life%20Contact%20Form%20Widget&amp;severity=medium&amp;id=69552c1edb813ff03eeb80da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62138-cwe-862-missing-authorization-in-ce-3bc81f11</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62138%3A%20Missing%20Authorization%20in%20cedcommerce%20WP%20Advanced%20PDF&amp;severity=medium&amp;id=69552c1edb813ff03eeb80dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62144-cwe-862-missing-authorization-in-mo-0e19e9aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62144%3A%20Missing%20Authorization%20in%20Mohammed%20Kaludi%20Core%20Web%20Vitals%20%26%20PageSpeed%20Booster&amp;severity=medium&amp;id=69552c1edb813ff03eeb80e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59003-cwe-201-insertion-of-sensitive-info-7bd636ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59003%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20inkthemescom%20ColorWay&amp;severity=medium&amp;id=69552c1edb813ff03eeb80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62119-cwe-79-improper-neutralization-of-i-86b5ce16</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62119%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ViitorCloud%20Technologies%20Pvt%20Ltd%20Add%20Featured%20Image%20Custom%20Link&amp;severity=medium&amp;id=69552c1edb813ff03eeb80e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62121-cwe-79-improper-neutralization-of-i-c53868b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62121%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Emu%20Logo%20Slider%20%2C%20Logo%20Carousel%20%2C%20Logo%20showcase%20%2C%20Client%20Logo&amp;severity=medium&amp;id=69552c1edb813ff03eeb80e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62124-cwe-79-improper-neutralization-of-i-98b9c41e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62124%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soli%20WP%20Post%20Signature&amp;severity=medium&amp;id=6955289adb813ff03eeaf248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ibm-warns-of-critical-api-connect-bug-allowing-rem-bb565a8e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20CVSS%209.8%20Flaw%20Found%20in%20IBM%20API%20Connect%20Authentication%20System&amp;severity=critical&amp;id=6955a5badb813ff03e05624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62750-cwe-79-improper-neutralization-of-i-650996f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62750%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Filipe%20Seabra%20WooCommerce%20Parcelas&amp;severity=medium&amp;id=6955289adb813ff03eeaf24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-spot-modified-shai-hulud-worm-testing--421fc379</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Spot%20Modified%20Shai-Hulud%20Worm%20Testing%20Payload%20on%20npm%20Registry&amp;severity=medium&amp;id=6955a5badb813ff03e05624f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62140-cwe-79-improper-neutralization-of-i-9bc58405</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62140%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plainware%20Locatoraid%20Store%20Locator&amp;severity=medium&amp;id=6955289adb813ff03eeaf24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62142-cwe-79-improper-neutralization-of-i-b83b606e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62142%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicashmu%20Post%20Video%20Players&amp;severity=medium&amp;id=69552525db813ff03eea3684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62149-cwe-79-improper-neutralization-of-i-0aa0931e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62149%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SaifuMak%20Add%20Custom%20Codes&amp;severity=medium&amp;id=69552525db813ff03eea3687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62095-cwe-79-improper-neutralization-of-i-620c571b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62095%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neilgee%20Bootstrap%20Modals&amp;severity=medium&amp;id=69552525db813ff03eea367b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2-us-cybersecurity-experts-guilty-of-extortion-sch-fcbe7d20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2%20US%20Cybersecurity%20Experts%20Guilty%20of%20Extortion%20Scheme%20for%20ALPHV%20Ransomware&amp;severity=medium&amp;id=69552512db813ff03eea350e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62096-cwe-79-improper-neutralization-of-i-2c423dda</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62096%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Maximum%20Products%20per%20User%20for%20WooCommerce&amp;severity=medium&amp;id=69552525db813ff03eea367e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62097-cwe-79-improper-neutralization-of-i-e7a7ac0b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62097%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seothemes%20SEO%20Slider&amp;severity=medium&amp;id=69552525db813ff03eea3681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63020-cwe-79-improper-neutralization-of-i-b03d3db9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wayne%20Allen%20Postie&amp;severity=medium&amp;id=69552526db813ff03eea368a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62111-cwe-79-improper-neutralization-of-i-b0a35392</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62111%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Extra%20Shortcodes&amp;severity=medium&amp;id=69552191db813ff03ee950df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62118-cwe-79-improper-neutralization-of-i-5b4ec2dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62118%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kcseopro%20AdWords%20Conversion%20Tracking%20Code&amp;severity=medium&amp;id=69552191db813ff03ee950e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62990-cwe-79-improper-neutralization-of-i-e77fb9e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62990%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20Beaver%20Builder&amp;severity=medium&amp;id=69552191db813ff03ee950ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62125-cwe-79-improper-neutralization-of-i-b57c70dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62125%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anshul%20Gangrade%20Custom%20Background%20Changer&amp;severity=medium&amp;id=69552191db813ff03ee950e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62743-cwe-79-improper-neutralization-of-i-4b12da5a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zookatron%20MyBookTable%20Bookstore&amp;severity=medium&amp;id=69552191db813ff03ee950e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62744-cwe-79-improper-neutralization-of-i-d9f25b5b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62744%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Steman%20Page%20Title%20Splitter&amp;severity=medium&amp;id=69552191db813ff03ee950eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62748-cwe-79-improper-neutralization-of-i-9317f75a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Genetech%20Products%20Web%20and%20WooCommerce%20Addons%20for%20WPBakery%20Builder&amp;severity=medium&amp;id=69554136db813ff03eefd38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49358-cwe-79-improper-neutralization-of-i-abb87ade</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ruhul%20Amin%20Content%20Fetcher&amp;severity=medium&amp;id=69554136db813ff03eefd38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62749-cwe-79-improper-neutralization-of-i-a3888bd5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bainternet%20User%20Specific%20Content&amp;severity=medium&amp;id=69554136db813ff03eefd392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-supply-chain-attack-led-to-85-million-t-99716b1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20Supply%20Chain%20Attack%20Led%20to%20%248.5%20Million%20Trust%20Wallet%20Heist&amp;severity=low&amp;id=69551373db813ff03ee619cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62752-cwe-79-improper-neutralization-of-i-827f401c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kalender.digital%20Calendar.online%20%2F%20Kalender.digital&amp;severity=medium&amp;id=69551396db813ff03ee6224b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62135-cwe-79-improper-neutralization-of-i-00d7c0bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20landwire%20Responsive%20Block%20Control&amp;severity=medium&amp;id=69551396db813ff03ee62248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62756-cwe-79-improper-neutralization-of-i-cfa6a678</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62756%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lvaudore%20The%20Moneytizer&amp;severity=medium&amp;id=69551396db813ff03ee6224e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62757-cwe-79-improper-neutralization-of-i-347986b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62757%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebMan%20Design%20%7C%20Oliver%20Juhas%20WebMan%20Amplifier&amp;severity=medium&amp;id=69551023db813ff03ee548e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62991-cwe-79-improper-neutralization-of-i-4f8e3893</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Minamaze&amp;severity=medium&amp;id=69551023db813ff03ee548e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63032-cwe-79-improper-neutralization-of-i-54998eb7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Consulting&amp;severity=medium&amp;id=69551023db813ff03ee548ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disney-will-pay-10-million-to-settle-childrens-dat-837290e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disney%20will%20pay%20%2410%20million%20to%20settle%20children&apos;s%20data%20privacy%20lawsuit&amp;severity=high&amp;id=69550ffbdb813ff03ee545c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ibm-warns-of-critical-api-connect-auth-bypass-vuln-46286c5b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IBM%20warns%20of%20critical%20API%20Connect%20auth%20bypass%20vulnerability&amp;severity=critical&amp;id=69550ffbdb813ff03ee545bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/30000-korean-air-employee-records-stolen-as-cl0p-l-6a12adba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=30%2C000%20Korean%20Air%20Employee%20Records%20Stolen%20as%20Cl0p%20Leaks%20450gb%20of%20Data%20Online&amp;severity=medium&amp;id=69550c77db813ff03ee3e18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-space-agency-confirms-breach-after-hacker-0604158e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Space%20Agency%20Confirms%20Breach%20After%20Hacker%20Offers%20to%20Sell%20Data&amp;severity=medium&amp;id=6954f04bdb813ff03edbd02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15389-cwe-78-improper-neutralization-of-s-06a6e83f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15389%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20QNO%20Technology%20VPN%20Firewall&amp;severity=high&amp;id=6954ecd6db813ff03edabf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-treasury-lifts-sanctions-on-three-individuals-l-b477d519</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Treasury%20Lifts%20Sanctions%20on%20Three%20Individuals%20Linked%20to%20Intellexa%20and%20Predator%20Spyware&amp;severity=high&amp;id=6954e94edb813ff03ed9a5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49028-cwe-352-cross-site-request-forgery--3021ae32</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49028%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Zoho%20Mail%20Zoho%20ZeptoMail&amp;severity=high&amp;id=6954e963db813ff03ed9a74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15388-cwe-78-improper-neutralization-of-s-1b98deb7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15388%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20QNO%20Technology%20VPN%20Firewall&amp;severity=high&amp;id=6954e963db813ff03ed9a746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62136-cwe-79-improper-neutralization-of-i-0e16f771</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62136%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Melos&amp;severity=medium&amp;id=6954e963db813ff03ed9a74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62992-cwe-352-cross-site-request-forgery--a39e955a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62992%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20everestthemes%20Everest%20Backup&amp;severity=medium&amp;id=6954e963db813ff03ed9a751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62137-cwe-79-improper-neutralization-of-i-569165d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62137%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shuttlethemes%20Shuttle&amp;severity=medium&amp;id=6955a05adb813ff03e045d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62758-cwe-79-improper-neutralization-of-i-103b1b40</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62758%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Funnelforms%20Funnelforms%20Free&amp;severity=medium&amp;id=6955a05adb813ff03e045dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62759-cwe-79-improper-neutralization-of-i-a4b646d8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62759%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Justin%20Tadlock%20Series&amp;severity=medium&amp;id=6955a05adb813ff03e045dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62760-cwe-79-improper-neutralization-of-i-cffb444d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62760%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddyDev%20BuddyPress%20Activity%20Shortcode&amp;severity=medium&amp;id=6955a05adb813ff03e045dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63000-cwe-79-improper-neutralization-of-i-e984071f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63000%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpforchurch%20Sermon%20Manager&amp;severity=medium&amp;id=6955a05adb813ff03e045dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62146-cwe-79-improper-neutralization-of-i-72b6b7a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62146%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maksym%20Marko%20MX%20Time%20Zone%20Clocks&amp;severity=medium&amp;id=6954e5cedb813ff03ed8c526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63005-cwe-79-improper-neutralization-of-i-a40c43d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63005%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tomas%20WordPress%20Tooltips&amp;severity=medium&amp;id=6954e5cfdb813ff03ed8c52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62761-cwe-79-improper-neutralization-of-i-89d84afb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62761%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BasePress%20Knowledge%20Base%20documentation%20%26%20wiki%20plugin%20%E2%80%93%20BasePress&amp;severity=medium&amp;id=6954e5cfdb813ff03ed8c529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15387-cwe-331-insufficient-entropy-in-qno-d5d780dc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15387%3A%20CWE-331%20Insufficient%20Entropy%20in%20QNO%20Technology%20VPN%20Firewall&amp;severity=high&amp;id=6954e24adb813ff03ed79303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15017-cwe-489-active-debug-code-in-moxa-n-8edd86b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15017%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20Moxa%20NPort%205000AI-M12%20Series&amp;severity=high&amp;id=6954d7bedb813ff03ed404d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2026-cwe-170-improper-null-termination-in-2185ebc9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2026%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20Moxa%20NPort%206100-G2%2F6200-G2%20Series&amp;severity=high&amp;id=6954d43bdb813ff03ed2b252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1977-cwe-250-execution-with-unnecessary-p-8abad923</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1977%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Moxa%20NPort%206100-G2%2F6200-G2%20Series&amp;severity=high&amp;id=6954d0b7db813ff03ed1d613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14783-cwe-640-weak-password-recovery-mech-3c628701</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14783%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=6954c62bdb813ff03ece1113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14434-cwe-862-missing-authorization-in-ul-57a94541</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14434%3A%20CWE-862%20Missing%20Authorization%20in%20Ultimate%20Post%20Kit%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6954bf22db813ff03ecb3d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13029-cwe-862-missing-authorization-in-kn-d68d7e05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13029%3A%20CWE-862%20Missing%20Authorization%20in%20Knowband%20Mobile%20App%20Builder&amp;severity=high&amp;id=6954bf22db813ff03ecb3d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49342-cwe-352-cross-site-request-forgery--98f229ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20merzedes%20Custom%20Style&amp;severity=high&amp;id=6954bb9edb813ff03eca28b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49353-cwe-352-cross-site-request-forgery--ca82064b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49353%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Marcin%20Kijak%20Noindex%20by%20Path&amp;severity=high&amp;id=6954b81adb813ff03ec990bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68885-cwe-352-cross-site-request-forgery--a88909d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68885%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20page-carbajal%20Custom%20Post%20Status&amp;severity=high&amp;id=6954b81adb813ff03ec990c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49354-cwe-352-cross-site-request-forgery--6349a428</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49354%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mindstien%20Technologies%20Recent%20Posts%20From%20Each%20Category&amp;severity=high&amp;id=6954b81adb813ff03ec990c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49343-cwe-352-cross-site-request-forgery--3a693984</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49343%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20socialprofilr%20Social%20Profilr&amp;severity=high&amp;id=6954b81adb813ff03ec990c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49344-cwe-352-cross-site-request-forgery--7d3723af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49344%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20reneade%20SensitiveTagCloud&amp;severity=high&amp;id=6954b81adb813ff03ec990c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49345-cwe-352-cross-site-request-forgery--512892cd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49345%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mg12%20WP-EasyArchives&amp;severity=high&amp;id=6954b496db813ff03ec88a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-treasury-lifts-sanctions-on-three-individuals-l-1386f087</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Treasury%20Lifts%20Sanctions%20on%20Three%20Individuals%20Linked%20to%20Intellexa%20and%20Predator%20Spyware&amp;severity=low&amp;id=6955a5badb813ff03e056252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15375-deserialization-in-eyoucms-252aafab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15375%3A%20Deserialization%20in%20EyouCMS&amp;severity=medium&amp;id=6954b113db813ff03ec76317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49346-cwe-352-cross-site-request-forgery--3e5e70f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49346%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20peterwsterling%20Simple%20Archive%20Generator&amp;severity=high&amp;id=69556460db813ff03ef78082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59137-cwe-352-cross-site-request-forgery--b5d86e7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59137%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=high&amp;id=69556460db813ff03ef78085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15374-cross-site-scripting-in-eyoucms-25a6e41b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15374%3A%20Cross%20Site%20Scripting%20in%20EyouCMS&amp;severity=medium&amp;id=6955a05adb813ff03e045dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15373-server-side-request-forgery-in-eyou-f3bf806f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15373%3A%20Server-Side%20Request%20Forgery%20in%20EyouCMS&amp;severity=medium&amp;id=6954a302db813ff03ec15f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15223-cross-site-scripting-in-philipinho--e4573780</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15223%3A%20Cross%20Site%20Scripting%20in%20Philipinho%20Simple-PHP-Blog&amp;severity=medium&amp;id=69548debdb813ff03e97609a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15372-cross-site-scripting-in-youlaitech--27a6541b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15372%3A%20Cross%20Site%20Scripting%20in%20youlaitech%20vue3-element-admin&amp;severity=medium&amp;id=69548debdb813ff03e9760a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68131-cwe-212-improper-removal-of-sensiti-44fcde2d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68131%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20agronholm%20cbor2&amp;severity=medium&amp;id=6954835edb813ff03e856042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15371-hard-coded-credentials-in-tenda-i24-b8cfa17a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15371%3A%20Hard-coded%20Credentials%20in%20Tenda%20i24&amp;severity=high&amp;id=69547c56db813ff03e760a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11964-cwe-787-out-of-bounds-write-in-the--73861582</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11964%3A%20CWE-787%20Out-of-bounds%20Write%20in%20The%20Tcpdump%20Group%20libpcap&amp;severity=low&amp;id=69547c56db813ff03e760a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11961-cwe-126-buffer-over-read-in-the-tcp-6c702504</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11961%3A%20CWE-126%20Buffer%20Over-read%20in%20The%20Tcpdump%20Group%20libpcap&amp;severity=low&amp;id=69547c56db813ff03e760a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-31-9c886a19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-31&amp;severity=medium&amp;id=6955bc30db813ff03e0aca04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64699-na-f1e1679d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64699%3A%20n%2Fa&amp;severity=high&amp;id=6955483edb813ff03ef16426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61037-na-aa254d3a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61037%3A%20n%2Fa&amp;severity=high&amp;id=695544badb813ff03ef0a097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-errtraffic-service-enables-clickfix-attacks-vi-eb9c3eff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ErrTraffic%20service%20enables%20ClickFix%20attacks%20via%20fake%20browser%20glitches&amp;severity=high&amp;id=69546032db813ff03e4e3dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59131-cwe-352-cross-site-request-forgery--25075ae0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59131%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hoernerfranz%20WP-CalDav2ICS&amp;severity=high&amp;id=69545cb1db813ff03e4d2622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15114-exposure-of-file-descriptor-to-unin-a925b5ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15114%3A%20CWE-403%20Exposure%20of%20file%20descriptor%20to%20unintended%20control%20sphere%20(&apos;file%20descriptor%20leak&apos;)%20in%20Ksenia%20Security%20S.p.A.%20lares&amp;severity=critical&amp;id=6954592fdb813ff03e385603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15113-plaintext-storage-of-a-password-in--a52c6363</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15113%3A%20CWE-256%20Plaintext%20storage%20of%20a%20password%20in%20Ksenia%20Security%20S.p.A.%20lares&amp;severity=critical&amp;id=6954592edb813ff03e38559a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15112-url-redirection-to-untrusted-site-o-ef02bf18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15112%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20Ksenia%20Security%20S.p.A.%20lares&amp;severity=medium&amp;id=6954592edb813ff03e385594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15111-use-of-hard-coded-credentials-in-ks-0c8678d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15111%3A%20CWE-259%20Use%20of%20hard-coded%20password%20in%20Ksenia%20Security%20S.p.A.%20lares&amp;severity=critical&amp;id=6954592edb813ff03e38558e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58338-incorrect-privilege-assignment-in-a-f7694504</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58338%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ateme%20Flamingo%20XL&amp;severity=high&amp;id=6954592edb813ff03e385588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58337-missing-authorization-in-the-akuvox-a564647c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58337%3A%20Missing%20Authorization%20in%20The%20Akuvox%20Company%20Akuvox%20Smart%20Doorphone&amp;severity=high&amp;id=6954592edb813ff03e385582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58336-missing-authentication-for-critical-bebc812d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58336%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20The%20Akuvox%20Company%20Akuvox%20Smart%20Doorphone&amp;severity=high&amp;id=6954592edb813ff03e38557d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58315-unquoted-search-path-or-element-in--1de85834</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58315%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Tosibox%20Oy%20Tosibox%20Key%20Service&amp;severity=high&amp;id=6954592edb813ff03e385577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54327-missing-authorization-in-tinycontro-2d7878f2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54327%3A%20Missing%20Authorization%20in%20Tinycontrol%20LAN%20Controller&amp;severity=critical&amp;id=6954592edb813ff03e385571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54163-improper-neutralization-of-special--5582e714</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54163%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NLB%20Banka%20AD%20Skopje%20NLB%20mKlik%20Makedonija&amp;severity=high&amp;id=6954592edb813ff03e38556a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53983-use-of-hard-coded-credentials-in-at-6648bf40</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53983%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Ateme%20Anevia%20Flamingo%20XL%2FXS&amp;severity=critical&amp;id=6954592edb813ff03e385562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62753-cwe-98-improper-control-of-filename-8e384849</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62753%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20MadrasThemes%20MAS%20Videos&amp;severity=high&amp;id=695455a9db813ff03e324076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/csa-issues-alert-on-critical-smartermail-bug-allow-cc967373</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CSA%20Issues%20Alert%20on%20Critical%20SmarterMail%20Bug%20Allowing%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69545221db813ff03e2d7848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15360-unrestricted-upload-in-newbee-mall--699c458f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15360%3A%20Unrestricted%20Upload%20in%20newbee-mall-plus&amp;severity=medium&amp;id=695450a0db813ff03e2bda58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rmm-abuse-in-a-crypto-wallet-distribution-campaign-d22731d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RMM%20Abuse%20in%20a%20Crypto%20Wallet%20Distribution%20Campaign&amp;severity=medium&amp;id=6954513bdb813ff03e2c9fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61594-cwe-212-improper-removal-of-sensiti-3dd18d0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61594%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ruby%20uri&amp;severity=low&amp;id=695450a0db813ff03e2bda74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15357-command-injection-in-d-link-di-7400-64a89479</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15357%3A%20Command%20Injection%20in%20D-Link%20DI-7400G%2B&amp;severity=medium&amp;id=695450a0db813ff03e2bda6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15356-buffer-overflow-in-tenda-ac20-636a2f51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15356%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=695450a0db813ff03e2bda65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15354-sql-injection-in-itsourcecode-socie-340a17be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15354%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=695450a0db813ff03e2bda5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15353-sql-injection-in-itsourcecode-socie-7dfac788</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15353%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=695450a1db813ff03e2be01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69210-cwe-79-improper-neutralization-of-i-1a9d8f07</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69210%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NeoRazorX%20facturascripts&amp;severity=low&amp;id=695450a1db813ff03e2be029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69257-cwe-269-improper-privilege-manageme-c5fbd534</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69257%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20AsfhtgkDavid%20theshit&amp;severity=medium&amp;id=695450a2db813ff03e2be05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15264-server-side-request-forgery-in-feeh-0a3813c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15264%3A%20Server-Side%20Request%20Forgery%20in%20FeehiCMS&amp;severity=medium&amp;id=695450a2db813ff03e2be06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15263-sql-injection-in-biggidroid-simple--9e020cc4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15263%3A%20SQL%20Injection%20in%20BiggiDroid%20Simple%20PHP%20CMS&amp;severity=medium&amp;id=695450a2db813ff03e2be067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cybersecurity-experts-plead-guilty-to-blackcat--106a8c26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20cybersecurity%20experts%20plead%20guilty%20to%20BlackCat%20ransomware%20attacks&amp;severity=high&amp;id=69544fcedb813ff03e2aff49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zoom-stealer-browser-extensions-harvest-corporate--24a26564</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zoom%20Stealer%20browser%20extensions%20harvest%20corporate%20meeting%20intelligence&amp;severity=high&amp;id=69544fcedb813ff03e2aff59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-space-agency-confirms-breach-of-external--64ace173</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Space%20Agency%20confirms%20breach%20of%20%22external%20servers%22&amp;severity=high&amp;id=69544fcedb813ff03e2aff3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15262-unrestricted-upload-in-biggidroid-s-197472c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15262%3A%20Unrestricted%20Upload%20in%20BiggiDroid%20Simple%20PHP%20CMS&amp;severity=medium&amp;id=695450a2db813ff03e2be061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15258-open-redirect-in-edimax-br-6208ac-0c363eb9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15258%3A%20Open%20Redirect%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=695450a4db813ff03e2be13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15257-command-injection-in-edimax-br-6208-05538cbd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15257%3A%20Command%20Injection%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=695450a4db813ff03e2be150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emeditor-homepage-download-button-served-malware-f-8bb957e6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EmEditor%20Homepage%20Download%20Button%20Served%20Malware%20for%204%20Days&amp;severity=medium&amp;id=69544fc0db813ff03e2ae6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52835-cwe-352-cross-site-request-forgery--2b72c46b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52835%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ConoHa%20by%20GMO%20WING%20WordPress%20Migrator&amp;severity=critical&amp;id=695450a2db813ff03e2be072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66103-cwe-79-improper-neutralization-of-i-4b1cbf27</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66103%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revmakx%20WPCal.io&amp;severity=medium&amp;id=695450a2db813ff03e2be078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15256-command-injection-in-edimax-br-6208-5b03bee1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15256%3A%20Command%20Injection%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=695450a4db813ff03e2be132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/csa-issues-alert-on-critical-smartermail-bug-allow-6a5b9593</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CSA%20Issues%20Alert%20on%20Critical%20SmarterMail%20Bug%20Allowing%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69544e28b932a5a22ffaf4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62128-cwe-862-missing-authorization-in-si-428acc57</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62128%3A%20Missing%20Authorization%20in%20SiteLock%20SiteLock%20Security%20%E2%80%93%20WP%20Hardening%2C%20Login%20Security%20%26%20Malware%20Scans&amp;severity=medium&amp;id=695450a2db813ff03e2be075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62112-cwe-352-cross-site-request-forgery--0fc85d30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62112%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Merv%20Barrett%20Import%20into%20Easy%20Property%20Listings&amp;severity=medium&amp;id=695450a1db813ff03e2be038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66094-cwe-79-improper-neutralization-of-i-46c1141e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dmccan%20Yada%20Wiki&amp;severity=medium&amp;id=695450a1db813ff03e2be03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62746-cwe-79-improper-neutralization-of-i-67d31b3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeFlavors%20Featured%20Video%20for%20WordPress%20%E2%80%93%20VideographyWP&amp;severity=medium&amp;id=695450a4db813ff03e2be15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66080-cwe-862-missing-authorization-in-wp-862fff27</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66080%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WP%20Cookie%20Notice%20for%20GDPR%2C%20CCPA%20%26%20ePrivacy%20Consent&amp;severity=medium&amp;id=695450a1db813ff03e2be03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63027-cwe-79-improper-neutralization-of-i-a7054129</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63027%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webcreations907%20WBC907%20Core&amp;severity=medium&amp;id=695450a1db813ff03e2be032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15255-stack-based-buffer-overflow-in-tend-1583de47</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15255%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W6-S&amp;severity=critical&amp;id=695450a4db813ff03e2be12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64190-cwe-79-improper-neutralization-of-i-81420c60</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64190%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=medium&amp;id=695450a1db813ff03e2be035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15254-os-command-injection-in-tenda-w6-s-41775fb0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15254%3A%20OS%20Command%20Injection%20in%20Tenda%20W6-S&amp;severity=medium&amp;id=695450aadb813ff03e2be6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeymyte-aka-mustang-panda-deploys-toneshell-back-964db2ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HoneyMyte%20(aka%20Mustang%20Panda)%20Deploys%20ToneShell%20Backdoor%20in%20New%20Attacks%20in%20South%20and%20East%20Asia&amp;severity=medium&amp;id=69544fcedb813ff03e2aff9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15253-stack-based-buffer-overflow-in-tend-640eb944</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15253%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450a8db813ff03e2be5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15252-stack-based-buffer-overflow-in-tend-4997a533</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15252%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450acdb813ff03e2bebb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15251-xml-external-entity-reference-in-be-6f953def</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15251%3A%20XML%20External%20Entity%20Reference%20in%20beecue%20FastBee&amp;severity=medium&amp;id=695450acdb813ff03e2bebc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15250-code-injection-in-08cms-novel-syste-a3583dc0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15250%3A%20Code%20Injection%20in%2008CMS%20Novel%20System&amp;severity=medium&amp;id=695450acdb813ff03e2bebe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lithuanian-suspect-arrested-over-kmsauto-malware-t-cf50bf54</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lithuanian%20suspect%20arrested%20over%20KMSAuto%20malware%20that%20infected%202.8M%20systems&amp;severity=medium&amp;id=69544fcedb813ff03e2affba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-ai-generated-images-to-get-refunds-schneier--5d3434fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20AI-Generated%20Images%20to%20Get%20Refunds%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=69544fcedb813ff03e2affbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15249-cross-site-scripting-in-zhujunliang-2e8fa958</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15249%3A%20Cross%20Site%20Scripting%20in%20zhujunliang3%20work_platform&amp;severity=medium&amp;id=695450acdb813ff03e2bebde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15248-cross-site-scripting-in-sunhailin12-c69da681</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15248%3A%20Cross%20Site%20Scripting%20in%20sunhailin12315%20product-review%20%E5%95%86%E5%93%81%E8%AF%84%E4%BB%B7%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=695450aedb813ff03e2bec41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54290-b533dfb3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54290&amp;severity=null&amp;id=695450acdb813ff03e2bebf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14426-cwe-862-missing-authorization-in-wp-5b787ec7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14426%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Strong%20Testimonials&amp;severity=medium&amp;id=695450aedb813ff03e2bec24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54256-52aaefa1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54256&amp;severity=null&amp;id=695450acdb813ff03e2bebf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54212-97d75d3d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54212&amp;severity=null&amp;id=695450addb813ff03e2bec03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15247-heap-based-buffer-overflow-in-gmg13-4120c6a2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15247%3A%20Heap-based%20Buffer%20Overflow%20in%20gmg137%20snap7-rs&amp;severity=medium&amp;id=695450aedb813ff03e2bec3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emeditor-homepage-download-button-served-malware-f-c0e21a85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EmEditor%20Homepage%20Download%20Button%20Served%20Malware%20for%204%20Days&amp;severity=medium&amp;id=69544fcedb813ff03e2aff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15246-deserialization-in-aizuda-snail-job-fa75406e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15246%3A%20Deserialization%20in%20aizuda%20snail-job&amp;severity=medium&amp;id=695450aedb813ff03e2bec37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14509-cwe-94-improper-control-of-generati-132e9f08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14509%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20villatheme%20Lucky%20Wheel%20for%20WooCommerce%20%E2%80%93%20Spin%20a%20Sale&amp;severity=high&amp;id=695450aedb813ff03e2bec2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15245-path-traversal-in-d-link-dcs-850l-3cefefd3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15245%3A%20Path%20Traversal%20in%20D-Link%20DCS-850L&amp;severity=medium&amp;id=695450aedb813ff03e2bec30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69093-missing-authorization-in-wpdesk-sho-245812d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69093%3A%20Missing%20Authorization%20in%20wpdesk%20ShopMagic&amp;severity=medium&amp;id=695450b1db813ff03e2bedf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69092-improper-neutralization-of-input-du-bb113c2d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=medium&amp;id=695450b1db813ff03e2bedf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69091-missing-authorization-in-kraft-plug-9ffa6e69</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69091%3A%20Missing%20Authorization%20in%20Kraft%20Plugins%20Demo%20Importer%20Plus&amp;severity=medium&amp;id=695450b1db813ff03e2bedf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69089-improper-neutralization-of-input-du-d5f69fa3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69089%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20autolistings%20Auto%20Listings&amp;severity=medium&amp;id=695450b1db813ff03e2beded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69088-improper-neutralization-of-input-du-0e83a9a1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vidish%20Combo%20Offers%20WooCommerce&amp;severity=medium&amp;id=695450b1db813ff03e2bedea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69034-improper-control-of-filename-for-in-8e0f4c1a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69034%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Lekker&amp;severity=high&amp;id=695450b1db813ff03e2bede7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69033-improper-neutralization-of-input-du-ef201e11</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20A%20WP%20Life%20Blog%20Filter&amp;severity=medium&amp;id=695450b1db813ff03e2bede4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69032-authorization-bypass-through-user-c-2717c1c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69032%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20FiveStar&amp;severity=medium&amp;id=695450b0db813ff03e2bedd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69031-missing-authorization-in-skywarrior-dd6f718f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69031%3A%20Missing%20Authorization%20in%20Skywarrior%20Arcane&amp;severity=medium&amp;id=695450b0db813ff03e2bedcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69030-authorization-bypass-through-user-c-962b0239</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69030%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Backpack%20Traveler&amp;severity=medium&amp;id=695450b0db813ff03e2bedca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69029-authorization-bypass-through-user-c-6e658217</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69029%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Select-Themes%20Struktur&amp;severity=medium&amp;id=695450b0db813ff03e2bedc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69028-missing-authorization-in-boldgrid-w-28551582</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69028%3A%20Missing%20Authorization%20in%20BoldGrid%20weForms&amp;severity=medium&amp;id=695450b0db813ff03e2bedc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69027-missing-authorization-in-tychesoftw-6a6d812e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69027%3A%20Missing%20Authorization%20in%20tychesoftwares%20Product%20Delivery%20Date%20for%20WooCommerce%20%E2%80%93%20Lite&amp;severity=medium&amp;id=695450b0db813ff03e2bedc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69026-exposure-of-sensitive-system-inform-02a01682</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69026%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Roxnor%20PopupKit&amp;severity=medium&amp;id=695450b0db813ff03e2bedbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69025-exposure-of-sensitive-system-inform-c5da4af7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69025%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Aethonic%20Poptics&amp;severity=medium&amp;id=695450b0db813ff03e2bedbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69024-missing-authorization-in-bizswoop-b-ced31511</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69024%3A%20Missing%20Authorization%20in%20bizswoop%20BizPrint&amp;severity=medium&amp;id=695450b0db813ff03e2bedb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69023-missing-authorization-in-marketing--0592e86d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69023%3A%20Missing%20Authorization%20in%20Marketing%20Fire%20Discussion%20Board&amp;severity=medium&amp;id=695450b0db813ff03e2bedb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69022-missing-authorization-in-weblizar-w-f91a4c03</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69022%3A%20Missing%20Authorization%20in%20Weblizar%20-%20WordPress%20Themes%20%26%20Plugin%20HR%20Management%20Lite&amp;severity=medium&amp;id=695450afdb813ff03e2bec74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69021-cross-site-request-forgery-csrf-in--4c2a67c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69021%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Popup%20box&amp;severity=medium&amp;id=695450afdb813ff03e2bec71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69020-improper-neutralization-of-input-du-d3a1bf4f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tribulant%20Software%20Newsletters&amp;severity=medium&amp;id=695450acdb813ff03e2bebeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69018-improper-neutralization-of-input-du-e90cd5b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shamalli%20Web%20Directory%20Free&amp;severity=medium&amp;id=695450acdb813ff03e2bebc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69017-improper-neutralization-of-input-du-6a8f1e84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69017%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Magnigenie%20RestroPress&amp;severity=medium&amp;id=695450acdb813ff03e2bebdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69016-missing-authorization-in-averta-sho-b64e0b83</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69016%3A%20Missing%20Authorization%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=695450acdb813ff03e2bebd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69015-missing-authorization-in-automattic-1f78b122</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69015%3A%20Missing%20Authorization%20in%20Automattic%20Crowdsignal%20Forms&amp;severity=low&amp;id=695450acdb813ff03e2bebcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69013-missing-authorization-in-jetmonster-cb458efb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69013%3A%20Missing%20Authorization%20in%20jetmonsters%20Stratum&amp;severity=medium&amp;id=695450addb813ff03e2bec0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69012-missing-authorization-in-stephen-ha-16dff902</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69012%3A%20Missing%20Authorization%20in%20Stephen%20Harris%20Event%20Organiser&amp;severity=medium&amp;id=695450acdb813ff03e2bebe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69010-missing-authorization-in-themebeez--a3c01909</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69010%3A%20Missing%20Authorization%20in%20themebeez%20Themebeez%20Toolkit&amp;severity=medium&amp;id=695450addb813ff03e2bec00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69009-missing-authorization-in-kamleshyad-69c0c703</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69009%3A%20Missing%20Authorization%20in%20kamleshyadav%20Medicalequipment&amp;severity=medium&amp;id=695450addb813ff03e2bec08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69008-improper-neutralization-of-input-du-143372f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69008%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Inboxify%20Inboxify%20Sign%20Up%20Form&amp;severity=medium&amp;id=695450addb813ff03e2bec05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69007-improper-neutralization-of-input-du-ffab4867</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69007%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Popping%20Sidebars%20and%20Widgets%20Light&amp;severity=medium&amp;id=695450acdb813ff03e2beba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69006-improper-neutralization-of-input-du-b6aa829a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atte%20Moisio%20AM%20Events&amp;severity=medium&amp;id=695450acdb813ff03e2bebbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68998-cross-site-request-forgery-csrf-in--452db036</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68998%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Heateor%20Support%20Heateor%20Social%20Login&amp;severity=medium&amp;id=695450acdb813ff03e2beb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68997-authorization-bypass-through-user-c-30f73078</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68997%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20AdvancedCoding%20wpDiscuz&amp;severity=medium&amp;id=695450abdb813ff03e2beb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68996-improper-control-of-filename-for-in-e0f709c1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68996%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebCodingPlace%20Responsive%20Posts%20Carousel%20Pro&amp;severity=high&amp;id=695450abdb813ff03e2beb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68995-missing-authorization-in-gal-dubins-ae0190c9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68995%3A%20Missing%20Authorization%20in%20Premio%20My%20Sticky%20Elements&amp;severity=medium&amp;id=695450aadb813ff03e2be6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68994-missing-authorization-in-xforwoocom-c40b8f2d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68994%3A%20Missing%20Authorization%20in%20XforWooCommerce%20Product%20Loops%20for%20WooCommerce&amp;severity=medium&amp;id=695450a9db813ff03e2be64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68993-missing-authorization-in-xforwoocom-e57b2278</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68993%3A%20Missing%20Authorization%20in%20XforWooCommerce%20Share%2C%20Print%20and%20PDF%20Products%20for%20WooCommerce&amp;severity=medium&amp;id=695450a9db813ff03e2be641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68992-improper-neutralization-of-input-du-6b4cfd8c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68992%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xenioushk%20BWL%20Knowledge%20Base%20Manager&amp;severity=medium&amp;id=695450a9db813ff03e2be63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68991-improper-neutralization-of-input-du-44839d6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xenioushk%20BWL%20Pro%20Voting%20Manager&amp;severity=medium&amp;id=695450a1db813ff03e2be026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68990-improper-neutralization-of-special--b3c6bf13</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68990%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xenioushk%20BWL%20Pro%20Voting%20Manager&amp;severity=high&amp;id=695450a0db813ff03e2bda55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68989-insertion-of-sensitive-information--8d7b877b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68989%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Renzo%20Johnson%20contact-form-7-mailchimp-extension&amp;severity=medium&amp;id=695450a0db813ff03e2bda52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68988-exposure-of-sensitive-system-inform-432d43b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68988%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20o2oe%20E-Invoice%20App%20Malaysia&amp;severity=medium&amp;id=695450a0db813ff03e2bda4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68987-improper-control-of-filename-for-in-07595cba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68987%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Cinerama&amp;severity=high&amp;id=695450a0db813ff03e2bda4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68985-improper-control-of-filename-for-in-34ad655a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68985%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Aora&amp;severity=high&amp;id=695450afdb813ff03e2bec6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68984-improper-control-of-filename-for-in-e7167b64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68984%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Puca&amp;severity=high&amp;id=695450afdb813ff03e2bec6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68983-improper-control-of-filename-for-in-08a0e879</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68983%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Greenmart&amp;severity=high&amp;id=695450afdb813ff03e2bec68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68982-missing-authorization-in-designthem-6304d88c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68982%3A%20Missing%20Authorization%20in%20designthemes%20DesignThemes%20LMS%20Addon&amp;severity=medium&amp;id=695450afdb813ff03e2bec65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68981-missing-authorization-in-designthem-ed8824ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68981%3A%20Missing%20Authorization%20in%20designthemes%20HomeFix%20Elementor%20Portfolio&amp;severity=medium&amp;id=695450afdb813ff03e2bec62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68980-missing-authorization-in-designthem-3030acad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68980%3A%20Missing%20Authorization%20in%20designthemes%20WeDesignTech%20Portfolio&amp;severity=medium&amp;id=695450afdb813ff03e2bec5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68979-authorization-bypass-through-user-c-84e8b0f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68979%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SimpleCalendar%20Google%20Calendar%20Events&amp;severity=medium&amp;id=695450afdb813ff03e2bec5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68978-improper-neutralization-of-input-du-f51a4c5c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68978%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Core&amp;severity=medium&amp;id=695450a8db813ff03e2be601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68977-improper-neutralization-of-input-du-d2b76d73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68977%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Portfolio%20Addon&amp;severity=medium&amp;id=695450a8db813ff03e2be5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68976-missing-authorization-in-eagle-them-fc580b29</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68976%3A%20Missing%20Authorization%20in%20Eagle-Themes%20Eagle%20Booking&amp;severity=medium&amp;id=695450afdb813ff03e2bec59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68975-authorization-bypass-through-user-c-aa7835f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68975%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Eagle-Themes%20Eagle%20Booking&amp;severity=medium&amp;id=695450aedb813ff03e2bec4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68974-improper-control-of-filename-for-in-f15e34c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68974%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20miniOrange%20WordPress%20Social%20Login%20and%20Register&amp;severity=medium&amp;id=695450aedb813ff03e2bec49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-targets-indian-users-with-tax-themed-em-52559c67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Targets%20Indian%20Users%20With%20Tax-Themed%20Emails%20Delivering%20ValleyRAT%20Malware&amp;severity=medium&amp;id=69544e28b932a5a22ffaf4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15244-race-condition-in-phpems-0f365c23</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15244%3A%20Race%20Condition%20in%20PHPEMS&amp;severity=medium&amp;id=695450a6db813ff03e2be31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-mustang-panda-caught-using-kernel-mode-09a5fa0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Mustang%20Panda%20Caught%20Using%20Kernel-Mode%20Rootkit&amp;severity=medium&amp;id=69544f40db813ff03e2a1839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-to-split-117-billion-among-337-million-dat-549885c3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20to%20split%20%241.17%20billion%20among%2033.7%20million%20data%20breach%20victims&amp;severity=high&amp;id=69544fcedb813ff03e2aff39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mustang-panda-uses-signed-kernel-mode-rootkit-to-l-795f651d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mustang%20Panda%20Uses%20Signed%20Kernel-Mode%20Rootkit%20to%20Load%20TONESHELL%20Backdoor&amp;severity=high&amp;id=69544fcedb813ff03e2aff45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15243-sql-injection-in-code-projects-simp-c1a47f83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15243%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15242-race-condition-in-phpems-c450a593</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15242%3A%20Race%20Condition%20in%20PHPEMS&amp;severity=low&amp;id=695450a6db813ff03e2be310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15359-cwe-787-out-of-bounds-write-in-delt-fb40b2a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15359%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20DVP-12SE11T&amp;severity=critical&amp;id=695450a8db813ff03e2be60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15358-cwe-20-improper-input-validation-in-35bfe4f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15358%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Delta%20Electronics%20DVP-12SE11T&amp;severity=high&amp;id=695450a8db813ff03e2be60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15241-open-redirect-in-cloudpanel-communi-ce6222c3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15241%3A%20Open%20Redirect%20in%20CloudPanel%20Community%20Edition&amp;severity=medium&amp;id=695450acdb813ff03e2bebac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15103-cwe-200-exposure-of-sensitive-infor-f235f3c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15103%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Delta%20Electronics%20DVP-12SE11T&amp;severity=high&amp;id=695450a5db813ff03e2be182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/korean-air-data-compromised-in-oracle-ebs-hack-b93ec7b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Korean%20Air%20Data%20Compromised%20in%20Oracle%20EBS%20Hack&amp;severity=medium&amp;id=69544f40db813ff03e2a183c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15102-cwe-288-authentication-bypass-using-8ef45d07</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15102%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Delta%20Electronics%20DVP-12SE11T&amp;severity=critical&amp;id=695450a5db813ff03e2be17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mustang-panda-uses-signed-kernel-mode-rootkit-to-l-32bee55b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mustang%20Panda%20Uses%20Signed%20Kernel-Mode%20Rootkit%20to%20Load%20TONESHELL%20Backdoor&amp;severity=medium&amp;id=69544e28b932a5a22ffaf4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15234-heap-based-buffer-overflow-in-tenda-5ac9b0ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15234%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450acdb813ff03e2beba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15233-heap-based-buffer-overflow-in-tenda-ae002c8c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15233%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450abdb813ff03e2beb84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15355-cwe-79-improper-neutralization-of-i-418490c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NetVision%20Information%20ISOinsight&amp;severity=medium&amp;id=695450a8db813ff03e2be5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15232-stack-based-buffer-overflow-in-tend-b36a6e32</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15232%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450abdb813ff03e2beb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15231-stack-based-buffer-overflow-in-tend-c0b871dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15231%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450abdb813ff03e2beb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15230-heap-based-buffer-overflow-in-tenda-5c1e8035</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15230%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450abdb813ff03e2beb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15229-denial-of-service-in-tenda-ch22-0b25f925</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15229%3A%20Denial%20of%20Service%20in%20Tenda%20CH22&amp;severity=medium&amp;id=695450abdb813ff03e2beb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14313-cwe-79-cross-site-scripting-xss-in--9f819fdc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14313%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Advance%20WP%20Query%20Search%20Filter&amp;severity=medium&amp;id=695450a5db813ff03e2be17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14312-cwe-79-cross-site-scripting-xss-in--6c65ee47</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14312%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Advance%20WP%20Query%20Search%20Filter&amp;severity=medium&amp;id=695450a5db813ff03e2be179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15222-deserialization-in-dromara-sa-token-a440b332</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15222%3A%20Deserialization%20in%20Dromara%20Sa-Token&amp;severity=low&amp;id=695450abdb813ff03e2beb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15221-cross-site-scripting-in-sohutv-cach-13804611</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15221%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450abdb813ff03e2beb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15220-cross-site-scripting-in-sohutv-cach-a48f490c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15220%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450aadb813ff03e2be6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15219-cross-site-scripting-in-sohutv-cach-14e7d34c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15219%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450aadb813ff03e2be68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15218-buffer-overflow-in-tenda-ac10u-87b4a6f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15218%3A%20Buffer%20Overflow%20in%20Tenda%20AC10U&amp;severity=high&amp;id=695450aadb813ff03e2be686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15217-buffer-overflow-in-tenda-ac23-50b71d11</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15217%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=695450a3db813ff03e2be0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15216-stack-based-buffer-overflow-in-tend-395bed09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15216%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=695450a3db813ff03e2be0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15215-buffer-overflow-in-tenda-ac10u-d075e045</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15215%3A%20Buffer%20Overflow%20in%20Tenda%20AC10U&amp;severity=high&amp;id=695450a3db813ff03e2be0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15214-cross-site-scripting-in-campcodes-p-4bd60176</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15214%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Park%20Ticketing%20System&amp;severity=medium&amp;id=695450a3db813ff03e2be0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69235-cwe-346-origin-validation-error-in--00523337</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69235%3A%20CWE-346%20Origin%20Validation%20Error%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=high&amp;id=695450b1db813ff03e2bee02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69234-cwe-358-improperly-implemented-secu-2cc1a01e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69234%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=critical&amp;id=695450b1db813ff03e2bedff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15213-improper-authorization-in-code-proj-8d33b8d7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15213%3A%20Improper%20Authorization%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=695450a3db813ff03e2be0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15212-sql-injection-in-code-projects-refu-3df67c64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15212%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a2db813ff03e2be086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15211-sql-injection-in-code-projects-refu-a7f2d1b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15211%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a2db813ff03e2be07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-30-542a9515</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-30&amp;severity=medium&amp;id=69546ab0db813ff03e51b650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61557-na-94a333ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61557%3A%20n%2Fa&amp;severity=high&amp;id=695450a5db813ff03e2be16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65925-na-700ef966</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65925%3A%20n%2Fa&amp;severity=medium&amp;id=695450a4db813ff03e2be15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66848-na-ba4b5e0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66848%3A%20n%2Fa&amp;severity=critical&amp;id=695450a4db813ff03e2be156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65411-na-0940d80d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65411%3A%20n%2Fa&amp;severity=high&amp;id=695450a4db813ff03e2be149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65409-na-b108bdfd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65409%3A%20n%2Fa&amp;severity=high&amp;id=695450a4db813ff03e2be143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56332-na-94ea4996</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56332%3A%20n%2Fa&amp;severity=critical&amp;id=695450a4db813ff03e2be139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66835-na-146f76ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66835%3A%20n%2Fa&amp;severity=high&amp;id=695450a3db813ff03e2be0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66834-na-a05c6e52</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66834%3A%20n%2Fa&amp;severity=high&amp;id=695450a3db813ff03e2be0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66824-na-df333349</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66824%3A%20n%2Fa&amp;severity=high&amp;id=695450a2db813ff03e2be07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66823-na-d62a6660</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66823%3A%20n%2Fa&amp;severity=low&amp;id=695450a1db813ff03e2be02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50343-na-f7003477</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50343%3A%20n%2Fa&amp;severity=critical&amp;id=695450a1db813ff03e2be01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66723-na-222b3b68</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66723%3A%20n%2Fa&amp;severity=high&amp;id=695450a0db813ff03e2bda7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23554-cwe-79-improper-neutralization-of-i-7ab66fc4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jakub%20Glos%20Off%20Page%20SEO&amp;severity=high&amp;id=695450a3db813ff03e2be0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23550-cwe-79-improper-neutralization-of-i-4a910a83</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kemal%20YAZICI%20Product%20Puller&amp;severity=high&amp;id=695450a8db813ff03e2be5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23458-cwe-79-improper-neutralization-of-i-9a61ff8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23458%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rakessh%20Ads24%20Lite&amp;severity=high&amp;id=695450a9db813ff03e2be632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15210-sql-injection-in-code-projects-refu-c5c1893c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15210%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68036-cwe-862-missing-authorization-in-em-42123364</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68036%3A%20Missing%20Authorization%20in%20Imran%20Tauqeer%20CubeWP&amp;severity=high&amp;id=695450a9db813ff03e2be635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68040-cwe-201-insertion-of-sensitive-info-3b015c56</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68040%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20weDevs%20WP%20Project%20Manager&amp;severity=medium&amp;id=695450a9db813ff03e2be638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41656-cwe-862-missing-authorization-in-wp-cb9f755d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41656%3A%20CWE-862%20Missing%20Authorization%20in%20wpdive%20Better%20Elementor%20Addons&amp;severity=medium&amp;id=695450a8db813ff03e2be607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32238-vulnerability-in-codexthemes-thegem-0dfe05ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32238%3A%20Vulnerability%20in%20CodexThemes%20TheGem%20(Elementor)&amp;severity=medium&amp;id=695450a8db813ff03e2be604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68498-cwe-862-missing-authorization-in-cr-923ab839</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68498%3A%20Missing%20Authorization%20in%20Crocoblock%20JetTabs&amp;severity=medium&amp;id=695450a3db813ff03e2be0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68499-cwe-79-improper-neutralization-of-i-466523d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68499%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetTabs&amp;severity=medium&amp;id=695450a3db813ff03e2be0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15209-sql-injection-in-code-projects-refu-598967f7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15209%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15284-cwe-20-improper-input-validation-4da53598</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15284%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=medium&amp;id=695450a8db813ff03e2be5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15208-sql-injection-in-code-projects-refu-6af596e6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15208%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15207-sql-injection-in-campcodes-supplier-faa2b8d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15207%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-arrested-for-kmsauto-malware-campaign-with--c732ded7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20arrested%20for%20KMSAuto%20malware%20campaign%20with%202.8%20million%20downloads&amp;severity=high&amp;id=69544fcedb813ff03e2aff4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15206-sql-injection-in-campcodes-supplier-1ca0c63d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15206%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68502-cwe-639-authorization-bypass-throug-9d688c8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68502%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Crocoblock%20JetPopup&amp;severity=medium&amp;id=695450b1db813ff03e2bee29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68503-cwe-862-missing-authorization-in-cr-f178da74</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68503%3A%20Missing%20Authorization%20in%20Crocoblock%20JetBlog&amp;severity=medium&amp;id=695450b1db813ff03e2bee2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68504-cwe-79-improper-neutralization-of-i-502470b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68504%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=medium&amp;id=695450a9db813ff03e2be63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68562-cwe-434-unrestricted-upload-of-file-d9646de3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68562%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RomanCode%20MapSVG&amp;severity=critical&amp;id=695450a9db813ff03e2be648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68607-cwe-79-improper-neutralization-of-i-6391990a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hiroaki%20Miyashita%20Custom%20Field%20Template&amp;severity=medium&amp;id=695450a9db813ff03e2be64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15205-sql-injection-in-code-projects-stud-12baf67d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15205%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69205-cwe-20-improper-input-validation-in-ab71e66d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69205%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20olell%20uURU&amp;severity=medium&amp;id=695450a9db813ff03e2be682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-google-themed-phishing-wave-hits-over-3000-glo-ffcbfdd3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Google-Themed%20Phishing%20Wave%20Hits%20Over%203%2C000%20Global%20Organisations&amp;severity=medium&amp;id=69544fcedb813ff03e2affc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15204-cross-site-scripting-in-sohutv-cach-9638f1e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15204%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450a6db813ff03e2be2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/former-coinbase-support-agent-arrested-for-helping-8ff81d84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Former%20Coinbase%20support%20agent%20arrested%20for%20helping%20hackers&amp;severity=high&amp;id=69544fcedb813ff03e2aff85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romanian-energy-provider-hit-by-gentlemen-ransomwa-c2363cda</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Romanian%20energy%20provider%20hit%20by%20Gentlemen%20ransomware%20attack&amp;severity=high&amp;id=69544fcedb813ff03e2aff79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-real-world-attacks-behind-owasp-agentic-ai-top-35869202</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Real-World%20Attacks%20Behind%20OWASP%20Agentic%20AI%20Top%2010&amp;severity=high&amp;id=69544fcedb813ff03e2aff7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trust-wallet-says-2596-wallets-drained-in-7-millio-ce38881d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trust%20Wallet%20says%202%2C596%20wallets%20drained%20in%20%247%20million%20crypto%20theft%20attack&amp;severity=high&amp;id=69544fcedb813ff03e2aff89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15203-cross-site-scripting-in-sohutv-cach-ad9b3972</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15203%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450a5db813ff03e2be191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-weaponizes-react2shell-c9839964</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDoX%20Botnet%20Weaponizes%20React2Shell&amp;severity=medium&amp;id=69544fc0db813ff03e2ae6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15202-cross-site-scripting-in-sohutv-cach-760b5f7c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15202%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450a5db813ff03e2be18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14175-cwe-327-use-of-a-broken-or-risky-cr-3e822f3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14175%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20TP-Link%20Systems%20Inc.%20TL-WR820N%20v2.8&amp;severity=medium&amp;id=695450b2db813ff03e2bee67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69202-cwe-524-use-of-cache-containing-sen-cb7532b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69202%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20arthurfiorette%20axios-cache-interceptor&amp;severity=medium&amp;id=695450b2db813ff03e2bee73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ubisoft-shuts-down-rainbow-six-siege-after-mongodb-a2d6874d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ubisoft%20Shuts%20Down%20Rainbow%20Six%20Siege%20After%20MongoDB%20Exploit%20Hits%20Players&amp;severity=high&amp;id=69544fcedb813ff03e2aff91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68431-cwe-125-out-of-bounds-read-in-struk-83ef3f16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68431%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20strukturag%20libheif&amp;severity=medium&amp;id=695450b3db813ff03e2beea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14728-cwe-22-improper-limitation-of-a-pat-4ee27fb4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14728%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Rapid7%20Velociraptor&amp;severity=medium&amp;id=695450b2db813ff03e2bee77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15201-cross-site-scripting-in-sohutv-cach-4944a10c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15201%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b3db813ff03e2beea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15200-cross-site-scripting-in-sohutv-cach-2269a032</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15200%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b3db813ff03e2beec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/39c3-multiple-vulnerabilities-in-gnupg-and-other-c-540768d8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=39C3%3A%20Multiple%20vulnerabilities%20in%20GnuPG%20and%20other%20cryptographic%20tools&amp;severity=medium&amp;id=6954513bdb813ff03e2c9fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13592-cwe-94-improper-control-of-generati-e6077c8c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13592%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=high&amp;id=695450b3db813ff03e2beed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14280-cwe-200-exposure-of-sensitive-infor-1f1fb677</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14280%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20pixelyoursite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20%26%20API%20Manager&amp;severity=medium&amp;id=695450b3db813ff03e2beed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15199-unrestricted-upload-in-code-project-d4553a3d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15199%3A%20Unrestricted%20Upload%20in%20code-projects%20College%20Notes%20Uploading%20System&amp;severity=medium&amp;id=695450b4db813ff03e2beeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15198-sql-injection-in-code-projects-coll-58efda3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15198%3A%20SQL%20Injection%20in%20code-projects%20College%20Notes%20Uploading%20System&amp;severity=medium&amp;id=695450b4db813ff03e2bef01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55064-cwe-79-improper-neutralization-of-i-08596a2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Priority%20Web&amp;severity=medium&amp;id=695450b3db813ff03e2beec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68861-missing-authorization-in-pluginopti-bf994e6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68861%3A%20Missing%20Authorization%20in%20pluginoptimizer%20Plugin%20Optimizer&amp;severity=high&amp;id=69cd7410e6bfc5ba1def5041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55063-cwe-79-improper-neutralization-of-i-93a6281a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55063%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Priority%20Web&amp;severity=medium&amp;id=695450b5db813ff03e2bf26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55062-cwe-79-improper-neutralization-of-i-30f4a759</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55062%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Priority%20Web&amp;severity=medium&amp;id=695450b5db813ff03e2bf267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55061-cwe-434-unrestricted-upload-of-file-dd277146</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55061%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Priority%20Web&amp;severity=high&amp;id=695450b4db813ff03e2bef0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55060-cwe-601-url-redirection-to-untruste-e503720d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55060%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Priority%20Web&amp;severity=medium&amp;id=695450b4db813ff03e2bef08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15197-unrestricted-upload-in-code-project-119f10f0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15197%3A%20Unrestricted%20Upload%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=695450a5db813ff03e2be185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15196-sql-injection-in-code-projects-asse-b75c9933</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15196%3A%20SQL%20Injection%20in%20code-projects%20Assessment%20Management&amp;severity=medium&amp;id=695450b6db813ff03e2bf328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53627-cwe-1287-improper-validation-of-spe-ec2a415c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53627%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20meshtastic%20firmware&amp;severity=medium&amp;id=695450b7db813ff03e2bf33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68868-cwe-79-improper-neutralization-of-i-414a7aac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68868%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeaffairs%20Wp%20Text%20Slider%20Widget&amp;severity=medium&amp;id=695450b7db813ff03e2bf354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68870-cwe-98-improper-control-of-filename-578ac616</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68870%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20reDim%20GmbH%20CookieHint%20WP&amp;severity=high&amp;id=695450b7db813ff03e2bf357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68876-cwe-79-improper-neutralization-of-i-f269bdcb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68876%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20INVELITY%20Invelity%20SPS%20connect&amp;severity=high&amp;id=695450b7db813ff03e2bf35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68877-cwe-98-improper-control-of-filename-9550df20</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68877%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cedcommerce%20CedCommerce%20Integration%20for%20Good%20Market&amp;severity=high&amp;id=695450b7db813ff03e2bf35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15195-sql-injection-in-code-projects-asse-121e9194</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15195%3A%20SQL%20Injection%20in%20code-projects%20Assessment%20Management&amp;severity=medium&amp;id=695450b6db813ff03e2bf321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69211-cwe-367-time-of-check-time-of-use-t-f2c6d84c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69211%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20nestjs%20nest&amp;severity=medium&amp;id=695450b7db813ff03e2bf37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68878-cwe-79-improper-neutralization-of-i-bda943d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasadkirpekar%20Advanced%20Custom%20CSS&amp;severity=high&amp;id=695450b7db813ff03e2bf369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68879-cwe-79-improper-neutralization-of-i-2ecc13fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68879%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20councilsoft%20Content%20Grid%20Slider&amp;severity=high&amp;id=695450b7db813ff03e2bf36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68893-cwe-918-server-side-request-forgery-8b0da527</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68893%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HETWORKS%20WordPress%20Image%20shrinker&amp;severity=medium&amp;id=695450b7db813ff03e2bf36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68897-cwe-94-improper-control-of-generati-6ce7a238</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68897%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Mohammad%20I.%20Okfie%20IF%20AS%20Shortcode&amp;severity=critical&amp;id=695450b7db813ff03e2bf372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69206-cwe-918-server-side-request-forgery-a8c5bb90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69206%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HemmeligOrg%20Hemmelig.app&amp;severity=medium&amp;id=695450b7db813ff03e2bf37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69201-cwe-77-improper-neutralization-of-s-d081ac76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69201%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Quenary%20tugtainer&amp;severity=high&amp;id=695450b7db813ff03e2bf375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/top-us-accounting-firm-sax-discloses-2024-data-bre-dd3e692a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Top%20US%20Accounting%20Firm%20Sax%20Discloses%202024%20Data%20Breach%20Impacting%20220%2C000&amp;severity=medium&amp;id=69544f40db813ff03e2a183f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15194-stack-based-buffer-overflow-in-d-li-10140e0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15194%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-600&amp;severity=critical&amp;id=695450badb813ff03e2bf7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69200-cwe-202-exposure-of-sensitive-infor-b5056c34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69200%3A%20CWE-202%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=695450badb813ff03e2bf7d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68951-cwe-79-improper-neutralization-of-i-a89c9033</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68951%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=695450badb813ff03e2bf7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/korean-air-data-breach-exposes-data-of-thousands-o-d5f4c954</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Korean%20Air%20data%20breach%20exposes%20data%20of%20thousands%20of%20employees&amp;severity=high&amp;id=69544fcedb813ff03e2aff41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68928-cwe-79-improper-neutralization-of-i-be3c3552</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68928%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20crm&amp;severity=medium&amp;id=695450badb813ff03e2bf7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15193-buffer-overflow-in-d-link-dwr-m920-6e780a45</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15193%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=695450badb813ff03e2bf7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15192-command-injection-in-d-link-dwr-m92-a595c141</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15192%3A%20Command%20Injection%20in%20D-Link%20DWR-M920&amp;severity=medium&amp;id=695450badb813ff03e2bf7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15191-command-injection-in-d-link-dwr-m92-ee55654f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15191%3A%20Command%20Injection%20in%20D-Link%20DWR-M920&amp;severity=medium&amp;id=695450bddb813ff03e2bf8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-mongodb-attacks-wallet-breaches-andro-2db72cca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20MongoDB%20Attacks%2C%20Wallet%20Breaches%2C%20Android%20Spyware%2C%20Insider%20Crime%20%26%20More&amp;severity=medium&amp;id=69544e28b932a5a22ffaf4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15190-stack-based-buffer-overflow-in-d-li-da06f287</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15190%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=695450bddb813ff03e2bf8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-honeymyte-apt-now-protects-malware-with-a-kern-5ec6fd5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20HoneyMyte%20APT%20now%20protects%20malware%20with%20a%20kernel-mode%20rootkit&amp;severity=medium&amp;id=69544fc0db813ff03e2ae70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15189-buffer-overflow-in-d-link-dwr-m920-7a378f33</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15189%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=695450bfdb813ff03e2bfc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-new-attacks-exploiting-old-vulne-d488c40a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Warns%20of%20New%20Attacks%20Exploiting%20Old%20Vulnerability&amp;severity=low&amp;id=69544f40db813ff03e2a1842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-0day-flaw-exposes-70000-xspeeder-devices--01b167b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%200day%20flaw%20Exposes%2070%2C000%20XSpeeder%20Devices%20as%20Vendor%20Ignores%20Alert&amp;severity=critical&amp;id=69544fcedb813ff03e2aff95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15188-cross-site-scripting-in-campcodes-c-570b8b1a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15188%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=695450bfdb813ff03e2bfc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-to-issue-117-billion-in-vouchers-over-data-c5fbfb04</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20to%20Issue%20%241.17%20Billion%20in%20Vouchers%20Over%20Data%20Breach&amp;severity=medium&amp;id=69544f40db813ff03e2a1845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15187-path-traversal-in-greencms-9e09e525</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15187%3A%20Path%20Traversal%20in%20GreenCMS&amp;severity=medium&amp;id=695450bfdb813ff03e2bfc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/22-million-affected-by-aflac-data-breach-55789947</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=22%20Million%20Affected%20by%20Aflac%20Data%20Breach&amp;severity=medium&amp;id=69544f40db813ff03e2a1848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/29th-december-threat-intelligence-report-8cbd6ec9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=29th%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69545139db813ff03e2c9ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15186-sql-injection-in-code-projects-refu-142c5dc1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15186%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450bfdb813ff03e2bfc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-malware-delivered-in-emeditor-supply-c-5c095a8b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20Malware%20Delivered%20in%20EmEditor%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69544f40db813ff03e2a184b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15185-sql-injection-in-code-projects-refu-4eb02a05</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15185%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450bedb813ff03e2bf91c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15184-sql-injection-in-code-projects-refu-ede4d722</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15184%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450bedb813ff03e2bf915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15183-sql-injection-in-code-projects-refu-c9938682</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15183%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450bedb813ff03e2bf90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fresh-mongodb-vulnerability-exploited-in-attacks-a0ef0da8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fresh%20MongoDB%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=high&amp;id=69544f40db813ff03e2a184e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-panda-cyberespionage-campaign-uses-dns-poi-ec875179</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20Panda%20cyberespionage%20campaign%20uses%20DNS%20poisoning%20to%20install%20MgBot%20backdoor&amp;severity=medium&amp;id=69544fcedb813ff03e2affb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mongodb-vulnerability-cve-2025-14847-under-active--8b9d09d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MongoDB%20Vulnerability%20CVE-2025-14847%20Under%20Active%20Exploitation%20Worldwide&amp;severity=low&amp;id=69544e28b932a5a22ffaf4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/27-malicious-npm-packages-used-as-phishing-infrast-76290b65</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=27%20Malicious%20npm%20Packages%20Used%20as%20Phishing%20Infrastructure%20to%20Steal%20Login%20Credentials&amp;severity=critical&amp;id=69544e28b932a5a22ffaf4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15182-sql-injection-in-code-projects-refu-cc3dcc9d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15182%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450b9db813ff03e2bf6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-claims-theft-of-40-million-cond-nast-record-ae43a788</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Claims%20Theft%20of%2040%20Million%20Cond%C3%A9%20Nast%20Records%20After%20Wired%20Data%20Leak&amp;severity=medium&amp;id=69544f40db813ff03e2a1851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15181-sql-injection-in-code-projects-refu-97e56528</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15181%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450b8db813ff03e2bf3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15180-stack-based-buffer-overflow-in-tend-d6da6130</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15180%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b8db813ff03e2bf3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15179-stack-based-buffer-overflow-in-tend-68f9f5c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15179%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b8db813ff03e2bf3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15178-stack-based-buffer-overflow-in-tend-7a395b86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15178%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b8db813ff03e2bf3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15228-cwe-434-unrestricted-upload-of-file-86c9ba3b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15228%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WELLTEND%20TECHNOLOGY%20BPMFlowWebkit&amp;severity=critical&amp;id=695450b9db813ff03e2bf6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15227-cwe-36-absolute-path-traversal-in-w-e51ca937</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15227%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20WELLTEND%20TECHNOLOGY%20BPMFlowWebkit&amp;severity=high&amp;id=695450bedb813ff03e2bf8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15177-stack-based-buffer-overflow-in-tend-44e19e2b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15177%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450bddb813ff03e2bf8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15226-cwe-434-unrestricted-upload-of-file-b4fdff47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15226%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Sunnet%20WMPro&amp;severity=critical&amp;id=695450bedb813ff03e2bf8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/traditional-security-frameworks-leave-organization-388f8038</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Traditional%20Security%20Frameworks%20Leave%20Organizations%20Exposed%20to%20AI-Specific%20Attack%20Vectors&amp;severity=low&amp;id=69544e28b932a5a22ffaf4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15176-reachable-assertion-in-open5gs-09c73495</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15176%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=695450bddb813ff03e2bf8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15225-cwe-23-relative-path-traversal-in-s-df677faf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15225%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Sunnet%20WMPro&amp;severity=high&amp;id=695450b9db813ff03e2bf6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15175-cross-site-scripting-in-sohutv-cach-9986c342</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15175%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b6db813ff03e2bf319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13958-cwe-79-cross-site-scripting-xss-in--3a358256</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13958%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20YaMaps%20for%20WordPress%20Plugin&amp;severity=medium&amp;id=695450b2db813ff03e2bee60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13417-cwe-89-sql-injection-in-plugin-orga-ddec5dbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13417%3A%20CWE-89%20SQL%20Injection%20in%20Plugin%20Organizer&amp;severity=high&amp;id=695450b2db813ff03e2bee5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15174-cross-site-scripting-in-sohutv-cach-9edc1770</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15174%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b6db813ff03e2bf312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15070-cwe-200-exposure-of-sensitive-infor-4dbfe805</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15070%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Gmission%20Web%20Fax&amp;severity=medium&amp;id=695450b6db813ff03e2bf2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15069-cwe-287-improper-authentication-in--e58ad2d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15069%3A%20CWE-287%20Improper%20Authentication%20in%20Gmission%20Web%20Fax&amp;severity=high&amp;id=695450b6db813ff03e2bf2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15068-cwe-862-missing-authorization-in-gm-840e10de</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15068%3A%20CWE-862%20Missing%20Authorization%20in%20Gmission%20Web%20Fax&amp;severity=high&amp;id=695450b5db813ff03e2bf27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15173-cross-site-scripting-in-sohutv-cach-f9c3ced9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15173%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b5db813ff03e2bf274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15172-cross-site-scripting-in-sohutv-cach-dd0c8538</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15172%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b5db813ff03e2bf26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15171-cross-site-scripting-in-sohutv-cach-7f0fe415</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15171%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450bddb813ff03e2bf8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15170-cross-site-scripting-in-advaya-soft-834d3c9a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15170%3A%20Cross%20Site%20Scripting%20in%20Advaya%20Softech%20GEMS%20ERP%20Portal&amp;severity=medium&amp;id=695450bddb813ff03e2bf8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15169-sql-injection-in-biggidroid-simple--21795ad5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15169%3A%20SQL%20Injection%20in%20BiggiDroid%20Simple%20PHP%20CMS&amp;severity=medium&amp;id=695450badb813ff03e2bf7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15168-sql-injection-in-itsourcecode-stude-a8c4bc97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15168%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=695450b6db813ff03e2bf30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52691-vulnerability-in-smartertools-smart-0974873e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52691%3A%20Vulnerability%20in%20SmarterTools%20SmarterMail&amp;severity=critical&amp;id=695450b7db813ff03e2bf339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15167-sql-injection-in-itsourcecode-onlin-b6a9b8dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15167%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=695450b5db813ff03e2bf260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15166-sql-injection-in-itsourcecode-onlin-1a56a211</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15166%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=695450b3db813ff03e2beeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15165-sql-injection-in-itsourcecode-onlin-51a81c78</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15165%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=695450b2db813ff03e2bee6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15067-cwe-434-unrestricted-upload-of-file-7670a9d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15067%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Innorix%20Innorix%20WP&amp;severity=high&amp;id=695450b5db813ff03e2bf282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15066-cwe-22-improper-limitation-of-a-pat-8b2e2d0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15066%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Innorix%20Innorix%20WP&amp;severity=medium&amp;id=695450b5db813ff03e2bf27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15164-stack-based-buffer-overflow-in-tend-386733c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15164%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450bfdb813ff03e2bfc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15065-cwe-200-exposure-of-sensitive-infor-0df4a5ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15065%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Kings%20Information%20%26%20Network%20Co.%20KESS%20Enterprise&amp;severity=high&amp;id=695450b1db813ff03e2bee3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15163-stack-based-buffer-overflow-in-tend-2e45f503</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15163%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b2db813ff03e2bee50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57460-na-0b914ec7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57460%3A%20n%2Fa&amp;severity=critical&amp;id=695450bedb813ff03e2bf907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65570-na-0a4121e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65570%3A%20n%2Fa&amp;severity=critical&amp;id=695450bddb813ff03e2bf898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56333-na-b5c46c27</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56333%3A%20n%2Fa&amp;severity=critical&amp;id=695450badb813ff03e2bf7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66861-na-09879b85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66861%3A%20n%2Fa&amp;severity=low&amp;id=695450b9db813ff03e2bf6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66866-na-811d85af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66866%3A%20n%2Fa&amp;severity=medium&amp;id=695450b7db813ff03e2bf386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66864-na-8c485912</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66864%3A%20n%2Fa&amp;severity=medium&amp;id=695450b7db813ff03e2bf383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65442-na-6b81495f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65442%3A%20n%2Fa&amp;severity=medium&amp;id=695450b7db813ff03e2bf346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60458-na-b06c4858</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60458%3A%20n%2Fa&amp;severity=medium&amp;id=695450b7db813ff03e2bf343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67255-na-6dd7edef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67255%3A%20n%2Fa&amp;severity=high&amp;id=695450b4db813ff03e2beef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67254-na-76844ed4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67254%3A%20n%2Fa&amp;severity=high&amp;id=695450b4db813ff03e2beef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68706-na-f2f55eee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68706%3A%20n%2Fa&amp;severity=critical&amp;id=695450b3db813ff03e2beecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30855-na-a94e39d9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30855%3A%20n%2Fa&amp;severity=high&amp;id=695450b2db813ff03e2bee63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27480-na-3dd42f0e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27480%3A%20n%2Fa&amp;severity=critical&amp;id=695450b2db813ff03e2bee5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25182-na-bea3e943</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25182%3A%20n%2Fa&amp;severity=critical&amp;id=695450b2db813ff03e2bee57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57462-na-478261e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57462%3A%20n%2Fa&amp;severity=medium&amp;id=695450acdb813ff03e2bebbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66877-na-1b96073c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66877%3A%20n%2Fa&amp;severity=high&amp;id=695450abdb813ff03e2beb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66869-na-eb17fa38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66869%3A%20n%2Fa&amp;severity=high&amp;id=695450aadb813ff03e2be6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66865-na-f643d785</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66865%3A%20n%2Fa&amp;severity=high&amp;id=695450aadb813ff03e2be6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66863-na-f0cc1d4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66863%3A%20n%2Fa&amp;severity=high&amp;id=695450aadb813ff03e2be6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66862-na-21d83737</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66862%3A%20n%2Fa&amp;severity=high&amp;id=695450aadb813ff03e2be6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25183-na-41f93c72</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25183%3A%20n%2Fa&amp;severity=high&amp;id=695450a5db813ff03e2be176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25181-na-e8b0bdcd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25181%3A%20n%2Fa&amp;severity=critical&amp;id=695450a5db813ff03e2be173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-29-cb7a6ab2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-29&amp;severity=medium&amp;id=69544e27b932a5a22ffaf0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15162-stack-based-buffer-overflow-in-tend-0eebf42b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15162%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b1db813ff03e2bee3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15161-stack-based-buffer-overflow-in-tend-cdcbd525</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15161%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b1db813ff03e2bee35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15160-stack-based-buffer-overflow-in-tend-fa75d401</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15160%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b9db813ff03e2bf71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-mongobleed-flaw-leaks-mongodb-secrets-87-8caf568a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20MongoBleed%20flaw%20leaks%20MongoDB%20secrets%2C%2087K%20servers%20exposed&amp;severity=high&amp;id=69544fcedb813ff03e2aff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15156-null-pointer-dereference-in-omec-pr-726c8043</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15156%3A%20NULL%20Pointer%20Dereference%20in%20omec-project%20UPF&amp;severity=medium&amp;id=695450b9db813ff03e2bf716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stolen-lastpass-backups-enable-crypto-theft-throug-339d0526</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stolen%20LastPass%20backups%20enable%20crypto%20theft%20through%202025&amp;severity=medium&amp;id=69544fcedb813ff03e2affc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-claims-to-leak-wired-database-with-23-milli-fc0be0bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20claims%20to%20leak%20WIRED%20database%20with%202.3%20million%20records&amp;severity=high&amp;id=69544fcedb813ff03e2aff81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15155-stack-based-buffer-overflow-in-floo-000c8b90</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15155%3A%20Stack-based%20Buffer%20Overflow%20in%20floooh%20sokol&amp;severity=medium&amp;id=695450bddb813ff03e2bf8a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15154-use-of-less-trusted-source-in-pboot-d66f9650</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15154%3A%20Use%20of%20Less%20Trusted%20Source%20in%20PbootCMS&amp;severity=medium&amp;id=695450bddb813ff03e2bf89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15153-files-or-directories-accessible-in--6ca46105</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15153%3A%20Files%20or%20Directories%20Accessible%20in%20PbootCMS&amp;severity=medium&amp;id=695450bddb813ff03e2bf892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15152-unrestricted-upload-in-h-moses-moga-7081a4b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15152%3A%20Unrestricted%20Upload%20in%20h-moses%20moga-mall&amp;severity=medium&amp;id=695450bcdb813ff03e2bf878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15151-password-in-configuration-file-in-t-d0b6d407</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15151%3A%20Password%20in%20Configuration%20File%20in%20TaleLin%20Lin-CMS&amp;severity=medium&amp;id=695450bcdb813ff03e2bf872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15150-stack-based-buffer-overflow-in-px4--8346c34b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15150%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=695450b9db813ff03e2bf70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15149-cross-site-scripting-in-rawchen-ecm-9eccac06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15149%3A%20Cross%20Site%20Scripting%20in%20rawchen%20ecms&amp;severity=medium&amp;id=695450b1db813ff03e2bee2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15148-code-injection-in-cmseasy-4649066c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15148%3A%20Code%20Injection%20in%20CmsEasy&amp;severity=medium&amp;id=695450b1db813ff03e2bee23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15146-cross-site-scripting-in-sohutv-cach-7a503536</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15146%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b1db813ff03e2bee1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15145-cross-site-scripting-in-sohutv-cach-a6b0ebd7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15145%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b1db813ff03e2bee15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15144-cross-site-scripting-in-dayrui-xunr-2d5ac17d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15144%3A%20Cross%20Site%20Scripting%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=695450b1db813ff03e2bee0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15143-sql-injection-in-eyoucms-ce492585</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15143%3A%20SQL%20Injection%20in%20EyouCMS&amp;severity=medium&amp;id=695450b9db813ff03e2bf708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15142-sql-injection-in-9786-phpok3w-9e27a8b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15142%3A%20SQL%20Injection%20in%209786%20phpok3w&amp;severity=medium&amp;id=695450b9db813ff03e2bf702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15141-information-disclosure-in-halo-c37fbf3f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15141%3A%20Information%20Disclosure%20in%20Halo&amp;severity=low&amp;id=695450b9db813ff03e2bf6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15140-sql-injection-in-saiftheboss7-onlin-d76f5f9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15140%3A%20SQL%20Injection%20in%20saiftheboss7%20onlinemcqexam&amp;severity=medium&amp;id=695450bbdb813ff03e2bf84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15139-command-injection-in-trendnet-tew-8-6748e06f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15139%3A%20Command%20Injection%20in%20TRENDnet%20TEW-822DRE&amp;severity=medium&amp;id=695450bbdb813ff03e2bf848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15138-path-traversal-in-prasathmani-tinyf-4fe74e7a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15138%3A%20Path%20Traversal%20in%20prasathmani%20TinyFileManager&amp;severity=medium&amp;id=695450b8db813ff03e2bf3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15137-command-injection-in-trendnet-tew-8-8f166541</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15137%3A%20Command%20Injection%20in%20TRENDnet%20TEW-800MB&amp;severity=high&amp;id=695450b6db813ff03e2bf2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15136-command-injection-in-trendnet-tew-8-5f1a00e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15136%3A%20Command%20Injection%20in%20TRENDnet%20TEW-800MB&amp;severity=high&amp;id=695450b6db813ff03e2bf2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15135-improper-authentication-in-joey-zho-b3c4bcfb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15135%3A%20Improper%20Authentication%20in%20joey-zhou%20xiaozhi-esp32-server-java&amp;severity=medium&amp;id=695450b5db813ff03e2bf257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15134-cross-site-scripting-in-yourmaileye-f4b184e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15134%3A%20Cross%20Site%20Scripting%20in%20yourmaileyes%20MOOC&amp;severity=medium&amp;id=695450b5db813ff03e2bf250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15133-command-injection-in-zspace-z4pro-c83a4404</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15133%3A%20Command%20Injection%20in%20ZSPACE%20Z4Pro%2B&amp;severity=medium&amp;id=695450b4db813ff03e2bef1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15132-command-injection-in-zspace-z4pro-c1cefaa1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15132%3A%20Command%20Injection%20in%20ZSPACE%20Z4Pro%2B&amp;severity=medium&amp;id=695450b4db813ff03e2bef14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15131-command-injection-in-zspace-z4pro-e1fb44b5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15131%3A%20Command%20Injection%20in%20ZSPACE%20Z4Pro%2B&amp;severity=medium&amp;id=695450b4db813ff03e2bef0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15130-code-injection-in-shanyu-sycms-1951a355</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15130%3A%20Code%20Injection%20in%20shanyu%20SyCms&amp;severity=medium&amp;id=695450b4db813ff03e2beefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15129-code-injection-in-chenjinchuang-lin-2816b5ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15129%3A%20Code%20Injection%20in%20ChenJinchuang%20Lin-CMS-TP5&amp;severity=medium&amp;id=695450b3db813ff03e2beebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15128-unprotected-storage-of-credentials--0cd8d136</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15128%3A%20Unprotected%20Storage%20of%20Credentials%20in%20ZKTeco%20BioTime&amp;severity=medium&amp;id=695450bbdb813ff03e2bf842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15127-sql-injection-in-fantasticlbp-hotel-9b248b3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15127%3A%20SQL%20Injection%20in%20FantasticLBP%20Hotels_Server&amp;severity=medium&amp;id=695450bbdb813ff03e2bf83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15126-improper-authorization-in-jeecgboot-dbc4f2ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15126%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450bbdb813ff03e2bf836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15125-improper-authorization-in-jeecgboot-3d625a7a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15125%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450bbdb813ff03e2bf830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15124-improper-authorization-in-jeecgboot-71a33653</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15124%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450bbdb813ff03e2bf82a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15123-improper-authorization-in-jeecgboot-bc164e5c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15123%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450bbdb813ff03e2bf824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15122-improper-authorization-in-jeecgboot-fed35077</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15122%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450b8db813ff03e2bf3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15121-information-disclosure-in-jeecgboot-532c1d86</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15121%3A%20Information%20Disclosure%20in%20JeecgBoot&amp;severity=medium&amp;id=695450b8db813ff03e2bf3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15120-improper-authorization-in-jeecgboot-9e4faed7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15120%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450b8db813ff03e2bf3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15119-improper-authorization-in-jeecgboot-baf53065</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15119%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450b3db813ff03e2beeae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15118-improper-authorization-in-macrozhen-77683775</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15118%3A%20Improper%20Authorization%20in%20macrozheng%20mall&amp;severity=medium&amp;id=695450b8db813ff03e2bf3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15117-deserialization-in-dromara-sa-token-1d569065</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15117%3A%20Deserialization%20in%20Dromara%20Sa-Token&amp;severity=low&amp;id=695450b8db813ff03e2bf39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15116-race-condition-in-opencart-62e59fd9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15116%3A%20Race%20Condition%20in%20OpenCart&amp;severity=medium&amp;id=695450b7db813ff03e2bf389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-28-99c7d7df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-28&amp;severity=medium&amp;id=69544e26b932a5a22ffaeea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/petlibro-your-pet-feeder-is-feeding-data-to-anyone-c72b1a5f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Petlibro%3A%20Your%20Pet%20Feeder%20Is%20Feeding%20Data%20To%20Anyone%20Who%20Asks&amp;severity=medium&amp;id=6954513bdb813ff03e2c9fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15110-unrestricted-upload-in-jackq-xcms-e9275597</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15110%3A%20Unrestricted%20Upload%20in%20jackq%20XCMS&amp;severity=medium&amp;id=695450b6db813ff03e2bf305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14177-cwe-125-out-of-bounds-read-in-php-g-17d890ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14177%3A%20CWE-125%20Out-of-bounds%20Read%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=695450badb813ff03e2bf7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14178-cwe-787-out-of-bounds-write-in-php--bed270d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14178%3A%20CWE-787%20Out-of-bounds%20Write%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=695450badb813ff03e2bf7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14180-cwe-476-null-pointer-dereference-in-8221dc6d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14180%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20PHP%20Group%20PHP&amp;severity=high&amp;id=695450bbdb813ff03e2bf81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15109-unrestricted-upload-in-jackq-xcms-4e9e56c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15109%3A%20Unrestricted%20Upload%20in%20jackq%20XCMS&amp;severity=medium&amp;id=695450bbdb813ff03e2bf81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/implicit-execution-authority-is-the-real-failure-m-c4845665</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Implicit%20execution%20authority%20is%20the%20real%20failure%20mode%20behind%20prompt%20injection&amp;severity=medium&amp;id=6954513bdb813ff03e2c9fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15108-use-of-hard-coded-cryptographic-key-5c0526fd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15108%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20PandaXGO%20PandaX&amp;severity=medium&amp;id=695450bcdb813ff03e2bf86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15107-use-of-hard-coded-cryptographic-key-961c2436</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15107%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20actiontech%20sqle&amp;severity=medium&amp;id=695450bcdb813ff03e2bf865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15106-improper-authorization-in-getmaxun--dda24507</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15106%3A%20Improper%20Authorization%20in%20getmaxun%20maxun&amp;severity=medium&amp;id=695450bcdb813ff03e2bf85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mongodb-flaw-lets-unauthenticated-attackers-re-024cec06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MongoDB%20Flaw%20Lets%20Unauthenticated%20Attackers%20Read%20Uninitialized%20Memory&amp;severity=high&amp;id=694fb495613270c7b7ffb853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openais-chatgpt-ads-will-allegedly-prioritize-spon-6838c740</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI&apos;s%20ChatGPT%20ads%20will%20allegedly%20prioritize%20sponsored%20content%20in%20answers&amp;severity=high&amp;id=694fb495613270c7b7ffb857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-runtime-attacks-stay-quiet-for-so-long-61468bb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20runtime%20attacks%20stay%20quiet%20for%20so%20long&amp;severity=medium&amp;id=694fadebd43a27076d86e1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15105-use-of-hard-coded-cryptographic-key-9a892d06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15105%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20getmaxun%20maxun&amp;severity=medium&amp;id=694fa35cd43a27076d7b384f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mongodb-flaw-lets-unauthenticated-attackers-re-701f4a01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MongoDB%20Flaw%20Lets%20Unauthenticated%20Attackers%20Read%20Uninitialized%20Memory&amp;severity=high&amp;id=694f983f46aa44436a57c516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-verified-sha-256-second-preimage-collision-s-99c70243</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=First%20verified%20SHA-256%20second-preimage%20collision%3A%20Structural%20analysis%20of%20the%20W-schedule%20vulnerability&amp;severity=high&amp;id=694f3fd333784cecd4bb6a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68952-cwe-94-improper-control-of-generati-d00ad68e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68952%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20eigent-ai%20eigent&amp;severity=critical&amp;id=694f5b38b11716a1460d26a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68948-cwe-321-use-of-hard-coded-cryptogra-cbac227e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68948%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=694f5b38b11716a1460d26a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68927-cwe-79-improper-neutralization-of-i-3c80206e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68927%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20abhinavxd%20libredesk&amp;severity=high&amp;id=694f5b38b11716a1460d26a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54322-cwe-95-improper-neutralization-of-d-0b1e7694</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54322%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Xspeeder%20SXZOS&amp;severity=critical&amp;id=695450b7db813ff03e2bf33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-27-278341d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-27&amp;severity=medium&amp;id=69544e27b932a5a22ffaf2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68474-cwe-787-out-of-bounds-write-in-espr-9754a97b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68474%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=694f23b933784cecd4a2ce7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66203-cwe-78-improper-neutralization-of-s-bc8f18e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66203%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20lemon8866%20StreamVault&amp;severity=critical&amp;id=694f202f33784cecd4a18a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-group-claims-theft-of-over-1tb--0d277026</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Group%20Claims%20Theft%20of%20Over%201TB%20of%20Chrysler%20Data&amp;severity=high&amp;id=694f0e9833784cecd49bbf5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67729-cwe-502-deserialization-of-untruste-d7495667</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67729%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20InternLM%20lmdeploy&amp;severity=high&amp;id=694f079233784cecd499b7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68697-cwe-269-improper-privilege-manageme-eb98d913</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68697%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20n8n-io%20n8n&amp;severity=high&amp;id=694f079233784cecd499b7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68668-cwe-693-protection-mechanism-failur-bcbb4231</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68668%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=694f040e33784cecd498bd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61914-cwe-79-improper-neutralization-of-i-3caedd8f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61914%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=694f040e33784cecd498bd15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-russian-group-noname057-claims-cyberattack-on--27e7ead6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Russian%20group%20Noname057%20claims%20cyberattack%20on%20La%20Poste%20services&amp;severity=medium&amp;id=694ef98033784cecd495b6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-grubhub-emails-promise-tenfold-return-on-sent-716cb93f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20GrubHub%20emails%20promise%20tenfold%20return%20on%20sent%20cryptocurrency&amp;severity=high&amp;id=694ef98033784cecd495b6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13158-cwe-1321-improperly-controlled-modi-61fce7bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13158%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20apiDoc%20apidoc-core&amp;severity=critical&amp;id=694eb33b33784cecd475b0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trust-wallet-chrome-extension-breach-caused-7-mill-4908a715</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trust%20Wallet%20Chrome%20Extension%20Breach%20Caused%20%247%20Million%20Crypto%20Loss%20via%20Malicious%20Code&amp;severity=low&amp;id=694ebaa733784cecd47d1e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-evasive-panda-ran-dns-poisoning-campa-de4fd13f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Evasive%20Panda%20Ran%20DNS%20Poisoning%20Campaign%20to%20Deliver%20MgBot%20Malware&amp;severity=high&amp;id=694ea99af5f69c8dc2a0d494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64645-cwe-367-time-of-check-time-of-use-t-3886589b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64645%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20IBM%20Concert&amp;severity=high&amp;id=694e9f3b2bc1afab4ba470b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36230-cwe-80-improper-neutralization-of-s-74e5d956</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36230%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Aspera%20Faspex%205&amp;severity=medium&amp;id=694e9f3b2bc1afab4ba470b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36229-cwe-497-exposure-of-sensitive-syste-ee8c7117</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36229%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20Aspera%20Faspex%205&amp;severity=low&amp;id=694e9bb32bc1afab4ba051ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36228-cwe-279-incorrect-execution-assigne-c83eb68f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36228%3A%20CWE-279%20Incorrect%20Execution-Assigned%20Permissions%20in%20IBM%20Aspera%20Faspex%205&amp;severity=low&amp;id=694e9bb32bc1afab4ba051ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36192-cwe-862-missing-authorization-in-ib-ee403eab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36192%3A%20CWE-862%20Missing%20Authorization%20in%20IBM%20DS8A00(%20R10.1)&amp;severity=medium&amp;id=694e98cd2bc1afab4b9c3a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14687-cwe-602-client-side-enforcement-of--e85a1f20</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14687%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Db2%20Intelligence%20Center&amp;severity=medium&amp;id=694e8dcb1cd79ac615c4b7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13915-cwe-305-authentication-bypass-by-pr-11cca0f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13915%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20IBM%20API%20Connect&amp;severity=critical&amp;id=694e8dcb1cd79ac615c4b7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ferry-iot-hack-5b55cfb9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ferry%20IoT%20Hack&amp;severity=medium&amp;id=694e8a471cd79ac615c0f045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12771-cwe-119-improper-restriction-of-ope-e7d7d9d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12771%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20IBM%20Concert&amp;severity=high&amp;id=694e8a571cd79ac615c0ff4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1721-cwe-244-improper-clearing-of-heap-me-3f8bca1f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1721%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=694e8a571cd79ac615c0ff4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-langchain-core-vulnerability-exposes-secr-ecd8d0fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20LangChain%20Core%20Vulnerability%20Exposes%20Secrets%20via%20Serialization%20Injection&amp;severity=critical&amp;id=694e7c9ccb0c2e4fdeb3e18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trust-wallet-chrome-extension-hack-tied-to-million-df7f6f76</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trust%20Wallet%20Chrome%20extension%20hack%20tied%20to%20millions%20in%20losses&amp;severity=high&amp;id=694e7c9ccb0c2e4fdeb3e18f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spotify-cracks-down-on-unlawful-scraping-of-86-mil-a2457526</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spotify%20cracks%20down%20on%20unlawful%20scraping%20of%2086%20million%20songs&amp;severity=high&amp;id=694e7c9ccb0c2e4fdeb3e193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-year-old-fortinet-fortios-ssl-vpn-flaw-active-3a11fdb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five-year-old%20Fortinet%20FortiOS%20SSL%20VPN%20flaw%20actively%20exploited&amp;severity=medium&amp;id=694e64d1ddaad31618addf2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-langchain-core-vulnerability-exposes-secr-24b8ea8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20LangChain%20Core%20Vulnerability%20Exposes%20Secrets%20via%20Serialization%20Injection&amp;severity=critical&amp;id=694e64e4ddaad31618adf431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67450-cwe-427-uncontrolled-search-path-el-730bb734</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67450%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Eaton%20UPS%20Companion%20software&amp;severity=high&amp;id=694e3453f3b146189c0afb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59888-cwe-428-unquoted-search-path-or-ele-bcb5c8a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59888%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20Eaton%20UPS%20Companion%20software&amp;severity=medium&amp;id=694e3453f3b146189c0afb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59887-cwe-427-uncontrolled-search-path-el-b954d403</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59887%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Eaton%20Eaton%20UPS%20Companion%20Software&amp;severity=high&amp;id=694e3453f3b146189c0afb85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62578-cwe-319-cleartext-transmission-of-s-5af203d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62578%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Delta%20Electronics%20DVP-12SE&amp;severity=high&amp;id=694e29d4f3b146189c00bac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8075-cwe-20-improper-input-validation-in--d394635e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8075%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20QNV-C8012&amp;severity=medium&amp;id=694e12d9f3548aedd14cdc88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52601-cwe-321-use-of-hard-coded-cryptogra-706197e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52601%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20Device%20Manager&amp;severity=medium&amp;id=694e12d9f3548aedd14cdc85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52600-cwe-20-improper-input-validation-in-b14ca427</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52600%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20QNV-C8012&amp;severity=medium&amp;id=694e0f54f3548aedd1483f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52599-cwe-269-improper-privilege-manageme-fe306a0e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52599%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20QNV-C8012&amp;severity=medium&amp;id=694e0f54f3548aedd1483f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52598-cwe-295-improper-certificate-valida-7c93afa3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52598%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20QNV-C8012&amp;severity=medium&amp;id=694e0f54f3548aedd1483f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15099-improper-authentication-in-simstudi-24cea6ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15099%3A%20Improper%20Authentication%20in%20simstudioai%20sim&amp;severity=medium&amp;id=694e0bd1f3548aedd14620a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15098-server-side-request-forgery-in-yuna-7f3bb429</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15098%3A%20Server-Side%20Request%20Forgery%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=694dfdd590f5ab8d8496eb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15097-improper-authentication-in-alteryx--ff12d8a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15097%3A%20Improper%20Authentication%20in%20Alteryx%20Server&amp;severity=medium&amp;id=694df6cb90f5ab8d8495363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15095-cross-site-scripting-in-postmanlabs-ce50d497</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15095%3A%20Cross%20Site%20Scripting%20in%20postmanlabs%20httpbin&amp;severity=medium&amp;id=694df6cb90f5ab8d84953634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15094-cross-site-scripting-in-sunkaifei-f-590ca55e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15094%3A%20Cross%20Site%20Scripting%20in%20sunkaifei%20FlyCMS&amp;severity=medium&amp;id=694dec4090f5ab8d848ddc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15093-cross-site-scripting-in-sunkaifei-f-2e22a3c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15093%3A%20Cross%20Site%20Scripting%20in%20sunkaifei%20FlyCMS&amp;severity=medium&amp;id=694de1be90f5ab8d8485b016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15092-buffer-overflow-in-utt-512w-4ff41af4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15092%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=694dd5fa8e70994989d5204f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-26-66477bd1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-26&amp;severity=medium&amp;id=694f23a733784cecd4a2ba30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66738-na-f81b2c51</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66738%3A%20n%2Fa&amp;severity=high&amp;id=694ebaca33784cecd47d2b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44065-na-ea0be00f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44065%3A%20n%2Fa&amp;severity=critical&amp;id=694ebaca33784cecd47d2b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66737-na-e956d76b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66737%3A%20n%2Fa&amp;severity=medium&amp;id=694eb6b333784cecd47a79ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42718-na-2dd731cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42718%3A%20n%2Fa&amp;severity=medium&amp;id=694eb6b333784cecd47a79aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29720-na-d262a0ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29720%3A%20n%2Fa&amp;severity=medium&amp;id=694eb33b33784cecd475b0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57403-na-b89d59b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57403%3A%20n%2Fa&amp;severity=high&amp;id=694eb33b33784cecd475b0ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67014-na-41ddc1ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67014%3A%20n%2Fa&amp;severity=high&amp;id=694eac67f5f69c8dc2a51203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66947-na-fffce203</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66947%3A%20n%2Fa&amp;severity=medium&amp;id=694ea97cf5f69c8dc2a0b964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67015-na-35bedd05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67015%3A%20n%2Fa&amp;severity=high&amp;id=694ea97cf5f69c8dc2a0b960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67013-na-9ad5da5f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67013%3A%20n%2Fa&amp;severity=medium&amp;id=694ea97cf5f69c8dc2a0b95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25341-na-52f6fdc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25341%3A%20n%2Fa&amp;severity=high&amp;id=694ea55ef5f69c8dc29d5015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67349-na-dabe5216</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67349%3A%20n%2Fa&amp;severity=medium&amp;id=694ea1e7f5f69c8dc2984abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65885-na-128e8357</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65885%3A%20n%2Fa&amp;severity=medium&amp;id=694e9f3b2bc1afab4ba470b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15091-buffer-overflow-in-utt-512w-a4ed831e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15091%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=694dcb6d8e70994989c8c85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14913-cwe-862-missing-authorization-in-wp-254f1c52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14913%3A%20CWE-862%20Missing%20Authorization%20in%20wpshuffle%20Frontend%20Post%20Submission%20Manager%20Lite%20%E2%80%93%20Frontend%20Posting%20WordPress%20Plugin&amp;severity=medium&amp;id=694dc7eb8e70994989c72dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15090-buffer-overflow-in-utt-512w-48838686</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15090%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=694dd8a490f5ab8d848037d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15089-buffer-overflow-in-utt-512w-d90fd5fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15089%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=694dc5dd8e70994989c5c8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15088-sql-injection-in-ketr-jepaas-37627fd2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15088%3A%20SQL%20Injection%20in%20ketr%20JEPaaS&amp;severity=medium&amp;id=694db6612ae90972ac5c78a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15087-improper-authorization-in-youlaitec-6bc441ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15087%3A%20Improper%20Authorization%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=694da8ba9e3e753cc31e3817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15086-improper-access-controls-in-youlait-d3f42cf9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15086%3A%20Improper%20Access%20Controls%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=694da1bc9e3e753cc3176e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68936-cwe-79-improper-neutralization-of-i-8929366f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68936%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ONLYOFFICE%20Document%20Server&amp;severity=medium&amp;id=694d9b76ac739891066893e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68935-cwe-79-improper-neutralization-of-i-a1d33b23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68935%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ONLYOFFICE%20Document%20Server&amp;severity=medium&amp;id=694d9b76ac739891066893e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15085-improper-authorization-in-youlaitec-88700874</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15085%3A%20Improper%20Authorization%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=694d9b76ac739891066893e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15084-improper-access-controls-in-youlait-95491511</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15084%3A%20Improper%20Access%20Controls%20in%20youlaitech%20youlai-mall&amp;severity=low&amp;id=694d87052ffa995e0cff37ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15083-on-chip-debug-and-test-interface-wi-3e4729a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15083%3A%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20TOZED%20ZLT%20M30s&amp;severity=low&amp;id=694d7662f4aff2fc081e1f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15082-information-disclosure-in-tozed-zlt-81a0e5d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15082%3A%20Information%20Disclosure%20in%20TOZED%20ZLT%20M30s&amp;severity=medium&amp;id=694d6f65f4aff2fc0818851c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15081-command-injection-in-jd-cloud-be650-1008c4b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15081%3A%20Command%20Injection%20in%20JD%20Cloud%20BE6500&amp;severity=medium&amp;id=694d55421baa80570922cc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-stealth-loaders-ai-chatbot-fla-99e7b5e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Stealth%20Loaders%2C%20AI%20Chatbot%20Flaws%20AI%20Exploits%2C%20Docker%20Hack%2C%20and%2015%20More%20Stories&amp;severity=medium&amp;id=694d59541baa805709281622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2307-cwe-79-improper-neutralization-of-in-29d3bb3c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2307%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Verisay%20Communication%20and%20Information%20Technology%20Industry%20and%20Trade%20Ltd.%20Co.%20Aidango&amp;severity=high&amp;id=694d3ac1a66482ded1ed29ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2406-cwe-79-improper-neutralization-of-in-f29ffd48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2406%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Verisay%20Communication%20and%20Information%20Technology%20Industry%20and%20Trade%20Ltd.%20Co.%20Trizbi&amp;severity=high&amp;id=694d3ac1a66482ded1ed2a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2405-cwe-79-improper-neutralization-of-in-22548e54</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2405%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Verisay%20Communication%20and%20Information%20Technology%20Industry%20and%20Trade%20Ltd.%20Co.%20Titarus&amp;severity=high&amp;id=694d3ac1a66482ded1ed2a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-mas-windows-activation-domain-used-to-spread--c59c8530</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20MAS%20Windows%20activation%20domain%20used%20to%20spread%20PowerShell%20malware&amp;severity=high&amp;id=694d373ea66482ded1ea090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-actively-exploited-digiever-nvr-vulnera-4793cc5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Actively%20Exploited%20Digiever%20NVR%20Vulnerability%20Allowing%20Remote%20Code%20Execution&amp;severity=high&amp;id=694d373ea66482ded1ea08f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-active-exploitation-of-fortios-s-7588133f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Warns%20of%20Active%20Exploitation%20of%20FortiOS%20SSL%20VPN%202FA%20Bypass%20Vulnerability&amp;severity=high&amp;id=694d373ea66482ded1ea08fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-2022-breach-led-to-years-long-cryptocurre-2c8e1d63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%202022%20Breach%20Led%20to%20Years-Long%20Cryptocurrency%20Thefts%2C%20TRM%20Labs%20Finds&amp;severity=medium&amp;id=694d373ea66482ded1ea092c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/csrf-protection-without-tokens-or-hidden-form-fiel-a9bc5643</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CSRF%20Protection%20without%20Tokens%20or%20Hidden%20Form%20Fields&amp;severity=medium&amp;id=694d1965e0af5c9a9a86af7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-active-exploitation-of-fortios-s-5e3d59b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Warns%20of%20Active%20Exploitation%20of%20FortiOS%20SSL%20VPN%202FA%20Bypass%20Vulnerability&amp;severity=low&amp;id=694cf78a3d2785a864bf3f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-actively-exploited-digiever-nvr-vulnera-5de96a0c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Actively%20Exploited%20Digiever%20NVR%20Vulnerability%20Allowing%20Remote%20Code%20Execution&amp;severity=critical&amp;id=694d0abe9393940d4873d875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15078-sql-injection-in-itsourcecode-stude-dbef1ba7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15078%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=694cc81abddd8c7d7f664829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15077-sql-injection-in-itsourcecode-stude-a57572a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15077%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=694cba530921a92379b92d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15076-path-traversal-in-tenda-ch22-e4cfe51b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15076%3A%20Path%20Traversal%20in%20Tenda%20CH22&amp;severity=medium&amp;id=694cb5998e23ad4a677a863f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15075-sql-injection-in-itsourcecode-stude-adeb5c49</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15075%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=694cab0d8e23ad4a67740162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15074-sql-injection-in-itsourcecode-onlin-711b6435</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15074%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=694cab0d8e23ad4a6774015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-25-be54d0ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-25&amp;severity=medium&amp;id=694dd26a8e70994989cf121e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freebsd-rtsold-15x-remote-code-execution-via-dnssl-4131792e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FreeBSD%20rtsold%2015.x%20-%20Remote%20Code%20Execution%20via%20DNSSL&amp;severity=critical&amp;id=694d89022ffa995e0c012b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chained-quiz-135-unauthenticated-insecure-direct-o-4650e5dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chained%20Quiz%20%201.3.5%20-%20Unauthenticated%20Insecure%20Direct%20Object%20Reference%20via%20Cookie&amp;severity=medium&amp;id=694d89022ffa995e0c012b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-quiz-maker-67056-sql-injection-b1412d1e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Quiz%20Maker%206.7.0.56%20-%20SQL%20Injection&amp;severity=medium&amp;id=694d89022ffa995e0c012b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66378-cwe-863-incorrect-authorization-in--84f7457e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66378%3A%20CWE-863%20Incorrect%20Authorization%20in%20Pexip%20Infinity&amp;severity=medium&amp;id=694cc81abddd8c7d7f664839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66377-cwe-306-missing-authentication-for--49ad67de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66377%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc81abddd8c7d7f664836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59683-cwe-863-incorrect-authorization-in--67144ea5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59683%3A%20CWE-863%20Incorrect%20Authorization%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc81abddd8c7d7f664833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48704-cwe-617-reachable-assertion-in-pexi-da833cc7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48704%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc81abddd8c7d7f664830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66443-cwe-617-reachable-assertion-in-pexi-cc25f33f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66443%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc4e20921a92379c39d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66379-cwe-617-reachable-assertion-in-pexi-7de5280c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66379%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc4e20921a92379c39d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49088-cwe-617-reachable-assertion-in-pexi-892678d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49088%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=medium&amp;id=694cc4e20921a92379c39d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32096-cwe-617-reachable-assertion-in-pexi-0e88440b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32096%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc4e20921a92379c39d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32095-cwe-617-reachable-assertion-in-pexi-2da95b82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32095%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc4e20921a92379c39d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/websocket-rce-in-the-curseforge-launcher-6c8dbc1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WebSocket%20RCE%20in%20the%20CurseForge%20Launcher&amp;severity=medium&amp;id=694c81885f4e95c0c378ae3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15073-sql-injection-in-itsourcecode-onlin-836a4e29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15073%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=694c7418585daa086f41f356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68920-cwe-862-missing-authorization-in-ke-f2f7c763</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68920%3A%20CWE-862%20Missing%20Authorization%20in%20kermitproject%20C-Kermit&amp;severity=high&amp;id=694c648a9a174f390b50ac19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-targeting-india-using-tax-themed-phishi-778f2deb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Targeting%20India%20Using%20Tax%20Themed%20Phishing%20Lures&amp;severity=medium&amp;id=694e5d4fddaad31618a6af91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68919-cwe-532-insertion-of-sensitive-info-22835cca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68919%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Fujitsu%20%2F%20Fsas%20Technologies%20ETERNUS%20SF%20ACM%2FSC%2FExpress&amp;severity=medium&amp;id=694c5c919a174f390b469df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68917-cwe-79-improper-neutralization-of-i-01fd401c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68917%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ONLYOFFICE%20Document%20Server&amp;severity=medium&amp;id=694c4f8fd9ecbeec2ac2a95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8769-cwe-20-in-megasys-computer-technolog-34cd1760</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8769%3A%20CWE-20%20in%20MegaSys%20Computer%20Technologies%20Telenium%20Online%20Web%20Application&amp;severity=critical&amp;id=694c4c0ad9ecbeec2abe38b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3232-cwe-306-in-mitsubishi-electric-europ-d9ab6730</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3232%3A%20CWE-306%20in%20Mitsubishi%20Electric%20Europe%20smartRTU&amp;severity=high&amp;id=694c4887d9ecbeec2abc776c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68916-cwe-25-path-traversal-filedir-in-ri-5d011025</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68916%3A%20CWE-25%20Path%20Traversal%3A%20&apos;%2F..%2Ffiledir&apos;%20in%20Riello%20NetMan&amp;severity=critical&amp;id=694c450ed9ecbeec2ab862a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68915-cwe-79-improper-neutralization-of-i-691de484</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68915%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Riello%20NetMan&amp;severity=medium&amp;id=694c450ed9ecbeec2ab8629e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68914-cwe-89-improper-neutralization-of-s-f429854c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68914%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Riello%20NetMan&amp;severity=medium&amp;id=694c450ed9ecbeec2ab8629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36154-cwe-313-cleartext-storage-in-a-file-67d69f76</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36154%3A%20CWE-313%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20IBM%20Concert&amp;severity=medium&amp;id=694c3aaadf08e956cf26e4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macsync-macos-stealer-uses-signed-app-to-bypas-3139da34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MacSync%20macOS%20Stealer%20Uses%20Signed%20App%20to%20Bypass%20Apple%20Gatekeeper&amp;severity=high&amp;id=694c303a484fa739dbdc500e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macsync-macos-stealer-uses-signed-app-to-bypas-d4ac26f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MacSync%20macOS%20Stealer%20Uses%20Signed%20App%20to%20Bypass%20Apple%20Gatekeeper&amp;severity=medium&amp;id=694c2f82484fa739dbdb4e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2515-incorrect-authorization-in-eclipse-f-10af996d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2515%3A%20Incorrect%20Authorization%20in%20Eclipse%20Foundation%20BlueChi&amp;severity=high&amp;id=694c14c8c1b1db9e83c081da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-seizes-domain-storing-bank-credentials-stolen--ed46e74d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20seizes%20domain%20storing%20bank%20credentials%20stolen%20from%20U.S.%20victims&amp;severity=high&amp;id=694c114cc1b1db9e83bc86ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mongodb-warns-admins-to-patch-severe-rce-flaw-imme-69c4c61c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MongoDB%20warns%20admins%20to%20patch%20severe%20RCE%20flaw%20immediately&amp;severity=critical&amp;id=694c114cc1b1db9e83bc86a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43876-cwe-78-improper-neutralization-of-s-ef95807e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43876%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Controls%20iSTAR%20Ultra%2C%20iSTAR%20Ultra%20SE&amp;severity=high&amp;id=694c098b550a31ae84b9ba46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43875-cwe-78-improper-neutralization-of-s-97654d86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43875%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Controls%20iSTAR%20Ultra%2C%20iSTAR%20Ultra%20SE&amp;severity=high&amp;id=694c0608550a31ae84b6c530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-russian-hackers-claim-cyberattack-on-french-po-b945c549</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Russian%20Hackers%20Claim%20Cyberattack%20on%20French%20Postal%20Service&amp;severity=medium&amp;id=694bfbad5a2eea8446bf8390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2155-cwe-434-unrestricted-upload-of-file--729e743a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2155%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Echo%20Call%20Center%20Services%20Trade%20and%20Industry%20Inc.%20Specto%20CM&amp;severity=high&amp;id=694bfbca5a2eea8446bfa2a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2154-cwe-79-improper-neutralization-of-in-8026720a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2154%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Echo%20Call%20Center%20Services%20Trade%20and%20Industry%20Inc.%20Specto%20CM&amp;severity=medium&amp;id=694bfbca5a2eea8446bfa2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-panda-apt-poisons-dns-requests-to-deliver--2df365db</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20Panda%20APT%20poisons%20DNS%20requests%20to%20deliver%20MgBot&amp;severity=medium&amp;id=694c0607550a31ae84b6c4b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68606-exposure-of-sensitive-system-inform-45d0e715</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68606%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPXPO%20PostX&amp;severity=medium&amp;id=694bea27279c98bf57f75488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68605-improper-neutralization-of-input-du-57892407</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68605%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=medium&amp;id=694bea27279c98bf57f75485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68603-missing-authorization-in-marketing--1fa6060f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68603%3A%20Missing%20Authorization%20in%20Marketing%20Fire%20Editorial%20Calendar&amp;severity=medium&amp;id=694bea25279c98bf57f75472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68602-url-redirection-to-untrusted-site-o-3eb82e75</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68602%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Scott%20Paterson%20Accept%20Donations%20with%20PayPal%20%26%20Stripe&amp;severity=medium&amp;id=694bea25279c98bf57f7546f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68601-cross-site-request-forgery-csrf-in--5507ce57</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68601%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rustaurius%20Five%20Star%20Restaurant%20Reservations&amp;severity=medium&amp;id=694bea25279c98bf57f7546c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68600-server-side-request-forgery-ssrf-in-c3cb034b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68600%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Yannick%20Lefebvre%20Link%20Library&amp;severity=medium&amp;id=694bea25279c98bf57f75469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68599-improper-neutralization-of-input-du-676d4414</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Embeds%20For%20YouTube%20Plugin%20Support%20YouTube%20Embed&amp;severity=medium&amp;id=694bea25279c98bf57f75466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68598-improper-neutralization-of-input-du-3ce8a961</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68598%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LiveComposer%20Page%20Builder%3A%20Live%20Composer&amp;severity=medium&amp;id=694bea25279c98bf57f75463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68597-improper-neutralization-of-input-du-1552e644</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68597%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BlueGlass%20Interactive%20AG%20Jobs%20for%20WordPress&amp;severity=medium&amp;id=694bea25279c98bf57f75460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68596-missing-authorization-in-bit-apps-b-ab595958</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68596%3A%20Missing%20Authorization%20in%20Bit%20Apps%20Bit%20Assist&amp;severity=medium&amp;id=694bea25279c98bf57f7545d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68595-missing-authorization-in-trustindex-c6c34d56</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68595%3A%20Missing%20Authorization%20in%20Trustindex%20Widgets%20for%20Social%20Photo%20Feed&amp;severity=medium&amp;id=694bea25279c98bf57f7545a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68594-missing-authorization-in-assaf-para-994714a8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68594%3A%20Missing%20Authorization%20in%20Opinion%20Stage%20Poll%2C%20Survey%20%26%20Quiz%20Maker%20Plugin%20by%20Opinion%20Stage&amp;severity=medium&amp;id=694bea25279c98bf57f75457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68593-missing-authorization-in-liton-aref-607a8db7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68593%3A%20Missing%20Authorization%20in%20Liton%20Arefin%20WP%20Adminify&amp;severity=medium&amp;id=694bea23279c98bf57f752cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68592-missing-authorization-in-liton-aref-7dee314a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68592%3A%20Missing%20Authorization%20in%20Liton%20Arefin%20WP%20Adminify&amp;severity=medium&amp;id=694bea23279c98bf57f752ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68591-missing-authorization-in-mitchell-b-270364fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68591%3A%20Missing%20Authorization%20in%20Mitchell%20Bennis%20Simple%20File%20List&amp;severity=medium&amp;id=694bea23279c98bf57f752c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68590-improper-neutralization-of-special--5849784a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68590%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CRM%20Perks%20Integration%20for%20Contact%20Form%207%20HubSpot&amp;severity=high&amp;id=694bea23279c98bf57f752c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68589-missing-authorization-in-wp-socio-w-34e87768</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68589%3A%20Missing%20Authorization%20in%20WP%20Socio%20WP%20Telegram%20Widget%20and%20Join%20Link&amp;severity=medium&amp;id=694bea23279c98bf57f752c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68588-missing-authorization-in-totalsoft--3a4b17d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68588%3A%20Missing%20Authorization%20in%20totalsoft%20TS%20Poll&amp;severity=medium&amp;id=694bea23279c98bf57f752be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68587-missing-authorization-in-bob-watu-q-b2d3b854</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68587%3A%20Missing%20Authorization%20in%20Bob%20Watu%20Quiz&amp;severity=medium&amp;id=694bea23279c98bf57f752bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68586-missing-authorization-in-gora-tech--e11fcfc2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68586%3A%20Missing%20Authorization%20in%20Gora%20Tech%20Cooked&amp;severity=medium&amp;id=694bea23279c98bf57f752b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68585-missing-authorization-in-ben-balter-19e9ceaa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68585%3A%20Missing%20Authorization%20in%20Ben%20Balter%20WP%20Document%20Revisions&amp;severity=low&amp;id=694bea23279c98bf57f752b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68584-cross-site-request-forgery-csrf-in--fbd9bc8d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68584%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Constantin%20Boiangiu%20Vimeotheque&amp;severity=medium&amp;id=694bea23279c98bf57f752b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68583-cross-site-request-forgery-csrf-in--02da362c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68583%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tikweb%20Management%20Fast%20User%20Switching&amp;severity=medium&amp;id=694bea21279c98bf57f7529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68582-missing-authorization-in-funnelform-baba8937</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68582%3A%20Missing%20Authorization%20in%20Funnelforms%20Funnelforms%20Free&amp;severity=medium&amp;id=694bea21279c98bf57f75297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68581-missing-authorization-in-yithemes-y-6a15eea2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68581%3A%20Missing%20Authorization%20in%20YITHEMES%20YITH%20Slider%20for%20page%20builders&amp;severity=medium&amp;id=694bea21279c98bf57f75294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68580-cross-site-request-forgery-csrf-in--8e5e1458</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68580%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pluginsware%20Advanced%20Classifieds%20%26%20Directory%20Pro&amp;severity=medium&amp;id=694bea21279c98bf57f75291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68579-missing-authorization-in-foliovisio-b6436965</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68579%3A%20Missing%20Authorization%20in%20FolioVision%20FV%20Simpler%20SEO&amp;severity=medium&amp;id=694bea21279c98bf57f7528e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68575-missing-authorization-in-wappointme-9d2aca1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68575%3A%20Missing%20Authorization%20in%20Wappointment%20team%20Wappointment&amp;severity=medium&amp;id=694bea21279c98bf57f7528b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68574-improper-neutralization-of-input-du-ebee53be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20voidcoders%20WPBakery%20Visual%20Composer%20WHMCS%20Elements&amp;severity=medium&amp;id=694bea21279c98bf57f75288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68573-cross-site-request-forgery-csrf-in--7d187062</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68573%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alessandro%20Piconi%20Simple%20Keyword%20to%20Link&amp;severity=medium&amp;id=694bea21279c98bf57f75285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68572-missing-authorization-in-spider-the-bc813c8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68572%3A%20Missing%20Authorization%20in%20Spider%20Themes%20BBP%20Core&amp;severity=medium&amp;id=694bea21279c98bf57f75282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68571-missing-authorization-in-salesmanag-a18de078</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68571%3A%20Missing%20Authorization%20in%20SALESmanago%20SALESmanago%20%26%20Leadoo&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68570-improper-neutralization-of-special--dfb7803e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68570%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20captivateaudio%20Captivate%20Sync&amp;severity=high&amp;id=694bea21279c98bf57f7527f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68569-missing-authorization-in-codepeople-17c47c6c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68569%3A%20Missing%20Authorization%20in%20codepeople%20WP%20Time%20Slots%20Booking%20Form&amp;severity=medium&amp;id=694bea1e279c98bf57f75256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68568-missing-authorization-in-integratio-eedddb58</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68568%3A%20Missing%20Authorization%20in%20Claspo%20Popup%20Builders%20Claspo%20%E2%80%93%20Popups%2C%20Spin%20the%20Wheel%20%26%20Email%20Capture&amp;severity=medium&amp;id=694bea1e279c98bf57f75253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68567-cross-site-request-forgery-csrf-in--001ee464</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68567%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=medium&amp;id=694bea1e279c98bf57f75250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68566-improper-neutralization-of-input-du-04d80a8b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=medium&amp;id=694bea1e279c98bf57f7524d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68565-missing-authorization-in-jaybee-twi-49be1953</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68565%3A%20Missing%20Authorization%20in%20JayBee%20Twitch%20Player&amp;severity=medium&amp;id=694bea1e279c98bf57f7524a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68506-improper-control-of-filename-for-in-60e27d39</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68506%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nawawi%20Jamili%20Docket%20Cache&amp;severity=high&amp;id=694bea1e279c98bf57f75247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68038-deserialization-of-untrusted-data-i-36a7f7b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68038%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Icegram%20Icegram%20Express%20Pro&amp;severity=high&amp;id=694bea1e279c98bf57f75244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67909-authorization-bypass-through-user-c-e45d875b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67909%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20Swings%20Membership%20For%20WooCommerce&amp;severity=high&amp;id=694bea1e279c98bf57f75241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67633-improper-neutralization-of-input-du-d52e2331</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67633%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brownbagmarketing%20Greenhouse%20Job%20Board&amp;severity=medium&amp;id=694bea1e279c98bf57f7523e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67632-improper-neutralization-of-input-du-acfaf597</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20Plugin%20Factory%20Google%20AdSense%20for%20Responsive%20Design%20%E2%80%93%20GARD&amp;severity=medium&amp;id=694bea1e279c98bf57f7523b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67631-improper-neutralization-of-input-du-289ad904</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ecommerce%20Platforms%20Gift%20Hunt&amp;severity=medium&amp;id=694bea1c279c98bf57f751fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67630-improper-neutralization-of-input-du-5050b5d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webheadcoder%20WH%20Tweaks&amp;severity=medium&amp;id=694bea1c279c98bf57f751fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67629-improper-neutralization-of-input-du-c9760941</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basticom%20Basticom%20Framework&amp;severity=medium&amp;id=694bea1c279c98bf57f751f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67628-improper-neutralization-of-input-du-1dea10f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67628%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AMP-MODE%20Review%20Disclaimer&amp;severity=medium&amp;id=694bea1c279c98bf57f751f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67627-improper-neutralization-of-input-du-b5fad6a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67627%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TouchOfTech%20Draft%20Notify&amp;severity=medium&amp;id=694bea1c279c98bf57f751f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67625-cross-site-request-forgery-csrf-in--a85bb7c4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67625%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tmtraderunner%20Trade%20Runner&amp;severity=medium&amp;id=694bea1c279c98bf57f751ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67623-server-side-request-forgery-ssrf-in-19dd6f91</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67623%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%206Storage%206Storage%20Rentals&amp;severity=medium&amp;id=694bea1c279c98bf57f751eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67622-cross-site-request-forgery-csrf-in--c3aba9d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67622%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20titopandub%20Evergreen%20Post%20Tweeter&amp;severity=high&amp;id=694bea1c279c98bf57f751e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67621-exposure-of-sensitive-system-inform-300cbe53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67621%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%2010up%20Eight%20Day%20Week%20Print%20Workflow&amp;severity=medium&amp;id=694bea1c279c98bf57f751e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nomani-investment-scam-surges-62-using-ai-deepfake-df8f7f6a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nomani%20Investment%20Scam%20Surges%2062%25%20Using%20AI%20Deepfake%20Ads%20on%20Social%20Media&amp;severity=medium&amp;id=694bfc755a2eea8446c1242a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54161-e7b46d71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54161&amp;severity=null&amp;id=695450bcdb813ff03e2bf882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54103-4d022dec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54103&amp;severity=null&amp;id=695450acdb813ff03e2bebf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54082-e3880816</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54082&amp;severity=null&amp;id=695450bcdb813ff03e2bf880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40679-cwe-862-missing-authorization-in-je-21216bf2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40679%3A%20CWE-862%20Missing%20Authorization%20in%20Jewel%20Theme%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=694be306279c98bf57efd5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32120-cwe-79-improper-neutralization-of-i-d07786cc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Hostel&amp;severity=medium&amp;id=694be306279c98bf57efd5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28619-cwe-862-missing-authorization-in-bn-281a81ec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28619%3A%20CWE-862%20Missing%20Authorization%20in%20bnayawpguy%20Resoto&amp;severity=medium&amp;id=694be306279c98bf57efd5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68608-missing-authorization-in-deluxethem-afcdec58</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68608%3A%20Missing%20Authorization%20in%20DeluxeThemes%20Userpro&amp;severity=high&amp;id=694bdf8b279c98bf57ee5aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68563-improper-control-of-filename-for-in-88bf04c4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68563%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Shuffle%20Subscribe%20to%20Unlock%20Lite&amp;severity=high&amp;id=694bdf8b279c98bf57ee5aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68540-improper-control-of-filename-for-in-5bc65fc5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68540%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Fana&amp;severity=high&amp;id=694bdf8b279c98bf57ee5ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68537-improper-control-of-filename-for-in-57d681ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68537%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Zota&amp;severity=high&amp;id=694bdf8b279c98bf57ee5ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68535-missing-authorization-in-sunshineph-80ac8ddc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68535%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=medium&amp;id=694bdf8b279c98bf57ee5ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68533-improper-neutralization-of-input-du-20c724a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68533%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HasThemes%20WC%20Builder&amp;severity=medium&amp;id=694bdf88279c98bf57ee5779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68532-improper-neutralization-of-input-du-ca683309</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20modeltheme%20ModelTheme%20Addons%20for%20WPBakery%20and%20Elementor&amp;severity=medium&amp;id=694bdf88279c98bf57ee5776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68530-improper-control-of-filename-for-in-310b31ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68530%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pavothemes%20Bookory&amp;severity=high&amp;id=694bdf88279c98bf57ee5773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68529-cross-site-request-forgery-csrf-in--bbd0073a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68529%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rhys%20Wynne%20WP%20Email%20Capture&amp;severity=medium&amp;id=694bdf88279c98bf57ee5770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68528-improper-neutralization-of-input-du-dd800929</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Free%20Shipping%20Bar%3A%20Amount%20Left%20for%20Free%20Shipping%20for%20WooCommerce&amp;severity=medium&amp;id=694bdf88279c98bf57ee576d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68527-improper-neutralization-of-input-du-b6e1ad0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68527%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kodezen%20LLC%20Academy%20LMS&amp;severity=medium&amp;id=694bdf88279c98bf57ee576a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68525-improper-neutralization-of-input-du-49c67a1e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelgrade%20Category%20Icon&amp;severity=medium&amp;id=694bdf88279c98bf57ee5767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68523-missing-authorization-in-spiffy-plu-fe61153d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68523%3A%20Missing%20Authorization%20in%20Spiffy%20Plugins%20Spiffy%20Calendar&amp;severity=medium&amp;id=694bdf88279c98bf57ee5764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68519-improper-neutralization-of-special--89d8abea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68519%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BeRocket%20Brands%20for%20WooCommerce&amp;severity=high&amp;id=694bdf88279c98bf57ee5761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68517-missing-authorization-in-essekia-ta-1adda1d8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68517%3A%20Missing%20Authorization%20in%20Essekia%20Tablesome&amp;severity=medium&amp;id=694bdf88279c98bf57ee575e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68516-insertion-of-sensitive-information--5f260c3d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68516%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Essekia%20Tablesome&amp;severity=medium&amp;id=694bdf86279c98bf57ee5739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68513-improper-neutralization-of-input-du-f18e7e1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68513%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Timeline%20Lite&amp;severity=medium&amp;id=694bdf86279c98bf57ee5736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68512-improper-neutralization-of-input-du-e518f476</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68512%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativeinteractivemedia%20Real%203D%20FlipBook&amp;severity=medium&amp;id=694bdf86279c98bf57ee5733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68511-missing-authorization-in-jegstudio--7b211a48</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68511%3A%20Missing%20Authorization%20in%20Jegstudio%20Gutenverse%20Form&amp;severity=medium&amp;id=694bdf86279c98bf57ee5730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68509-url-redirection-to-untrusted-site-o-11879abd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68509%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Jeff%20Starr%20User%20Submitted%20Posts&amp;severity=medium&amp;id=694bdf86279c98bf57ee572d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68505-missing-authorization-in-icc0rz-h5p-eb4c9926</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68505%3A%20Missing%20Authorization%20in%20icc0rz%20H5P&amp;severity=medium&amp;id=694bdf86279c98bf57ee572a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68500-server-side-request-forgery-ssrf-in-ddcb1747</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68500%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20For%20Elementor&amp;severity=medium&amp;id=694bdf86279c98bf57ee5727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68497-improper-neutralization-of-input-du-74e13614</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68497%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Astra%20Widgets&amp;severity=medium&amp;id=694bdf86279c98bf57ee5724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68496-improper-neutralization-of-special--129f996e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68496%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Syed%20Balkhi%20User%20Feedback&amp;severity=high&amp;id=694bdf86279c98bf57ee5721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68494-exposure-of-sensitive-system-inform-f13a9e04</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68494%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=694bdf86279c98bf57ee571e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54061-260db88a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54061&amp;severity=null&amp;id=695450bcdb813ff03e2bf886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54054-7169bde6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54054&amp;severity=null&amp;id=695450acdb813ff03e2bebee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-deep-dive-how-early-boot-dma-attacks-are-ba0ecb99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Deep%20Dive%3A%20How%20Early-Boot%20DMA%20Attacks%20are%20bypassing%20IOMMU%20on%20modern%20UEFI%20systems&amp;severity=critical&amp;id=694bd1cbd92b37ea4884053d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attacks-are-evolving-3-ways-to-protect-your-busine-70c77822</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attacks%20are%20Evolving%3A%203%20Ways%20to%20Protect%20Your%20Business%20in%202026&amp;severity=medium&amp;id=694bd7b3d92b37ea488ac8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eurostar-accused-researchers-of-blackmail-for-repo-f0a44ae3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eurostar%20Accused%20Researchers%20of%20Blackmail%20for%20Reporting%20Serious%20AI%20Chatbot%20Vulnerabilities&amp;severity=high&amp;id=694bce40d92b37ea48822362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54029-f060d5c2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54029&amp;severity=low&amp;id=695b99acdb813ff03e48b591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sec-files-charges-over-14-million-crypto-scam-usin-1112e1ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEC%20Files%20Charges%20Over%20%2414%20Million%20Crypto%20Scam%20Using%20Fake%20AI-Themed%20Investment%20Tips&amp;severity=medium&amp;id=694bc6d99aa9cfad4fc54f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57840-cwe-269-improper-privilege-manageme-db7f2da9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57840%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Honor%20Magic%20OS&amp;severity=low&amp;id=694b9152c9988d5885b407ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italy-fines-apple-986-million-over-att-rules-limit-19b0a03f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italy%20Fines%20Apple%20%E2%82%AC98.6%20Million%20Over%20ATT%20Rules%20Limiting%20App%20Store%20Competition&amp;severity=low&amp;id=694ba4ad8a0fdcaea830efc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13407-cwe-434-unrestricted-upload-of-file-51add803</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13407%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Gravity%20Forms&amp;severity=medium&amp;id=694b843854de1641bdb80e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linearizing-sha-256-via-fractional-modular-analysi-7cd38114</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linearizing%20SHA-256%20via%20fractional%20modular%20analysis%20(Kaoru%20Method)&amp;severity=medium&amp;id=694b7d3554de1641bdadf303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66444-cwe-79-improper-neutralization-of-i-600eea9c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66444%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=high&amp;id=694b763354de1641bda79407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66445-cwe-306-missing-authentication-for--a6a62849</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66445%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=high&amp;id=694b736bce42f4d6d98ab670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13773-cwe-94-improper-control-of-generati-9e9b2019</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13773%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=critical&amp;id=694b6fe5ce42f4d6d986e053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15053-sql-injection-in-code-projects-stud-f5d42ed6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15053%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=694b66f1ce42f4d6d97d5045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15052-cross-site-scripting-in-code-projec-d3edc2df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15052%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=694b66f1ce42f4d6d97d503e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15050-unrestricted-upload-in-code-project-a4f6811e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15050%3A%20Unrestricted%20Upload%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=694b38e9b05e549e5d30882e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/availability-of-old-crypto-exchange-user-email-add-c2595c46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Availability%20of%20old%20crypto%20exchange%20user%20email%20addresses%3F%20-%20Help%20to%20notify%20victims%20of%20the%20Bitfinex%20Hack%20-%20Now%20the%20largest%20forfeiture%20(113000%20Bitcoins)&amp;severity=medium&amp;id=694b2ef10a0f3cdd674eb766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-24-12cf5821</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-24&amp;severity=medium&amp;id=694c81775f4e95c0c3788b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60935-na-b350b626</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60935%3A%20n%2Fa&amp;severity=medium&amp;id=694c0d10550a31ae84bde24f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40317-na-f8358d37</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40317%3A%20n%2Fa&amp;severity=medium&amp;id=694c098b550a31ae84b9ba42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39037-na-1ee7f50e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39037%3A%20n%2Fa&amp;severity=medium&amp;id=694c0608550a31ae84b6c52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35322-na-0ed41982</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35322%3A%20n%2Fa&amp;severity=medium&amp;id=694c0608550a31ae84b6c528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58335-cwe-611-improper-restriction-of-xml-955c09dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58335%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20jcthiele%20OpenXRechnungToolbox&amp;severity=medium&amp;id=694b7d3054de1641bdaded10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15049-sql-injection-in-code-projects-onli-e29fbcf1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15049%3A%20SQL%20Injection%20in%20code-projects%20Online%20Farm%20System&amp;severity=medium&amp;id=694b21afd0b9012ffd6d18db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68696-cwe-918-server-side-request-forgery-bdfea579</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68696%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jnunemaker%20httparty&amp;severity=high&amp;id=694b21b0d0b9012ffd6d18e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68665-cwe-502-deserialization-of-untruste-ca398625</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68665%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langchainjs&amp;severity=high&amp;id=694b21afd0b9012ffd6d18e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-a-multi-stage-macos-infostealer-0b0922e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20a%20Multi-Stage%20macOS%20Infostealer&amp;severity=medium&amp;id=694b1e37d0b9012ffd6895af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68669-cwe-79-improper-neutralization-of-i-63086d96</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68669%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=694b1e31d0b9012ffd688bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68664-cwe-502-deserialization-of-untruste-afc7ade4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68664%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langchain&amp;severity=critical&amp;id=694b1e31d0b9012ffd688bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15048-command-injection-in-tenda-wh450-92b1c857</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15048%3A%20Command%20Injection%20in%20Tenda%20WH450&amp;severity=medium&amp;id=694b2534d0b9012ffd70d6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66213-cwe-78-improper-neutralization-of-s-1966d389</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66213%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b149ad69af40f3136cc82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66212-cwe-78-improper-neutralization-of-s-88cd29aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66212%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b149ad69af40f3136cc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guide-to-preventing-the-most-common-enterprise-soc-56f05de7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guide%20to%20preventing%20the%20most%20common%20enterprise%20social%20engineering%20attacks&amp;severity=medium&amp;id=694b149fd69af40f3136cce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15047-stack-based-buffer-overflow-in-tend-201507ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15047%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694b149ad69af40f3136cc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66211-cwe-78-improper-neutralization-of-s-d8597e5b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66211%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b149ad69af40f3136cc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-gitlab-breach-exposes-data-of-21000-nissan-3cd215ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20GitLab%20breach%20exposes%20data%20of%2021%2C000%20Nissan%20customers&amp;severity=high&amp;id=694b1115d69af40f31320638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66210-cwe-78-improper-neutralization-of-s-38cb6bef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66210%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b1125d69af40f3132312c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12491-cwe-200-exposure-of-sensitive-infor-a302c821</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12491%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Senstar%20Symphony&amp;severity=high&amp;id=694b1125d69af40f31323131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66209-cwe-78-improper-neutralization-of-s-31b72d66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66209%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b1125d69af40f31323140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12840-cwe-122-heap-based-buffer-overflow--4ad434c2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12840%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Academy%20Software%20Foundation%20OpenEXR&amp;severity=high&amp;id=694b1125d69af40f3132313d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12839-cwe-122-heap-based-buffer-overflow--aed6601a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12839%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Academy%20Software%20Foundation%20OpenEXR&amp;severity=high&amp;id=694b1125d69af40f3132313a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12495-cwe-122-heap-based-buffer-overflow--24bbd9a4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12495%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Academy%20Software%20Foundation%20OpenEXR&amp;severity=high&amp;id=694b1125d69af40f31323134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12838-cwe-59-improper-link-resolution-bef-4a4f503d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12838%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20MSP360%20Free%20Backup&amp;severity=high&amp;id=694b1125d69af40f31323137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13698-cwe-22-improper-limitation-of-a-pat-7d1fce6b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13698%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Deciso%20OPNsense&amp;severity=medium&amp;id=694b0d93d69af40f312d385a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13715-cwe-502-deserialization-of-untruste-4b7a6668</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13715%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20FaceDetection-DSFD&amp;severity=high&amp;id=694b0d93d69af40f312d387e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13709-cwe-502-deserialization-of-untruste-f9c89a0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13709%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20TFace&amp;severity=high&amp;id=694b0d93d69af40f312d386a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13711-cwe-502-deserialization-of-untruste-ffa36311</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13711%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20TFace&amp;severity=high&amp;id=694b0d93d69af40f312d3872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13706-cwe-502-deserialization-of-untruste-d380745b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13706%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20PatrickStar&amp;severity=high&amp;id=694b0d93d69af40f312d385e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13708-cwe-502-deserialization-of-untruste-741519b9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13708%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20NeuralNLP-NeuralClassifier&amp;severity=high&amp;id=694b0d93d69af40f312d3866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13716-cwe-502-deserialization-of-untruste-3f94be8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13716%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20MimicMotion&amp;severity=high&amp;id=694b0d95d69af40f312d389a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13714-cwe-502-deserialization-of-untruste-6024b824</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13714%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20MedicalNet&amp;severity=high&amp;id=694b0d93d69af40f312d387a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13710-cwe-502-deserialization-of-untruste-f6f65021</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13710%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20HunyuanVideo&amp;severity=high&amp;id=694b0d93d69af40f312d386e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13707-cwe-502-deserialization-of-untruste-4aaf9e74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13707%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20HunyuanDiT&amp;severity=high&amp;id=694b0d93d69af40f312d3862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13712-cwe-502-deserialization-of-untruste-0dffb87c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13712%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20HunyuanDiT&amp;severity=high&amp;id=694b0d93d69af40f312d3876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13713-cwe-502-deserialization-of-untruste-9d594f99</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13713%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20Hunyuan3D-1&amp;severity=high&amp;id=694b0d95d69af40f312d38a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15046-stack-based-buffer-overflow-in-tend-bb8b390f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15046%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694b0d95d69af40f312d38a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13703-cwe-732-incorrect-permission-assign-54400d17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13703%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20VIPRE%20Advanced%20Security&amp;severity=high&amp;id=694b0d95d69af40f312d389e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14414-cwe-356-product-ui-does-not-warn-us-bd621d58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14414%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0d95d69af40f312d38a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14415-cwe-356-product-ui-does-not-warn-us-d05e72cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14415%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a14d69af40f312b7df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14413-cwe-22-improper-limitation-of-a-pat-9750c4ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14413%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a14d69af40f312b7df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14412-cwe-356-product-ui-does-not-warn-us-e149b9c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14412%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a14d69af40f312b7df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14411-cwe-125-out-of-bounds-read-in-soda--16ad1dca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14411%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Soda%20PDF%20Desktop&amp;severity=low&amp;id=694b0a14d69af40f312b7ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14410-cwe-125-out-of-bounds-read-in-soda--422d79ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14410%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Soda%20PDF%20Desktop&amp;severity=low&amp;id=694b0a12d69af40f312b7db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14409-cwe-787-out-of-bounds-write-in-soda-aaf40247</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14409%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a12d69af40f312b7db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14408-cwe-125-out-of-bounds-read-in-soda--4d00ae35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14408%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Soda%20PDF%20Desktop&amp;severity=low&amp;id=694b0a12d69af40f312b7dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14407-cwe-119-improper-restriction-of-ope-9a6bf049</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14407%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Soda%20PDF%20Desktop&amp;severity=low&amp;id=694b0a12d69af40f312b7dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14406-cwe-427-uncontrolled-search-path-el-6b0ce000</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14406%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a12d69af40f312b7da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14421-cwe-125-out-of-bounds-read-in-pdffo-45771e42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14421%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pdfforge%20PDF%20Architect&amp;severity=low&amp;id=694b0a14d69af40f312b7e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14420-cwe-22-improper-limitation-of-a-pat-cbe44120</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14420%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14419-cwe-119-improper-restriction-of-ope-8e33a1be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14419%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14418-cwe-356-product-ui-does-not-warn-us-1d40233a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14418%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14417-cwe-356-product-ui-does-not-warn-us-1f4cc08d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14417%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14416-cwe-356-product-ui-does-not-warn-us-b1fc5776</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14416%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14405-cwe-427-uncontrolled-search-path-el-9c217a53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14405%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20PDFsam%20Enhanced&amp;severity=medium&amp;id=694b0a12d69af40f312b7da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14404-cwe-356-product-ui-does-not-warn-us-43ea9253</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14404%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20PDFsam%20Enhanced&amp;severity=high&amp;id=694b0a12d69af40f312b7da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14403-cwe-356-product-ui-does-not-warn-us-10cd75a5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14403%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20PDFsam%20Enhanced&amp;severity=high&amp;id=694b0a12d69af40f312b7d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14402-cwe-356-product-ui-does-not-warn-us-b0d1ac32</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14402%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20PDFsam%20Enhanced&amp;severity=high&amp;id=694b0a12d69af40f312b7d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14401-cwe-125-out-of-bounds-read-in-pdfsa-740f307e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14401%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDFsam%20Enhanced&amp;severity=high&amp;id=694b0a12d69af40f312b7d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14501-cwe-476-null-pointer-dereference-in-d2278806</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14501%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Sante%20PACS%20Server&amp;severity=high&amp;id=694b0a18d69af40f312b7e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14498-cwe-427-uncontrolled-search-path-el-a8aa08f8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14498%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20TradingView%20Desktop&amp;severity=high&amp;id=694b0a18d69af40f312b7e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14494-cwe-749-exposed-dangerous-method-or-51ecad4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14494%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14491-cwe-749-exposed-dangerous-method-or-e3145f40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14491%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14489-cwe-749-exposed-dangerous-method-or-10cc5dbe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14489%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14490-cwe-749-exposed-dangerous-method-or-31ba8435</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14490%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14488-cwe-749-exposed-dangerous-method-or-10f24e49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14488%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14497-cwe-749-exposed-dangerous-method-or-c22ee38f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14497%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14495-cwe-749-exposed-dangerous-method-or-a4ac5c4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14495%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14493-cwe-749-exposed-dangerous-method-or-cd4a49c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14493%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14496-cwe-749-exposed-dangerous-method-or-cf9a401c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14496%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14492-cwe-749-exposed-dangerous-method-or-f2885f23</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14492%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14932-cwe-121-stack-based-buffer-overflow-435a0656</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14932%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14933-cwe-190-integer-overflow-or-wraparo-47049827</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14933%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14934-cwe-121-stack-based-buffer-overflow-b99bc4be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14934%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14935-cwe-122-heap-based-buffer-overflow--7b5e3188</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14935%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14936-cwe-121-stack-based-buffer-overflow-3de4cb37</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14936%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14925-cwe-502-deserialization-of-untruste-330be640</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14925%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Accelerate&amp;severity=high&amp;id=694b064e4eddf7475afca179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14922-cwe-502-deserialization-of-untruste-903b28bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14922%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Diffusers&amp;severity=high&amp;id=694b064e4eddf7475afca173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14931-cwe-502-deserialization-of-untruste-f426cae4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14931%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20smolagents&amp;severity=critical&amp;id=694b06504eddf7475afca195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14930-cwe-502-deserialization-of-untruste-99c41a0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14930%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14928-cwe-94-improper-control-of-generati-c1738c78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14928%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14924-cwe-502-deserialization-of-untruste-050f3747</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14924%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14920-cwe-502-deserialization-of-untruste-a0d964d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14920%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14926-cwe-94-improper-control-of-generati-c5732c31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14926%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14927-cwe-94-improper-control-of-generati-4d47d1eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14927%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14921-cwe-502-deserialization-of-untruste-cacb5701</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14921%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14929-cwe-502-deserialization-of-untruste-73e34153</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14929%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15045-stack-based-buffer-overflow-in-tend-0cd0200a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15045%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694b06504eddf7475afca1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11419-allocation-of-resources-without-lim-bd726837</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11419%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=high&amp;id=694aff404eddf7475af4bf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15044-stack-based-buffer-overflow-in-tend-3c7e80e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15044%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694aff404eddf7475af4bf93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53982-improper-neutralization-of-special--2e3e8b04</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53982%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sigb%20PMB&amp;severity=critical&amp;id=694af0d43b03476441e1a525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-knocks-offline-frances-postal-banking--a5e5f306</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20knocks%20offline%20France&apos;s%20postal%2C%20banking%20services&amp;severity=high&amp;id=694ae2c73b03476441d427fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-chrome-extensions-caught-secretly-stealing-cre-30cc9d50</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Chrome%20Extensions%20Caught%20Secretly%20Stealing%20Credentials%20from%20Over%20170%20Sites&amp;severity=high&amp;id=694ae2c73b03476441d427fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macsync-stealer-disguised-as-trusted-mac-app-h-4133f791</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MacSync%20Stealer%20Disguised%20as%20Trusted%20Mac%20App%20Hunts%20Your%20Saved%20Passwords&amp;severity=medium&amp;id=694ad8d52a62208f8b330ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33222-cwe-798-use-of-hard-coded-credentia-89cf704b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33222%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20NVIDIA%20Isaac%20Launchable&amp;severity=critical&amp;id=694acf18a81ab5ceedee7e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33223-cwe-250-execution-with-unnecessary--627533aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33223%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20NVIDIA%20Isaac%20Launchable&amp;severity=critical&amp;id=694acf18a81ab5ceedee7e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33224-cwe-250-execution-with-unnecessary--af7b58e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33224%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20NVIDIA%20Isaac%20Launchable&amp;severity=critical&amp;id=694acf18a81ab5ceedee7e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2025-holiday-scams-docusign-phishing-meets-loan-sp-af1eedb0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2025%20Holiday%20Scams%3A%20Docusign%20Phishing%20Meets%20Loan%20Spam&amp;severity=medium&amp;id=694ad1d72a62208f8b2cf541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-chrome-extensions-caught-secretly-stealing-cre-cbf3b7bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Chrome%20Extensions%20Caught%20Secretly%20Stealing%20Credentials%20from%20Over%20170%20Sites&amp;severity=medium&amp;id=694abd65e971240e2a7b89a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9684-cwe-119-improper-restriction-of-oper-c53b4ea4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9684%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20FreyrSCADA%20IEC-60870-5-104&amp;severity=high&amp;id=694aac52a6db0d9209ededd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-hits-romanian-water-authority-1000-syst-d08e6bf1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Hits%20Romanian%20Water%20Authority%2C%201000%20Systems%20Knocked%20Offline&amp;severity=medium&amp;id=694a9e45a6db0d9209e0a479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13183-cwe-79-improper-neutralization-of-i-b694b461</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Hotech%20Software%20Inc.%20Otello&amp;severity=high&amp;id=694a96bf8594d4628a6218f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nissan-confirms-impact-from-red-hat-data-breach-b6230865</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nissan%20Confirms%20Impact%20From%20Red%20Hat%20Data%20Breach&amp;severity=medium&amp;id=694a8c348594d4628a576146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/feds-seize-password-database-used-in-massive-bank--207ad22c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Feds%20Seize%20Password%20Database%20Used%20in%20Massive%20Bank%20Account%20Takeover%20Scheme&amp;severity=medium&amp;id=694a88b570354fdeefe463bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24844-cwe-862-missing-authorization-in-id-0a5f922a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24844%3A%20CWE-862%20Missing%20Authorization%20in%20IdeaBox%20Creations%20PowerPack%20Pro%20for%20Elementor&amp;severity=high&amp;id=694a88f670354fdeefe4c6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52210-vulnerability-in-tyche-softwares-pr-a2c1afa9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52210%3A%20Vulnerability%20in%20Tyche%20softwares%20Product%20Delivery%20Date%20for%20WooCommerce%20%E2%80%93%20Lite&amp;severity=medium&amp;id=694a88f670354fdeefe4c6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68546-cwe-98-improper-control-of-filename-4fc99eea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68546%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Nika&amp;severity=high&amp;id=694a88f670354fdeefe4c6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68544-cwe-98-improper-control-of-filename-ba5e03d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68544%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Diza&amp;severity=high&amp;id=694a855570354fdeefe116a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68548-cwe-79-improper-neutralization-of-i-a7e1cdbe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebCodingPlace%20Responsive%20Posts%20Carousel%20Pro&amp;severity=medium&amp;id=694a855570354fdeefe116ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68550-cwe-89-improper-neutralization-of-s-d09e4513</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68550%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VillaTheme%20WPBulky&amp;severity=high&amp;id=694a855570354fdeefe116ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68551-cwe-497-exposure-of-sensitive-syste-893513b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68551%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=medium&amp;id=694a81d070354fdeefdcefb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68556-cwe-862-missing-authorization-in-vi-dc415fa5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68556%3A%20Missing%20Authorization%20in%20VillaTheme%20HAPPY&amp;severity=medium&amp;id=694a81d070354fdeefdcefb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68557-cwe-862-missing-authorization-in-vi-5dcfeed1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68557%3A%20Missing%20Authorization%20in%20Vikas%20Ratudi%20Chakra%20test&amp;severity=medium&amp;id=694a81d070354fdeefdcefbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68559-cwe-79-improper-neutralization-of-i-1eb5b8e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=medium&amp;id=694a81d070354fdeefdcefc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68560-cwe-98-improper-control-of-filename-59c77b4d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68560%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=high&amp;id=694a81d070354fdeefdcefc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interpol-arrests-574-in-africa-ukrainian-ransomwar-81ec7e57</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=INTERPOL%20Arrests%20574%20in%20Africa%3B%20Ukrainian%20Ransomware%20Affiliate%20Pleads%20Guilty&amp;severity=medium&amp;id=694a882670354fdeefe3b3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68561-cwe-89-improper-neutralization-of-s-59c2fc04</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68561%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ruben%20Garcia%20AutomatorWP&amp;severity=high&amp;id=694a81d070354fdeefdcefc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59886-cwe-20-improper-input-validation-in-2d4c1c69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59886%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Eaton%20Eaton%20xComfort%20ECI&amp;severity=high&amp;id=694a81d070354fdeefdcefbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/passwd-a-walkthrough-of-the-google-workspace-passw-1f9ca260</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Passwd%3A%20A%20walkthrough%20of%20the%20Google%20Workspace%20Password%20Manager&amp;severity=medium&amp;id=694a882670354fdeefe3b3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14635-cwe-79-improper-neutralization-of-i-722f1448</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14635%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=694a88f670354fdeefe4c6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14000-cwe-79-improper-neutralization-of-i-b54c07cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=694a88f670354fdeefe4c6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pirate-group-annas-archive-copies-256-million-spot-722bf333</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pirate%20Group%20Anna%E2%80%99s%20Archive%20Copies%20256%20Million%20Spotify%20Songs%20in%20Data%20Scrape&amp;severity=medium&amp;id=694a7ace70354fdeefd70248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-flaw-cvss-99-enables-arbitrary-code-e-dac31bf3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20n8n%20Flaw%20(CVSS%209.9)%20Enables%20Arbitrary%20Code%20Execution%20Across%20Thousands%20of%20Instances&amp;severity=critical&amp;id=694a77833c0d0694898a009b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-doj-seizes-fraud-domain-behind-146-million-bank-7bb19014</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20DoJ%20Seizes%20Fraud%20Domain%20Behind%20%2414.6%20Million%20Bank%20Account%20Takeover%20Scheme&amp;severity=high&amp;id=694a77833c0d0694898a009f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/baker-university-says-2024-data-breach-impacts-530-6582b7cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Baker%20University%20says%202024%20data%20breach%20impacts%2053%2C000%20people&amp;severity=high&amp;id=694a77833c0d0694898a0093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-package-with-56000-downloads-steals-whatsapp-c-7a751ca4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Package%20With%2056%2C000%20Downloads%20Steals%20WhatsApp%20Credentials%2C%20Data&amp;severity=medium&amp;id=694a77573c0d06948989e89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/turning-list-unsubscribe-into-an-ssrfxss-gadget-e71ff148</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Turning%20List-Unsubscribe%20into%20an%20SSRF%2FXSS%20Gadget&amp;severity=medium&amp;id=694a6cf23c0d0694897f6e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italy-antitrust-agency-fines-apple-116-million-ove-1faa2894</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italy%20Antitrust%20Agency%20Fines%20Apple%20%24116%20Million%20Over%20Privacy%20Feature%3B%20Apple%20Announces%20Appeal&amp;severity=medium&amp;id=694a6cd03c0d0694897f57e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-bans-foreign-made-drones-and-key-parts-over-us-251b166f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Bans%20Foreign-Made%20Drones%20and%20Key%20Parts%20Over%20U.S.%20National%20Security%20Risks&amp;severity=high&amp;id=694a69643c0d0694897b184c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-a-flaw-in-digiever-ds-2105-pro-to-its-550b672f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20a%20flaw%20in%20Digiever%20DS-2105%20Pro%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=694a69643c0d0694897b1850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/574-arrested-3-million-seized-in-crackdown-on-afri-2aecf863</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=574%20Arrested%2C%20%243%20Million%20Seized%20in%20Crackdown%20on%20African%20Cybercrime%20Rings&amp;severity=medium&amp;id=694a62a1033f6f66d7774d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14388-cwe-158-improper-neutralization-of--469918d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14388%3A%20CWE-158%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20in%20kiboit%20PhastPress&amp;severity=critical&amp;id=694a62c0033f6f66d77784e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12934-cwe-862-missing-authorization-in-be-58e0e17f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12934%3A%20CWE-862%20Missing%20Authorization%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=high&amp;id=694a62c0033f6f66d77784cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14163-cwe-352-cross-site-request-forgery--eb1639ff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14163%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20leap13%20Premium%20Addons%20for%20Elementor%20%E2%80%93%20Powerful%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=694a62c0033f6f66d77784db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14548-cwe-79-improper-neutralization-of-i-b8f90af3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14548%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kieranoshea%20Calendar&amp;severity=medium&amp;id=694a62c0033f6f66d77784e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14155-cwe-862-missing-authorization-in-le-fcfd4c9f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14155%3A%20CWE-862%20Missing%20Authorization%20in%20leap13%20Premium%20Addons%20for%20Elementor%20%E2%80%93%20Powerful%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=694a62c0033f6f66d77784d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-doj-seizes-fraud-domain-behind-146-million-bank-d3911225</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20DoJ%20Seizes%20Fraud%20Domain%20Behind%20%2414.6%20Million%20Bank%20Account%20Takeover%20Scheme&amp;severity=medium&amp;id=694a76ef3c0d0694898962fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-flaw-cvss-99-enables-arbitrary-code-e-e75bd99b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20n8n%20Flaw%20(CVSS%209.9)%20Enables%20Arbitrary%20Code%20Execution%20Across%20Thousands%20of%20Instances&amp;severity=critical&amp;id=694a54f9ef649361abadc9cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/35-million-affected-by-university-of-phoenix-data--73c7ea66</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3.5%20Million%20Affected%20by%20University%20of%20Phoenix%20Data%20Breach&amp;severity=medium&amp;id=694a4707ef649361ab9ffec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-bans-foreign-made-drones-and-key-parts-over-us-4fba9572</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Bans%20Foreign-Made%20Drones%20and%20Key%20Parts%20Over%20U.S.%20National%20Security%20Risks&amp;severity=critical&amp;id=694a4007576fb14eec735518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-disrupts-frances-postal-service-and-ba-f2ab1950</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20Disrupts%20France%E2%80%99s%20Postal%20Service%20and%20Banking%20During%20Christmas%20Rush&amp;severity=medium&amp;id=694a2f701ebffca81fee60cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macsync-stealer-evolves-from-clickfix-to-code-sign-22a6d93c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MacSync%20Stealer%20Evolves%3A%20From%20ClickFix%20to%20Code-Signed%20Swift%20Malware&amp;severity=medium&amp;id=694a5f2d033f6f66d772eb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trial-error-and-typos-why-some-malware-attacks-are-8fea923a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trial%2C%20Error%2C%20and%20Typos%3A%20Why%20Some%20Malware%20Attacks%20Aren&apos;t%20as%20&apos;Sophisticated&apos;%20as%20You%20Think&amp;severity=medium&amp;id=694a5f2d033f6f66d772eb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macsync-malware-dropper-evades-macos-gatekeepe-3ecdfa66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MacSync%20malware%20dropper%20evades%20macOS%20Gatekeeper%20checks&amp;severity=high&amp;id=6949f6592404c2324fd731d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nissan-says-thousands-of-customers-exposed-in-red--fc220f6f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nissan%20says%20thousands%20of%20customers%20exposed%20in%20Red%20Hat%20breach&amp;severity=high&amp;id=6949f6592404c2324fd731c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15034-sql-injection-in-itsourcecode-stude-a1536eb0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15034%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=694a15813b5cae87d6da8425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67743-cwe-918-server-side-request-forgery-7319c56c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67743%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LearningCircuit%20local-deep-research&amp;severity=medium&amp;id=694a15813b5cae87d6da842c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-23-bf1bb18f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-23&amp;severity=medium&amp;id=694b2edc0a0f3cdd674e7536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65354-na-20a3c195</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65354%3A%20n%2Fa&amp;severity=critical&amp;id=694af4523b03476441e587e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25364-na-b2a1931e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25364%3A%20n%2Fa&amp;severity=high&amp;id=694adfdf2a62208f8b3adbe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51511-na-3ce435fd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51511%3A%20n%2Fa&amp;severity=critical&amp;id=694ad8e82a62208f8b331179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65410-na-f1c896cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65410%3A%20n%2Fa&amp;severity=medium&amp;id=694acb94a81ab5ceedeb10c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65713-na-c0df9882</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65713%3A%20n%2Fa&amp;severity=medium&amp;id=694ac811a81ab5ceede6bf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57521-na-37e5a65a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57521%3A%20n%2Fa&amp;severity=critical&amp;id=694ac811a81ab5ceede6bf44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29228-na-4201ef46</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29228%3A%20n%2Fa&amp;severity=critical&amp;id=694ac48ca81ab5ceede4f327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67111-na-bd2b6c90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67111%3A%20n%2Fa&amp;severity=high&amp;id=694ac115a81ab5ceede10cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50526-na-2157bbff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50526%3A%20n%2Fa&amp;severity=critical&amp;id=694ac115a81ab5ceede10ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45493-na-65f2c3b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45493%3A%20n%2Fa&amp;severity=medium&amp;id=694ac115a81ab5ceede10cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29229-na-2b83df69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29229%3A%20n%2Fa&amp;severity=critical&amp;id=694ac115a81ab5ceede10cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65865-na-83c35a2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65865%3A%20n%2Fa&amp;severity=high&amp;id=694abdbbe971240e2a7c28e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67109-na-443d973e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67109%3A%20n%2Fa&amp;severity=critical&amp;id=694ab6b2e971240e2a747f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67108-na-09aab092</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67108%3A%20n%2Fa&amp;severity=critical&amp;id=694ab6b2e971240e2a747eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66845-na-97607a2a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66845%3A%20n%2Fa&amp;severity=medium&amp;id=694aa1c2a6db0d9209e4958a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/your-supabase-is-public-33d270ed</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Your%20Supabase%20Is%20Public&amp;severity=medium&amp;id=6949c93566e722bb4ceafa62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53964-missing-authentication-for-critical-736117f0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53964%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=high&amp;id=6949bf36edc45005c15e342d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53963-improper-neutralization-of-special--558d1744</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53963%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=critical&amp;id=6949bf36edc45005c15e3427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53962-improper-limitation-of-a-pathname-t-dd85bb58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53962%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=high&amp;id=6949bf36edc45005c15e3421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53961-cross-site-request-forgery-csrf-in--847bb2d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53961%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=medium&amp;id=6949bf36edc45005c15e341b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53960-improper-neutralization-of-special--30f07277</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53960%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=critical&amp;id=6949bf36edc45005c15e3415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53955-authorization-bypass-through-user-c-31e53ed8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53955%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=critical&amp;id=6949bf35edc45005c15e340f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53981-improper-neutralization-of-special--e3263d1f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53981%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20thibaud-rohmer%20PhotoShow&amp;severity=high&amp;id=6949bf39edc45005c15e34ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53978-improper-neutralization-of-input-du-2793ae8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53978%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mybb%20myBB%20forums&amp;severity=medium&amp;id=6949bf37edc45005c15e348a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53977-improper-neutralization-of-input-du-db59c6e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53977%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mybb%20myBB%20forums&amp;severity=medium&amp;id=6949bf37edc45005c15e3485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53976-improper-neutralization-of-input-du-852834e2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53976%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mybb%20myBB%20forums&amp;severity=medium&amp;id=6949bf37edc45005c15e3480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53975-improper-neutralization-of-special--2a4e2592</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53975%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thedigicraft%20Atom%20CMS&amp;severity=critical&amp;id=6949bf37edc45005c15e347b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53974-missing-authentication-for-critical-e2a4778b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53974%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20D-Link%20DSL-124%20Wireless%20N300%20ADSL2%2B&amp;severity=high&amp;id=6949bf37edc45005c15e3475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53973-incorrect-privilege-assignment-in-z-606a5e3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53973%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Zillya%20Zillya%20Total%20Security&amp;severity=high&amp;id=6949bf37edc45005c15e3470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53972-improper-neutralization-of-special--85c7b79d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53972%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20luiswang%20WebTareas&amp;severity=critical&amp;id=6949bf37edc45005c15e346b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53971-unrestricted-upload-of-file-with-da-4270a38c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53971%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20luiswang%20WebTareas&amp;severity=high&amp;id=6949bf37edc45005c15e3466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53970-missing-authentication-for-critical-c3b85a4c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53970%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=high&amp;id=6949bf37edc45005c15e345f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53969-missing-authentication-for-critical-9e6961c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53969%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=critical&amp;id=6949bf37edc45005c15e3458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53968-missing-authentication-for-critical-a38eefbf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53968%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=critical&amp;id=6949bf36edc45005c15e3446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53967-missing-authentication-for-critical-6938aa98</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53967%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=critical&amp;id=6949bf36edc45005c15e343f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53966-use-of-externally-controlled-format-cd173db7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53966%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20SOUND4%20Ltd.%20SOUND4%20LinkAndShare%20Transmitter&amp;severity=critical&amp;id=6949bf36edc45005c15e3439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53965-unquoted-search-path-or-element-in--7cdd93c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53965%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20SOUND4%20Ltd.%20SOUND4%20Server%20Service&amp;severity=high&amp;id=6949bf36edc45005c15e3433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68476-cwe-22-improper-limitation-of-a-pat-ba1a9014</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68476%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kedacore%20keda&amp;severity=high&amp;id=6949bf39edc45005c15e34dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68475-cwe-1333-inefficient-regular-expres-65a715a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68475%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20fedify-dev%20fedify&amp;severity=high&amp;id=6949bb2eedc45005c15a5728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34457-cwe-121-stack-based-buffer-overflow-f17fe992</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34457%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20wb2osz%20Dire%20Wolf&amp;severity=high&amp;id=6949bb2eedc45005c15a571c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34458-cwe-617-reachable-assertion-in-wb2o-7d8e8cd1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34458%3A%20CWE-617%20Reachable%20Assertion%20in%20wb2osz%20Dire%20Wolf&amp;severity=high&amp;id=6949bb2eedc45005c15a5722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68480-cwe-405-asymmetric-resource-consump-86b8f8d2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68480%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20marshmallow-code%20marshmallow&amp;severity=medium&amp;id=6949bf39edc45005c15e34e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interpol-led-action-decrypts-6-ransomware-strains--0779daf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interpol-led%20action%20decrypts%206%20ransomware%20strains%2C%20arrests%20hundreds&amp;severity=high&amp;id=69499cf3c525bff625e6a22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romanian-water-authority-hit-by-ransomware-attack--e161185b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Romanian%20water%20authority%20hit%20by%20ransomware%20attack%20over%20weekend&amp;severity=high&amp;id=69499cf3c525bff625e6a231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-package-steals-whatsapp-accounts-and-aabdb973</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20package%20steals%20WhatsApp%20accounts%20and%20messages&amp;severity=high&amp;id=69499cf3c525bff625e6a235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urban-vpn-proxy-spies-on-ai-chatbot-conversations-6bc24134</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Urban%20VPN%20Proxy%20Spies%20on%20AI%20Chatbot%20Conversations&amp;severity=medium&amp;id=69499cf3c525bff625e6a239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thank-you-reddit-ubroadexample-updated-version-of--c1a8a589</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thank%20you%20reddit%20(u%2Fbroadexample)%20-%20updated%20version%20of%20my%20STIX%20feed&amp;severity=medium&amp;id=69499d45c525bff625e767b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-websites-can-detection-vision-based-ai-agents--d3672297</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Websites%20can%20detection%20Vision-Based%20AI%20Agents%20like%20Claude%20Computer%20Use%20and%20OpenAI%20Operator&amp;severity=medium&amp;id=694995f2c525bff625de514f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15033-cwe-639-authorization-bypass-throug-4f0a7ed6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15033%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Automattic%20WooCommerce&amp;severity=medium&amp;id=69499d40c525bff625e76670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/19-vulnerabilities-pocs-for-the-mediatek-mt7622-wi-2bb67e74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=19%2B%20Vulnerabilities%20%2B%20PoCs%20for%20the%20MediaTek%20MT7622%20Wifi%20Driver&amp;severity=medium&amp;id=69499281c525bff625dc98a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jetpack-image-sitemap-enumerates-historical-wp-med-bb4ffab6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jetpack%20image%20sitemap%20enumerates%20historical%20WP%20media%20content%20even%20when%20not%20present%20in%20published%20HTML%20(timeleak%20pattern)&amp;severity=medium&amp;id=69499265c525bff625dc87fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-breach-affecting-337-million-users-raises--b92d76a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20breach%20affecting%2033.7%20million%20users%20raises%20data%20protection%20questions&amp;severity=high&amp;id=694981a35b5b68b8f5d32598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-phoenix-data-breach-impacts-nearly-3-1c3f7338</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Phoenix%20data%20breach%20impacts%20nearly%203.5%20million%20individuals&amp;severity=high&amp;id=694981a35b5b68b8f5d3258c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-national-pleads-guilty-in-nefilim-ransom-898ad26c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20National%20Pleads%20Guilty%20in%20Nefilim%20Ransomware%20Conspiracy&amp;severity=medium&amp;id=69497e2c5b5b68b8f5cf2c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indian-income-tax-themed-phishing-campaign-targets-396dda1d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indian%20Income%20Tax-Themed%20Phishing%20Campaign%20Targets%20Local%20Businesses&amp;severity=medium&amp;id=694a5f2d033f6f66d772eb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ung0801-tracking-threat-clusters-obsessed-with-av--2217646d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNG0801%3A%20Tracking%20Threat%20Clusters%20obsessed%20with%20AV%20Icon%20Spoofing%20targeting%20Israel&amp;severity=medium&amp;id=694a5f2d033f6f66d772eafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-whatsapp-api-package-on-npm-steals-messages-c-b35e8a61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20WhatsApp%20API%20Package%20on%20npm%20Steals%20Messages%2C%20Contacts%2C%20and%20Login%20Tokens&amp;severity=medium&amp;id=69498cbc5b5b68b8f5deea6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frogblight-malware-targets-android-users-with-fake-860ebbec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frogblight%20Malware%20Targets%20Android%20Users%20With%20Fake%20Court%20and%20Aid%20Apps&amp;severity=medium&amp;id=694970f3d6cb72e86e3c39ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10021-cwe-457-use-of-uninitialized-variab-892ca771</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10021%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Open%20Design%20Alliance%20ODA%20Drawings%20SDK%20-%20All%20Versions%20%3C%202026.12&amp;severity=high&amp;id=69496a9ea3c8169c9ce67026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-caught-a-rust-ddos-botnet-on-my-honeypot-reverse-281667c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20caught%20a%20Rust%20DDoS%20botnet%20on%20my%20honeypot%2C%20reverse%20engineered%20it%2C%20and%20now%20I&apos;m%20monitoring%20its%20targets%20in%20real-time&amp;severity=medium&amp;id=69496aa1a3c8169c9ce67036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61740-cwe-346-origin-validation-error-in--32ecdd5c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61740%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Johnson%20Controls%20IQ%20Panels2%2C%202%2B%2C%20IQHub%2C%20IQPanel%204%2C%20PowerG&amp;severity=high&amp;id=694959ea89a9ac879c469573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26379-cwe-338-use-of-cryptographically-we-dd645ed4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26379%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Johnson%20Controls%20IQ%20Panels2%2C%202%2B%2C%20IQHub%2C%20IQPanel%204%2C%20PowerG&amp;severity=high&amp;id=694955df89a9ac879c424572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/54-charged-in-us-over-atm-attacks-involving-ploutu-2cc855e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ATM%20Hackers%20Using%20%E2%80%98Ploutus%E2%80%99%20Malware%20Charged%20in%20US&amp;severity=medium&amp;id=69494ec789a9ac879c3b6f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14018-cwe-428-unquoted-search-path-or-ele-d1a2df04</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14018%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20NetBT%20Consulting%20Services%20Inc.%20e-Fatura&amp;severity=high&amp;id=69494ee289a9ac879c3b8d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macsync-macos-malware-distributed-via-signed-swift-d5c63753</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MacSync%20macOS%20Malware%20Distributed%20via%20Signed%20Swift%20Application&amp;severity=medium&amp;id=69494186120b5bbb4ee44c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-popular-monitoring-tool-nezha-as-a-s-4fde7c18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Abuse%20Popular%20Monitoring%20Tool%20Nezha%20as%20a%20Stealth%20Trojan&amp;severity=medium&amp;id=6949419d120b5bbb4ee45867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/22nd-december-threat-intelligence-report-94c45600</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=22nd%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69493e10120b5bbb4ee25d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-firewall-exploits-ai-data-theft-andro-770aa404</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Firewall%20Exploits%2C%20AI%20Data%20Theft%2C%20Android%20Hacks%2C%20APT%20Attacks%2C%20Insider%20Leaks%20%26%20More&amp;severity=medium&amp;id=694937e70a7f5b66fcfa78e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/insider-threat-hackers-offering-cash-for-company-i-f174e3ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Insider%20Threat%3A%20Hackers%20Offering%20Cash%20for%20Company%20Insiders%20to%20Bypass%20Security&amp;severity=medium&amp;id=694933e20a7f5b66fcf615ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54890-cwe-79-improper-neutralization-of-i-070f5001</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=694929690a7f5b66fcebbfcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12514-cwe-89-improper-neutralization-of-s-b03e453a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12514%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20Infra%20Monitoring%20-%20Open-tickets&amp;severity=high&amp;id=694926ef9679ab05af621755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-nefilim-ransomware-affiliate-pleads-guil-376563e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Nefilim%20Ransomware%20Affiliate%20Pleads%20Guilty%20in%20US&amp;severity=medium&amp;id=694926d69679ab05af620d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8460-cwe-79-improper-neutralization-of-in-4bf5a4a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=694926ef9679ab05af621758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/waymo-suspends-service-after-power-outage-hit-san--3d6fd441</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Waymo%20suspends%20service%20after%20power%20outage%20hit%20San%20Francisco&amp;severity=medium&amp;id=69491f509679ab05af5852d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-sydney-discloses-a-data-breach-impac-db43eafe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Sydney%20discloses%20a%20data%20breach%20impacting%2027%2C000%20people&amp;severity=high&amp;id=69491f509679ab05af5852d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-hacker-admits-affiliate-role-in-nefilim--60cd7b60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20hacker%20admits%20affiliate%20role%20in%20Nefilim%20ransomware%20gang&amp;severity=high&amp;id=69491f509679ab05af5852d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61739-cwe-323-reusing-a-nonce-key-pair-in-b4f9f167</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61739%3A%20CWE-323%20Reusing%20a%20Nonce%2C%20Key%20pair%20in%20encryption%20in%20Johnson%20Controls%20IQ%20Panels2%2C%202%2B%2C%20IQHub%2C%20IQPanel%204%2C%20PowerG&amp;severity=high&amp;id=69491f829679ab05af587010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61738-cwe-319-cleartext-transmission-of-s-226a1fc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61738%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Johnson%20Controls%20IQPanel2%2C%09IQHub%2CIQPanel2%2B%2CIQPanel%204%2CPowerG&amp;severity=low&amp;id=69491bd19679ab05af567f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62094-cwe-79-improper-neutralization-of-i-361917d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20voidthemes%20Void%20Elementor%20WHMCS%20Elements%20For%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=694915f817ee8e546cf7ec93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watchguard-patches-firebox-zero-day-exploited-in-t-8e6753b5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WatchGuard%20Patches%20Firebox%20Zero-Day%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=694915d517ee8e546cf7bcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62107-cwe-352-cross-site-request-forgery--eac51b26</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62107%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PluginOps%20Feather%20Login%20Page&amp;severity=medium&amp;id=694915f817ee8e546cf7ec96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62880-cwe-352-cross-site-request-forgery--ece79c6b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62880%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kunal%20Custom%20404%20Pro&amp;severity=medium&amp;id=694915f817ee8e546cf7ec99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-government-acknowledges-it-is-investigating-cyb-618545e6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Government%20Acknowledges%20It%20Is%20Investigating%20Cyber%20Incident%20After%20Media%20Reports&amp;severity=low&amp;id=69490aac17ee8e546cec44ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8305-cwe-200-exposure-of-sensitive-inform-0faa840c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8305%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor.%20in%20checkpoint%20Identity%20Awareness&amp;severity=medium&amp;id=6948fd2e2cf13c7ddd47406e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8304-cwe-200-exposure-of-sensitive-inform-698100f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8304%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor.%20in%20checkpoint%20Identity%20Agent&amp;severity=medium&amp;id=6948fd2e2cf13c7ddd474071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-operations-merge-droppers-sms-thef-28c10803</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Malware%20Operations%20Merge%20Droppers%2C%20SMS%20Theft%2C%20and%20RAT%20Capabilities%20at%20Scale&amp;severity=medium&amp;id=6948f3514c0b8833c8a1e25e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11545-cwe-497-exposure-of-sensitive-syste-092c5862</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11545%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-PA1705UL-W%2C%20NP-PA1705UL-W%2B%2C%20NP-PA1705UL-B%2C%20NP-PA1705UL-B%2B%2C%20NP-PA1505UL-W%2C%20NP-PA1505UL-W%2B%2C%20NP-PA1505UL-B%2C%20NP-PA1505UL-B%2B%2C%20NP-PA1505UL-BJL%20NP-PV800UL-W%2C%20NP-PV800UL-W%2B%2C%20NP-PV800UL-B%2C%20NP-PV800UL-B%2B%2C%20NP-PV710UL-W%2C%20NP-PV710UL-W%2B%2C%20NP-PV710UL-B%2C%20NP-PV710UL-B%2B%2C%20NP-PV800UL-W1%2C%20NP-PV800UL-B1%2C%20NP-PV710UL-W1%2C%20NP-PV710UL-B1%2C%20NP-PV800UL-B1G%2C%20NP-PV710UL-B1G%2C%20NP-PV800UL-WH%2C%20NP-PV710UL-WH%2C%20NP-P627UL%2C%20NP-P627ULG%2C%20NP-P627UL%2B%2C%20NP-P547UL%2C%20NP-P547ULG%2C%20NP-P607UL%2B%2C%20NP-CG6600UL%2C%20NP-H6271UL%2C%20NP-H5471UL%2C%20NP-P627ULH%2C%20NP-P547ULH%20NP-PV710UL%2B%20NP-PA1004UL-W%2C%20NP-PA1004UL-WG%2C%20NP-PA1004UL-W%2B%2C%20NP-PA1004UL-WH%2C%20NP-PA1004UL-B%2C%20NP-PA1004UL-BG%2C%20NP-PA1004UL-B%2B%2C%20NP-PA804UL-W%2C%20NP-PA804UL-WG%2C%20NP-PA804UL-W%2B%2C%20NP-PA804UL-WH%2C%20NP-PA804UL-B%2C%20NP-PA804UL-BG%2C%20NP-PA804UL-B%2B%2C%20NP-PA1004UL-BH%2C%20NP-PA804UL-BH%2C%20NP-PE455UL%2C%20NP-PE455ULG%2C%20NP-PE455WL%2C%20NP-PE455WLG%2C%20NP-PE505XLG%2C%20NP-CG6500XL%2C%20NP-CG6400UL%2C%20NP-CG6400WL%2C%20NP-CB4500XL%2C%20NP-CA4120X%2C%20NP-CA4160W%2C%20NP-CA4160X%2C%20NP-CA4200U%2C%20NP-CA4200W%2C%20NP-CA4202W%2C%20NP-CA4260X%2C%20NP-CA4300X%2C%20NP-CA4355X%2C%20NP-CD2100U%2C%20NP-CD2120X%2C%20NP-CD2300X%2C%20NP-CR2100X%2C%20NP-CR2170W%2C%20NP-CR2170X%2C%20NP-CR2200U%2C%20NP-CR2200W%2C%20NP-CR2280X%2C%20NP-CR2310X%2C%20NP-CR2350X%2C%20NP-MC302XG%2C%20NP-MC332WG%2C%20NP-MC342XG%2C%20NP-MC372X%2C%20NP-MC372XG%2C%20NP-MC382W%2C%20NP-MC382WG%2C%20NP-MC422XG%2C%20NP-ME342UG%2C%20NP-ME372W%2C%20NP-ME372WG%2C%20NP-ME382U%2C%20NP-ME382UG%2C%20NP-ME402X%2C%20NP-ME402XG%20NP-CU4300XD%2C%20NP-CU4200XD%2C%20NP-CU4200WD%2C%20NP-UM383WL%2C%20NP-UM383WLG%2C%20NP-CJ2200WD%2C%20NP-PH3501QL%2C%20NP-PH3501QL%2B%2C%20NP-PH2601QL%2C%20NP-PH2601QL%2B%2C%20NP-PH350Q40L%2C%20NP-PH260Q30L%2C%20NP-PX1005QL-W%2C%20NP-PX1005QL-B%2C%20NP-PX1005QL-B%2B%2C%20NP-P525UL%2C%20NP-P525ULG%2C%20NP-P525UL%2B%2C%20NP-P525WL%2C%20NP-P525WLG%2C%20NP-P525WL%2B%2C%20NP-P605UL%2C%20NP-P605ULG%2C%20NP-P605UL%2B&amp;severity=critical&amp;id=6948d6e9f380eec6876e960d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11544-cwe-912-hidden-functionality-in-sha-156315c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11544%3A%20CWE-912%3A%20Hidden%20Functionality%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P627UL%2C%20NP-P627ULG%2C%20NP-P627UL%2B%2C%20NP-P547UL%2C%20NP-P547ULG%2C%20NP-P607UL%2B%2C%20NP-CG6600UL%2C%20NP-H6271UL%2C%20NP-H5471UL%2C%20NP-P627ULH%2C%20NP-P547ULH%2C%20NP-PE455UL%2C%20NP-PE455ULG%2C%20NP-PE455WL%2C%20NP-PE455WLG%2C%20NP-PE505XLG%2C%20NP-CG6500XL%2C%20NP-CG6400UL%2C%20NP-CG6400WL%2C%20NP-CB4500XL%2C%20NP-CA4120X%2C%20NP-CA4160W%2C%20NP-CA4160X%2C%20NP-CA4200U%2C%20NP-CA4200W%2C%20NP-CA4202W%2C%20NP-CA4260X%2C%20NP-CA4300X%2C%20NP-CA4355X%2C%20NP-CD2100U%2C%20NP-CD2120X%2C%20NP-CD2300X%2C%20NP-CR2100X%2C%20NP-CR2170W%2C%20NP-CR2170X%2C%20NP-CR2200U%2C%20NP-CR2200W%2C%20NP-CR2280X%2C%20NP-CR2310X%2C%20NP-CR2350X%2C%20NP-MC302XG%2C%20NP-MC332WG%2C%20NP-MC342XG%2C%20NP-MC372X%2C%20NP-MC372XG%2C%20NP-MC382W%2C%20NP-MC382WG%2C%20NP-MC422XG%2C%20NP-ME342UG%2C%20NP-ME372W%2C%20NP-ME372WG%2C%20NP-ME382U%2C%20NP-ME382UG%2C%20NP-ME402X%2C%20NP-ME402XG%2C%20NP-P525UL%2C%20NP-P525ULG%2C%20NP-P525UL%2B%2C%20NP-P525WL%2C%20NP-P525WLG%2C%20NP-P525WL%2B%2C%20NP-P605UL%2C%20NP-P605ULG%2C%20NP-P605UL%2B%2C%20NP-CG6500UL%2C%20NP-CG6500WL%2C%20NP-CB4500UL%2C%20NP-CB4500WL%2C%20NP-P525ULH%2C%20NP-P525WLH%2C%20NP-P605ULH%2C%20NP-P554U%2C%20NP-P554UG%2C%20NP-P554U%2B%2C%20NP-P554W%2C%20NP-P554WG%2C%20NP-P554W%2B%2C%20NP-P474U%2C%20NP-P474UG%2C%20NP-P474W%2C%20NP-P474WG%2C%20NP-P604XG%2C%20NP-P604X%2B%2C%20NP-P603XG%2C%20NP-P523X%2B%2C%20NP-PE523XG%2C%20NP-PE523X%2B%2C%20NP-CF6600U%2C%20NP-CF6600W%2C%20NP-CF6700X%2C%20NP-CF6500X%2C%20NP-CB4600U%2C%20NP-P554UH%2C%20NP-P554WH%2C%20NP-P474UH%2C%20NP-P474WH%2C%20NP-P604XH%2C%20NP-P603XH%2C%20NP-PE523XH%2C%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%20%2CNP-ME401W%2C%20NP-ME361W%2C%20NP-ME331W%2C%20NP-ME301W%2C%20NP-ME401X%2C%20NP-ME361X%2C%20NP-ME331X%2C%20NP-ME301X%2C%20NP-ME401WG%2C%20NP-ME361WG%2C%20NP-ME331WG%2C%20NP-ME301WG%2C%20NP-ME401XG%2C%20NP-ME361XG%2C%20NP-ME331XG%2C%20NP-ME301XG%2C%20NP-CA4155W%2C%20NP-CA4350X%2C%20NP-CA4255X%2C%20NP-CA4155X%2C%20NP-CA4115X%2C%20NP-MC331WG%2C%20NP-MC421XG%2C%20NP-MC401XG%2C%20NP-MC371XG%2C%20NP-MC331XG%2C%20NP-MC301XG%2C%20NP-CK4155W%2C%20NP-CK4255X%2C%20NP-CK4155X%2C%20NP-CK4055X%2C%20NP-CM4150X%2C%20NP-CM4050X%2C%20NP-CK4155WG%2C%20NP-CK4255XG%2C%20NP-CK4155XG%2C%20NP-CR2165W%2C%20NP-CR2305X%2C%20NP-CR2275X%2C%20NP-CR2165X%2C%20NP-CR2155X%2C%20NP-CD2115X%2C%20NP-CD2105X%2C%20NP-CM4151X%2C%20NP-CR2276X%2C%20NP-CD2116X%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W&amp;severity=critical&amp;id=6948d6e9f380eec6876e960a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11543-cwe-354-improper-validation-of-inte-576d4b82</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11543%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W%2C%20NP-P502HG%2C%20NP-P502WG%2C%20NP-P452HG%2C%20NP-P452WG%2C%20NP-P502H%2B%2C%20NP-P502W%2B%2C%20NP-CR5450H%2C%20NP-CR5450W%2C%20NP-P502HL%2C%20NP-P502WL%2C%20NP-P502HLG%2C%20NP-P502WLG%2C%20NP-P502HL%2B%2C%20NP-P502WL%2B%2C%20NP-CR5450HL%2C%20NP-CR5450WL%2C%20NP-UM352W%2C%20NP-UM352WG%2C%20NP-UM352W%2B&amp;severity=critical&amp;id=6948e1f1f380eec6877c45d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11542-cwe-121-stack-based-buffer-overflow-0c9f51ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11542%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W%2C%20NP-P502HG%2C%20NP-P502WG%2C%20NP-P452HG%2C%20NP-P452WG%2C%20NP-P502H%2B%2C%20NP-P502W%2B%2C%20NP-CR5450H%2C%20NP-CR5450W%2C%20NP-P502HL%2C%20NP-P502WL%2C%20NP-P502HLG%2C%20NP-P502WLG%2C%20NP-P502HL%2B%2C%20NP-P502WL%2B%2C%20NP-CR5450HL%2C%20NP-CR5450WL%2C%20NP-UM352W%2C%20NP-UM352WG%2C%20NP-UM352W%2B&amp;severity=high&amp;id=6948e1f1f380eec6877c45d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11541-cwe-121-stack-based-buffer-overflow-423506bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11541%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W%2C%20NP-P502HG%2C%20NP-P502WG%2C%20NP-P452HG%2C%20NP-P452WG%2C%20NP-P502H%2B%2C%20NP-P502W%2B%2C%20NP-CR5450H%2C%20NP-CR5450W%2C%20NP-P502HL%2C%20NP-P502WL%2C%20NP-P502HLG%2C%20NP-P502WLG%2C%20NP-P502HL%2B%2C%20NP-P502WL%2B%2C%20NP-CR5450HL%2C%20NP-CR5450WL%2C%20NP-UM352W%2C%20NP-UM352WG%2C%20NP-UM352W%2B&amp;severity=critical&amp;id=6948e1f1f380eec6877c45ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11540-cwe-22-improper-limitation-of-a-pat-93647b69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11540%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W%2C%20NP-P502HG%2C%20NP-P502WG%2C%20NP-P452HG%2C%20NP-P452WG%2C%20NP-P502H%2B%2C%20NP-P502W%2B%2C%20NP-CR5450H%2C%20NP-CR5450W%2C%20NP-P502HL%2C%20NP-P502WL%2C%20NP-P502HLG%2C%20NP-P502WLG%2C%20NP-P502HL%2B%2C%20NP-P502WL%2B%2C%20NP-CR5450HL%2C%20NP-CR5450WL%2C%20NP-UM352W%2C%20NP-UM352WG%2C%20NP-UM352W%2B&amp;severity=critical&amp;id=6948e1f1f380eec6877c45cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12049-cwe-306-missing-authentication-for--3a29601c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12049%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20Media%20Player%20MP-01&amp;severity=critical&amp;id=6948e1f1f380eec6877c45d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15014-sql-injection-in-loganhong-php-loga-d4c3c0db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15014%3A%20SQL%20Injection%20in%20loganhong%20php%20loganSite&amp;severity=medium&amp;id=6948e1f1f380eec6877c45da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15013-stack-based-buffer-overflow-in-floo-e7e5488a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15013%3A%20Stack-based%20Buffer%20Overflow%20in%20floooh%20sokol&amp;severity=medium&amp;id=6948d0ddf3d40542c74aa483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15012-sql-injection-in-code-projects-refu-86a7903c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15012%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=6948d0ddf3d40542c74aa48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-artemis-analysis-of-hwp-based-dll-side-l-03d8a559</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Artemis%3A%20Analysis%20of%20HWP-Based%20DLL%20Side%20Loading%20Attacks&amp;severity=medium&amp;id=69491f829679ab05af586fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15011-sql-injection-in-code-projects-simp-c332fcf7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15011%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=6948c1179b5fbca4f51854f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15016-cwe-321-use-of-hard-coded-cryptogra-828a99de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15016%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Ragic%20Enterprise%20Cloud%20Database&amp;severity=critical&amp;id=6948c1179b5fbca4f51854fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15015-cwe-23-relative-path-traversal-in-r-9dd6db79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15015%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Ragic%20Enterprise%20Cloud%20Database&amp;severity=high&amp;id=6948c1179b5fbca4f51854f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15010-stack-based-buffer-overflow-in-tend-05e7daf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15010%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=6948ba199b5fbca4f5110ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59301-cwe-20-improper-input-validation-in-d559bd68</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59301%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Delta%20Electronics%20DVP15MC11T&amp;severity=medium&amp;id=6948ba199b5fbca4f5110eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15009-unrestricted-upload-in-liweiyi-ches-38c9a37a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15009%3A%20Unrestricted%20Upload%20in%20liweiyi%20ChestnutCMS&amp;severity=medium&amp;id=6948b19135589e6cb165ba56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15008-stack-based-buffer-overflow-in-tend-c840f55c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15008%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=medium&amp;id=6948b19135589e6cb165ba4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15007-stack-based-buffer-overflow-in-tend-32e684d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15007%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=6948a94d0a1294c2fe493cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15006-stack-based-buffer-overflow-in-tend-8430c353</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15006%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=69489e000a1294c2fe3241ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15005-use-of-hard-coded-cryptographic-key-849c0d51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15005%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20CouchCMS&amp;severity=medium&amp;id=694897e7a595d307a79322bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15004-sql-injection-in-dedecms-b9181687</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15004%3A%20SQL%20Injection%20in%20DedeCMS&amp;severity=medium&amp;id=69489057a595d307a785c50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-22-55f63229</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-22&amp;severity=medium&amp;id=6949dd7eefa849cc1322059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66735-na-2c8d719a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66735%3A%20n%2Fa&amp;severity=high&amp;id=6949bf39edc45005c15e34e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67436-na-b2cf1dd5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67436%3A%20n%2Fa&amp;severity=medium&amp;id=6949bf39edc45005c15e34d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65857-na-3b607dbc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65857%3A%20n%2Fa&amp;severity=high&amp;id=6949bf39edc45005c15e34d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66736-na-44e0a840</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66736%3A%20n%2Fa&amp;severity=high&amp;id=6949b7a0edc45005c155e0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65856-na-11fd2d6e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65856%3A%20n%2Fa&amp;severity=critical&amp;id=6949b7a0edc45005c155e0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65817-na-db490a51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65817%3A%20n%2Fa&amp;severity=high&amp;id=6949aa669d3de339c6b17817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67291-na-02aa6d96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67291%3A%20n%2Fa&amp;severity=medium&amp;id=6949a6e09d3de339c6ad0f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67290-na-96e8ea15</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67290%3A%20n%2Fa&amp;severity=medium&amp;id=6949a6e09d3de339c6ad0f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27708-na-5d50372c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27708%3A%20n%2Fa&amp;severity=critical&amp;id=6949a6e09d3de339c6ad0f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65790-na-8f1aa0ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65790%3A%20n%2Fa&amp;severity=medium&amp;id=6949a35b9d3de339c6aad188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65837-na-aec8491e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65837%3A%20n%2Fa&amp;severity=medium&amp;id=6949a35b9d3de339c6aad184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67418-na-722b7814</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67418%3A%20n%2Fa&amp;severity=critical&amp;id=69499fe29d3de339c6a6aefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25812-na-f1ac14ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25812%3A%20n%2Fa&amp;severity=medium&amp;id=69499d40c525bff625e7666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35321-na-fd2fcd6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35321%3A%20n%2Fa&amp;severity=medium&amp;id=6949997dc525bff625e31dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25814-na-93ead183</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25814%3A%20n%2Fa&amp;severity=medium&amp;id=6949997dc525bff625e31dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67288-na-ea93a173</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67288%3A%20n%2Fa&amp;severity=critical&amp;id=69498ef9c525bff625d87afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63664-na-1a474005</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63664%3A%20n%2Fa&amp;severity=high&amp;id=69498ef9c525bff625d87af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63663-na-887291a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63663%3A%20n%2Fa&amp;severity=high&amp;id=69498ef9c525bff625d87af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63662-na-fa8c276e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63662%3A%20n%2Fa&amp;severity=high&amp;id=69498ef9c525bff625d87af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26787-na-567c5e45</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26787%3A%20n%2Fa&amp;severity=medium&amp;id=69498ef9c525bff625d87aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68645-na-fe921bf7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68645%3A%20n%2Fa&amp;severity=high&amp;id=69498cb05b5b68b8f5dee2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67289-na-46d41f94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67289%3A%20n%2Fa&amp;severity=critical&amp;id=69498cb05b5b68b8f5dee2a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65270-na-5c19a053</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65270%3A%20n%2Fa&amp;severity=medium&amp;id=69498cb05b5b68b8f5dee2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67443-na-09f871d3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67443%3A%20n%2Fa&amp;severity=medium&amp;id=69497803d6cb72e86e42a14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67826-na-b2fb3279</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67826%3A%20n%2Fa&amp;severity=high&amp;id=6949600fa3c8169c9cdce196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15003-sql-injection-in-seacms-53188bdc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15003%3A%20SQL%20Injection%20in%20SeaCMS&amp;severity=medium&amp;id=694886b83ccd96b7b746ed2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15002-sql-injection-in-seacms-8c466e46</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15002%3A%20SQL%20Injection%20in%20SeaCMS&amp;severity=medium&amp;id=69487f303ccd96b7b73da3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62901-cwe-79-improper-neutralization-of-i-f009e1e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62901%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tormorten%20WP%20Microdata&amp;severity=medium&amp;id=69486686250e8b2ef81b7a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62926-cwe-79-improper-neutralization-of-i-d06592db</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62926%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HappyDevs%20TempTool%20%20%5BShow%20Current%20Template%20Info%5D&amp;severity=medium&amp;id=69486686250e8b2ef81b7a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62955-cwe-497-exposure-of-sensitive-syste-6ce72f1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62955%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20HappyDevs%20TempTool%20%20%5BShow%20Current%20Template%20Info%5D&amp;severity=medium&amp;id=69486301250e8b2ef817cae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-android-botnet-kimwolf-infects-millions-st-37ffb723</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Android%20botnet%20Kimwolf%20infects%20millions%2C%20strikes%20with%20DDoS&amp;severity=medium&amp;id=6947f4d2e026439f1e12e4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnhalla-picking-the-true-vulnerabilities-from-th-89208606</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnhalla%3A%20Picking%20the%20true%20vulnerabilities%20from%20the%20CodeQL%20haystack&amp;severity=medium&amp;id=6947d39b26a902801d433cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14995-stack-based-buffer-overflow-in-tend-4ac05581</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14995%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=6947b3aa3cbe12b6f35cac8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14994-stack-based-buffer-overflow-in-tend-84473859</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14994%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=6947a34f3cbe12b6f34a58d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14800-cwe-434-unrestricted-upload-of-file-d6002914</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14800%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeisle%20Redirection%20for%20Contact%20Form%207&amp;severity=high&amp;id=6947a34f3cbe12b6f34a58cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14855-cwe-79-improper-neutralization-of-i-e9088a96</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14855%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=high&amp;id=6947a34f3cbe12b6f34a58d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14993-stack-based-buffer-overflow-in-tend-b5631f8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14993%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=69477b5ddaa649f723885181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-infy-apt-resurfaces-with-new-malware-activ-bdecb56e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Infy%20APT%20Resurfaces%20with%20New%20Malware%20Activity%20After%20Years%20of%20Silence&amp;severity=medium&amp;id=69478fcd598cfcf336c8656d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14992-stack-based-buffer-overflow-in-tend-a3382e6f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14992%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=69477456daa649f7237d58f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14991-cross-site-scripting-in-campcodes-c-1ab969a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14991%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=694770dcdaa649f7237704d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13361-cwe-352-cross-site-request-forgery--5ea9dfef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13361%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dipesh_patel%20Web%20to%20SugarCRM%20Lead&amp;severity=medium&amp;id=694770dcdaa649f7237704cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13220-cwe-79-improper-neutralization-of-i-65adb83f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13220%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=694770dcdaa649f7237704c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12654-cwe-73-external-control-of-file-nam-d7dbb5ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12654%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wpvividplugins%20WPvivid%20%E2%80%94%20Backup%2C%20Migration%20%26%20Staging&amp;severity=low&amp;id=694770dcdaa649f7237704bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13693-cwe-79-improper-neutralization-of-i-3bea09b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13693%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=694770dcdaa649f7237704d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12398-cwe-79-improper-neutralization-of-i-dac3cafe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12398%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codersaiful%20Product%20Table%20for%20WooCommerce&amp;severity=medium&amp;id=694770dcdaa649f7237704b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9343-cwe-79-improper-neutralization-of-in-be5fc715</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=high&amp;id=694770dcdaa649f7237704e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14990-sql-injection-in-campcodes-complete-f74d16ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14990%3A%20SQL%20Injection%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=694766ae8da8a612761646df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68644-cwe-290-authentication-bypass-by-sp-a28dec5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68644%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Yealink%20RPS&amp;severity=high&amp;id=694766ae8da8a612761646e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12980-cwe-862-missing-authorization-in-wp-d70fd0d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12980%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20for%20News%2C%20Magazines%2C%20Blog%20Websites%20%E2%80%93%20PostX&amp;severity=high&amp;id=69475fa78da8a612760a1abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14054-cwe-79-improper-neutralization-of-i-fb60ab26</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hasthemes%20WC%20Builder%20%E2%80%93%20WooCommerce%20Page%20Builder%20for%20WPBakery&amp;severity=medium&amp;id=69475fa78da8a612760a1ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13838-cwe-79-improper-neutralization-of-i-eeab8c23</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13838%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20WishSuite%20%E2%80%93%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=69475fa78da8a612760a1ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14071-cwe-502-deserialization-of-untruste-b346b7cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14071%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20livecomposer%20Live%20Composer%20%E2%80%93%20Free%20WordPress%20Website%20Builder&amp;severity=high&amp;id=69475fa78da8a612760a1acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14080-cwe-862-missing-authorization-in-wp-cb10bc18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14080%3A%20CWE-862%20Missing%20Authorization%20in%20wpshuffle%20Frontend%20Post%20Submission%20Manager%20Lite%20%E2%80%93%20Frontend%20Posting%20WordPress%20Plugin&amp;severity=medium&amp;id=69475fa78da8a612760a1ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11496-cwe-79-improper-neutralization-of-i-d40d9863</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Five%20Star%20Restaurant%20Reservations%20%E2%80%93%20WordPress%20Booking%20Plugin&amp;severity=medium&amp;id=69475fa78da8a612760a1ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47232-vulnerability-in-mojofywp-wp-affili-809ae75c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47232%3A%20Vulnerability%20in%20mojofywp%20WP%20Affiliate%20Disclosure&amp;severity=medium&amp;id=69474498db1f51f880c173f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25446-cwe-862-missing-authorization-in-ha-ffaa9462</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25446%3A%20CWE-862%20Missing%20Authorization%20in%20HappyFiles%20HappyFiles%20Pro&amp;severity=high&amp;id=69474498db1f51f880c173f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25445-cwe-862-missing-authorization-in-ha-4ae6e79b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25445%3A%20CWE-862%20Missing%20Authorization%20in%20HappyFiles%20HappyFiles%20Pro&amp;severity=medium&amp;id=69474498db1f51f880c173ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-21-c515f019</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-21&amp;severity=medium&amp;id=69488cc7a595d307a781fae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25068-cwe-862-missing-authorization-in-ma-21a979e5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25068%3A%20CWE-862%20Missing%20Authorization%20in%20Mapro%20Collins%20Magazine%20Edge&amp;severity=medium&amp;id=694739fbdb1f51f880b2a275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14989-sql-injection-in-campcodes-complete-69d7be57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14989%3A%20SQL%20Injection%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=694733b5c9c6df9f5ceaa1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomhouse-upgrades-encryption-with-multi-layered-c84bab0f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RansomHouse%20upgrades%20encryption%20with%20multi-layered%20data%20processing&amp;severity=high&amp;id=6947184f6364f0d3b54121f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34290-cwe-250-execution-with-unnecessary--3537b5e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34290%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Versa%20Networks%20SASE%20Client%20for%20Windows&amp;severity=high&amp;id=6947030ab06cf8342301ae4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-seizes-fake-id-template-domains-operating-from-e395c62e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Seizes%20Fake%20ID%20Template%20Domains%20Operating%20from%20Bangladesh&amp;severity=medium&amp;id=6946ec0edf378ae201258978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-sidewinder-apt-campaign-detected-33d72334</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20SideWinder%20APT%20Campaign%20Detected&amp;severity=medium&amp;id=69491f829679ab05af586fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-doj-charges-54-in-atm-jackpotting-scheme-using--4703ff40</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20DOJ%20Charges%2054%20in%20ATM%20Jackpotting%20Scheme%20Using%20Ploutus%20Malware&amp;severity=medium&amp;id=6946b15e987e301cd64ae78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7782-cwe-862-missing-authorization-in-wp--38b9bbfb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7782%3A%20CWE-862%20Missing%20Authorization%20in%20WP%20JobHunt&amp;severity=high&amp;id=6946aa3f987e301cd6415949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7733-cwe-639-authorization-bypass-through-96dce83b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7733%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20JobHunt&amp;severity=medium&amp;id=6946aa3f987e301cd6415945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wk-51-north-korean-infiltrator-caught-working-in-a-5fbbbaf8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%F0%9F%9A%A8WK%2051%3A%20North%20Korean%20Infiltrator%20Caught%20Working%20in%20Amazon%20IT%20Department%2C%20EU%20Fines%20X%20%E2%82%AC140%20Million%2C%20Cisco%20Customers%20Hit%20by%20China-Linked%20APT...&amp;severity=medium&amp;id=6946981a3f10de0b706b5d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-a-flaw-in-watchguard-fireware-os-to-i-22620824</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20a%20flaw%20in%20WatchGuard%20Fireware%20OS%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=694691cd73e2535dfefe0060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14298-cwe-79-improper-neutralization-of-i-a2db8710</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14298%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20damian-gora%20FiboSearch%20%E2%80%93%20Ajax%20Search%20for%20WooCommerce&amp;severity=medium&amp;id=69465e70aa65b5798e1d3c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12492-cwe-200-exposure-of-sensitive-infor-d492d455</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12492%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=69465e70aa65b5798e1d3c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13619-cwe-269-improper-privilege-manageme-48700e01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13619%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20CMSSuperHeroes%20Flex%20Store%20Users&amp;severity=critical&amp;id=694651418d921bbd6b8e5b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12820-cwe-862-missing-authorization-in-pu-ae3ab761</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12820%3A%20CWE-862%20Missing%20Authorization%20in%20Pure%20WC%20Variation%20Swatches&amp;severity=medium&amp;id=6946402959945ce0dd08adc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13365-cwe-352-cross-site-request-forgery--9818f34d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13365%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tikolan%20WP%20Hallo%20Welt&amp;severity=medium&amp;id=694619d2c376abdb7ecb86a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12581-cwe-79-improper-neutralization-of-i-4da1c0de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12581%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kaizencoders%20Attachments%20Handler&amp;severity=medium&amp;id=694619d1c376abdb7ecb869c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13329-cwe-434-unrestricted-upload-of-file-e47819d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13329%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20snowray%20File%20Uploader%20for%20WooCommerce&amp;severity=critical&amp;id=694619d2c376abdb7ecb86a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14168-cwe-352-cross-site-request-forgery--b872e166</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14168%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpmaniax%20WP%20DB%20Booster&amp;severity=medium&amp;id=694619d2c376abdb7ecb86bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13624-cwe-79-improper-neutralization-of-i-af28a405</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20travishoki%20Overstock%20Affiliate%20Links&amp;severity=medium&amp;id=694619d2c376abdb7ecb86b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14633-cwe-862-missing-authorization-in-ni-871d843a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14633%3A%20CWE-862%20Missing%20Authorization%20in%20niao70%20F70%20Lead%20Document%20Download&amp;severity=medium&amp;id=694619d2c376abdb7ecb86c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14721-cwe-79-improper-neutralization-of-i-920861e2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mansoormunib%20RESPONSIVE%20AND%20SWIPE%20SLIDER!&amp;severity=medium&amp;id=694619d2c376abdb7ecb86cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12898-cwe-862-missing-authorization-in-lb-6401d6d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12898%3A%20CWE-862%20Missing%20Authorization%20in%20lbell%20Pretty%20Google%20Calendar&amp;severity=medium&amp;id=694619d2c376abdb7ecb86a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14734-cwe-352-cross-site-request-forgery--45adb2e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14734%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nestornoe%20Amazon%20affiliate%20lite%20Plugin&amp;severity=medium&amp;id=694619d3c376abdb7ecb8faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14164-cwe-352-cross-site-request-forgery--d309b53c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14164%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edckwt%20Quran%20Gateway&amp;severity=medium&amp;id=694619d2c376abdb7ecb86b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14735-cwe-80-improper-neutralization-of-s-e544b8ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14735%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20nestornoe%20Amazon%20affiliate%20lite%20Plugin&amp;severity=medium&amp;id=694619d3c376abdb7ecb8fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14591-vulnerability-in-perforce-delphix-c-e7634947</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14591%3A%20Vulnerability%20in%20Perforce%20Delphix%20Continuous%20Compliance&amp;severity=medium&amp;id=694619d2c376abdb7ecb86c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14300-cwe-306-missing-authentication-for--8b24a75f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14300%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C200%20V3&amp;severity=high&amp;id=6945fa2fc376abdb7e67a375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14299-cwe-770-allocation-of-resources-wit-cc3e31a1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14299%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C200%20V3&amp;severity=high&amp;id=6945fa2fc376abdb7e67a371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8065-cwe-400-uncontrolled-resource-consum-b3fbab90</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8065%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C200%20V3&amp;severity=high&amp;id=6945fa2fc376abdb7e67a379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-20-10c92024</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-20&amp;severity=medium&amp;id=694739e9db1f51f880b29b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68613-cwe-913-improper-control-of-dynamic-ff9feacf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68613%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=6945d4648954746f284878c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53950-unrestricted-upload-of-file-with-da-c7bcfb0c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53950%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20innovastudio%20WYSIWYG%20Editor&amp;severity=critical&amp;id=6945c32cf5c5e8dffe81cafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53959-uncontrolled-search-path-element-in-44f19486</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53959%3A%20Uncontrolled%20Search%20Path%20Element%20in%20filezilla-project%20FileZilla%20Client&amp;severity=high&amp;id=6945c32cf5c5e8dffe81cb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53958-weak-password-recovery-mechanism-fo-a24bdc5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53958%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20ltb-project%20LDAP%20Tool%20Box%20Self%20Service%20Password&amp;severity=high&amp;id=6945c32cf5c5e8dffe81cb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53956-unrestricted-upload-of-file-with-da-473b2792</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53956%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20altervista%20flatnux&amp;severity=high&amp;id=6945c32cf5c5e8dffe81cb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53951-improper-verification-of-cryptograp-8f12262e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53951%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Gauzy%20ever%20gauzy&amp;severity=critical&amp;id=6945c32cf5c5e8dffe81cb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53948-improper-neutralization-of-special--8fc96bc8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53948%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20cat03%20Lilac-Reloaded&amp;severity=critical&amp;id=6945c32cf5c5e8dffe81caf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53947-unquoted-search-path-or-element-in--80258714</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53947%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20oscinventory%20OCS%20Inventory%20NG&amp;severity=high&amp;id=6945c32cf5c5e8dffe81caf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53946-unquoted-search-path-or-element-in--2ada9fcf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53946%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Arcsoft%20PhotoStudio&amp;severity=high&amp;id=6945c32cf5c5e8dffe81caec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-tapo-c200-hardcoded-keys-buffer-overflows--31590741</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Tapo%20C200%3A%20Hardcoded%20Keys%2C%20Buffer%20Overflows%20and%20Privacy%20in%20the%20Era%20of%20AI%20Assisted%20Reverse%20Engineering&amp;severity=medium&amp;id=6945ec33c376abdb7e50f357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67712-cwe-79-improper-neutralization-of-i-bb130446</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67712%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Web%20AppBuilder%20%7BDeveloper%20Edition)&amp;severity=medium&amp;id=6945b49d94037f6b535f8834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14968-sql-injection-in-code-projects-simp-f2719609</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14968%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=6945b49d94037f6b535f882d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12874-cwe-444-inconsistent-interpretation-dc5ece68</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12874%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Quest%20Coexistence%20Manager%20for%20Notes&amp;severity=medium&amp;id=6945ad9494037f6b5356f5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14967-sql-injection-in-itsourcecode-stude-f05ca633</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14967%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6945aa0f94037f6b535451d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14966-sql-injection-in-fastadmin-169a822e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14966%3A%20SQL%20Injection%20in%20FastAdmin&amp;severity=medium&amp;id=6945aa0f94037f6b535451d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thailand-conference-launches-international-initiat-eea5de12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thailand%20Conference%20Launches%20International%20Initiative%20to%20Fight%20Online%20Scams&amp;severity=medium&amp;id=6945a43e0919c128849dab14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14965-path-traversal-in-1541492390c-yougo-b8e99b86</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14965%3A%20Path%20Traversal%20in%201541492390c%20yougou-mall&amp;severity=medium&amp;id=6945a4610919c128849db32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14964-stack-based-buffer-overflow-in-toto-be6aedc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14964%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=critical&amp;id=6945a4610919c128849db330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14962-cross-site-scripting-in-code-projec-d50cb772</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14962%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=69459d520919c12884942cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14961-sql-injection-in-code-projects-simp-ae37d208</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14961%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Blood%20Donor%20Management%20System&amp;severity=medium&amp;id=69459d520919c12884942cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-series-of-unfortunate-rmm-events-a2f17747</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Series%20of%20Unfortunate%20(RMM)%20Events&amp;severity=medium&amp;id=69459d520919c12884942c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-advertising-company-hacked-72a3b5d7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Advertising%20Company%20Hacked&amp;severity=medium&amp;id=694596380919c128848e2644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/denmark-blames-russia-for-destructive-cyberattack--d866fce5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Denmark%20blames%20Russia%20for%20destructive%20cyberattack%20on%20water%20utility&amp;severity=high&amp;id=694596380919c128848e2638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-25000-forticloud-sso-devices-exposed-to-remot-e6deeb43</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2025%2C000%20FortiCloud%20SSO%20devices%20exposed%20to%20remote%20attacks&amp;severity=high&amp;id=694596380919c128848e263c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14960-sql-injection-in-code-projects-simp-025af685</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14960%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Blood%20Donor%20Management%20System&amp;severity=medium&amp;id=694596660919c128848e41e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14959-sql-injection-in-code-projects-simp-f747c480</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14959%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=694596660919c128848e41d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-linked-hackers-use-microsoft-365-device-cod-8c2c93b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-Linked%20Hackers%20Use%20Microsoft%20365%20Device%20Code%20Phishing%20for%20Account%20Takeovers&amp;severity=low&amp;id=6945b57794037f6b53608bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14958-heap-based-buffer-overflow-in-flooo-b7c70023</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14958%3A%20Heap-based%20Buffer%20Overflow%20in%20floooh%20sokol&amp;severity=medium&amp;id=69458e67f063e4fadf084613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68430-cwe-24-path-traversal-filedir-in-cv-211a2800</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68430%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=69458ae3f063e4fadf03d176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68478-cwe-73-external-control-of-file-nam-228a882f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68478%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69458ae3f063e4fadf03d17a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14957-null-pointer-dereference-in-webasse-4f1cda29</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14957%3A%20NULL%20Pointer%20Dereference%20in%20WebAssembly%20Binaryen&amp;severity=medium&amp;id=6945875ff063e4fadffe4627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68477-cwe-918-server-side-request-forgery-92aa0069</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68477%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=694583dbf063e4fadffb129e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68457-cwe-79-improper-neutralization-of-i-b924277b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68457%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boscop-fr%20orejime&amp;severity=low&amp;id=694583dbf063e4fadffb1299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14809-cwe-1021-improper-restriction-of-re-c46befdd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14809%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20The%20Browser%20Company%20of%20New%20York%20ArcSearch&amp;severity=high&amp;id=694583dbf063e4fadffb1296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14812-cwe-1021-improper-restriction-of-re-501eeae3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14812%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20The%20Browser%20Company%20of%20New%20York%20ArcSearch&amp;severity=high&amp;id=69458084f063e4fadff5e82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66580-cwe-94-improper-control-of-generati-8d6c3eb4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66580%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenAgentPlatform%20Dive&amp;severity=critical&amp;id=69458084f063e4fadff5e847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65035-cwe-502-deserialization-of-untruste-bddb3352</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65035%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pluginsGLPI%20databaseinventory&amp;severity=medium&amp;id=69458084f063e4fadff5e842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30971-this-weakness-has-been-deprecated-b-88e2315d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30971%3A%20This%20weakness%20has%20been%20deprecated%20because%20it%20covered%20redundant%20concepts%20already%20described%20in%20CWE-287.%20in%20Palantir%20com.palantir.acme.gaia%3Agaia&amp;severity=medium&amp;id=69458083f063e4fadff5e827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49587-the-authentication-algorithm-is-sou-b53b34e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49587%3A%20The%20authentication%20algorithm%20is%20sound%2C%20but%20the%20implemented%20mechanism%20can%20be%20bypassed%20as%20the%20result%20of%20a%20separate%20weakness%20that%20is%20primary%20to%20the%20authentication%20error.%20in%20Palantir%20com.palantir.gotham%3Aglutton&amp;severity=critical&amp;id=69458084f063e4fadff5e82a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14956-heap-based-buffer-overflow-in-webas-de7ae511</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14956%3A%20Heap-based%20Buffer%20Overflow%20in%20WebAssembly%20Binaryen&amp;severity=medium&amp;id=69458084f063e4fadff5e839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14955-improper-initialization-in-open5gs-cf773d19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14955%3A%20Improper%20Initialization%20in%20Open5GS&amp;severity=medium&amp;id=69458084f063e4fadff5e830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempts-to-sniff-out-governmental-affairs-in-sout-9f45d5a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempts%20to%20sniff%20out%20governmental%20affairs%20in%20Southeast%20Asia%20and%20Japan&amp;severity=medium&amp;id=69459d520919c12884942c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-busted-north-korean-worker-posing-as-us-sta-ea41aac8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Busted%20North%20Korean%20Worker%20Posing%20as%20US%20Staff%20After%20Keyboard%20Lag&amp;severity=medium&amp;id=69457d16133fda1465c6ad06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-docker-ai-attack-google-sues-chinese-d3819014</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Docker%20AI%20Attack%2C%20Google%20Sues%20Chinese%20Cybercriminals%2C%20Coupang%20Hacked%20by%20Employee&amp;severity=medium&amp;id=69457988133fda1465c25886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14954-reachable-assertion-in-open5gs-06d109a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14954%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=694579a3133fda1465c274d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14953-null-pointer-dereference-in-open5gs-f0ac8021</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14953%3A%20NULL%20Pointer%20Dereference%20in%20Open5GS&amp;severity=low&amp;id=694579a3133fda1465c274c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34433-cwe-94-improper-control-of-generati-6b212350</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34433%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=critical&amp;id=694572a4133fda1465b9f67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cracked-software-and-youtube-videos-spread-countlo-44ebd0cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cracked%20Software%20and%20YouTube%20Videos%20Spread%20CountLoader%20and%20GachiLoader%20Malware&amp;severity=medium&amp;id=6945727d133fda1465b9bd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/denmark-blames-russia-for-cyberattacks-ahead-of-el-3c4afed4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Denmark%20Blames%20Russia%20for%20Cyberattacks%20Ahead%20of%20Elections%20and%20on%20Water%20Utility&amp;severity=medium&amp;id=69456746a90e3c9a1540af74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-longnosedgoblin-targeting-asian-govern-b265ce62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20%E2%80%98LongNosedGoblin%E2%80%99%20Targeting%20Asian%20Governments&amp;severity=medium&amp;id=694563a2a90e3c9a153ea496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14952-sql-injection-in-campcodes-supplier-d4710ed1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14952%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=69456762a90e3c9a1540c4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14951-sql-injection-in-code-projects-scho-7ee18e07</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14951%3A%20SQL%20Injection%20in%20code-projects%20Scholars%20Tracking%20System&amp;severity=medium&amp;id=694563c4a90e3c9a153eb8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breaking-sapcar-four-local-privilege-escalation-bu-3e2ea23e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Breaking%20SAPCAR%3A%20Four%20Local%20Privilege%20Escalation%20Bugs%20in%20SAR%20Archive%20Parsing&amp;severity=medium&amp;id=6945602ea90e3c9a153ccdab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14950-sql-injection-in-code-projects-scho-e65c5a36</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14950%3A%20SQL%20Injection%20in%20code-projects%20Scholars%20Tracking%20System&amp;severity=medium&amp;id=69455922a90e3c9a153a0e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-uat-9686-is-targeting-cisco-secur-923e338c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20APT%20UAT-9686%20is%20targeting%20Cisco%20Secure%20Email%20Gateway%20and%20Secure%20Email%20and%20Web%20Manager&amp;severity=medium&amp;id=69455218a90e3c9a1536c246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-critical-watchguard-firebox-firewall-flaw-expl-7c584dfe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20critical%20WatchGuard%20Firebox%20firewall%20flaw%20exploited%20in%20attacks&amp;severity=critical&amp;id=69455218a90e3c9a1536c23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asrock-asus-gigabyte-msi-boards-vulnerable-to-pre--7cdf1ecc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASRock%2C%20ASUS%2C%20GIGABYTE%2C%20MSI%20Boards%20vulnerable%20to%20pre-boot%20memory%20attacks&amp;severity=medium&amp;id=69455218a90e3c9a1536c24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-shuts-down-crypto-exchange-e-note-charges-russi-49b32b14</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Shuts%20Down%20Crypto%20Exchange%20E-Note%2C%20Charges%20Russian%20Administrator&amp;severity=medium&amp;id=69454e8aa90e3c9a1534b73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14946-improper-neutralization-of-argument-7f78966a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14946%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Red%20Hat%20libnbd&amp;severity=medium&amp;id=69455253a90e3c9a1536f3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-fixes-ask-gordon-ai-flaw-that-enabled-metad-bdb3bdb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Fixes%20%E2%80%98Ask%20Gordon%E2%80%99%20AI%20Flaw%20That%20Enabled%20Metadata-Based%20Attacks&amp;severity=medium&amp;id=69454b11a90e3c9a1532a008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14882-cwe-639-authorization-bypass-throug-e0d1d418</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14882%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pretix%20pretix-offlinesales&amp;severity=low&amp;id=6945478da90e3c9a1530ec0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1928-cwe-307-improper-restriction-of-exce-093697df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1928%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Restajet%20Information%20Technologies%20Inc.%20Online%20Food%20Delivery%20System&amp;severity=critical&amp;id=6945440aa90e3c9a152fb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1927-cwe-352-cross-site-request-forgery-c-76034cc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1927%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Restajet%20Information%20Technologies%20Inc.%20Online%20Food%20Delivery%20System&amp;severity=high&amp;id=69454096a90e3c9a152ce8bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-sydney-data-breach-affects-27000-ind-cf62c273</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Sydney%20Data%20Breach%20Affects%2027%2C000%20Individuals&amp;severity=medium&amp;id=6945407aa90e3c9a152cdb0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-android-botnet-ensnares-18-million-devices-153a1bc9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Kimwolf%E2%80%99%20Android%20Botnet%20Ensnares%201.8%20Million%20Devices&amp;severity=medium&amp;id=69453cf6a90e3c9a152a261a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1885-cwe-601-url-redirection-to-untrusted-2e698a7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1885%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Restajet%20Information%20Technologies%20Inc.%20Online%20Food%20Delivery%20System&amp;severity=medium&amp;id=69453d1ba90e3c9a152a49e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watchguard-warns-of-active-exploitation-of-critica-7a91ba7a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WatchGuard%20Warns%20of%20Active%20Exploitation%20of%20Critical%20Fireware%20OS%20VPN%20Vulnerability&amp;severity=critical&amp;id=69454869a90e3c9a1531997c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14847-cwe-130-improper-handling-of-length-dd0a4a45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14847%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=high&amp;id=6945326bd11fe727795f9186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dlls-x26-tls-callbacks-fri-dec-19th-03e4850e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x26%3B%23xa%3BDLLs%20%26%23x26%3B%20TLS%20Callbacks%2C%20(Fri%2C%20Dec%2019th)&amp;severity=medium&amp;id=69453259d11fe727795f70ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nigeria-arrests-raccoono365-phishing-developer-lin-8976cecd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nigeria%20Arrests%20RaccoonO365%20Phishing%20Developer%20Linked%20to%20Microsoft%20365%20Attacks&amp;severity=high&amp;id=69452b4ed11fe7277955fdff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-digital-surge-2b-stolen-in-crypto-as--6251bbc3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea%E2%80%99s%20Digital%20Surge%3A%20%242B%20Stolen%20in%20Crypto%20as%20Amazon%20Blocks%201%2C800%20Fake%20IT%20Workers&amp;severity=medium&amp;id=6945243eac896f72532c0166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14455-cwe-862-missing-authorization-in-wp-f85c4ba5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14455%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=69451dcdc326d36e537b0ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12361-cwe-862-missing-authorization-in-sa-acd99d13</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12361%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Points%20Management%20System%20For%20Gamification%2C%20Ranks%2C%20Badges%2C%20and%20Loyalty%20Rewards%20Program%20%E2%80%93%20myCred&amp;severity=medium&amp;id=69451dcdc326d36e537b0eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66524-cwe-502-deserialization-of-untruste-b2316260</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66524%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20NiFi&amp;severity=high&amp;id=69451a4cc326d36e53765d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-uefi-flaw-enables-early-boot-dma-attacks-on-as-403cd23b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20UEFI%20Flaw%20Enables%20Early-Boot%20DMA%20Attacks%20on%20ASRock%2C%20ASUS%2C%20GIGABYTE%2C%20MSI%20Motherboards&amp;severity=medium&amp;id=69450f474227c5364db3e81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11747-cwe-79-improper-neutralization-of-i-d0aabd5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=69450d534227c5364db27c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14151-cwe-79-improper-neutralization-of-i-3ab9f1a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14151%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=high&amp;id=69450d534227c5364db27c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-pwned-x-twitter-vercel-cursor-discord-and-h-9860143b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20we%20pwned%20X%20(Twitter)%2C%20Vercel%2C%20Cursor%2C%20Discord%2C%20and%20hundreds%20of%20companies%20through%20a%20supply-chain%20attack&amp;severity=medium&amp;id=69451342c326d36e536dff83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66522-cwe-79-improper-neutralization-of-i-360d1aab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66522%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66521-cwe-79-improper-neutralization-of-i-e5651c4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66520-cwe-79-improper-neutralization-of-i-b0667f4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66520%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66519-cwe-79-improper-neutralization-of-i-e4e18a78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66519%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66502-cwe-79-improper-neutralization-of-i-d4893b5b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66501-cwe-79-improper-neutralization-of-i-561c3445</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=6944ff0c19341fe1888b869e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66500-cwe-79-improper-neutralization-of-i-b8d63d9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20webplugins.foxit.com&amp;severity=medium&amp;id=6944ff0c19341fe1888b869b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66499-cwe-190-integer-overflow-or-wraparo-9cd261f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66499%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=6944fb8919341fe1888ac966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66498-cwe-125-out-of-bounds-read-in-foxit-229caee9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66498%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=medium&amp;id=6944fb8919341fe1888ac963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66497-cwe-125-out-of-bounds-read-in-foxit-523c74ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66497%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=medium&amp;id=6944fb8919341fe1888ac960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66496-cwe-125-out-of-bounds-read-in-foxit-f8ef853b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66496%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=medium&amp;id=6944fb8919341fe1888ac95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66495-cwe-416-use-after-free-in-foxit-sof-e36af769</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66495%3A%20CWE-416%20Use%20After%20Free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=6944fb8919341fe1888ac95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66494-cwe-416-use-after-free-in-foxit-sof-dea8f968</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66494%3A%20CWE-416%20Use%20After%20Free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=6944fb8919341fe1888ac957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66493-cwe-416-use-after-free-in-foxit-sof-0528ceff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66493%3A%20CWE-416%20Use%20After%20Free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=6944fb8919341fe1888ac954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13008-cwe-359-exposure-of-private-persona-6ed57175</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13008%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=high&amp;id=6944fb8919341fe1888ac951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13999-cwe-918-server-side-request-forgery-5d7ec843</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13999%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20HTML5%20Audio%20Player%20%E2%80%93%20The%20Ultimate%20No-Code%20Podcast%2C%20MP3%20%26%20Audio%20Player&amp;severity=high&amp;id=6944f80919341fe18889df14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14449-cwe-79-improper-neutralization-of-i-44a54a37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14449%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bookingalgorithms%20BA%20Book%20Everything&amp;severity=medium&amp;id=6944f80919341fe18889df18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13754-cwe-862-missing-authorization-in-cr-437e9840</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13754%3A%20CWE-862%20Missing%20Authorization%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=6944f80919341fe18889df10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66174-vulnerability-in-hikvision-ds-7104h-2d4bb1ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66174%3A%20Vulnerability%20in%20Hikvision%20DS-7104HGHI-F1&amp;severity=medium&amp;id=6944f80919341fe18889df1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66173-vulnerability-in-hikvision-ds-7104h-46a488ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66173%3A%20Vulnerability%20in%20Hikvision%20DS-7104HGHI-F1&amp;severity=medium&amp;id=6944f80919341fe18889df1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14267-cwe-212-improper-removal-of-sensiti-9044f6c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14267%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=6944f0fd19341fe188885b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13307-cwe-94-improper-control-of-generati-4568600d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13307%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ocean%20Modal%20Window&amp;severity=high&amp;id=6944ed7819341fe18887d792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14546-cross-site-request-forgery-csrf-in--0167bf96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14546%3A%20Cross-site%20Request%20Forgery%20(CSRF)%20in%20fastapi-sso&amp;severity=medium&amp;id=6944df6e19341fe18884f730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14940-sql-injection-in-code-projects-scho-08664755</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14940%3A%20SQL%20Injection%20in%20code-projects%20Scholars%20Tracking%20System&amp;severity=medium&amp;id=6944d15919341fe188822336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14939-sql-injection-in-code-projects-onli-7bf2961b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14939%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=6944d15919341fe188822319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/research-geometric-analysis-of-sha-256-finding-68--d4c16e12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BResearch%5D%20Geometric%20analysis%20of%20SHA-256%3A%20Finding%2068%25%20bit-match%20pairs%20through%20dimensional%20transformation&amp;severity=medium&amp;id=6944b4524eb3efac36c3350b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13941-cwe-732-incorrect-permission-assign-0aef8af7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13941%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=6944b7d24eb3efac36c40a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52692-vulnerability-in-linksys-linksys-e9-4ceaf0da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52692%3A%20Vulnerability%20in%20Linksys%20Linksys%20E9450-SG&amp;severity=high&amp;id=6944b7d24eb3efac36c40a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14910-path-traversal-in-edimax-br-6208ac-2c60754f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14910%3A%20Path%20Traversal%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14909-manage-user-sessions-in-jeecgboot-807bf1b2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14909%3A%20Manage%20User%20Sessions%20in%20JeecgBoot&amp;severity=medium&amp;id=6944a9c54eb3efac36c013f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14908-improper-authentication-in-jeecgboo-5a05bcaf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14908%3A%20Improper%20Authentication%20in%20JeecgBoot&amp;severity=medium&amp;id=6944a2ba4eb3efac36beeb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11774-cwe-78-improper-neutralization-of-s-cf4c89d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11774%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=high&amp;id=69449f434eb3efac36bb56a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14900-sql-injection-in-codeastro-real-est-3937182a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14900%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=69449f434eb3efac36bb56b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14899-sql-injection-in-codeastro-real-est-5f54f327</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14899%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=69449f434eb3efac36bb56a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14733-cwe-787-out-of-bounds-write-in-watc-6a8ed88f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14733%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=critical&amp;id=69449f434eb3efac36bb56a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-19-936b8ab9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-19&amp;severity=medium&amp;id=6945e89ad64a69f72fb550f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63665-na-3788a013</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63665%3A%20n%2Fa&amp;severity=critical&amp;id=6945875ff063e4fadffe4631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67442-na-fb96278b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67442%3A%20n%2Fa&amp;severity=high&amp;id=69457615133fda1465bcd188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66905-na-dac37d1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66905%3A%20n%2Fa&amp;severity=high&amp;id=694570c4133fda1465b7b150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66906-na-574df72b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66906%3A%20n%2Fa&amp;severity=medium&amp;id=69456e3ba90e3c9a15456616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66908-na-170811fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66908%3A%20n%2Fa&amp;severity=medium&amp;id=69456762a90e3c9a1540c4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66910-na-b1f4754d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66910%3A%20n%2Fa&amp;severity=medium&amp;id=69456762a90e3c9a1540c4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50681-na-6dd0a897</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50681%3A%20n%2Fa&amp;severity=high&amp;id=69456762a90e3c9a1540c4a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66909-na-368d6d13</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66909%3A%20n%2Fa&amp;severity=high&amp;id=694563c4a90e3c9a153eb8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66911-na-9d398eb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66911%3A%20n%2Fa&amp;severity=medium&amp;id=69456029a90e3c9a153cc466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67846-cwe-472-external-control-of-assumed-9813c718</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67846%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20Mintlify%20Mintlify%20Platform&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67845-cwe-24-path-traversal-filedir-in-mi-ac7a313c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67845%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Mintlify%20Mintlify%20Platform&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67844-cwe-425-direct-request-forced-brows-4d47529d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67844%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Mintlify%20Mintlify%20Platform&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67843-cwe-1336-improper-neutralization-of-73b33a02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67843%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Mintlify%20Mintlify%20Platform&amp;severity=high&amp;id=6944b7d24eb3efac36c40a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67842-cwe-829-inclusion-of-functionality--cf753aa3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67842%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Mintlify%20Mintlify%20Platform&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14898-sql-injection-in-codeastro-real-est-5142238d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14898%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=694491254eb3efac36b3b60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14897-sql-injection-in-codeastro-real-est-3a585ee7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14897%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=694491254eb3efac36b3b608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64675-cwe-79-improper-neutralization-of-i-197cbe83</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64675%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20Cosmos%20DB&amp;severity=high&amp;id=69448da64eb3efac36b2e5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68398-cwe-20-improper-input-validation-in-186802ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68398%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20WeblateOrg%20weblate&amp;severity=critical&amp;id=69448a1d4eb3efac36b25ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68279-cwe-22-improper-limitation-of-a-pat-32cc7cef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68279%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69448a1d4eb3efac36b25ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68422-cwe-863-incorrect-authorization-in--fa007da8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68422%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=694483164eb3efac36b0f27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68386-cwe-863-incorrect-authorization-in--acad51ae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68386%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=694483164eb3efac36b0f280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68390-cwe-770-allocation-of-resources-wit-4f6b919c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68390%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=69447f924eb3efac36af9a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68389-cwe-770-allocation-of-resources-wit-e3a8c1ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68389%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69447f924eb3efac36af9a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68387-cwe-79-improper-neutralization-of-i-60505a08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69447f924eb3efac36af9a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68385-cwe-79-improper-neutralization-of-i-ec595932</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69447f924eb3efac36af9a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68384-cwe-770-allocation-of-resources-wit-0091fbad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68384%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=69447c134eb3efac36aec21f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64677-cwe-79-improper-neutralization-of-i-f84c1f6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64677%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Office%20Out-of-Box%20Experience&amp;severity=high&amp;id=69447c134eb3efac36aec210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64676-cwe-94-improper-control-of-generati-e958604e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64676%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=69447c134eb3efac36aec20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65037-cwe-94-improper-control-of-generati-ddd87b56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65037%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Azure%20Container%20Apps&amp;severity=critical&amp;id=69447c134eb3efac36aec213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65041-cwe-285-improper-authorization-in-m-738f9e8a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65041%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20Partner%20Center&amp;severity=critical&amp;id=69447c134eb3efac36aec216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64663-cwe-918-server-side-request-forgery-4a0523d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64663%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Cognitive%20Service%20for%20Language&amp;severity=critical&amp;id=69447c134eb3efac36aec20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65046-spoofing-in-microsoft-microsoft-edg-c7e523a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65046%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=low&amp;id=69447c134eb3efac36aec219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68383-cwe-1284-improper-validation-of-spe-5a5d7031</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68383%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Elastic%20Filebeat&amp;severity=medium&amp;id=69447c134eb3efac36aec21c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13427-cwe-287-improper-authentication-in--4490b313</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13427%3A%20CWE-287%20Improper%20Authentication%20in%20Google%20Cloud%20Dialogflow%20CX%20Messenger&amp;severity=medium&amp;id=69447c134eb3efac36aec222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68382-cwe-125-out-of-bounds-read-in-elast-65a4ffd6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68382%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69447c134eb3efac36aec225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68381-cwe-787-out-of-bounds-write-in-elas-67fe2acd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68381%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=6944788a4eb3efac36ae0ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68388-cwe-770-allocation-of-resources-wit-dcae1706</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68388%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=694475234eb3efac36ad1c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-ransomware-targets-gladinet-centrestack-in-da-c35cedf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20ransomware%20targets%20Gladinet%20CentreStack%20in%20data%20theft%20attacks&amp;severity=high&amp;id=694475034eb3efac36ad185d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-sydney-suffers-data-breach-exposing--2bf13239</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Sydney%20suffers%20data%20breach%20exposing%20student%20and%20staff%20info&amp;severity=high&amp;id=694475034eb3efac36ad1859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34451-cwe-121-stack-based-buffer-overflow-b557dacc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34451%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20rofl0r%20proxychains-ng&amp;severity=medium&amp;id=694471834eb3efac36abad29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34450-cwe-121-stack-based-buffer-overflow-73a71696</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34450%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20merbanan%20rtl_433&amp;severity=medium&amp;id=694471834eb3efac36abad23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34449-cwe-119-improper-restriction-of-ope-b8f14c0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34449%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Genymobile%20scrcpy&amp;severity=medium&amp;id=694471834eb3efac36abad1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53710-the-product-does-not-properly-compa-237abb75</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53710%3A%20The%20product%20does%20not%20properly%20compartmentalize%20or%20isolate%20functionality%2C%20processes%2C%20or%20resources%20that%20require%20different%20privilege%20levels%2C%20rights%2C%20or%20permissions.%20in%20Palantir%20com.palantir.compute%3Acompute-service&amp;severity=high&amp;id=694471834eb3efac36abad33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68161-cwe-297-improper-validation-of-cert-e05a34ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68161%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69446a7c4eb3efac36a96175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67653-cwe-22-in-advantech-webaccessscada-6eeebc62</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67653%3A%20CWE-22%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=medium&amp;id=69446a7c4eb3efac36a96197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62004-cwe-367-time-of-check-time-of-use-t-c33b54ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62004%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20BullWall%20Server%20Intrusion%20Protection&amp;severity=high&amp;id=69446a7c4eb3efac36a96193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62003-cwe-367-time-of-check-time-of-use-t-93d17383</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62003%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20BullWall%20Server%20Intrusion%20Protection&amp;severity=high&amp;id=69446a7c4eb3efac36a9618f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46268-cwe-89-in-advantech-webaccessscada-8758bd00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46268%3A%20CWE-89%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=medium&amp;id=69446a7c4eb3efac36a9618a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14848-cwe-36-in-advantech-webaccessscada-1dd8a4cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14848%3A%20CWE-36%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=medium&amp;id=694466f94eb3efac36a822ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62002-cwe-358-improperly-implemented-secu-2dd2851a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62002%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20BullWall%20Ransomware%20Containment&amp;severity=medium&amp;id=694466f94eb3efac36a822c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14849-cwe-434-in-advantech-webaccessscada-fb4363c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14849%3A%20CWE-434%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=high&amp;id=694466f94eb3efac36a822b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62001-cwe-420-unprotected-alternate-chann-c08209ae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62001%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20BullWall%20Ransomware%20Containment&amp;severity=high&amp;id=694466f94eb3efac36a822c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62000-cwe-1023-incomplete-comparison-with-6b3774ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62000%3A%20CWE-1023%20Incomplete%20Comparison%20with%20Missing%20Factors%20in%20BullWall%20Ransomware%20Containment&amp;severity=high&amp;id=694466f94eb3efac36a822bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14850-cwe-22-in-advantech-webaccessscada-a5857d11</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14850%3A%20CWE-22%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=high&amp;id=694466f94eb3efac36a822b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13911-cwe-250-in-inductive-automation-ign-4659c19c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13911%3A%20CWE-250%20in%20Inductive%20Automation%20Ignition&amp;severity=medium&amp;id=69446a7c4eb3efac36a9617d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14889-improper-authorization-in-campcodes-768d03ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14889%3A%20Improper%20Authorization%20in%20Campcodes%20Advanced%20Voting%20Management%20System&amp;severity=medium&amp;id=69445ff04eb3efac36a51161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53940-improper-control-of-generation-of-c-41124e09</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53940%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Alfonzm%20Codigo%20Markdown%20Editor&amp;severity=high&amp;id=69445ff04eb3efac36a5115c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58323-improper-neutralization-of-input-du-e04b8df2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58322-improper-neutralization-of-input-du-ae016e7b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58322%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a5145c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58321-improper-neutralization-of-input-du-93d3908c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58321%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58320-exposure-of-sensitive-system-inform-55a8ee17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58320%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58319-improper-neutralization-of-input-du-d4bcaecf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58319%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58318-improper-neutralization-of-input-du-7dce5008</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58318%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a5144c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58317-sensitive-cookie-in-https-session-w-f022bc87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58317%3A%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53944-improper-limitation-of-a-pathname-t-e72a8f55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53944%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Easyphp%20EasyPHP%20Webserver&amp;severity=high&amp;id=69445ff24eb3efac36a51443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53943-observable-discrepancy-in-glpi-proj-1ed08ea6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53943%3A%20Observable%20Discrepancy%20in%20Glpi-Project%20GLPI&amp;severity=medium&amp;id=69445ff24eb3efac36a5143e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53942-unrestricted-upload-of-file-with-da-33ff8834</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53942%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20leefish%20File%20Thingie&amp;severity=critical&amp;id=69445ff24eb3efac36a51439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53941-improper-neutralization-of-special--e06a1807</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53941%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Easyphp%20EasyPHP%20Webserver&amp;severity=critical&amp;id=69445ff04eb3efac36a51187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53938-improper-neutralization-of-input-du-704d5343</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iwind%20RockMongo&amp;severity=medium&amp;id=69445ff04eb3efac36a51182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53936-improper-neutralization-of-input-du-b7cb8c17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53936%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tuzitio%20Cameleon%20CMS&amp;severity=medium&amp;id=69445ff04eb3efac36a5117d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53935-improper-neutralization-of-special--70960e6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53935%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Codester%20WBiz%20Desk&amp;severity=medium&amp;id=69445ff04eb3efac36a51178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53934-improper-neutralization-of-server-s-45238502</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53934%3A%20Improper%20Neutralization%20of%20Server-Side%20Includes%20(SSI)%20Within%20a%20Web%20Page%20in%20Kentico%20Xperience&amp;severity=high&amp;id=69445ff04eb3efac36a51174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53738-improper-neutralization-of-input-du-bd88573c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53738%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff04eb3efac36a51170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53737-improper-neutralization-of-input-du-d4695a57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53737%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff04eb3efac36a5116c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53736-improper-neutralization-of-input-du-32d50676</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53736%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff04eb3efac36a51168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64400-the-product-does-not-restrict-or-in-1e9733f5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64400%3A%20The%20product%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Palantir%20com.palantir.controlpanel%3Acontrol-panel&amp;severity=medium&amp;id=694459184eb3efac36a3bd24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-password-spraying-attacks-target-cisco-pan-vpn-253ff13e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20password%20spraying%20attacks%20target%20Cisco%2C%20PAN%20VPN%20gateways&amp;severity=high&amp;id=694458e34eb3efac36a3a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-aligned-threat-group-uses-windows-group-poli-ccd395e3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Aligned%20Threat%20Group%20Uses%20Windows%20Group%20Policy%20to%20Deploy%20Espionage%20Malware&amp;severity=high&amp;id=694458e34eb3efac36a3a0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dig-ai-uncensored-darknet-ai-assistant-at-the-serv-44b25b6b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DIG%20AI%3A%20Uncensored%20Darknet%20AI%20Assistant%20at%20the%20Service%20of%20Criminals%20and%20Terrorists&amp;severity=medium&amp;id=694458e34eb3efac36a3a0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-beavertail-malware-variant-linked-to-lazarus-g-9523fb47</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20BeaverTail%20Malware%20Variant%20Linked%20to%20Lazarus%20Group&amp;severity=high&amp;id=694455604eb3efac36a30571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-steals-over-2bn-in-crypto-in-2025-50c7260d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea%20Steals%20Over%20%242bn%20in%20Crypto%20in%202025&amp;severity=high&amp;id=694455604eb3efac36a30575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hpe-oneview-flaw-rated-cvss-100-allows-unauthentic-6d3538dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HPE%20OneView%20Flaw%20Rated%20CVSS%2010.0%20Allows%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=high&amp;id=694455604eb3efac36a30579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pathfindingcloud-a-library-of-aws-iam-privilege-es-31582a04</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=pathfinding.cloud%20-%20A%20library%20of%20AWS%20IAM%20privilege%20escalation%20paths&amp;severity=medium&amp;id=69444e634eb3efac36a13f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-embed-new-beavertail-variant-in-deve-c44bf866</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20Embed%20New%20BeaverTail%20Variant%20in%20Developer%20Tools&amp;severity=medium&amp;id=69444ad84eb3efac36a081f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67745-cwe-402-transmission-of-private-res-0147fce4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67745%3A%20CWE-402%3A%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)%20in%20Aiven-Open%20myhoard&amp;severity=high&amp;id=69444e5e4eb3efac36a13dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14885-unrestricted-upload-in-sourcecodest-6b02eee6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14885%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69444e5e4eb3efac36a13dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14739-cwe-824-access-of-uninitialized-poi-ee6d5fa5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14739%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20TP-Link%20Systems%20Inc.%20WR940N%20and%20WR941ND&amp;severity=medium&amp;id=694447544eb3efac369fb3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14738-cwe-287-improper-authentication-in--f3738763</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14738%3A%20CWE-287%20Improper%20Authentication%20in%20TP-Link%20Systems%20Inc.%20WA850RE&amp;severity=medium&amp;id=694443d04eb3efac369ef739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14737-cwe-78-improper-neutralization-of-s-52edd935</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14737%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20WA850RE&amp;severity=high&amp;id=694443d04eb3efac369ef733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-prince-of-persia-resurfaces-with-new-t-69092c6d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20%E2%80%98Prince%20of%20Persia%E2%80%99%20Resurfaces%20With%20New%20Tools%20and%20Global%20Targets&amp;severity=medium&amp;id=694435bc4eb3efac369bc19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14884-command-injection-in-d-link-dir-605-f27fb0bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14884%3A%20Command%20Injection%20in%20D-Link%20DIR-605&amp;severity=high&amp;id=694435d24eb3efac369bca07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14879-stack-based-buffer-overflow-in-tend-980d32bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14879%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694435d24eb3efac369bca00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62960-cwe-862-missing-authorization-in-sp-07ee6c5b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62960%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Construction%20Light&amp;severity=medium&amp;id=6944323d4eb3efac369b379a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62961-cwe-862-missing-authorization-in-sp-96a77111</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62961%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Sparkle%20FSE&amp;severity=medium&amp;id=6944323d4eb3efac369b379d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62998-cwe-201-insertion-of-sensitive-info-4b85d3fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62998%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WP%20Messiah%20WP%20AI%20CoPilot&amp;severity=medium&amp;id=6944323d4eb3efac369b37a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63002-cwe-862-missing-authorization-in-wp-5aedb54f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63002%3A%20Missing%20Authorization%20in%20wpforchurch%20Sermon%20Manager&amp;severity=medium&amp;id=6944323d4eb3efac369b37a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63043-cwe-639-authorization-bypass-throug-156d0aca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63043%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=medium&amp;id=6944323d4eb3efac369b37a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64235-cwe-22-improper-limitation-of-a-pat-c4795854</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64235%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AmentoTech%20Tuturn&amp;severity=medium&amp;id=6944323d4eb3efac369b37a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64236-cwe-288-authentication-bypass-using-414f4af6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64236%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20AmentoTech%20Tuturn&amp;severity=critical&amp;id=6944323d4eb3efac369b37af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14896-files-or-directories-accessible-to--f96436ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14896%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20yuzutech%20kroki&amp;severity=high&amp;id=6944323d4eb3efac369b37ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64282-cwe-639-authorization-bypass-throug-3c6dd366</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64282%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20RadiusTheme%20Radius%20Blocks&amp;severity=medium&amp;id=69443cc84eb3efac369d2e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64355-cwe-79-improper-neutralization-of-i-94e56e13</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=medium&amp;id=6944323d4eb3efac369b37b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66058-cwe-862-missing-authorization-in-pi-5620b7ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66058%3A%20Missing%20Authorization%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=medium&amp;id=6944323d4eb3efac369b37b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14878-stack-based-buffer-overflow-in-tend-832aeece</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14878%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=69442b344eb3efac36990c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14877-sql-injection-in-campcodes-supplier-9e879e33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14877%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=69442b344eb3efac36990c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14823-cwe-201-insertion-of-sensitive-info-a7d3f81a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14823%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ConnectWise%20ScreenConnect&amp;severity=medium&amp;id=6944242d4eb3efac36964740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uefi-vulnerability-in-major-motherboards-enables-e-f792c7c3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UEFI%20Vulnerability%20in%20Major%20Motherboards%20Enables%20Early-Boot%20Attacks&amp;severity=medium&amp;id=6944209a4eb3efac369568a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64724-cwe-276-incorrect-default-permissio-363ef435</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64724%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20arduino%20arduino-ide&amp;severity=medium&amp;id=69441d2a4eb3efac369420af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64723-cwe-276-incorrect-default-permissio-c22765a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64723%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20arduino%20arduino-ide&amp;severity=medium&amp;id=69441d2a4eb3efac369420a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65011-cwe-425-direct-request-forced-brows-4322ca1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65011%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20WODESYS%20WD-R608U&amp;severity=high&amp;id=69441d2f4eb3efac369421ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65010-cwe-306-missing-authentication-for--4e3e22c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65010%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WODESYS%20WD-R608U&amp;severity=high&amp;id=69441d2f4eb3efac369421b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65009-cwe-256-plaintext-storage-of-a-pass-0ec48ee3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65009%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20WODESYS%20WD-R608U&amp;severity=high&amp;id=69441d2f4eb3efac369421b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65008-cwe-78-improper-neutralization-of-s-d341792b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65008%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WODESYS%20WD-R608U&amp;severity=critical&amp;id=69441d2f4eb3efac369421ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65007-cwe-306-missing-authentication-for--727ac4e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65007%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WODESYS%20WD-R608U&amp;severity=high&amp;id=69441d2f4eb3efac369421a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hpe-patches-critical-flaw-in-it-infrastructure-man-912fda4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HPE%20Patches%20Critical%20Flaw%20in%20IT%20Infrastructure%20Management%20Software&amp;severity=critical&amp;id=694419924eb3efac3690e8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64469-cwe-121-stack-based-buffer-overflow-1b1ce284</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64469%3A%20CWE-121%20-%20Stack-based%20Buffer%20Overflow%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694416204eb3efac368e65d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64468-cwe-416-use-after-free-in-ni-labvie-40c52f4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64468%3A%20CWE-416%20Use%20After%20Free%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694416204eb3efac368e65d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7358-cwe-798-use-of-hard-coded-credential-d9b40039</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7358%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Utarit%20Informatics%20Services%20Inc.%20SoliClub&amp;severity=high&amp;id=694416204eb3efac368e65d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7047-cwe-862-missing-authorization-in-uta-85b0834d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7047%3A%20CWE-862%20Missing%20Authorization%20in%20Utarit%20Informatics%20Services%20Inc.%20SoliClub&amp;severity=medium&amp;id=694416204eb3efac368e65e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64467-cwe-125-out-of-bounds-read-in-ni-la-4b37ff21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64467%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694416204eb3efac368e65da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hpe-oneview-flaw-rated-cvss-100-allows-unauthentic-92e1896b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HPE%20OneView%20Flaw%20Rated%20CVSS%2010.0%20Allows%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=6944e77519341fe1888671e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64466-cwe-125-out-of-bounds-read-in-ni-la-ade9688b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64466%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694416204eb3efac368e65dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64465-cwe-125-out-of-bounds-read-in-ni-la-03680b5d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64465%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694412994eb3efac368d95e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64464-cwe-125-out-of-bounds-read-in-ni-la-c761ae48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64464%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694412994eb3efac368d95df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64463-cwe-125-out-of-bounds-read-in-ni-la-727099c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64463%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694412994eb3efac368d95dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1031-cwe-639-authorization-bypass-through-52f38987</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1031%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Utarit%20Informatics%20Services%20Inc.%20SoliClub&amp;severity=high&amp;id=694412994eb3efac368d95d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64462-cwe-125-out-of-bounds-read-in-ni-la-2b265abe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64462%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694412994eb3efac368d95d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1030-cwe-359-exposure-of-private-personal-fe8e64a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1030%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Utarit%20Informatics%20Services%20Inc.%20SoliClub&amp;severity=high&amp;id=69440f154eb3efac368cd70d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64461-cwe-787-out-of-bounds-write-in-ni-l-3c49877a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64461%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69440f154eb3efac368cd710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14861-vulnerability-in-mozilla-firefox-9685657f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14861%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69440f154eb3efac368cd706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14860-vulnerability-in-mozilla-firefox-82f60082</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14860%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69440f154eb3efac368cd702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14744-vulnerability-in-mozilla-firefox-fo-bde4dbc7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14744%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=69440f154eb3efac368cd6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1029-cwe-798-use-of-hard-coded-credential-6b7120c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1029%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Utarit%20Information%20Services%20Inc.%20SoliClub&amp;severity=high&amp;id=69440f154eb3efac368cd70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9787-cwe-79-improper-neutralization-of-in-52164820</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9787%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Applications%20Manager&amp;severity=medium&amp;id=69440f154eb3efac368cd713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65000-cwe-212-improper-removal-of-sensiti-4c4606b7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65000%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=low&amp;id=69440bfa4eb3efac368bf684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-hubspot-phishing-campaign-9c5426b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20HubSpot%20Phishing%20Campaign&amp;severity=medium&amp;id=694408114eb3efac368aaf10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-stealka-stealer-hijacks-accounts-and-steals-cr-5c6750cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Stealka%20stealer%20hijacks%20accounts%20and%20steals%20crypto%20while%20masquerading%20as%20pirated%20software%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6944054f4eb3efac3689efa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/access-granted-phishing-with-device-code-authoriza-75df8ed8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Access%20granted%3A%20phishing%20with%20device%20code%20authorization%20for%20account%20takeover&amp;severity=medium&amp;id=6944242b4eb3efac36964678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-flaw-in-asus-update-tool-252cfa27</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20Flaw%20in%20Asus%20Update%20Tool&amp;severity=medium&amp;id=6944051a4eb3efac3689cb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40898-cwe-22-improper-limitation-of-a-pat-9b5d57c9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40898%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=694401044eb3efac3688609a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40893-cwe-79-improper-neutralization-of-i-099af892</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=694401044eb3efac36886097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40892-cwe-79-improper-neutralization-of-i-acbcde93</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=694401044eb3efac36886094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40891-cwe-79-improper-neutralization-of-i-6aec0b9f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=low&amp;id=694401044eb3efac36886091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-whatsapp-hijacks-mcp-leaks-ai--0207a7b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20WhatsApp%20Hijacks%2C%20MCP%20Leaks%2C%20AI%20Recon%2C%20React2Shell%20Exploit%20and%2015%20More%20Stories&amp;severity=medium&amp;id=6944e77519341fe1888671ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-hackers-steal-202-billion-in-20-e0770956</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Linked%20Hackers%20Steal%20%242.02%20Billion%20in%202025%2C%20Leading%20Global%20Crypto%20Theft&amp;severity=medium&amp;id=6944e77519341fe1888671ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13110-cwe-639-authorization-bypass-throug-e2175abb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13110%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=medium&amp;id=6943f2f44eb3efac36830805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14437-cwe-532-insertion-of-sensitive-info-132acec1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14437%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20wpmudev%20Hummingbird%20Performance%20%E2%80%93%20Cache%20%26%20Page%20Speed%20Optimization%20for%20Core%20Web%20Vitals%20%7C%20Critical%20CSS%20%7C%20Minify%20CSS%20%7C%20Defer%20CSS%20Javascript%20%7C%20CDN&amp;severity=high&amp;id=6943f2f44eb3efac3683080e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14618-cwe-862-missing-authorization-in-li-b0bcebfe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14618%3A%20CWE-862%20Missing%20Authorization%20in%20wpdirectorykit%20Sweet%20Energy%20Efficiency&amp;severity=medium&amp;id=6943f2f44eb3efac36830812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14277-cwe-918-server-side-request-forgery-c4d54bf2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14277%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6943f2f44eb3efac3683080a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-case-for-dynamic-ai-saas-security-as-copilots--814f4403</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Case%20for%20Dynamic%20AI-SaaS%20Security%20as%20Copilots%20Scale&amp;severity=medium&amp;id=6944e77519341fe1888671f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10910-cwe-639-authorization-bypass-throug-3488e573</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10910%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Govee%20H6056&amp;severity=critical&amp;id=6943e86c4eb3efac367ff766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/113000-impacted-by-data-breach-at-virginia-mental--28f003f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=113%2C000%20Impacted%20by%20Data%20Breach%20at%20Virginia%20Mental%20Health%20Authority&amp;severity=medium&amp;id=6943e1514eb3efac367e3aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zeroday-cloud-hacking-event-awards-3200000-for-11--58d27060</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zeroday%20Cloud%20hacking%20event%20awards%20%24320%2C0000%20for%2011%20zero%20days&amp;severity=critical&amp;id=6943da584eb3efac367cd1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-asus-live-update-flaw-after-ev-95e8b5d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20ASUS%20Live%20Update%20Flaw%20After%20Evidence%20of%20Active%20Exploitation&amp;severity=critical&amp;id=6943da584eb3efac367cd1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-spreads-docswap-android-malware-via-qr-phi-8f1eaaf1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20Spreads%20DocSwap%20Android%20Malware%20via%20QR%20Phishing%20Posing%20as%20Delivery%20App&amp;severity=high&amp;id=6943da584eb3efac367cd1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/france-probes-foreign-interference-after-remote-co-aea49651</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=France%20Probes%20%E2%80%98Foreign%20Interference%E2%80%99%20After%20Remote%20Control%20Malware%20Found%20on%20Passenger%20Ferry&amp;severity=medium&amp;id=6943d3424eb3efac367b3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/orm-leaking-more-than-you-joined-for-part-33-on-or-59b12903</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ORM%20Leaking%20More%20Than%20You%20Joined%20For%20-%20Part%203%2F3%20on%20ORM%20Leak%20Vulnerabilities&amp;severity=medium&amp;id=6943cc4d4eb3efac36794bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14364-cwe-862-missing-authorization-in-kr-d026b68d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14364%3A%20CWE-862%20Missing%20Authorization%20in%20kraftplugins%20Demo%20Importer%20Plus&amp;severity=high&amp;id=6943cc484eb3efac36794b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13730-cwe-79-improper-neutralization-of-i-0ed3a838</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13730%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20daggerhart%20OpenID%20Connect%20Generic%20Client&amp;severity=medium&amp;id=6943cc484eb3efac36794b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13641-cwe-22-improper-limitation-of-a-pat-737604d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13641%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20smub%20Photo%20Gallery%2C%20Sliders%2C%20Proofing%20and%20Themes%20%E2%80%93%20NextGEN%20Gallery&amp;severity=high&amp;id=6943cc484eb3efac36794b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64997-cwe-280-improper-handling-of-insuff-32f1c412</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64997%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=6943c8c34eb3efac3678171c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-patches-exploited-sma-1000-zero-day-0b1eed74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Patches%20Exploited%20SMA%201000%20Zero-Day&amp;severity=critical&amp;id=6943c5314eb3efac3676c54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14874-improper-check-or-handling-of-excep-67b511f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14874%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20Red%20Hat%20Red%20Hat%20Advanced%20Cluster%20Management%20for%20Kubernetes%202&amp;severity=medium&amp;id=6943c1bb4eb3efac3675c967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14318-cwe-863-incorrect-authorization-in--dc1411c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14318%3A%20CWE-863%20Incorrect%20Authorization%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=6943b3ab4eb3efac3671aa33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67546-exposure-of-sensitive-system-inform-ae67d079</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67546%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20weDevs%20WP%20ERP&amp;severity=medium&amp;id=6943b0574eb3efac36700b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66119-improper-neutralization-of-input-du-29b87daa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66119%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Hostel&amp;severity=high&amp;id=6943b0574eb3efac36700b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66118-improper-neutralization-of-input-du-706be7f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66118%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BoldGrid%20Sprout%20Clients&amp;severity=high&amp;id=6943b0574eb3efac36700b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66117-missing-authorization-in-ays-pro-ea-5d57de8a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66117%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Easy%20Form&amp;severity=high&amp;id=6943b0574eb3efac36700b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66116-insertion-of-sensitive-information--44febdc3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66116%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20UserElements%20Ultimate%20Member%20Widgets%20for%20Elementor&amp;severity=high&amp;id=6943b0574eb3efac36700b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66104-missing-authorization-in-anton-vany-cd195efc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66104%3A%20Missing%20Authorization%20in%20Anton%20Vanyukov%20Offload%2C%20AI%20%26%20Optimize%20with%20Cloudflare%20Images&amp;severity=medium&amp;id=6943b0574eb3efac36700b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66102-improper-neutralization-of-input-du-beae84bd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FolioVision%20FV%20Antispam&amp;severity=high&amp;id=6943b0574eb3efac36700b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66100-missing-authorization-in-magnigenie-e1c75802</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66100%3A%20Missing%20Authorization%20in%20Magnigenie%20RestroPress&amp;severity=medium&amp;id=6943b0574eb3efac36700b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66088-missing-authorization-in-property-h-1ca157f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66088%3A%20Missing%20Authorization%20in%20Property%20Hive%20PropertyHive&amp;severity=high&amp;id=6943b0564eb3efac36700b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66078-improper-control-of-generation-of-c-3efabb23</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66078%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20jetmonsters%20Hotel%20Booking%20Lite&amp;severity=critical&amp;id=6943b0564eb3efac36700b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66074-unrestricted-upload-of-file-with-da-496ef0ea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66074%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cozmoslabs%20WP%20Webhooks&amp;severity=critical&amp;id=6943b0564eb3efac36700b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66070-missing-authorization-in-tomdever-w-10b207cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66070%3A%20Missing%20Authorization%20in%20Tomdever%20wpForo%20Forum&amp;severity=high&amp;id=6943b0564eb3efac36700b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66068-missing-authorization-in-instawp-in-8ccc0e9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66068%3A%20Missing%20Authorization%20in%20InstaWP%20InstaWP%20Connect&amp;severity=medium&amp;id=6943b0564eb3efac36700b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66054-missing-authorization-in-thimpress--ef86ffb0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66054%3A%20Missing%20Authorization%20in%20ThimPress%20LearnPress&amp;severity=high&amp;id=6943b0564eb3efac36700b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64378-missing-authorization-in-cridiostud-06d3196a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64378%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=6943b0564eb3efac36700b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64377-improper-control-of-filename-for-in-ad79603f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64377%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=6943b0564eb3efac36700b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64376-improper-neutralization-of-input-du-0b7551cb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64376%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=6943b0564eb3efac36700b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64375-missing-authorization-in-mahmudul-h-01257310</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64375%3A%20Missing%20Authorization%20in%20Mahmudul%20Hasan%20Arif%20WP%20Social%20Ninja&amp;severity=medium&amp;id=6943b0564eb3efac36700b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64374-unrestricted-upload-of-file-with-da-157631bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64374%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StylemixThemes%20Motors&amp;severity=critical&amp;id=6943b0544eb3efac36700ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64373-improper-control-of-filename-for-in-77102f0e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64373%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=6943b0544eb3efac36700adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64372-improper-neutralization-of-input-du-1dcb7b31</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64372%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=6943b0544eb3efac36700adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64371-improper-neutralization-of-special--d8f288ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64371%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=6943b0544eb3efac36700ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64295-insertion-of-sensitive-information--cba8bb88</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64295%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Syed%20Balkhi%20All%20In%20One%20SEO%20Pack&amp;severity=medium&amp;id=6943b0544eb3efac36700ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64273-missing-authorization-in-getrespons-15884e0a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64273%3A%20Missing%20Authorization%20in%20GetResponse%20Email%20marketing%20for%20WordPress%20by%20GetResponse%20Official&amp;severity=medium&amp;id=6943b0544eb3efac36700ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64272-exposure-of-sensitive-system-inform-440d7d4a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64272%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20GetResponse%20Email%20marketing%20for%20WordPress%20by%20GetResponse%20Official&amp;severity=medium&amp;id=6943b0544eb3efac36700ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64270-exposure-of-sensitive-system-inform-df4da6e3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64270%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20masteriyo%20Masteriyo%20-%20LMS&amp;severity=medium&amp;id=6943b0544eb3efac36700acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64268-missing-authorization-in-arraytics--f8238140</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64268%3A%20Missing%20Authorization%20in%20Arraytics%20Timetics&amp;severity=high&amp;id=6943b0544eb3efac36700aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64266-deserialization-of-untrusted-data-i-aa9cfce6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64266%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=high&amp;id=6943b0544eb3efac36700ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64260-improper-neutralization-of-input-du-4508b2aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64260%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marco%20Milesi%20ANAC%20XML%20Bandi%20di%20Gara&amp;severity=high&amp;id=6943b0534eb3efac36700aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64258-exposure-of-sensitive-system-inform-8beff33b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64258%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20wpweb%20Follow%20My%20Blog%20Post&amp;severity=high&amp;id=6943b0534eb3efac36700ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64233-deserialization-of-untrusted-data-i-eb415402</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64233%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Codiqa&amp;severity=critical&amp;id=6943b0534eb3efac36700ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64231-unrestricted-upload-of-file-with-da-0100cecd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64231%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RedefiningTheWeb%20WordPress%20Contact%20Form%207%20PDF%2C%20Google%20Sheet%20%26%20Database&amp;severity=critical&amp;id=6943b0534eb3efac36700ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64230-improper-limitation-of-a-pathname-t-1226ec74</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64230%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WP%20Chill%20Filr&amp;severity=high&amp;id=6943b0534eb3efac36700aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64227-deserialization-of-untrusted-data-i-d0b8dbab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64227%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=critical&amp;id=6943b0534eb3efac36700aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64225-improper-neutralization-of-script-r-72de1e5b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64225%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20colabrio%20Stockie%20Extra&amp;severity=medium&amp;id=6943b0534eb3efac36700aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64223-improper-control-of-filename-for-in-8647e9ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64223%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PenciDesign%20PenNews&amp;severity=high&amp;id=6943b0534eb3efac36700aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64222-missing-authorization-in-fantasticp-55de75f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64222%3A%20Missing%20Authorization%20in%20FantasticPlugins%20WooCommerce%20Recover%20Abandoned%20Cart&amp;severity=high&amp;id=6943b0534eb3efac36700aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64221-improper-neutralization-of-input-du-eba2349f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64221%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20Reservation%20Plugin&amp;severity=high&amp;id=6943b0534eb3efac36700a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64218-insertion-of-sensitive-information--7186db2a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64218%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WP%20Chill%20Passster&amp;severity=high&amp;id=6943b0514eb3efac36700a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64217-improper-neutralization-of-input-du-ad04acc5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64217%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=6943b0514eb3efac36700a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64214-missing-authorization-in-stylemixth-cbd3d425</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64214%3A%20Missing%20Authorization%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=high&amp;id=6943b0514eb3efac36700a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64213-insertion-of-sensitive-information--b49195e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64213%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=high&amp;id=6943b0514eb3efac36700a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64209-missing-authorization-in-stylemixth-c6e023c2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64209%3A%20Missing%20Authorization%20in%20StylemixThemes%20Masterstudy&amp;severity=high&amp;id=6943b0514eb3efac36700a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64207-improper-neutralization-of-input-du-a07a09be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64207%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TieLabs%20Jannah&amp;severity=high&amp;id=6943b0514eb3efac36700a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64206-deserialization-of-untrusted-data-i-54558714</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64206%3A%20Deserialization%20of%20Untrusted%20Data%20in%20TieLabs%20Jannah&amp;severity=critical&amp;id=6943b0514eb3efac36700a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64205-improper-control-of-filename-for-in-898693ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64205%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TieLabs%20Jannah&amp;severity=high&amp;id=6943b0514eb3efac36700a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64203-improper-neutralization-of-input-du-0bd9616a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64203%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EverPress%20Mailster&amp;severity=high&amp;id=6943b0514eb3efac36700a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64193-improper-control-of-filename-for-in-7a872eb3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64193%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%208theme%20XStore&amp;severity=high&amp;id=6943b0514eb3efac36700a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64192-missing-authorization-in-8theme-xst-5f9866e3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64192%3A%20Missing%20Authorization%20in%208theme%20XStore&amp;severity=medium&amp;id=6943b04f4eb3efac36700888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64191-improper-neutralization-of-input-du-046b5834</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64191%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore&amp;severity=high&amp;id=6943b04f4eb3efac36700885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64189-improper-neutralization-of-input-du-b34d095a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64189%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=high&amp;id=6943b04f4eb3efac36700882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64188-incorrect-privilege-assignment-in-p-5d0acbf8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64188%3A%20Incorrect%20Privilege%20Assignment%20in%20PenciDesign%20Soledad&amp;severity=critical&amp;id=6943b04f4eb3efac3670087f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6326-improper-control-of-filename-for-inc-310fbee6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Inset&amp;severity=high&amp;id=6943b0574eb3efac36700b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6324-improper-neutralization-of-input-dur-fa24820e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MatrixAddons%20Easy%20Invoice&amp;severity=high&amp;id=6943b0574eb3efac36700b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63039-missing-authorization-in-cridiostud-2f0ce5bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63039%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro&amp;severity=medium&amp;id=6943b04f4eb3efac3670087c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60182-improper-neutralization-of-input-du-9e5993e3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60182%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=high&amp;id=6943b04f4eb3efac36700879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60180-deserialization-of-untrusted-data-i-c6d73945</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60180%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Salesforce&amp;severity=critical&amp;id=6943b04f4eb3efac36700876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60178-deserialization-of-untrusted-data-i-7c1c4a50</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60178%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20HubSpot&amp;severity=critical&amp;id=6943b04f4eb3efac36700873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60174-deserialization-of-untrusted-data-i-2c012f73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60174%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Constant%20Contact%20Plugin&amp;severity=critical&amp;id=6943b04f4eb3efac36700870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60091-deserialization-of-untrusted-data-i-bcc97e76</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60091%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Zoho%20CRM%20and%20Bigin&amp;severity=critical&amp;id=6943b04f4eb3efac3670086d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60090-deserialization-of-untrusted-data-i-8078a441</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60090%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Insightly&amp;severity=critical&amp;id=6943b04e4eb3efac36700394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60089-deserialization-of-untrusted-data-i-2935f42a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60089%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20FreshDesk%20Plugin&amp;severity=critical&amp;id=6943b04e4eb3efac36700391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60088-missing-authorization-in-saleswonde-0d01330e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60088%3A%20Missing%20Authorization%20in%20Saleswonder%20Team%3A%20Tobias%20WebinarIgnition&amp;severity=medium&amp;id=6943b04e4eb3efac3670038e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60086-missing-authorization-in-matt-wp-vo-d20e9f75</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60086%3A%20Missing%20Authorization%20in%20Matt%20WP%20Voting%20Contest&amp;severity=high&amp;id=6943b04e4eb3efac3670038b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60084-deserialization-of-untrusted-data-i-cce7d12f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60084%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20for%20Elementor%20Forms%20%2B%20Drag%20And%20Drop%20Template%20Builder&amp;severity=high&amp;id=6943b04e4eb3efac36700388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60083-deserialization-of-untrusted-data-i-8c8b0a51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60083%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20Invoice%20Builder%20for%20WooCommerce&amp;severity=high&amp;id=6943b04e4eb3efac36700385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60082-deserialization-of-untrusted-data-i-a3acb28d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60082%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=high&amp;id=6943b04e4eb3efac36700382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60081-deserialization-of-untrusted-data-i-70f10eec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60081%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20for%20Contact%20Form%207&amp;severity=high&amp;id=6943b04e4eb3efac3670037f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60080-deserialization-of-untrusted-data-i-9b656e2f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60080%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20for%20Gravity%20Forms%20%2B%20Drag%20And%20Drop%20Template%20Builder&amp;severity=high&amp;id=6943b04e4eb3efac3670037c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60079-missing-authorization-in-bplugins-p-3a661dbb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60079%3A%20Missing%20Authorization%20in%20bPlugins%20Parallax%20Section%20block&amp;severity=high&amp;id=6943b04e4eb3efac36700379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60078-improper-control-of-filename-for-in-9a39ec2c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60078%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Agence%20web%20Eoxia%20%E2%80%93%20Montpellier%20Task%20Manager&amp;severity=high&amp;id=6943b04c4eb3efac36700367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60077-missing-authorization-in-yaycommerc-bae79feb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60077%3A%20Missing%20Authorization%20in%20YayCommerce%20YayPricing&amp;severity=high&amp;id=6943b04c4eb3efac36700364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60076-improper-control-of-filename-for-in-29481198</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Jiro%20Sasamoto%20Ray%20Enterprise%20Translation&amp;severity=high&amp;id=6943b04c4eb3efac36700361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60072-improper-control-of-filename-for-in-0af44a05</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60072%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Processby%20Anchor%20smooth%20scroll&amp;severity=high&amp;id=6943b04c4eb3efac3670035e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60071-improper-control-of-filename-for-in-1d495539</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60071%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20don-themes%20Riode&amp;severity=high&amp;id=6943b04c4eb3efac3670035b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60070-improper-control-of-generation-of-c-23d08543</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60070%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20The4%20Molla&amp;severity=medium&amp;id=6943b04c4eb3efac36700358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60069-improper-control-of-filename-for-in-23fdf38a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60069%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20MinimogWP&amp;severity=high&amp;id=6943b04c4eb3efac36700355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60068-improper-control-of-generation-of-c-31d72f12</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60068%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20javothemes%20Javo%20Core&amp;severity=medium&amp;id=6943b04c4eb3efac36700352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60067-improper-control-of-filename-for-in-dbb9b1fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Giardino&amp;severity=high&amp;id=6943b04c4eb3efac3670034f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60066-improper-control-of-filename-for-in-9458d725</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Katelyn&amp;severity=high&amp;id=6943b04c4eb3efac3670034c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60065-improper-control-of-filename-for-in-c16eddc5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Pinevale&amp;severity=high&amp;id=6943b04b4eb3efac366ffb20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60064-improper-control-of-filename-for-in-70a85ac2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60064%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Renewal&amp;severity=high&amp;id=6943b04b4eb3efac366ffb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60063-improper-control-of-filename-for-in-33de8f2d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60063%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rosalinda&amp;severity=high&amp;id=6943b04b4eb3efac366ffb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60062-improper-neutralization-of-special--eae2adb6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60062%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mmetrodw%20tPlayer&amp;severity=critical&amp;id=6943b04b4eb3efac366ffb17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60061-improper-control-of-filename-for-in-3df43892</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Kicker&amp;severity=high&amp;id=6943b04b4eb3efac366ffb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60060-improper-control-of-filename-for-in-fb3c8f34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60060%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Pubzinne&amp;severity=high&amp;id=6943b04b4eb3efac366ffb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60059-improper-control-of-filename-for-in-77acb870</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60059%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20smart%20SEO&amp;severity=high&amp;id=6943b04b4eb3efac366ffb0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60058-improper-control-of-filename-for-in-91e7a02c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60058%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20DetailX&amp;severity=high&amp;id=6943b04b4eb3efac366ffb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60057-improper-control-of-filename-for-in-60442586</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60057%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20DJ%20Rainflow&amp;severity=high&amp;id=6943b04b4eb3efac366ffb08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60056-improper-control-of-filename-for-in-d38acf97</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60056%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Winger&amp;severity=high&amp;id=6943b04b4eb3efac366ffb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60055-improper-control-of-filename-for-in-2e231458</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60055%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Fabrica&amp;severity=high&amp;id=6943b0494eb3efac366ffa94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60054-improper-control-of-filename-for-in-e52ea841</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60054%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20OnLeash&amp;severity=high&amp;id=6943b0494eb3efac366ffa91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60053-improper-control-of-filename-for-in-0d697375</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60053%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20MaxCube&amp;severity=high&amp;id=6943b0494eb3efac366ffa8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60052-improper-control-of-filename-for-in-e89862a3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60052%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20W%26D&amp;severity=high&amp;id=6943b0494eb3efac366ffa88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60051-improper-control-of-filename-for-in-e31bdccd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60051%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Rare%20Radio&amp;severity=high&amp;id=6943b0494eb3efac366ffa84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60050-improper-control-of-filename-for-in-e3a122e4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60050%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Panda&amp;severity=high&amp;id=6943b0494eb3efac366ffa81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60049-improper-control-of-filename-for-in-348d1db2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60049%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Soleil&amp;severity=high&amp;id=6943b0494eb3efac366ffa7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60048-improper-control-of-filename-for-in-10365e4b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60048%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Tripster&amp;severity=high&amp;id=6943b0494eb3efac366ffa7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60047-improper-control-of-filename-for-in-66f15b0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20IPharm&amp;severity=high&amp;id=6943b0494eb3efac366ffa78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60046-improper-control-of-filename-for-in-5a5d1cc0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60046%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20HeartStar&amp;severity=high&amp;id=6943b0494eb3efac366ffa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60045-missing-authorization-in-themeateli-91a26c30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60045%3A%20Missing%20Authorization%20in%20ThemeAtelier%20IDonatePro&amp;severity=high&amp;id=6943b0474eb3efac366ff9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60044-improper-control-of-filename-for-in-3f2a9741</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60044%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Fribbo&amp;severity=high&amp;id=6943b0474eb3efac366ff9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60043-improper-control-of-filename-for-in-729a73c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60043%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Wanderic&amp;severity=high&amp;id=6943b0474eb3efac366ff9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60042-improper-control-of-filename-for-in-2a45b4a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60042%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Chinchilla&amp;severity=high&amp;id=6943b0474eb3efac366ff9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59134-incorrect-privilege-assignment-in-j-3e4eaf3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59134%3A%20Incorrect%20Privilege%20Assignment%20in%20Jthemes%20Sale!%20Immigration%20law%2C%20Visa%20services%20support%2C%20Migration%20Agent%20Consulting&amp;severity=high&amp;id=6943b0474eb3efac366ff9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58951-improper-neutralization-of-special--fd987dfb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58951%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smartcms%20Advance%20Seat%20Reservation%20Management%20for%20WooCommerce&amp;severity=critical&amp;id=6943b0474eb3efac366ff9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58950-improper-control-of-filename-for-in-3b05f9fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58950%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Lione&amp;severity=high&amp;id=6943b0474eb3efac366ff9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58949-improper-control-of-filename-for-in-57145155</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58949%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Spock&amp;severity=high&amp;id=6943b0474eb3efac366ff99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58948-improper-control-of-filename-for-in-47bf2b58</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58948%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Aromatica&amp;severity=high&amp;id=6943b0474eb3efac366ff99a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58947-improper-control-of-filename-for-in-37a32cce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58947%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Athos&amp;severity=high&amp;id=6943b0474eb3efac366ff997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58946-improper-control-of-filename-for-in-1397df49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58946%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Vocal&amp;severity=high&amp;id=6943b0454eb3efac366ff8fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58945-improper-control-of-filename-for-in-1e6aa6da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58945%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20EcoGrow&amp;severity=high&amp;id=6943b0454eb3efac366ff8f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58944-improper-control-of-filename-for-in-26b08cbf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58944%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Manufactory&amp;severity=high&amp;id=6943b0454eb3efac366ff8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58943-improper-control-of-filename-for-in-9edbdc25</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58943%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Agricola&amp;severity=high&amp;id=6943b0454eb3efac366ff8ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58942-improper-control-of-filename-for-in-5d9ef633</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58942%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Dwell&amp;severity=high&amp;id=6943b0454eb3efac366ff8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58941-improper-control-of-filename-for-in-cd91f554</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58941%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Fabric&amp;severity=high&amp;id=6943b0454eb3efac366ff8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58940-improper-control-of-filename-for-in-e53941f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58940%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Basil&amp;severity=high&amp;id=6943b0454eb3efac366ff8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58938-missing-authorization-in-themeateli-dd754428</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58938%3A%20Missing%20Authorization%20in%20ThemeAtelier%20IDonatePro&amp;severity=high&amp;id=6943b0454eb3efac366ff8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58937-improper-control-of-filename-for-in-df193e72</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58937%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Tacticool&amp;severity=high&amp;id=6943b0454eb3efac366ff8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58936-improper-control-of-filename-for-in-c10bd1e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58936%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Catamaran&amp;severity=high&amp;id=6943b0454eb3efac366ff8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58935-improper-control-of-filename-for-in-5573f75e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58935%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Lunna&amp;severity=high&amp;id=6943b0434eb3efac366ff646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58934-improper-control-of-filename-for-in-dbf57e0f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58934%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20The%20Gig&amp;severity=high&amp;id=6943b0434eb3efac366ff643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58933-improper-control-of-filename-for-in-c2bd8165</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58933%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Anubis&amp;severity=high&amp;id=6943b0434eb3efac366ff640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58932-improper-control-of-filename-for-in-261168fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58932%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Prisma&amp;severity=high&amp;id=6943b0434eb3efac366ff63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58931-improper-control-of-filename-for-in-c5fabb91</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58931%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Palatio&amp;severity=high&amp;id=6943b0434eb3efac366ff63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58930-improper-control-of-filename-for-in-4fae6fc2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58930%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20FitFlex&amp;severity=high&amp;id=6943b0434eb3efac366ff637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58929-improper-control-of-filename-for-in-28dc98b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58929%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Pantry&amp;severity=high&amp;id=6943b0434eb3efac366ff634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58928-improper-control-of-filename-for-in-dd890eb1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58928%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Heart&amp;severity=high&amp;id=6943b0434eb3efac366ff631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58927-improper-control-of-filename-for-in-c9d1da75</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58927%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Stallion&amp;severity=high&amp;id=6943b0434eb3efac366ff62e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58926-improper-control-of-filename-for-in-a57389f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58926%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Cerebrum&amp;severity=high&amp;id=6943b0434eb3efac366ff62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58925-improper-control-of-filename-for-in-bd40899b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58925%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Neptunus&amp;severity=high&amp;id=6943b0414eb3efac366ff3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58923-improper-control-of-filename-for-in-58b8a01e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58923%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Critique&amp;severity=high&amp;id=6943b0414eb3efac366ff3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58901-improper-control-of-filename-for-in-afaf1f0e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58901%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Takeout&amp;severity=high&amp;id=6943b0414eb3efac366ff3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58900-improper-control-of-filename-for-in-3ce6cd5a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58900%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20UniTravel&amp;severity=high&amp;id=6943b0414eb3efac366ff3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58899-improper-control-of-filename-for-in-40a20cfb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58899%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Frame&amp;severity=high&amp;id=6943b0414eb3efac366ff3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58898-improper-control-of-filename-for-in-790c3d65</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58898%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20HealthHub&amp;severity=high&amp;id=6943b0414eb3efac366ff3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58896-improper-control-of-filename-for-in-f91a931d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58896%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Otaku&amp;severity=high&amp;id=6943b0414eb3efac366ff3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58895-improper-control-of-filename-for-in-088847ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58895%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Integro&amp;severity=high&amp;id=6943b0414eb3efac366ff3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58894-improper-control-of-filename-for-in-a257ac96</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58894%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Good%20Mood&amp;severity=high&amp;id=6943b0414eb3efac366ff3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58893-improper-control-of-filename-for-in-353da234</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58893%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Alright&amp;severity=high&amp;id=6943b0414eb3efac366ff3d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58892-improper-control-of-filename-for-in-b4c42cb8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58892%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tourimo&amp;severity=high&amp;id=6943b03f4eb3efac366ff385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58891-improper-control-of-filename-for-in-3d774b71</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58891%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Sanger&amp;severity=high&amp;id=6943b03f4eb3efac366ff381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58890-improper-control-of-filename-for-in-fceb0925</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58890%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Playful&amp;severity=high&amp;id=6943b03f4eb3efac366ff379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58889-improper-control-of-filename-for-in-785cb2b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58889%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Towny&amp;severity=high&amp;id=6943b03f4eb3efac366ff374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58888-improper-control-of-filename-for-in-85e53538</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58888%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20The%20Flash&amp;severity=high&amp;id=6943b03f4eb3efac366ff370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58885-improper-control-of-filename-for-in-6b2630d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58885%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Pathfinder&amp;severity=high&amp;id=6943b03f4eb3efac366ff36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58879-improper-control-of-filename-for-in-0b739edd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58879%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Festy&amp;severity=high&amp;id=6943b03f4eb3efac366ff365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58877-missing-authorization-in-javothemes-f0edaeb8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58877%3A%20Missing%20Authorization%20in%20javothemes%20Javo%20Core&amp;severity=high&amp;id=6943b03f4eb3efac366ff361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58803-improper-control-of-filename-for-in-59cab053</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58803%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Algenix&amp;severity=high&amp;id=6943b03f4eb3efac366ff35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58710-incorrect-privilege-assignment-in-e-f6108903</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58710%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Hotel%20Listing&amp;severity=high&amp;id=6943b03f4eb3efac366ff35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58709-improper-control-of-filename-for-in-025dbbf6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58709%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Legacy&amp;severity=high&amp;id=6943b03e4eb3efac366ff31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58708-improper-control-of-filename-for-in-faaf2138</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58708%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20777&amp;severity=high&amp;id=6943b03e4eb3efac366ff319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58706-improper-control-of-filename-for-in-7299fb46</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58706%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Woo%20Hoo&amp;severity=high&amp;id=6943b03e4eb3efac366ff316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58225-improper-control-of-filename-for-in-89f942b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58225%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Paragon&amp;severity=high&amp;id=6943b03e4eb3efac366ff313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57897-improper-neutralization-of-input-du-5b72dbd2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57897%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20venusweb%20Logtik&amp;severity=high&amp;id=6943b03e4eb3efac366ff310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55707-incorrect-privilege-assignment-in-w-dcd3c231</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55707%3A%20Incorrect%20Privilege%20Assignment%20in%20WPXPO%20PostX&amp;severity=high&amp;id=6943b03e4eb3efac366ff30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54751-missing-authorization-in-wpxpo-post-7eb00c6c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54751%3A%20Missing%20Authorization%20in%20WPXPO%20PostX&amp;severity=high&amp;id=6943b03e4eb3efac366ff30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54748-improper-limitation-of-a-pathname-t-190aa8a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54748%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RomanCode%20MapSVG&amp;severity=medium&amp;id=6943b03e4eb3efac366ff307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54745-missing-authorization-in-miniorange-1e238856</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54745%3A%20Missing%20Authorization%20in%20miniOrange%20miniOrange&apos;s%20Google%20Authenticator&amp;severity=medium&amp;id=6943b03e4eb3efac366ff304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54743-missing-authorization-in-mkscripts--46b67fb9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54743%3A%20Missing%20Authorization%20in%20mkscripts%20Download%20After%20Email&amp;severity=medium&amp;id=6943b03e4eb3efac366ff301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54741-missing-authorization-in-tyler-moor-5e00d0a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54741%3A%20Missing%20Authorization%20in%20Tyler%20Moore%20Super%20Blank&amp;severity=medium&amp;id=6943b03c4eb3efac366ff2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54723-deserialization-of-untrusted-data-i-945f8145</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54723%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20DentiCare&amp;severity=critical&amp;id=6943b03c4eb3efac366ff2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53453-improper-control-of-filename-for-in-0feab8c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53453%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Hygia&amp;severity=high&amp;id=6943b03c4eb3efac366ff2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53449-improper-control-of-filename-for-in-a23709c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53449%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Convex&amp;severity=high&amp;id=6943b03c4eb3efac366ff2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53448-improper-control-of-filename-for-in-02dea056</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53448%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rally&amp;severity=high&amp;id=6943b03c4eb3efac366ff2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53447-improper-control-of-filename-for-in-e1791361</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53447%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Assembly&amp;severity=high&amp;id=6943b03c4eb3efac366ff2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53446-improper-control-of-filename-for-in-864d7d0f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53446%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Beautique&amp;severity=high&amp;id=6943b03c4eb3efac366ff2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53445-improper-control-of-filename-for-in-3dc12dc8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53445%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Catwalk&amp;severity=high&amp;id=6943b03c4eb3efac366ff2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53443-improper-control-of-filename-for-in-75687fb0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53443%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Smash&amp;severity=high&amp;id=6943b03c4eb3efac366ff2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53442-improper-control-of-filename-for-in-69bb9ac1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53442%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rentic&amp;severity=high&amp;id=6943b03c4eb3efac366ff2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53441-improper-control-of-filename-for-in-4ec54b9c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53441%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Greeny&amp;severity=high&amp;id=6943b03a4eb3efac366ff24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53439-improper-control-of-filename-for-in-6410179c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53439%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Harper&amp;severity=high&amp;id=6943b03a4eb3efac366ff24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53438-improper-control-of-filename-for-in-4594ac0d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53438%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20FitLine&amp;severity=high&amp;id=6943b03a4eb3efac366ff247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53437-improper-control-of-filename-for-in-46ace214</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53437%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Greenorganic&amp;severity=high&amp;id=6943b03a4eb3efac366ff244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53436-improper-control-of-filename-for-in-e596625d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53436%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Monki&amp;severity=high&amp;id=6943b03a4eb3efac366ff241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53435-improper-control-of-filename-for-in-aac62298</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53435%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Plan%20My%20Day&amp;severity=high&amp;id=6943b03a4eb3efac366ff23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53434-improper-control-of-filename-for-in-1aa7b023</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53434%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20ChildHope&amp;severity=high&amp;id=6943b03a4eb3efac366ff23b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53433-improper-control-of-filename-for-in-8e74ca6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53433%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20EasyEat&amp;severity=critical&amp;id=6943b03a4eb3efac366ff238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53432-improper-control-of-filename-for-in-e3632a49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53432%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Echo&amp;severity=high&amp;id=6943b03a4eb3efac366ff235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53431-improper-control-of-filename-for-in-c67f9230</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53431%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Emberlyn&amp;severity=high&amp;id=6943b03a4eb3efac366ff232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53430-improper-control-of-filename-for-in-4679fc9b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53430%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Etta&amp;severity=high&amp;id=6943b0394eb3efac366ff21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53429-improper-control-of-filename-for-in-da038cf2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53429%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Exit%20Game&amp;severity=high&amp;id=6943b0394eb3efac366ff217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52768-improper-control-of-filename-for-in-9be21078</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52768%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Faith%20%26%20Hope&amp;severity=high&amp;id=6943b0394eb3efac366ff214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52745-improper-control-of-filename-for-in-3c36c44a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52745%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Farm%20Agrico&amp;severity=high&amp;id=6943b0394eb3efac366ff211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49943-improper-control-of-filename-for-in-66b22dac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49943%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Femme&amp;severity=high&amp;id=6943b0394eb3efac366ff20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49942-improper-control-of-filename-for-in-db48eb4b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49942%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Gardis&amp;severity=high&amp;id=6943b0394eb3efac366ff20b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49941-improper-control-of-filename-for-in-62a5ffa0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49941%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20GlamChic&amp;severity=high&amp;id=6943b0394eb3efac366ff208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49919-insertion-of-sensitive-information--16c712b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49919%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20DigitalME%20eRoom&amp;severity=medium&amp;id=6943b0394eb3efac366ff205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49918-insertion-of-sensitive-information--da68a59a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49918%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20e4jvikwp%20VikBooking%20Hotel%20Booking%20Engine%20%26%20PMS&amp;severity=medium&amp;id=6943b0394eb3efac366ff202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49914-exposure-of-sensitive-system-inform-491b1455</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49914%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20jetmonsters%20Restaurant%20Menu%20by%20MotoPress&amp;severity=medium&amp;id=6943b0394eb3efac366ff1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49902-missing-authorization-in-a-wp-life--741e5c92</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49902%3A%20Missing%20Authorization%20in%20A%20WP%20Life%20Login%20Page%20Customizer%20%E2%80%93%20Customizer%20Login%20Page%2C%20Admin%20Page%2C%20Custom%20Design&amp;severity=medium&amp;id=6943b0374eb3efac366ff1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49379-incorrect-privilege-assignment-in-s-f3bde4bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49379%3A%20Incorrect%20Privilege%20Assignment%20in%20silverplugins217%20Custom%20Fields%20Account%20Registration%20For%20Woocommerce&amp;severity=high&amp;id=6943b0374eb3efac366ff1cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49371-improper-control-of-filename-for-in-7fadea29</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49371%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Strux&amp;severity=high&amp;id=6943b0374eb3efac366ff1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49370-improper-control-of-filename-for-in-8db2ddee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49370%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Lymcoin&amp;severity=high&amp;id=6943b0374eb3efac366ff1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49369-improper-control-of-filename-for-in-503a2486</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49369%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Lettuce&amp;severity=high&amp;id=6943b0374eb3efac366ff1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49368-improper-control-of-filename-for-in-86eadbe4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49368%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Palladio&amp;severity=high&amp;id=6943b0374eb3efac366ff1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49367-improper-control-of-filename-for-in-5385a03c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49367%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Monyxi&amp;severity=high&amp;id=6943b0374eb3efac366ff1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49366-improper-control-of-filename-for-in-bf62c6f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49366%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Hanani&amp;severity=high&amp;id=6943b0374eb3efac366ff1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49365-improper-control-of-filename-for-in-040f2626</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49365%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Jack%20Well&amp;severity=high&amp;id=6943b0374eb3efac366ff1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49364-improper-control-of-filename-for-in-f1c2024f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Ludos%20Paradise&amp;severity=high&amp;id=6943b0374eb3efac366ff1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49363-improper-control-of-filename-for-in-67fd9c40</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49363%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Kings%20%26%20Queens&amp;severity=high&amp;id=6943b0354eb3efac366fee44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49362-improper-control-of-filename-for-in-61b15c7a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49362%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Gracioza&amp;severity=high&amp;id=6943b0354eb3efac366fee41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49361-improper-control-of-filename-for-in-dd85cf09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49361%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Mamita&amp;severity=high&amp;id=6943b0354eb3efac366fee3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49360-improper-control-of-filename-for-in-e1ac84ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49360%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Militarology&amp;severity=high&amp;id=6943b0354eb3efac366fee3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49359-improper-control-of-filename-for-in-b4e01207</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49359%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20ShieldGroup&amp;severity=high&amp;id=6943b0354eb3efac366fee38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49041-missing-authorization-in-the-africa-bbe2ce0d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49041%3A%20Missing%20Authorization%20in%20The%20African%20Boss%20Get%20Cash&amp;severity=medium&amp;id=6943b0354eb3efac366fee35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14314-improper-neutralization-of-special--04230435</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14314%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Roxnor%20PopupKit&amp;severity=high&amp;id=6943b0354eb3efac366fee32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10019-authorization-bypass-through-user-c-a2a1c206</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10019%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codepeople%20Contact%20Form%20Email&amp;severity=medium&amp;id=6943b0354eb3efac366fee20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13498-cwe-862-missing-authorization-in-co-67ba6149</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13498%3A%20CWE-862%20Missing%20Authorization%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=6943b0354eb3efac366fee2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12976-cwe-79-improper-neutralization-of-i-92338fbb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12976%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=6943b0354eb3efac366fee23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-exploiting-zero-day-in-cisco--a6ad105e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Exploiting%20Zero-Day%20in%20Cisco%20Security%20Gear&amp;severity=critical&amp;id=6943ac954eb3efac366e6b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68459-improper-neutralization-of-special--4b835e83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68459%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ruijie%20Networks%20Co.%2C%20Ltd.%20AP180-PE%20V3.xx&amp;severity=high&amp;id=694399e758cc240f07af7a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47387-cwe-822-untrusted-pointer-dereferen-965c2dc1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47387%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963a58cc240f07ac2f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47382-cwe-863-incorrect-authorization-in--722d39f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47382%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47372-cwe-120-buffer-copy-without-checkin-1257e58a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47372%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=6943963858cc240f07ac2f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47350-cwe-416-use-after-free-in-qualcomm--ec7a2b22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47350%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47325-cwe-822-untrusted-pointer-dereferen-70eeda71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47325%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6943963858cc240f07ac2f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47323-cwe-190-integer-overflow-or-wraparo-3b822062</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47323%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47322-cwe-416-use-after-free-in-qualcomm--e6ada09c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47322%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47321-cwe-120-buffer-copy-without-checkin-32100740</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47321%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47320-cwe-787-out-of-bounds-write-in-qual-e40aee57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47320%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47319-cwe-497-exposure-of-sensitive-syste-59bdb4c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47319%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6943963858cc240f07ac2f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27063-cwe-416-use-after-free-in-qualcomm--3e9f347f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27063%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68462-cwe-732-incorrect-permission-assign-19f4d074</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68462%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Debian%20FreedomBox&amp;severity=low&amp;id=694392b458cc240f07a98528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-asus-live-update-flaw-after-ev-7604611d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20ASUS%20Live%20Update%20Flaw%20After%20Evidence%20of%20Active%20Exploitation&amp;severity=critical&amp;id=69439e2358cc240f07b4a6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68461-cwe-79-improper-neutralization-of-i-1c741b3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Roundcube%20Webmail&amp;severity=high&amp;id=69438dec4dbf28c5ead2005c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68460-cwe-116-improper-encoding-or-escapi-b07cfa5e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68460%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Roundcube%20Webmail&amp;severity=high&amp;id=69438a6a4dbf28c5eacdbe29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-active-attacks-exploiting-unpatched-61fa3aaf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Warns%20of%20Active%20Attacks%20Exploiting%20Unpatched%200-Day%20in%20AsyncOS%20Email%20Security%20Appliances&amp;severity=medium&amp;id=69438be94dbf28c5eacfb0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12885-cwe-79-improper-neutralization-of-i-20218e28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awsmin%20Embed%20Any%20Document%20%E2%80%93%20Embed%20PDF%2C%20Word%2C%20PowerPoint%20and%20Excel%20Files&amp;severity=medium&amp;id=69437e144dbf28c5eab53ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14856-code-injection-in-yproject-ruoyi-86a8b163</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14856%3A%20Code%20Injection%20in%20y_project%20RuoYi&amp;severity=medium&amp;id=69435e96f4a1ba78f2daa41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/france-arrests-22-year-old-after-hack-of-interior--86218121</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=France%20Arrests%2022%20Year%20Old%20After%20Hack%20of%20Interior%20Ministry%20Systems&amp;severity=medium&amp;id=69434cfdf4a1ba78f2c11aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14841-null-pointer-dereference-in-offis-d-074f920e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14841%3A%20NULL%20Pointer%20Dereference%20in%20OFFIS%20DCMTK&amp;severity=medium&amp;id=69434d1ff4a1ba78f2c14a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xctdh-crypto-heist-part-4-nick-smart-and-andrii-so-0577ad05</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XCTDH%20Crypto%20Heist%20Part%204%20-%20Nick%20Smart%20and%20Andrii%20Sovershennyi&amp;severity=medium&amp;id=69457da2133fda1465c8178d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-18-0edeec95</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-18&amp;severity=medium&amp;id=6944981c4eb3efac36b4fea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63950-na-bd510531</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63950%3A%20n%2Fa&amp;severity=high&amp;id=694471834eb3efac36abad2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63948-na-788e7230</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63948%3A%20n%2Fa&amp;severity=medium&amp;id=69446a7c4eb3efac36a96186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63947-na-ecfddcfc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63947%3A%20n%2Fa&amp;severity=medium&amp;id=69446a7c4eb3efac36a96182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63951-na-76406042</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63951%3A%20n%2Fa&amp;severity=high&amp;id=694466f94eb3efac36a822cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63949-na-53dc807c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63949%3A%20n%2Fa&amp;severity=medium&amp;id=694466f94eb3efac36a822c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67163-na-13618c01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67163%3A%20n%2Fa&amp;severity=medium&amp;id=694463734eb3efac36a5c4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65566-na-69b4dde7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65566%3A%20n%2Fa&amp;severity=high&amp;id=694455994eb3efac36a31642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65565-na-5771b4f0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65565%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65564-na-69bb4fc5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65564%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65563-na-047b5841</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65563%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65562-na-b5533be2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65562%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65568-na-160c9cb8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65568%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65567-na-87bbdd63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65567%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65561-na-56a55538</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65561%3A%20n%2Fa&amp;severity=high&amp;id=69444e5e4eb3efac36a13dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65559-na-4be14d82</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65559%3A%20n%2Fa&amp;severity=high&amp;id=69444e5e4eb3efac36a13dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63387-na-56c624b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63387%3A%20n%2Fa&amp;severity=high&amp;id=69444aef4eb3efac36a086c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56157-na-16b6ceb5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56157%3A%20n%2Fa&amp;severity=critical&amp;id=69444aef4eb3efac36a086bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63386-na-29524515</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63386%3A%20n%2Fa&amp;severity=critical&amp;id=694427b04eb3efac36978401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63390-na-262242df</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63390%3A%20n%2Fa&amp;severity=medium&amp;id=6944242d4eb3efac36964743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63388-na-d8cfafee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63388%3A%20n%2Fa&amp;severity=critical&amp;id=694420bc4eb3efac36956eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63391-na-cfa36b98</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63391%3A%20n%2Fa&amp;severity=high&amp;id=69441d2a4eb3efac369420a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63389-na-64dbd776</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63389%3A%20n%2Fa&amp;severity=critical&amp;id=69441d2a4eb3efac369420a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63757-na-a459094a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63757%3A%20n%2Fa&amp;severity=high&amp;id=694416204eb3efac368e65cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14837-code-injection-in-zzcms-89492e18</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14837%3A%20Code%20Injection%20in%20ZZCMS&amp;severity=medium&amp;id=69433ef3f4a1ba78f2b59656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68435-cwe-305-authentication-bypass-by-pr-6cbd93fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68435%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20nicotsx%20zerobyte&amp;severity=critical&amp;id=69433981058703ef3fd47411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14836-cleartext-storage-in-a-file-or-on-d-fc9a3d86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14836%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20ZZCMS&amp;severity=medium&amp;id=69433981058703ef3fd4741d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14834-sql-injection-in-code-projects-simp-8b1d8255</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14834%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=69433981058703ef3fd47416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68433-cwe-77-improper-neutralization-of-s-bd9efb5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68433%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=69433603058703ef3fd02122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53917-improper-neutralization-of-special--77f28945</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53917%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20powerstonegh%20Affiliate%20Me&amp;severity=high&amp;id=69433601058703ef3fd020bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68432-cwe-77-improper-neutralization-of-s-7c4486fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68432%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=69433603058703ef3fd0211d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53933-unrestricted-upload-of-file-with-da-ff8ad256</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53933%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20s9y%20Serendipity&amp;severity=high&amp;id=69433603058703ef3fd02117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53932-improper-neutralization-of-input-du-28b84f9d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53932%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20s9y%20Serendipity&amp;severity=medium&amp;id=69433603058703ef3fd02112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53928-improper-neutralization-of-input-du-f27244da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Php-fusion%20PHPFusion&amp;severity=medium&amp;id=69433603058703ef3fd0210d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53927-improper-neutralization-of-input-du-0ab51043</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53927%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PHPJabbers%20Simple%20CMS&amp;severity=medium&amp;id=69433601058703ef3fd020cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53926-improper-neutralization-of-special--e45b6b00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53926%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPJabbers%20Simple%20CMS&amp;severity=high&amp;id=69433601058703ef3fd020c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53921-unrestricted-upload-of-file-with-da-ecfc0aaf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53921%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Sitemagic%20SitemagicCMS&amp;severity=high&amp;id=69433601058703ef3fd020c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53912-unquoted-search-path-or-element-in--f54ffd1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53912%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20BiniSoft%20USB%20Flash%20Drives%20Control&amp;severity=high&amp;id=69433601058703ef3fd020b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53911-improper-neutralization-of-input-du-d82893ba</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tmrswrr%20Textpattern%20CMS&amp;severity=medium&amp;id=69433601058703ef3fd020b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53910-improper-neutralization-of-input-du-e65c9d38</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53910%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wbce-cms%20WBCE%20CMS&amp;severity=medium&amp;id=69433601058703ef3fd020ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53909-improper-neutralization-of-input-du-75493285</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53909%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wbce-cms%20WBCE%20CMS&amp;severity=medium&amp;id=69433601058703ef3fd020a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53908-improper-privilege-management-in-be-f53944b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53908%3A%20Improper%20Privilege%20Management%20in%20Belden%20HiSecOS&amp;severity=high&amp;id=69433601058703ef3fd020a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53907-improper-limitation-of-a-pathname-t-6ee61da8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53907%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Bludit%20Backup%20Plugin&amp;severity=high&amp;id=69433601058703ef3fd0209f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66029-cwe-522-insufficiently-protected-cr-b9fc3983</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66029%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20OSC%20ondemand&amp;severity=high&amp;id=6943327a058703ef3fcb5ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14833-sql-injection-in-code-projects-onli-35555b34</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14833%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=6943327a058703ef3fcb5ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68429-cwe-200-exposure-of-sensitive-infor-5d66d7b1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68429%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20storybookjs%20storybook&amp;severity=high&amp;id=6943327a058703ef3fcb5caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-confirms-what-we-suspected-every-llm--528c867c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20research%20confirms%20what%20we%20suspected%3A%20every%20LLM%20tested%20can%20be%20exploited&amp;severity=medium&amp;id=69432f0b058703ef3fc98973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68145-cwe-22-improper-limitation-of-a-pat-bc581cde</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68145%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=69432efa058703ef3fc97f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68144-cwe-88-improper-neutralization-of-a-2aa85bd3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68144%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=69432efa058703ef3fc97f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68143-cwe-22-improper-limitation-of-a-pat-9cdc3058</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68143%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=69432efa058703ef3fc97f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68129-cwe-863-incorrect-authorization-in--be75163a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68129%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20auth0%20auth0-PHP&amp;severity=medium&amp;id=69432b79058703ef3fc51862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14832-sql-injection-in-itsourcecode-onlin-9f6ed03c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14832%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=69432b79058703ef3fc5185b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68275-cwe-79-improper-neutralization-of-i-e859cc68</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68275%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69432992fab815a9fc299edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68401-cwe-79-improper-neutralization-of-i-934dcf70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68401%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69432992fab815a9fc299ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68400-cwe-89-improper-neutralization-of-s-e8f3a7a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68400%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=6943260ffab815a9fc251847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68399-cwe-79-improper-neutralization-of-i-7b48662c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68399%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=low&amp;id=6943260ffab815a9fc251853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68112-cwe-89-improper-neutralization-of-s-533a5f5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68112%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=6943260ffab815a9fc251850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68111-cwe-89-improper-neutralization-of-s-ecf0e2bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68111%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=6943260ffab815a9fc25184d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68110-cwe-200-exposure-of-sensitive-infor-dac7d6cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68110%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=6943260ffab815a9fc25184a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68109-cwe-78-improper-neutralization-of-s-8c67d683</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68109%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=6943229bfab815a9fc1fb3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67877-cwe-89-improper-neutralization-of-s-9b7049b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67877%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=6943229bfab815a9fc1fb3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gachiloader-defeating-nodejs-malware-with-api-trac-5816058f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GachiLoader%3A%20Defeating%20Node.js%20Malware%20with%20API%20Tracing&amp;severity=medium&amp;id=69433981058703ef3fd47271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nuget-malware-targets-crypto-wallets-oauth-tokens-0d0b398e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NuGet%20malware%20targets%20crypto%20wallets%2C%20OAuth%20tokens&amp;severity=medium&amp;id=69433981058703ef3fd4727f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-botnet-hijacks-18-million-android-tvs-laun-ddb21d6c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimwolf%20Botnet%20Hijacks%201.8%20Million%20Android%20TVs%2C%20Launches%20Large-Scale%20DDoS%20Attacks&amp;severity=high&amp;id=69432285fab815a9fc1faebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-fixes-actively-exploited-cve-2025-40602--cb24fce8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Fixes%20Actively%20Exploited%20CVE-2025-40602%20in%20SMA%20100%20Appliances&amp;severity=high&amp;id=69431f01fab815a9fc1ddbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-unpatched-asyncos-zero-day-exploite-0ffcf769</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20warns%20of%20unpatched%20AsyncOS%20zero-day%20exploited%20in%20attacks&amp;severity=critical&amp;id=69431f01fab815a9fc1ddbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67876-cwe-79-improper-neutralization-of-i-625b81b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67876%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69431f35fab815a9fc1ded24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67875-cwe-79-improper-neutralization-of-i-0de84221</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67875%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69431f35fab815a9fc1ded21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68114-cwe-124-buffer-underwrite-buffer-un-421cf5a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68114%3A%20CWE-124%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20capstone-engine%20capstone&amp;severity=medium&amp;id=69431f35fab815a9fc1ded27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67873-cwe-122-heap-based-buffer-overflow--18ff7f1b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67873%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20capstone-engine%20capstone&amp;severity=medium&amp;id=69431f35fab815a9fc1ded1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67493-cwe-20-improper-input-validation-in-56691d24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67493%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20homarr-labs%20homarr&amp;severity=high&amp;id=69432d1e058703ef3fc81e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43514-an-app-may-be-able-to-access-protec-afae3e0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43514%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69431980c9138a40d2f661ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46281-an-app-may-be-able-to-break-out-of--f3b7b019</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46281%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69431982c9138a40d2f6625a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46278-an-app-may-be-able-to-access-protec-e6c0ac50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46278%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69431982c9138a40d2f6624d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46279-an-app-may-be-able-to-identify-what-6a7e3d7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46279%3A%20An%20app%20may%20be%20able%20to%20identify%20what%20other%20apps%20a%20user%20has%20installed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69431982c9138a40d2f66251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43535-processing-maliciously-crafted-web--1d399922</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43535%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431980c9138a40d2f661cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46291-an-app-may-bypass-gatekeeper-checks-7e2cb154</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46291%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=69431982c9138a40d2f6626b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43533-a-malicious-hid-device-may-cause-an-50931694</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43533%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431980c9138a40d2f661c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43529-processing-maliciously-crafted-web--ded99654</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43529%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals%20on%20versions%20of%20iOS%20before%20iOS%2026.%20CVE-2025-14174%20was%20also%20issued%20in%20response%20to%20this%20report.%20in%20Apple%20Safari&amp;severity=high&amp;id=69431980c9138a40d2f661b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43475-an-app-may-be-able-to-access-user-s-890d6416</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43475%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431980c9138a40d2f661a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43526-on-a-mac-with-lockdown-mode-enabled-2ee671ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43526%3A%20On%20a%20Mac%20with%20Lockdown%20Mode%20enabled%2C%20web%20content%20opened%20via%20a%20file%20URL%20may%20be%20able%20to%20use%20Web%20APIs%20that%20should%20be%20restricted%20in%20Apple%20Safari&amp;severity=critical&amp;id=69431980c9138a40d2f661af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46288-an-app-may-be-able-to-access-sensit-efb6bcf5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46288%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20payment%20tokens%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431982c9138a40d2f66264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43531-processing-maliciously-crafted-web--10ac1aad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43531%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=low&amp;id=69431980c9138a40d2f661bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55254-cwe-601-url-redirection-to-untruste-ad8c3d9e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55254%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20HCL%20Software%20BigFix%20Remote%20Control&amp;severity=low&amp;id=69431987c9138a40d2f6643c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46292-an-app-may-be-able-to-access-user-s-d9561db9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46292%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431982c9138a40d2f6626f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43536-processing-maliciously-crafted-web--be8b4b7c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43536%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431980c9138a40d2f661d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43428-photos-in-the-hidden-photos-album-m-8cbc28f0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43428%3A%20Photos%20in%20the%20Hidden%20Photos%20Album%20may%20be%20viewed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69431980c9138a40d2f6619d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46283-an-app-may-be-able-to-access-sensit-9a414a86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46283%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69431982c9138a40d2f66261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43541-processing-maliciously-crafted-web--be5d1ce6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43541%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431982c9138a40d2f66241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43501-processing-maliciously-crafted-web--e94ec6d2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43501%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431980c9138a40d2f661a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46282-an-app-may-be-able-to-access-sensit-8b20591e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46282%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431982c9138a40d2f6625d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46277-an-app-may-be-able-to-access-a-user-a69d4439</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46277%3A%20An%20app%20may%20be%20able%20to%20access%20a%20user%E2%80%99s%20Safari%20history%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431982c9138a40d2f66248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59849-cwe-1021-improper-restriction-of-re-43370891</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59849%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20HCL%20Software%20BigFix%20Remote%20Control&amp;severity=medium&amp;id=694315f3c9138a40d2f24a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53000-cwe-427-uncontrolled-search-path-el-0ad4c221</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53000%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20jupyter%20nbconvert&amp;severity=high&amp;id=694315f3c9138a40d2f24a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66647-cwe-120-buffer-copy-without-checkin-ab17f2b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66647%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20RIOT-OS%20RIOT&amp;severity=low&amp;id=6943126ec9138a40d2ed3260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14764-cwe-327-use-of-a-broken-or-risky-cr-14eab340</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14764%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20S3%20Encryption%20Client%20for%20Go&amp;severity=medium&amp;id=6943126ec9138a40d2ed325d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14763-cwe-327-use-of-a-broken-or-risky-cr-ffeb3020</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14763%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20S3%20Encryption%20Client%20for%20Java&amp;severity=medium&amp;id=6943126ec9138a40d2ed325a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14762-cwe-327-use-of-a-broken-or-risky-cr-287a2707</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14762%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20AWS%20SDK%20for%20Ruby&amp;severity=medium&amp;id=6943126ec9138a40d2ed3257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14761-cwe-327-use-of-a-broken-or-risky-cr-1c1e0bbe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14761%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20AWS%20SDK%20for%20PHP&amp;severity=medium&amp;id=6943126ec9138a40d2ed3254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14760-cwe-327-use-of-a-broken-or-risky-cr-33ee7551</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14760%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20AWS%20SDK%20for%20C%2B%2B&amp;severity=medium&amp;id=69430eeac9138a40d2eb2e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14759-cwe-327-use-of-a-broken-or-risky-cr-f701ab62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14759%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20S3%20Encryption%20Client%20for%20.NET&amp;severity=medium&amp;id=69430eeac9138a40d2eb2e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bluedeltas-persistent-campaign-against-ukrnet-bb35bec9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BlueDelta%E2%80%99s%20Persistent%20Campaign%20Against%20UKR.NET&amp;severity=medium&amp;id=69433981058703ef3fd4738a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uat-9686-actively-targets-cisco-secure-email-gatew-6ecdf845</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UAT-9686%20actively%20targets%20Cisco%20Secure%20Email%20Gateway%20and%20Secure%20Email%20and%20Web%20Manager&amp;severity=medium&amp;id=69433981058703ef3fd473c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34438-cwe-639-authorization-bypass-throug-a7b67404</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34438%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=69430b71c9138a40d2e72f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34437-cwe-639-authorization-bypass-throug-9c60e9ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34437%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=high&amp;id=69430b71c9138a40d2e72f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34435-cwe-639-authorization-bypass-throug-430ab558</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34435%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=high&amp;id=69430b71c9138a40d2e72f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34436-cwe-639-authorization-bypass-throug-1949ebbd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34436%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=high&amp;id=69430b71c9138a40d2e72f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34434-cwe-306-missing-authentication-for--c3cb7a3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34434%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=critical&amp;id=69430b71c9138a40d2e72f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34439-cwe-601-url-redirection-to-untruste-d54b1aaf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34439%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=694309ba0b6f32e62bf653cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34440-cwe-601-url-redirection-to-untruste-9c00d425</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34440%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=694309ba0b6f32e62bf653d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34442-cwe-497-exposure-of-sensitive-syste-f89422c7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34442%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=694309ba0b6f32e62bf653da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34441-cwe-359-exposure-of-private-persona-75140e38</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34441%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=694309ba0b6f32e62bf653d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-could-take-control-of-car-dashboard-by-hac-7c0ab88c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Could%20Take%20Control%20of%20Car%20Dashboard%20by%20Hacking%20Its%20Modem&amp;severity=high&amp;id=6943098c0b6f32e62bf64877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-warns-of-new-sma1000-zero-day-exploited--feac9fe2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sonicwall%20warns%20of%20new%20SMA1000%20zero-day%20exploited%20in%20attacks&amp;severity=critical&amp;id=6943098c0b6f32e62bf64866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66646-cwe-476-null-pointer-dereference-in-73c988e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66646%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20RIOT-OS%20RIOT&amp;severity=low&amp;id=6943060a0b6f32e62bf23024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66397-cwe-284-improper-access-control-in--0f8cb49e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66397%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=694302860b6f32e62bed0eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66396-cwe-89-improper-neutralization-of-s-7c40182b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66396%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=694302860b6f32e62bed0eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66395-cwe-89-improper-neutralization-of-s-ef22abc1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66395%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=694302860b6f32e62bed0ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62521-cwe-94-improper-control-of-generati-99532462</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62521%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=694302860b6f32e62bed0ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-posthog-how-ssrf-a-clickhouse-sql-escaping--63450a5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20PostHog%3A%20How%20SSRF%2C%20a%20ClickHouse%20SQL%20Escaping%200day%2C%20and%20Default%20PostgreSQL%20Credentials%20Formed%20an%20RCE%20Chain%20(ZDI-25-099%2C%20ZDI-25-097%2C%20ZDI-25-096)&amp;severity=medium&amp;id=6942ff090b6f32e62beb38c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14081-cwe-863-incorrect-authorization-in--df9dfbc5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14081%3A%20CWE-863%20Incorrect%20Authorization%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=6942f8e8847f7e98df04b54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13537-cwe-79-improper-neutralization-of-i-3cd560a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livecomposer%20Live%20Composer%20%E2%80%93%20Free%20WordPress%20Website%20Builder&amp;severity=medium&amp;id=6942f8e8847f7e98df04b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13217-cwe-79-improper-neutralization-of-i-ec65218d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=6942f8e7847f7e98df04b541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-fixes-actively-exploited-cve-2025-40602--0c4c7b57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Fixes%20Actively%20Exploited%20CVE-2025-40602%20in%20SMA%20100%20Appliances&amp;severity=high&amp;id=69433af3058703ef3fd57b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/14-malicious-nuget-packages-found-stealing-crypto--c88979cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=14%20Malicious%20NuGet%20Packages%20Found%20Stealing%20Crypto%20Wallets%20and%20Ad%20Data&amp;severity=medium&amp;id=6942f55f847f7e98df00b7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-botnet-hijacks-18-million-android-tvs-laun-f8bcd5cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimwolf%20Botnet%20Hijacks%201.8%20Million%20Android%20TVs%2C%20Launches%20Large-Scale%20DDoS%20Attacks&amp;severity=medium&amp;id=69433af3058703ef3fd57b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maybe-a-little-bit-more-interesting-react2shell-ex-8f7e1deb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maybe%20a%20Little%20Bit%20More%20Interesting%20React2Shell%20Exploit%2C%20(Wed%2C%20Dec%2017th)&amp;severity=medium&amp;id=6942e5571c1ff0913684af70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20393-improper-input-validation-in-cisco--c638b419</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20393%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Secure%20Email&amp;severity=critical&amp;id=6942e1e21c1ff091367fecea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russias-quiet-pivot-how-misconfigured-network-devi-6dbe5073</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%E2%80%99s%20Quiet%20Pivot%3A%20How%20Misconfigured%20Network%20Devices%20Became%20the%20New%20Front%20Line%20in%20Critical%20Infrastructure%20Cyber%20Risk%20-%20hack3d.news&amp;severity=critical&amp;id=6942d8b4b2cbfb3efaad1eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26381-cwe-425-direct-request-forced-brows-298e491e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26381%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Johnson%20Controls%20OpenBlue%20Workplace%20(formerly%20FM%20Systems)&amp;severity=medium&amp;id=6942d8c9b2cbfb3efaad4192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43873-cwe-78-improper-neutralization-of-s-9a500d1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43873%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Control%20iSTAR%20Ultra%2C%20iSTAR%20Ultra%20SE%2C%20iSTAR%20Ultra%20G2%2C%20iSTAR%20Ultra%20G2%20SE%2C%20iSTAR%20Edge%20G2&amp;severity=high&amp;id=6942d536b2cbfb3efaa86de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14727-cwe-22-improper-limitation-of-a-pat-b3541a68</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14727%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20F5%20NGINX%20Ingress%20Controller&amp;severity=high&amp;id=6942d1adb2cbfb3efaa33d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt28-targets-ukrainian-ukr-net-users-in-long-runn-09216ce3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT28%20Targets%20Ukrainian%20UKR-net%20Users%20in%20Long-Running%20Credential%20Phishing%20Campaign&amp;severity=medium&amp;id=6942d853b2cbfb3efaac9c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44005-cwe-287-improper-authentication-in--a1fcdb6f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44005%3A%20CWE-287%3A%20Improper%20Authentication%20in%20smallstep%20Step-CA&amp;severity=critical&amp;id=6942ce29b2cbfb3efaa16b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-clickfix-attack-uses-fake-browser-fix-to-insta-7aa340eb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ClickFix%20Attack%20Uses%20Fake%20Browser%20Fix%20to%20Install%20DarkGate%20Malware%20on%20Your%20Device&amp;severity=medium&amp;id=6942c8c3f1f5b73852a8e1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-forumtroll-phishing-attacks-target-russian-sch-abdd1962</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ForumTroll%20Phishing%20Attacks%20Target%20Russian%20Scholars%20Using%20Fake%20eLibrary%20Emails&amp;severity=medium&amp;id=6942d853b2cbfb3efaac9c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/parked-domains-become-weapons-with-direct-search-a-6bc2d55d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Parked%20Domains%20Become%20Weapons%20with%20Direct%20Search%20Advertising&amp;severity=medium&amp;id=69433981058703ef3fd473ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-linear-to-complex-an-upgrade-in-ransomhouse-e-073aacd2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Linear%20to%20Complex%3A%20An%20Upgrade%20in%20RansomHouse%20Encryption&amp;severity=medium&amp;id=69432ef1058703ef3fc97a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gachiloader-defeating-nodejs-malware-with-api-trac-ac2d957f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GachiLoader%3A%20Defeating%20Node.js%20Malware%20with%20API%20Tracing&amp;severity=medium&amp;id=6942bac1f1f5b73852995944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nmfta-warns-of-surge-and-sophistication-of-cyber-e-44536358</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NMFTA%20Warns%20of%20Surge%20and%20Sophistication%20of%20Cyber-Enabled%20Cargo%20Theft&amp;severity=medium&amp;id=6942b5654a800b14e7fca561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14266-cwe-352-cross-site-request-forgery--db410f69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14266%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ercom%20Cryptobox&amp;severity=low&amp;id=6942b5b04a800b14e7fcbd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deliberate-internet-shutdowns-schneier-on-security-96bde887</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deliberate%20Internet%20Shutdowns%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6942b58d4a800b14e7fcb5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/askul-data-breach-exposed-over-700000-records-afte-edbc1b49</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Askul%20data%20breach%20exposed%20over%20700%2C000%20records%20after%20ransomware%20attack&amp;severity=high&amp;id=6942b58d4a800b14e7fcb5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-campaign-by-the-forumtroll-apt-group-e016dc15</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20campaign%20by%20the%20ForumTroll%20APT%20group&amp;severity=medium&amp;id=69432b79058703ef3fc51713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-150-cellik-rat-grants-android-control-trojaniz-8f91973d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%24150%20Cellik%20RAT%20Grants%20Android%20Control%2C%20Trojanizes%20Google%20Play%20Apps&amp;severity=medium&amp;id=6942a8fbd5dc0d5a04f881ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61736-cwe-298-improper-validation-of-cert-8c275ac9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61736%3A%20CWE-298-Improper%20Validation%20of%20certificate%20expiration%20in%20Johnson%20Controls%20iSTAReX%2C%20iSTAR%20Edge%2C%20iSTAR%20Ultra%20LT%2C%20iSTAR%20Ultra%20%2C%20iSTAR%20Ultra%20SE&amp;severity=high&amp;id=6942a932d5dc0d5a04f89566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14097-cwe-287-improper-authentication-in--97f20f54</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14097%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Radiometer%20Medical%20Aps%20ABL90%20FLEX%20and%20ABL90%20FLEX%20PLUS%20Analyzers&amp;severity=high&amp;id=6942a932d5dc0d5a04f89563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14096-cwe-798-use-of-hard-coded-credentia-97a254f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14096%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Radiometer%20Medical%20Aps%20ABL90%20FLEX%20and%20ABL90%20FLEX%20PLUS%20Analyzers&amp;severity=high&amp;id=6942a591d5dc0d5a04f3ed84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-claim-stealing-94gb-of-pornhub-premium-use-d7adf0bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Claim%20Stealing%2094GB%20of%20Pornhub%20Premium%20User%20Watch%20Histories&amp;severity=medium&amp;id=6942a209d5dc0d5a04edbc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67895-cwe-669-incorrect-resource-transfer-8e97ed9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67895%3A%20CWE-669%3A%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Edge3&amp;severity=critical&amp;id=6942998e034dcf4950468cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14095-cwe-284-improper-access-control-in--9c122bac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14095%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Radiometer%20Medical%20Aps%20ABL90%20FLEX%20and%20ABL90%20FLEX%20PLUS%20Analyzers&amp;severity=medium&amp;id=6942998e034dcf4950468ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-a-flaw-in-multiple-fortinet-products--43ca79cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20a%20flaw%20in%20multiple%20Fortinet%20products%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=69429960034dcf4950467d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-ink-dragon-group-hides-in-european-governm-d10be6f8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Ink%20Dragon%20Group%20Hides%20in%20European%20Government%20Networks&amp;severity=high&amp;id=69429960034dcf4950467d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-ink-dragon-hacks-governments-using-sh-11eaecee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Ink%20Dragon%20Hacks%20Governments%20Using%20ShadowPad%20and%20FINALDRAFT%20Malware&amp;severity=medium&amp;id=6942a888d5dc0d5a04f7d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/forumtroll-targets-political-scientists-kaspersky--b1f95c92</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ForumTroll%20targets%20political%20scientists%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69428ec8034dcf49503b045e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostposter-firefox-extensions-hide-malware-in-ico-e0151e7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostPoster%20Firefox%20Extensions%20Hide%20Malware%20in%20Icons&amp;severity=medium&amp;id=6942890c76794366d0b4baa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14101-cwe-639-authorization-bypass-throug-28919e82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14101%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GG%20Soft%20Software%20Services%20Inc.%20PaperWork&amp;severity=high&amp;id=694278ef2a34f2e402b2a883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/auto-parts-giant-lkq-confirms-oracle-ebs-breach-3240b6ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Auto%20Parts%20Giant%20LKQ%20Confirms%20Oracle%20EBS%20Breach&amp;severity=medium&amp;id=6942755c2a34f2e402ada2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostposter-malware-found-in-17-firefox-add-ons-wi-d600a4bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostPoster%20Malware%20Found%20in%2017%20Firefox%20Add-ons%20with%2050%2C000%2B%20Downloads&amp;severity=medium&amp;id=6942894276794366d0b4e39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14347-cwe-79-improper-neutralization-of-i-50d26826</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proliz%20Software%20Ltd.%20OBS%20(Student%20Affairs%20Information%20System)0&amp;severity=medium&amp;id=6942697da68039dadb6d7560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14399-cwe-352-cross-site-request-forgery--edd51fc3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14399%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpcodefactory%20Download%20Plugins%20and%20Themes%20in%20ZIP%20from%20Dashboard&amp;severity=medium&amp;id=6942697da68039dadb6d7568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12496-cwe-22-improper-limitation-of-a-pat-1777d542</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12496%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dylanjkotze%20Zephyr%20Project%20Manager&amp;severity=medium&amp;id=6942697da68039dadb6d7563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11924-cwe-639-authorization-bypass-throug-69810fa6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11924%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=high&amp;id=694254ebbd21432f8e5297b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13750-cwe-862-missing-authorization-in-ma-0ba43c10</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13750%3A%20CWE-862%20Missing%20Authorization%20in%20mateuszgbiorczyk%20Converter%20for%20Media%20%E2%80%93%20Optimize%20images%20%7C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=694254ebbd21432f8e5297bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14061-cwe-862-missing-authorization-in-wp-267a805a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14061%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Cookie%20Banner%20for%20GDPR%20%2F%20CCPA%20%E2%80%93%20WPLP%20Cookie%20Consent&amp;severity=medium&amp;id=694254ebbd21432f8e5297c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14817-cwe-269-improper-privilege-manageme-e299a65f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14817%3A%20CWE-862%20Missing%20Authorization%20in%20TECNO%20Tecno%20Pova6%20Pro%205G&amp;severity=medium&amp;id=69425167bd21432f8e4d5fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14154-cwe-79-improper-neutralization-of-i-9b862588</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14154%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wordplus%20Better%20Messages%20%E2%80%93%20Live%20Chat%2C%20Chat%20Rooms%2C%20Real-Time%20Messaging%20%26%20Private%20Messages&amp;severity=medium&amp;id=694241cd1f9b086b9ae6dd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14385-cwe-79-improper-neutralization-of-i-56c392d3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=69423560364d4dab9cc00c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13880-cwe-862-missing-authorization-in-ad-8cc3f6de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13880%3A%20CWE-862%20Missing%20Authorization%20in%20adreastrian%20WP%20Social%20Ninja%20%E2%80%93%20Embed%20Social%20Feeds%2C%20User%20Reviews%20%26%20Chat%20Widgets&amp;severity=medium&amp;id=69423560364d4dab9cc00c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13861-cwe-79-improper-neutralization-of-i-eb021f23</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13861%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linksoftware%20HTML%20Forms%20%E2%80%93%20Simple%20WordPress%20Forms%20Plugin&amp;severity=medium&amp;id=69423560364d4dab9cc00c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59374-cwe-506-embedded-malicious-code-in--b20044d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59374%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20ASUS%20live%20update&amp;severity=critical&amp;id=69423560364d4dab9cc00c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11775-cwe-125-out-of-bounds-read-in-asus--3d78c2b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11775%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ASUS%20Armoury%20Crate&amp;severity=medium&amp;id=69423560364d4dab9cc00c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11901-cwe-284-improper-access-control-in--8373da85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11901%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ASUS%20B460%20series&amp;severity=high&amp;id=69423560364d4dab9cc00c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64700-cross-site-request-forgery-csrf-in--e2bde16a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64700%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=694231dc364d4dab9cbab4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14305-cwe-863-incorrect-authorization-in--73e0d293</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14305%3A%20CWE-863%20Incorrect%20Authorization%20in%20Acer%20ListCheck.exe&amp;severity=high&amp;id=69422931473cb759e1edea2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14304-cwe-693-protection-mechanism-failur-0bffe3fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14304%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20ASRock%20Intel%20500%20chipset%20motherboard&amp;severity=high&amp;id=69422931473cb759e1edea27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13977-cwe-79-improper-neutralization-of-i-66b837ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13977%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=69422931473cb759e1edea20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14303-cwe-693-protection-mechanism-failur-b62925ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14303%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20MSI%20Intel%20600%20chipset%20motherboard&amp;severity=high&amp;id=6942222a473cb759e1eb9cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14302-cwe-693-protection-mechanism-failur-5ba842ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14302%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20GIGABYTE%20intel%20600%20chipset%20Motherboard&amp;severity=high&amp;id=6942222a473cb759e1eb9cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blindeagle-targets-colombian-government-agency-wit-f335be46</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BlindEagle%20Targets%20Colombian%20Government%20Agency%20with%20Caminho%20and%20DCRAT&amp;severity=medium&amp;id=694295c3034dcf495041dbd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14801-cross-site-scripting-in-xiweicheng--4de27927</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14801%3A%20Cross%20Site%20Scripting%20in%20xiweicheng%20TMS&amp;severity=medium&amp;id=69421096473cb759e1e64c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11369-cwe-862-missing-authorization-in-wp-49665f9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11369%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=69421096473cb759e1e64bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11009-cwe-312-cleartext-storage-of-sensit-3bc7992a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11009%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20GT%20Designer3%20Version1%20(GOT2000)&amp;severity=medium&amp;id=6942060f473cb759e1e34e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trufflehog-now-detects-jwts-with-public-key-signat-bfa88e5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TruffleHog%20now%20detects%20JWTs%20with%20public-key%20signatures%20and%20verifies%20them%20for%20liveness&amp;severity=medium&amp;id=6941ff06473cb759e1d48eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53524-cwe-787-in-fuji-electric-monitouch--1218f3bd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53524%3A%20CWE-787%20in%20Fuji%20Electric%20Monitouch%20V-SFT-6&amp;severity=high&amp;id=6941f9b7d2cd6f6c37c00b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14700-cwe-1336-improper-neutralization-of-bf9964e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14700%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=critical&amp;id=6941f9b7d2cd6f6c37c0072f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14701-cwe-79-improper-neutralization-of-i-805e78d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14701%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=high&amp;id=6941f9b7d2cd6f6c37c00b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-17-bdf56445</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-17&amp;severity=medium&amp;id=694345e7f4a1ba78f2b7cc03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67794-na-5c197ce5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67794%3A%20n%2Fa&amp;severity=high&amp;id=6943260ffab815a9fc251844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-residentbat-a-new-spyware-family-used-by-bel-618fcae5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ResidentBat%3A%20A%20new%20spyware%20family%20used%20by%20Belarusian%20KGB&amp;severity=medium&amp;id=694325fbfab815a9fc24fb0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67791-na-ba4cf99b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67791%3A%20n%2Fa&amp;severity=critical&amp;id=6943229bfab815a9fc1fb3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67790-na-d232425c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67790%3A%20n%2Fa&amp;severity=critical&amp;id=69431b97fab815a9fc199cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67793-na-39d42ae5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67793%3A%20n%2Fa&amp;severity=critical&amp;id=69431987c9138a40d2f66457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67792-na-81d0c909</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67792%3A%20n%2Fa&amp;severity=high&amp;id=69431987c9138a40d2f66453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67789-na-09242368</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67789%3A%20n%2Fa&amp;severity=medium&amp;id=694315f3c9138a40d2f24a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67787-na-a043d065</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67787%3A%20n%2Fa&amp;severity=critical&amp;id=69430eeac9138a40d2eb2e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67781-na-25540013</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67781%3A%20n%2Fa&amp;severity=critical&amp;id=69430eeac9138a40d2eb2e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65233-na-fbeecb8d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65233%3A%20n%2Fa&amp;severity=medium&amp;id=694309ba0b6f32e62bf653df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67074-na-ad90f45c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67074%3A%20n%2Fa&amp;severity=medium&amp;id=6943060a0b6f32e62bf23030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67073-na-6e304afe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67073%3A%20n%2Fa&amp;severity=critical&amp;id=694302860b6f32e62bed0ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46062-na-466b53e3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46062%3A%20n%2Fa&amp;severity=high&amp;id=6942ff050b6f32e62beb35ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67174-na-dccb63ee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67174%3A%20n%2Fa&amp;severity=medium&amp;id=6942fb890b6f32e62be62d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66953-na-b7f870d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66953%3A%20n%2Fa&amp;severity=high&amp;id=6942fb890b6f32e62be62d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46060-na-2043728a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46060%3A%20n%2Fa&amp;severity=high&amp;id=6942fb890b6f32e62be62d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67171-na-ccf7bf28</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67171%3A%20n%2Fa&amp;severity=high&amp;id=6942f8e8847f7e98df04b557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67168-na-3ed5abab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67168%3A%20n%2Fa&amp;severity=medium&amp;id=6942f8e8847f7e98df04b552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67173-na-a8065ceb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67173%3A%20n%2Fa&amp;severity=medium&amp;id=6942f571847f7e98df00bfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67170-na-653cb1ce</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67170%3A%20n%2Fa&amp;severity=medium&amp;id=6942f571847f7e98df00bfcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53919-na-2f169e9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53919%3A%20n%2Fa&amp;severity=high&amp;id=6942ec89847f7e98dff8667b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53398-na-2d775721</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53398%3A%20n%2Fa&amp;severity=high&amp;id=6942ec89847f7e98dff86677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67172-na-ecf46117</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67172%3A%20n%2Fa&amp;severity=high&amp;id=6942eae7847f7e98dff54f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65203-na-96907401</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65203%3A%20n%2Fa&amp;severity=high&amp;id=6942eae7847f7e98dff54efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66924-na-a49f6c6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66924%3A%20n%2Fa&amp;severity=medium&amp;id=6942e8e71c1ff0913689279c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66923-na-a73893e2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66923%3A%20n%2Fa&amp;severity=high&amp;id=6942e8e71c1ff09136892798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67165-na-afd66dd7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67165%3A%20n%2Fa&amp;severity=critical&amp;id=6942e1e21c1ff091367fecf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67164-na-8aab4327</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67164%3A%20n%2Fa&amp;severity=critical&amp;id=6942e1e21c1ff091367feced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66921-na-42c238c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66921%3A%20n%2Fa&amp;severity=high&amp;id=6942e1e21c1ff091367fece6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67285-na-3e81af47</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67285%3A%20n%2Fa&amp;severity=high&amp;id=6942d8c9b2cbfb3efaad419f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65855-na-2aa7fbb3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65855%3A%20n%2Fa&amp;severity=medium&amp;id=6942d8c9b2cbfb3efaad419b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65185-na-d8c19bf3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65185%3A%20n%2Fa&amp;severity=low&amp;id=6942d8c9b2cbfb3efaad4196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29371-na-a9b2daea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29371%3A%20n%2Fa&amp;severity=high&amp;id=6942d536b2cbfb3efaa86de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29370-na-766c87a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29370%3A%20n%2Fa&amp;severity=medium&amp;id=6942d1adb2cbfb3efaa33d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14766-out-of-bounds-read-and-write-in-goo-22c194bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14766%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=6941e6798258306a9da22878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14765-use-after-free-in-google-chrome-60af4a1f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14765%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6941e6798258306a9da22874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soundcloud-hit-by-cyberattack-breach-affects-20-of-902e6d94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SoundCloud%20Hit%20by%20Cyberattack%2C%20Breach%20Affects%2020%25%20of%20its%20Users&amp;severity=high&amp;id=6941e2f38258306a9d9d1852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34288-cwe-732-incorrect-permission-assign-c4519e9b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34288%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Nagios%20Enterprises%20Nagios%20XI&amp;severity=high&amp;id=6941dbf98258306a9d96c3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68274-cwe-476-null-pointer-dereference-in-080bd02e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68274%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20emiago%20sipgo&amp;severity=high&amp;id=6941da4bb8ff87d8f94579f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64520-cwe-862-missing-authorization-in-gl-9990351a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64520%3A%20CWE-862%3A%20Missing%20Authorization%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=6941d6c9b8ff87d8f9416195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14466-cwe-770-allocation-of-resources-wit-f0fec304</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14466%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20G%C3%BCralp%20Systems%20Fortimus%20Series&amp;severity=medium&amp;id=6941d344b8ff87d8f93c7337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13532-cwe-916-use-of-password-hash-with-i-c52cab23</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13532%3A%20CWE-916%20Use%20of%20Password%20Hash%20With%20Insufficient%20Computational%20Effort%20in%20Fortra%20Core%20Privileged%20Access%20Manager%20(BoKS)&amp;severity=medium&amp;id=6941bc63535cdcbc0ad63cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-hidden-risk-in-virtualization-why-hypervisors--615dd39d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Hidden%20Risk%20in%20Virtualization%3A%20Why%20Hypervisors%20are%20a%20Ransomware%20Magnet&amp;severity=high&amp;id=6941b7290d5f6f4391b94106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rogue-nuget-package-poses-as-tracerfody-steals-cry-d9a9ce0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rogue%20NuGet%20Package%20Poses%20as%20Tracer.Fody%2C%20Steals%20Cryptocurrency%20Wallet%20Data&amp;severity=high&amp;id=6941b7290d5f6f4391b9410e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-iam-credentials-power-a-large-aws-cryp-c05e4887</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20IAM%20Credentials%20Power%20a%20Large%20AWS%20Crypto%20Mining%20Campaign&amp;severity=high&amp;id=6941b7290d5f6f4391b94102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/texas-sues-tv-makers-for-taking-screenshots-of-wha-8bcbf088</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Texas%20sues%20TV%20makers%20for%20taking%20screenshots%20of%20what%20people%20watch&amp;severity=high&amp;id=6941b7290d5f6f4391b94112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8872-cwe-400-uncontrolled-resource-consum-0eeca28e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8872%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Arista%20Networks%20EOS&amp;severity=high&amp;id=6941b76a0d5f6f4391b96408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14553-cwe-200-exposure-of-sensitive-infor-d14cd0b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14553%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TP-Link%20Systems%20Inc.%20TP-Link%20Tapo%20App&amp;severity=high&amp;id=6941ae5b0d5f6f4391b0c38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68270-cwe-862-missing-authorization-in-op-c7d17376</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68270%3A%20CWE-862%3A%20Missing%20Authorization%20in%20openedx%20edx-platform&amp;severity=critical&amp;id=6941ae5b0d5f6f4391b0c398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68156-cwe-770-allocation-of-resources-wit-2b56119d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68156%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20expr-lang%20expr&amp;severity=high&amp;id=6941ae5b0d5f6f4391b0c394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68155-cwe-22-improper-limitation-of-a-pat-16ba5c53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68155%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite-plugin-react&amp;severity=high&amp;id=6941a4041a61eff6269a9351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68154-cwe-78-improper-neutralization-of-s-41f82666</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68154%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sebhildebrandt%20systeminformation&amp;severity=high&amp;id=6941a4041a61eff6269a934d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68150-cwe-918-server-side-request-forgery-f5f91259</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68150%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=6941a4041a61eff6269a9348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68146-cwe-367-time-of-check-time-of-use-t-d4005e0b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68146%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20tox-dev%20filelock&amp;severity=medium&amp;id=6941a4041a61eff6269a9342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46296-an-authorization-bypass-vulnerabili-72992d35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46296%3A%20An%20authorization%20bypass%20vulnerability%20in%20FileMaker%20Server%20Admin%20Console%20allowed%20administrator%20roles%20with%20minimal%20privileges%20to%20access%20administrative%20features%20such%20as%20viewing%20license%20details%20and%20downloading%20application%20logs.%20in%20Claris%20FileMaker%20Server&amp;severity=medium&amp;id=6941ae5b0d5f6f4391b0c3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46295-apache-commons-text-versions-prior--b0b7aaed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46295%3A%20Apache%20Commons%20Text%20versions%20prior%20to%201.10.0%20included%20interpolation%20features%20that%20could%20be%20abused%20when%20applications%20passed%20untrusted%20input%20into%20the%20text-substitution%20API.%20Because%20some%20interpolators%20could%20trigger%20actions%20like%20executing%20commands%20or%20accessing%20external%20resources%2C%20an%20attacker%20could%20potentially%20achieve%20remote%20code%20execution.%20in%20Claris%20FileMaker%20Server&amp;severity=critical&amp;id=6941ae5b0d5f6f4391b0c3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46294-the-iis-shortname-vulnerability-exp-e89c4e3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46294%3A%20The%20IIS%20Shortname%20Vulnerability%20exploits%20how%20Microsoft%20IIS%20handles%20legacy%208.3%20short%20filenames%2C%20allowing%20attackers%20to%20infer%20the%20existence%20of%20files%20or%20directories%20by%20crafting%20requests%20with%20the%20tilde%20(~)%20character.%20in%20Claris%20FileMaker%20Server&amp;severity=medium&amp;id=6941ae5b0d5f6f4391b0c3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68142-cwe-1333-inefficient-regular-expres-1cfe4711</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68142%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20facelessuser%20pymdown-extensions&amp;severity=low&amp;id=6941ae5c0d5f6f4391b0c3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-open-source-to-openai-the-evolution-of-third--40358618</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Open%20Source%20to%20OpenAI%3A%20The%20Evolution%20of%20Third-Party%20Risk&amp;severity=medium&amp;id=6941a06f1a61eff626985458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-threat-intelligence-warns-russian-gru-hacke-369fb50c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Threat%20Intelligence%20Warns%20Russian%20GRU%20Hackers%20Now%20Favor%20Misconfigured%20Devices%20Over%20Vulnerabilities&amp;severity=medium&amp;id=6941a0851a61eff6269860f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwning-santa-before-the-bad-guys-do-a-hybrid-bug-b-65d57e1c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwning%20Santa%20before%20the%20bad%20guys%20do%3A%20A%20hybrid%20bug%20bounty%20%2F%20CTF%20for%20container%20isolation&amp;severity=medium&amp;id=69419d9a1a61eff62695ce95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33235-cwe-362-concurrent-execution-using--bae3f820</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33235%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Resiliency%20Extension&amp;severity=high&amp;id=69419b7d9050fe85080f3cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33225-cwe-61-unix-symbolic-link-symlink-f-eb6bc1d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33225%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20NVIDIA%20Resiliency%20Extension&amp;severity=high&amp;id=69419b7d9050fe85080f3cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33210-cwe-502-deserialization-of-untruste-c0f2ea24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33210%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Isaac%20Lab&amp;severity=critical&amp;id=694197f79050fe85080b12af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33226-cwe-502-deserialization-of-untruste-9614cc99</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33226%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=694197f79050fe85080b12b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33212-cwe-502-deserialization-of-untruste-121f7f0f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33212%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=694197f79050fe85080b12b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53896-missing-authentication-for-critical-e7811ddf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53896%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20D-Link%20DAP-1325&amp;severity=high&amp;id=694194749050fe8508060875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53901-url-redirection-to-untrusted-site-o-216e992b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53901%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WBCE%20CMS&amp;severity=high&amp;id=69446e034eb3efac36aa8f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53899-server-side-request-forgery-ssrf-0486edd2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53899%3A%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=medium&amp;id=69446e034eb3efac36aa8f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53894-weak-authentication-in-dulldusk-php-19de8a9f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53894%3A%20Weak%20Authentication%20in%20Dulldusk%20phpfm&amp;severity=critical&amp;id=694194749050fe8508060882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geminijack-a-prompt-injection-challenge-demonstrat-d2bfdfdf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GeminiJack%3A%20A%20prompt-injection%20challenge%20demonstrating%20real-world%20LLM%20abuse&amp;severity=medium&amp;id=694190f09050fe85080407ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempting-cross-translation-unit-taint-analysis-f-05d871c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempting%20Cross%20Translation%20Unit%20Taint%20Analysis%20for%20Firefox%20with%20Clang%20Static%20Analyzer&amp;severity=high&amp;id=69418d819050fe8508ffd529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68116-cwe-79-improper-neutralization-of-i-f4cb6712</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68116%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20error311%20FileRise&amp;severity=high&amp;id=69418d769050fe8508ffb304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-iam-credentials-power-a-large-aws-cryp-c27ba8dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20IAM%20Credentials%20Power%20a%20Large%20AWS%20Crypto%20Mining%20Campaign&amp;severity=medium&amp;id=694209ae473cb759e1e46806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59935-cwe-79-improper-neutralization-of-i-51c11d03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59935%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69418d769050fe8508ffb301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-in-telegram-mini-apps-how-to-avoid-taking-712ebf7f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20in%20Telegram%20Mini%20Apps%3A%20how%20to%20avoid%20taking%20the%20bait%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69418bb53e7fd18214c3d792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37164-vulnerability-in-hewlett-packard-en-2672bb21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37164%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20OneView&amp;severity=critical&amp;id=69418d769050fe8508ffb2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10450-cwe-359-exposure-of-private-persona-f18307df</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10450%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=694188253e7fd18214bf80c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rogue-nuget-package-poses-as-tracerfody-steals-cry-02754561</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rogue%20NuGet%20Package%20Poses%20as%20Tracer.Fody%2C%20Steals%20Cryptocurrency%20Wallet%20Data&amp;severity=medium&amp;id=694209ae473cb759e1e46809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68269-cwe-349-in-jetbrains-intellij-idea-b8f5905e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68269%3A%20CWE-349%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=69417c3609f61faec595078c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68268-cwe-79-in-jetbrains-teamcity-8fd63ffa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68268%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=69417c3609f61faec5950789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68267-cwe-272-in-jetbrains-teamcity-88645205</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68267%3A%20CWE-272%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=69417c3609f61faec5950786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68166-cwe-79-in-jetbrains-teamcity-d30f76a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68166%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=69417c3609f61faec5950783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68165-cwe-79-in-jetbrains-teamcity-e3e4b445</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68165%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=69417c3609f61faec5950780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68164-cwe-203-in-jetbrains-teamcity-6459069c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68164%3A%20CWE-203%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=69417c3609f61faec595077d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68163-cwe-79-in-jetbrains-teamcity-d4e67bb7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68163%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=69417c3609f61faec595077a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68162-cwe-829-in-jetbrains-teamcity-129a0fe2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68162%3A%20CWE-829%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=69417c3609f61faec5950777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14432-cwe-532-insertion-of-sensitive-info-fb159eae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14432%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20HP%20Inc%20Poly%20G7500&amp;severity=high&amp;id=694178b209f61faec5907335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62329-cwe-613-insufficient-session-expira-21d57530</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62329%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCL%20Software%20DevOps%20Deploy%20%2F%20Launch&amp;severity=medium&amp;id=694178b209f61faec5907338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ink-dragons-relay-network-and-stealthy-offensive-o-92ff5e3f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ink%20Dragon&apos;s%20Relay%20Network%20and%20Stealthy%20Offensive%20Operation&amp;severity=medium&amp;id=6941acaa0d5f6f4391ada9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-distributing-malicious-mobile-app-via-qr-c-f3dcf26a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20Distributing%20Malicious%20Mobile%20App%20via%20QR%20Code&amp;severity=medium&amp;id=6941b0230d5f6f4391b1e56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urban-vpn-browser-extension-caught-harvesting-ai-c-8d006c0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Urban%20VPN%20Browser%20Extension%20Caught%20Harvesting%20AI%20Chat%20Conversations%20from%20Millions%20of%20Users&amp;severity=high&amp;id=6941753609f61faec58b50f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/700000-records-compromised-in-askul-ransomware-att-df249994</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=700%2C000%20Records%20Compromised%20in%20Askul%20Ransomware%20Attack&amp;severity=medium&amp;id=69416c5f77659b3df3503eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68224-1f020b8c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68224&amp;severity=null&amp;id=6957eb35db813ff03ef355aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68203-ed505aa5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68203&amp;severity=null&amp;id=6957eb35db813ff03ef355a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jumpcloud-remote-assist-flaw-lets-users-gain-full--0016f86e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JumpCloud%20Remote%20Assist%20Flaw%20Lets%20Users%20Gain%20Full%20Control%20of%20Company%20Devices&amp;severity=medium&amp;id=6941656377659b3df346365d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tldr-hide-your-headless-bot-by-mimicking-a-webview-09b66c34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TL%3BDR%3A%20Hide%20your%20headless%20bot%20by%20mimicking%20a%20WebView%20(Sec-Fetch%20and%20Client%20Hints%20inconsistencies)&amp;severity=medium&amp;id=694165b177659b3df34666be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fortigate-under-active-attack-through-sam-54bab342</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20FortiGate%20Under%20Active%20Attack%20Through%20SAML%20SSO%20Authentication%20Bypass&amp;severity=high&amp;id=6941656377659b3df3463655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-authorities-dismantle-call-center-fraud-r-0ae902c9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20authorities%20dismantle%20call%20center%20fraud%20ring%20in%20Ukraine&amp;severity=high&amp;id=6941656377659b3df3463659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40361-60165bf4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40361&amp;severity=null&amp;id=6960dacfa48af7d8ce806bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-russian-hackers-now-favor-misconfigurations-de396171</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%3A%20Russian%20Hackers%20Now%20Favor%20Misconfigurations%20in%20Critical%20Infrastructure%20Attacks&amp;severity=critical&amp;id=69415d7d83e5b48efc059ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14780-sql-injection-in-xiongwei-smart-cat-cd25a57d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14780%3A%20SQL%20Injection%20in%20Xiongwei%20Smart%20Catering%20Cloud%20Platform&amp;severity=medium&amp;id=69415d9883e5b48efc05b0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-ink-dragon-revealing-the-relay-network-and--b1a1626f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20Ink%20Dragon%3A%20Revealing%20the%20Relay%20Network%20and%20Inner%20Workings%20of%20a%20Stealthy%20Offensive%20Operation&amp;severity=high&amp;id=69415a0a83e5b48efc0390b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-exposes-years-long-gru-cyber-campaign-targe-a5b9d6fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Exposes%20Years-Long%20GRU%20Cyber%20Campaign%20Targeting%20Energy%20and%20Cloud%20Infrastructure&amp;severity=critical&amp;id=694209ae473cb759e1e4680c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65076-cwe-22-improper-limitation-of-a-pat-978950f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65076%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WaveStore%20WaveStore%20Server&amp;severity=high&amp;id=694154d05e006677ae0dd914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65075-cwe-22-improper-limitation-of-a-pat-0dcb4cf8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65075%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WaveStore%20WaveStore%20Server&amp;severity=medium&amp;id=694154d05e006677ae0dd90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65074-cwe-22-improper-limitation-of-a-pat-3ae30a8f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65074%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WaveStore%20WaveStore%20Server&amp;severity=high&amp;id=694154d05e006677ae0dd860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14443-server-side-request-forgery-ssrf-in-9c5f2d2b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14443%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Container%20Platform%204&amp;severity=medium&amp;id=694151495e006677ae09a90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jumpcloud-remote-assist-vulnerability-can-expose-s-9a59f443</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JumpCloud%20Remote%20Assist%20Vulnerability%20Can%20Expose%20Systems%20to%20Takeover&amp;severity=low&amp;id=694146bc5e006677aefdeda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-data-security-and-privacy-need-to-start-in-cod-dd915236</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Data%20Security%20and%20Privacy%20Need%20to%20Start%20in%20Code&amp;severity=medium&amp;id=694155985e006677ae0eaf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13474-cwe-639-authorization-bypass-throug-873cadd2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13474%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Menulux%20Software%20Inc.%20Mobile%20App&amp;severity=high&amp;id=694144fdb7167ed5be7864c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13741-cwe-862-missing-authorization-in-pu-e73cee3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13741%3A%20CWE-862%20Missing%20Authorization%20in%20publishpress%20Schedule%20Post%20Changes%20With%20PublishPress%20Future%3A%20Unpublish%2C%20Delete%2C%20Change%20Status%2C%20Trash%2C%20Change%20Categories&amp;severity=medium&amp;id=694144fdb7167ed5be7864d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11220-cwe-79-improper-neutralization-of-i-ed2ebb13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11220%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=694144fdb7167ed5be7864cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0836-cwe-862-missing-authorization-in-mil-79aed365</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0836%3A%20CWE-862%20Missing%20Authorization%20in%20Milestone%20Systems%20XProtect%20VMS&amp;severity=medium&amp;id=69413e06b7167ed5be6e7a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fortigate-under-active-attack-through-sam-fbe8c785</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20FortiGate%20Under%20Active%20Attack%20Through%20SAML%20SSO%20Authentication%20Bypass&amp;severity=critical&amp;id=69413de7b7167ed5be6e5c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/user-data-compromised-in-soundcloud-hack-0a10a0db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=User%20Data%20Compromised%20in%20SoundCloud%20Hack&amp;severity=medium&amp;id=69413a65b7167ed5be6bc09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-santastealer-malware-steals-data-from-browsers-4c097a70</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20SantaStealer%20malware%20steals%20data%20from%20browsers%2C%20crypto%20wallets&amp;severity=high&amp;id=69413a7bb7167ed5be6bd723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/askul-confirms-theft-of-740k-customer-records-in-r-3594939a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Askul%20confirms%20theft%20of%20740k%20customer%20records%20in%20ransomware%20attack&amp;severity=high&amp;id=69413a7bb7167ed5be6bd727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-to-shut-down-dark-web-monitoring-tool-in-fe-3b686551</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20to%20Shut%20Down%20Dark%20Web%20Monitoring%20Tool%20in%20February%202026&amp;severity=high&amp;id=69413a7bb7167ed5be6bd72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-interior-minister-says-hackers-breached-its-d4e47474</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Interior%20Minister%20says%20hackers%20breached%20its%20email%20servers&amp;severity=medium&amp;id=69413a7bb7167ed5be6bd733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/700credit-data-breach-exposed-details-of-56-millio-94b89fcc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=700Credit%20Data%20Breach%20Exposed%20Details%20of%205.6%20Million%20Consumers%20Including%20SSNs.&amp;severity=high&amp;id=694135161c9332043ad4c808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigating-the-infrastructure-behind-ddosias-at-87296225</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigating%20the%20Infrastructure%20Behind%20DDoSia&apos;s%20Attacks&amp;severity=medium&amp;id=694154d05e006677ae0dd866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-actor-phishes-the-baltics-and-the-balk-6fae1177</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20actor%20phishes%20the%20Baltics%20and%20the%20Balkans&amp;severity=medium&amp;id=694154d05e006677ae0dd919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-the-wild-exploitation-of-fresh-fortinet-flaws-b-cb36df54</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-the-Wild%20Exploitation%20of%20Fresh%20Fortinet%20Flaws%20Begins&amp;severity=critical&amp;id=6941270b1c9332043ac20a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14002-cwe-287-improper-authentication-in--2dce4fae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14002%3A%20CWE-287%20Improper%20Authentication%20in%20whyun%20WPCOM%20Member&amp;severity=high&amp;id=69412552594e45819d817425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-vulnerability-actively-exploited-to-de-d91b3da6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Vulnerability%20Actively%20Exploited%20to%20Deploy%20Linux%20Backdoors&amp;severity=medium&amp;id=694155985e006677ae0eaf60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13231-cwe-362-concurrent-execution-using--a9a3b571</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13231%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=medium&amp;id=69411abe594e45819d7515df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68088-missing-authorization-in-merkulove--0e7f26c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68088%3A%20Missing%20Authorization%20in%20merkulove%20Huger%20for%20Elementor&amp;severity=medium&amp;id=69411758594e45819d70dc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68087-missing-authorization-in-merkulove--d7abe184</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68087%3A%20Missing%20Authorization%20in%20merkulove%20Modalier%20for%20Elementor&amp;severity=medium&amp;id=69411758594e45819d70dc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68086-missing-authorization-in-merkulove--fedb16e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68086%3A%20Missing%20Authorization%20in%20merkulove%20Reformer%20for%20Elementor&amp;severity=medium&amp;id=69411758594e45819d70dc69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68085-missing-authorization-in-merkulove--af053296</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68085%3A%20Missing%20Authorization%20in%20merkulove%20Buttoner%20for%20Elementor&amp;severity=medium&amp;id=69411758594e45819d70dc66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68084-missing-authorization-in-nitesh-ult-32182db0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68084%3A%20Missing%20Authorization%20in%20Nitesh%20Ultimate%20Auction&amp;severity=medium&amp;id=69411758594e45819d70dc62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68083-cross-site-request-forgery-csrf-in--5d4907a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68083%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Meks%20Meks%20Quick%20Plugin%20Disabler&amp;severity=medium&amp;id=69411758594e45819d70dc5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68082-cross-site-request-forgery-csrf-in--5257ee55</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68082%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SEMrush%20CY%20LTD%20Semrush%20Content%20Toolkit&amp;severity=medium&amp;id=69411758594e45819d70dc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68080-improper-neutralization-of-input-du-8c240ec7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68080%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20User%20Avatar%20-%20Reloaded&amp;severity=medium&amp;id=69411758594e45819d70dc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68079-improper-neutralization-of-input-du-4d5b6c56</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68079%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeNectar%20Salient%20Shortcodes&amp;severity=medium&amp;id=69411756594e45819d70d850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68078-improper-neutralization-of-input-du-8e9f15b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68078%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeNectar%20Salient%20Portfolio&amp;severity=medium&amp;id=69411756594e45819d70d84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68077-improper-neutralization-of-input-du-3f8a5ca0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68077%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Select-Themes%20Stockholm&amp;severity=medium&amp;id=69411756594e45819d70d84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68076-improper-neutralization-of-input-du-1661e62e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Select-Themes%20Stockholm%20Core&amp;severity=medium&amp;id=69411756594e45819d70d847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68071-authorization-bypass-through-user-c-b5fec355</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68071%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=medium&amp;id=69411756594e45819d70d844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68070-improper-neutralization-of-input-du-5ced6c6a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68070%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vektor%2CInc.%20VK%20Google%20Job%20Posting%20Manager&amp;severity=medium&amp;id=69411756594e45819d70d841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68068-improper-control-of-filename-for-in-75f2f7ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68068%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Stockholm&amp;severity=high&amp;id=69411756594e45819d70d83e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68067-improper-control-of-filename-for-in-a0e7d80f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Stockholm%20Core&amp;severity=high&amp;id=69411756594e45819d70d83b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68066-improper-control-of-filename-for-in-0b1d59d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PenciDesign%20Soledad&amp;severity=high&amp;id=69411756594e45819d70d838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68065-improper-control-of-filename-for-in-0c87a061</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LiquidThemes%20Hub%20Core&amp;severity=high&amp;id=69411756594e45819d70d835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68062-improper-control-of-filename-for-in-bada404d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20MinimogWP&amp;severity=high&amp;id=69411755594e45819d70d69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68061-improper-control-of-filename-for-in-bb1da9c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20EduMall&amp;severity=high&amp;id=69411755594e45819d70d69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68056-improper-neutralization-of-special--aab25123</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68056%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20LBG%20Zoominoutslider&amp;severity=high&amp;id=69411755594e45819d70d698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68055-improper-neutralization-of-special--5a43a174</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68055%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themefic%20Hydra%20Booking&amp;severity=high&amp;id=69411755594e45819d70d695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68054-improper-neutralization-of-special--ce61930b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68054%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20CountDown%20With%20Image%20or%20Video%20Background&amp;severity=high&amp;id=69411755594e45819d70d692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68053-improper-neutralization-of-special--97057880</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68053%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20xPromoter&amp;severity=high&amp;id=69411755594e45819d70d68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67999-improper-neutralization-of-special--82006b4a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67999%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stefano%20Lissa%20Newsletter&amp;severity=high&amp;id=69411755594e45819d70d68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67989-server-side-request-forgery-ssrf-in-2572ab30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67989%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LMPixels%20Kerge&amp;severity=medium&amp;id=69411755594e45819d70d689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67986-improper-neutralization-of-input-du-a9cfe3d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67986%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Barn2%20Plugins%20Document%20Library%20Lite&amp;severity=medium&amp;id=69411755594e45819d70d686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67985-authorization-bypass-through-user-c-32398551</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67985%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Barn2%20Plugins%20Document%20Library%20Lite&amp;severity=medium&amp;id=69411755594e45819d70d683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67983-improper-neutralization-of-input-du-c7befc6e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=medium&amp;id=69411753594e45819d70ccd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67976-missing-authorization-in-bob-watu-q-e82aef9c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67976%3A%20Missing%20Authorization%20in%20Bob%20Watu%20Quiz&amp;severity=medium&amp;id=69411753594e45819d70ccd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67965-missing-authorization-in-favethemes-f31e3a32</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67965%3A%20Missing%20Authorization%20in%20favethemes%20Homey%20Core&amp;severity=medium&amp;id=69411753594e45819d70cccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67962-improper-neutralization-of-special--05616468</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67962%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AIOSEO%20Plugin%20Team%20Broken%20Link%20Checker&amp;severity=high&amp;id=69411753594e45819d70ccca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67951-improper-neutralization-of-input-du-882cebfb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPZOOM%20WPZOOM%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69411753594e45819d70ccc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67950-improper-neutralization-of-special--a95dd924</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67950%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Syed%20Balkhi%20All%20In%20One%20SEO%20Pack&amp;severity=high&amp;id=69411753594e45819d70ccc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67948-exposure-of-sensitive-system-inform-6d54b8b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67948%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SendPulse%20SendPulse%20Email%20Marketing%20Newsletter&amp;severity=medium&amp;id=69411753594e45819d70ccc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67929-missing-authorization-in-templatein-271d97c2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67929%3A%20Missing%20Authorization%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=69411753594e45819d70ccbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67912-improper-neutralization-of-input-du-2e08586c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premio%20Stars%20Testimonials&amp;severity=medium&amp;id=69411753594e45819d70ccbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66167-missing-authorization-in-merkulove--01ae56bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66167%3A%20Missing%20Authorization%20in%20merkulove%20Lottier&amp;severity=medium&amp;id=69411753594e45819d70ccb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66166-missing-authorization-in-merkulove--99a465e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66166%3A%20Missing%20Authorization%20in%20merkulove%20Lottier%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66165-missing-authorization-in-merkulove--05ca9d4c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66165%3A%20Missing%20Authorization%20in%20merkulove%20Lottier%20for%20WPBakery&amp;severity=medium&amp;id=69411752594e45819d70cb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66164-missing-authorization-in-merkulove--da23dbb3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66164%3A%20Missing%20Authorization%20in%20merkulove%20Laser&amp;severity=medium&amp;id=69411752594e45819d70cb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66163-missing-authorization-in-merkulove--7c649501</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66163%3A%20Missing%20Authorization%20in%20merkulove%20Masker%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66162-missing-authorization-in-merkulove--eb8f0428</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66162%3A%20Missing%20Authorization%20in%20merkulove%20Spoter%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66161-missing-authorization-in-merkulove--5b555682</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66161%3A%20Missing%20Authorization%20in%20merkulove%20Grider%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66147-missing-authorization-in-merkulove--d9735ec2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66147%3A%20Missing%20Authorization%20in%20merkulove%20Coder%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66134-missing-authorization-in-ninjateam--254917e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66134%3A%20Missing%20Authorization%20in%20NinjaTeam%20FileBird%20Pro&amp;severity=medium&amp;id=69411752594e45819d70cb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66133-missing-authorization-in-wp-legal-p-f89bfdc3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66133%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WP%20Cookie%20Notice%20for%20GDPR%2C%20CCPA%20%26%20ePrivacy%20Consent&amp;severity=medium&amp;id=69411752594e45819d70cb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66132-authorization-bypass-through-user-c-30f0ab1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66132%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FAPI%20Business%20s.r.o.%20FAPI%20Member&amp;severity=medium&amp;id=69411752594e45819d70cb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66131-missing-authorization-in-yaadsarig--bacbc562</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66131%3A%20Missing%20Authorization%20in%20yaadsarig%20Yaad%20Sarig%20Payment%20Gateway%20For%20WC&amp;severity=medium&amp;id=69411750594e45819d70c756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66130-missing-authorization-in-etruel-wp--39feb8ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66130%3A%20Missing%20Authorization%20in%20etruel%20WP%20Views%20Counter&amp;severity=medium&amp;id=69411750594e45819d70c753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66129-missing-authorization-in-wppochipp--be62de5b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66129%3A%20Missing%20Authorization%20in%20wppochipp%20Pochipp&amp;severity=medium&amp;id=69411750594e45819d70c750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66128-missing-authorization-in-brevo-send-499c3b54</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66128%3A%20Missing%20Authorization%20in%20Brevo%20Sendinblue%20for%20WooCommerce&amp;severity=medium&amp;id=69411750594e45819d70c74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66127-missing-authorization-in-g5theme-es-85993736</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66127%3A%20Missing%20Authorization%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=medium&amp;id=69411750594e45819d70c74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66126-insertion-of-sensitive-information--07e14078</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66126%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20wowpress.host%20Fix%20Media%20Library&amp;severity=medium&amp;id=69411750594e45819d70c747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66125-insertion-of-sensitive-information--4bab3433</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66125%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Nitesh%20Ultimate%20Auction&amp;severity=medium&amp;id=69411750594e45819d70c744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66124-missing-authorization-in-zeen101-le-7a3eed6b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66124%3A%20Missing%20Authorization%20in%20ZEEN101%20Leaky%20Paywall&amp;severity=medium&amp;id=69411750594e45819d70c741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66122-missing-authorization-in-design-sty-8fbbfed3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66122%3A%20Missing%20Authorization%20in%20Design%20Stylish%20Price%20List&amp;severity=medium&amp;id=69411750594e45819d70c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66121-missing-authorization-in-siteground-84f6210c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66121%3A%20Missing%20Authorization%20in%20SiteGround%20SiteGround%20Security&amp;severity=medium&amp;id=69411750594e45819d70c73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64639-missing-authorization-in-wp-compres-ba710c44</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64639%3A%20Missing%20Authorization%20in%20WP%20Compress%20WP%20Compress%20for%20MainWP&amp;severity=medium&amp;id=6941174f594e45819d70c5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64638-missing-authorization-in-onpayio-on-64d9c883</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64638%3A%20Missing%20Authorization%20in%20OnPay.io%20OnPay.io%20for%20WooCommerce&amp;severity=medium&amp;id=6941174f594e45819d70c5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64635-missing-authorization-in-syed-balkh-7cb25363</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64635%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Feeds%20for%20YouTube&amp;severity=medium&amp;id=6941174f594e45819d70c5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64634-missing-authorization-in-themefusio-ea300690</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64634%3A%20Missing%20Authorization%20in%20ThemeFusion%20Avada&amp;severity=medium&amp;id=6941174f594e45819d70c5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64633-improper-neutralization-of-script-r-b164d6e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64633%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20colabrio%20Norebro%20Extra&amp;severity=medium&amp;id=6941174f594e45819d70c5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64632-missing-authorization-in-auctollo-g-e66cf382</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64632%3A%20Missing%20Authorization%20in%20Auctollo%20Google%20XML%20Sitemaps&amp;severity=medium&amp;id=6941174f594e45819d70c5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64631-missing-authorization-in-wc-lovers--aeff6e54</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64631%3A%20Missing%20Authorization%20in%20WC%20Lovers%20WCFM%20Marketplace&amp;severity=medium&amp;id=6941174f594e45819d70c59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64630-missing-authorization-in-strategy11-925240a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64630%3A%20Missing%20Authorization%20in%20Strategy11%20Team%20Business%20Directory&amp;severity=medium&amp;id=6941174f594e45819d70c59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64253-path-traversal-in-wordpressorg-heal-38180214</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64253%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20WordPress.org%20Health%20Check%20%26%20Troubleshooting&amp;severity=medium&amp;id=6941174f594e45819d70c598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64251-missing-authorization-in-azzaroco-u-96b8140d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64251%3A%20Missing%20Authorization%20in%20azzaroco%20Ultimate%20Learning%20Pro&amp;severity=medium&amp;id=6941174f594e45819d70c595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64250-url-redirection-to-untrusted-site-o-03e3b33e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64250%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpWax%20Directorist&amp;severity=medium&amp;id=6941174d594e45819d70c405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64249-missing-authorization-in-wp-experts-e0069cfd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64249%3A%20Missing%20Authorization%20in%20WP-EXPERTS.IN%20Protect%20WP%20Admin&amp;severity=medium&amp;id=6941174d594e45819d70c402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64248-missing-authorization-in-emarket-de-397e329e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64248%3A%20Missing%20Authorization%20in%20emarket-design%20Request%20a%20Quote&amp;severity=medium&amp;id=6941174d594e45819d70c3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64247-missing-authorization-in-edmonparke-15689752</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64247%3A%20Missing%20Authorization%20in%20edmon.parker%20Read%20More%20%26%20Accordion&amp;severity=medium&amp;id=6941174d594e45819d70c3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64246-missing-authorization-in-netopsae-a-12e0626d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64246%3A%20Missing%20Authorization%20in%20netopsae%20Accessibility%20by%20AudioEye&amp;severity=medium&amp;id=6941174d594e45819d70c3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64245-missing-authorization-in-ryanpcmcqu-e0320036</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64245%3A%20Missing%20Authorization%20in%20ryanpcmcquen%20Import%20external%20attachments&amp;severity=medium&amp;id=6941174d594e45819d70c3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64244-missing-authorization-in-codexpert--f5da3b19</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64244%3A%20Missing%20Authorization%20in%20Codexpert%2C%20Inc%20Restrict%20Elementor%20Widgets%2C%20Columns%20and%20Sections&amp;severity=medium&amp;id=6941174d594e45819d70c3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64243-missing-authorization-in-e-plugins--4ef6d695</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64243%3A%20Missing%20Authorization%20in%20e-plugins%20Directory%20Pro&amp;severity=medium&amp;id=6941174d594e45819d70c3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64242-missing-authorization-in-merv-barre-46bb16f5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64242%3A%20Missing%20Authorization%20in%20Merv%20Barrett%20Easy%20Property%20Listings&amp;severity=medium&amp;id=6941174d594e45819d70c3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64241-missing-authorization-in-imtiaz-ray-be5648b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64241%3A%20Missing%20Authorization%20in%20Imtiaz%20Rayhan%20WP%20Coupons%20and%20Deals&amp;severity=medium&amp;id=6941174d594e45819d70c3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64239-cross-site-request-forgery-csrf-in--3d465108</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64239%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yoav%20Farhi%20RTL%20Tester&amp;severity=medium&amp;id=6941174b594e45819d70bb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64238-missing-authorization-in-nicolaskul-d988c882</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64238%3A%20Missing%20Authorization%20in%20NicolasKulka%20WPS%20Bidouille&amp;severity=medium&amp;id=6941174b594e45819d70bb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64237-cross-site-request-forgery-csrf-in--67abc086</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64237%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Graham%20Quick%20Interest%20Slider&amp;severity=medium&amp;id=6941174b594e45819d70bb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59009-cross-site-request-forgery-csrf-in--0b7ef99e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59009%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Astoundify%20Listify&amp;severity=medium&amp;id=6941174b594e45819d70bb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59001-missing-authorization-in-themenecta-45e0f75d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59001%3A%20Missing%20Authorization%20in%20ThemeNectar%20Salient%20Core&amp;severity=medium&amp;id=6941174b594e45819d70bb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58999-cross-site-request-forgery-csrf-in--e3fae455</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58999%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20loopus%20WP%20Attractive%20Donations%20System%20-%20Easy%20Stripe%20%26%20Paypal%20donations&amp;severity=medium&amp;id=6941174b594e45819d70bb16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54045-missing-authorization-in-creativemi-3640d361</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54045%3A%20Missing%20Authorization%20in%20CreativeMindsSolutions%20CM%20On%20Demand%20Search%20And%20Replace&amp;severity=medium&amp;id=6941174b594e45819d70bb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54005-missing-authorization-in-sonalsinha-eef15f90</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54005%3A%20Missing%20Authorization%20in%20sonalsinha21%20SKT%20Page%20Builder&amp;severity=medium&amp;id=6941174b594e45819d70bb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54004-missing-authorization-in-wc-lovers--9f665bc4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54004%3A%20Missing%20Authorization%20in%20WC%20Lovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce&amp;severity=low&amp;id=6941174b594e45819d70bb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49300-insertion-of-sensitive-information--4e57656b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49300%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20shinetheme%20Traveler%20Option%20Tree&amp;severity=low&amp;id=6941174b594e45819d70bb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autonomous-appsec-via-chrome-devtools-mcp-600-min--5d3be28a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Autonomous%20AppSec%20via%20Chrome%20DevTools%20(MCP)%3A%20600%20min%20%E2%86%92%203.5%20min%20on%20OWASP%20Juice%20Shop&amp;severity=medium&amp;id=6941175d594e45819d70df7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11991-cwe-862-missing-authorization-in-je-7ec62977</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11991%3A%20CWE-862%20Missing%20Authorization%20in%20jetmonsters%20JetFormBuilder%20%E2%80%94%20Dynamic%20Blocks%20Form%20Builder&amp;severity=medium&amp;id=69410b259bfd1ab9ba9ec080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13439-cwe-200-exposure-of-sensitive-infor-d8447c75</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13439%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=medium&amp;id=69410b259bfd1ab9ba9ec084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66635-stack-based-buffer-overflow-in-seik-b3221617</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66635%3A%20Stack-based%20buffer%20overflow%20in%20SEIKO%20EPSON%20CORPORATION%20Web%20Config&amp;severity=high&amp;id=6941063f15f8de78ec7f942a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62330-cwe-319-cleartext-transmission-of-s-b362ac9f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62330%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20HCL%20Software%20DevOps%20Deploy&amp;severity=medium&amp;id=6940feba15f8de78ec72ee2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-to-shut-down-dark-web-monitoring-tool-in-fe-1841de7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20to%20Shut%20Down%20Dark%20Web%20Monitoring%20Tool%20in%20February%202026&amp;severity=medium&amp;id=6941068815f8de78ec7fc211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12809-cwe-862-missing-authorization-in-we-445ee50e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12809%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20Dokan%20Pro&amp;severity=medium&amp;id=6940f308a4f72ecfca032936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13794-cwe-862-missing-authorization-in-th-33143b06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13794%3A%20CWE-862%20Missing%20Authorization%20in%20themeisle%20Auto%20Featured%20Image%20(Auto%20Post%20Thumbnail)&amp;severity=medium&amp;id=6940f308a4f72ecfca03293a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14252-vulnerability-in-advantech-susi-cdc40913</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14252%3A%20Vulnerability%20in%20Advantech%20SUSI&amp;severity=high&amp;id=6940ef85a4f72ecfcafdd982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14777-authentication-bypass-by-alternate--765a6a72</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14777%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=6940ec04a4f72ecfcafbad2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66357-improper-check-for-unusual-or-excep-dd525d25</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66357%3A%20Improper%20check%20for%20unusual%20or%20exceptional%20conditions%20in%20Inaba%20Denki%20Sangyo%20Co.%2C%20Ltd.%20CHOCO%20TEI%20WATCHER%20mini%20(IB-MCT001)&amp;severity=medium&amp;id=6940e76154c229a9f5d8d5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59479-improper-restriction-of-rendered-ui-5231958d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59479%3A%20Improper%20restriction%20of%20rendered%20UI%20layers%20or%20frames%20in%20Inaba%20Denki%20Sangyo%20Co.%2C%20Ltd.%20CHOCO%20TEI%20WATCHER%20mini%20(IB-MCT001)&amp;severity=medium&amp;id=6940e76154c229a9f5d8d5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61976-improper-check-for-unusual-or-excep-3cc7b8f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61976%3A%20Improper%20check%20for%20unusual%20or%20exceptional%20conditions%20in%20Inaba%20Denki%20Sangyo%20Co.%2C%20Ltd.%20CHOCO%20TEI%20WATCHER%20mini%20(IB-MCT001)&amp;severity=high&amp;id=6940e76154c229a9f5d8d5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13956-cwe-862-missing-authorization-in-th-cbf34457</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13956%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=6940e3e754c229a9f5d4c70f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14749-improper-access-controls-in-ningyua-bb8b7fba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14749%3A%20Improper%20Access%20Controls%20in%20Ningyuanda%20TC155&amp;severity=medium&amp;id=6940cec5d9bcdf3f3d1f60d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14748-improper-access-controls-in-ningyua-f6ae90c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14748%3A%20Improper%20Access%20Controls%20in%20Ningyuanda%20TC155&amp;severity=medium&amp;id=6940cec5d9bcdf3f3d1f60d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59385-cwe-290-in-qnap-systems-inc-qts-976483fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59385%3A%20CWE-290%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=6940c7c9d9bcdf3f3d1a9816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62847-cwe-88-in-qnap-systems-inc-qts-9cc1e515</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62847%3A%20CWE-88%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6940c7c9d9bcdf3f3d1a981a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62848-cwe-476-in-qnap-systems-inc-qts-26997ee9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62848%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=6940c7c9d9bcdf3f3d1a981d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62849-cwe-89-in-qnap-systems-inc-qts-e243fee5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62849%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6940c7c9d9bcdf3f3d1a9820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14747-denial-of-service-in-ningyuanda-tc1-7c16042f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14747%3A%20Denial%20of%20Service%20in%20Ningyuanda%20TC155&amp;severity=medium&amp;id=6940c7c9d9bcdf3f3d1a9810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14746-improper-authentication-in-ningyuan-1fd9c740</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14746%3A%20Improper%20Authentication%20in%20Ningyuanda%20TC155&amp;severity=medium&amp;id=6940c7c9d9bcdf3f3d1a980a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autonomous-code-analyzer-beats-all-human-teams-at--1c48a073</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Autonomous%20code%20analyzer%20beats%20all%20human%20teams%20at%20OSS%20zero-day%20competition&amp;severity=critical&amp;id=6940af32d9bcdf3f3d14f703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68115-cwe-79-improper-neutralization-of-i-91559319</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68115%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=6940b2a5d9bcdf3f3d15a315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68113-cwe-115-misinterpretation-of-input--2c2eb7f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68113%3A%20CWE-115%3A%20Misinterpretation%20of%20Input%20in%20altcha-org%20altcha-lib&amp;severity=medium&amp;id=6940b2a5d9bcdf3f3d15a308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67751-cwe-89-improper-neutralization-of-s-2b97b28f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67751%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=6940b2a5d9bcdf3f3d15a2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67874-cwe-204-observable-response-discrep-cfea1afd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67874%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=6940b2a5d9bcdf3f3d15a302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67744-cwe-94-improper-control-of-generati-e699b3d7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67744%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=6940b2a5d9bcdf3f3d15a2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67748-cwe-184-incomplete-list-of-disallow-1dc75921</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67748%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6940abb2d9bcdf3f3d14315e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14758-cwe-1188-initialization-of-a-resour-9ca98302</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14758%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20ALASCA%20YAOOK&amp;severity=medium&amp;id=6940abb2d9bcdf3f3d143140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67747-cwe-184-incomplete-list-of-disallow-5eb97c09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67747%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6940abb2d9bcdf3f3d143158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67736-cwe-89-improper-neutralization-of-s-4283d66c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67736%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20tts&amp;severity=high&amp;id=6940abb2d9bcdf3f3d143154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67722-cwe-426-untrusted-search-path-in-fr-6d28d12e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67722%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20FreePBX%20framework&amp;severity=medium&amp;id=6940abb2d9bcdf3f3d143150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66449-cwe-22-improper-limitation-of-a-pat-b798008f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66449%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20C4illin%20ConvertX&amp;severity=high&amp;id=6940abb2d9bcdf3f3d143143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67715-cwe-284-improper-access-control-in--771eb11e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67715%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=6940abb2d9bcdf3f3d14314c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67492-cwe-1286-improper-validation-of-syn-b7f84d26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67492%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=6940abb2d9bcdf3f3d143148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-16-3c6b020b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-16&amp;severity=medium&amp;id=6941f612d2cd6f6c37b6aef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65834-na-00e2b8df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65834%3A%20n%2Fa&amp;severity=critical&amp;id=6941bc63535cdcbc0ad63cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65589-na-057d12ed</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65589%3A%20n%2Fa&amp;severity=medium&amp;id=6941ae5c0d5f6f4391b0c3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65581-na-3b8c31da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65581%3A%20n%2Fa&amp;severity=medium&amp;id=6941ae5b0d5f6f4391b0c3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52196-na-f0e6466e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52196%3A%20n%2Fa&amp;severity=high&amp;id=6941ae5b0d5f6f4391b0c3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65593-na-486a36aa</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65593%3A%20n%2Fa&amp;severity=high&amp;id=6941ae5b0d5f6f4391b0c390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65592-na-4856c6da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65592%3A%20n%2Fa&amp;severity=medium&amp;id=6941a4041a61eff6269a933e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65591-na-faa69fe0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65591%3A%20n%2Fa&amp;severity=medium&amp;id=6941a4041a61eff6269a933a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65590-na-3683ac85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65590%3A%20n%2Fa&amp;severity=medium&amp;id=6941a4041a61eff6269a9336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62862-na-9f706d9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62862%3A%20n%2Fa&amp;severity=medium&amp;id=694194749050fe8508060890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62864-na-91fd75e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62864%3A%20n%2Fa&amp;severity=critical&amp;id=694194749050fe850806087e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62863-na-4905d9e0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62863%3A%20n%2Fa&amp;severity=critical&amp;id=694194749050fe850806087a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50401-na-29c7c5f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50401%3A%20n%2Fa&amp;severity=critical&amp;id=694190eb9050fe8508040787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50398-na-8481b724</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50398%3A%20n%2Fa&amp;severity=critical&amp;id=694190eb9050fe8508040784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29231-na-f12e61c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29231%3A%20n%2Fa&amp;severity=medium&amp;id=69418d769050fe8508ffb2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63414-na-f12b194c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63414%3A%20n%2Fa&amp;severity=critical&amp;id=69418ba93e7fd18214c3d71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65427-na-74e6ad8f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65427%3A%20n%2Fa&amp;severity=medium&amp;id=694188253e7fd18214bf80c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65319-na-f7e35328</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65319%3A%20n%2Fa&amp;severity=critical&amp;id=694184a13e7fd18214ba0e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65318-na-e986605a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65318%3A%20n%2Fa&amp;severity=critical&amp;id=694184a13e7fd18214ba0e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64012-na-0ff9f27b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64012%3A%20n%2Fa&amp;severity=medium&amp;id=694178b209f61faec590733b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/esm-dev-136-path-traversal-7009fd5a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=esm-dev%20136%20-%20Path%20Traversal&amp;severity=medium&amp;id=6941062315f8de78ec7f738b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/summar-employee-portal-3980-authenticated-sql-inje-1a5894c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Summar%20Employee%20Portal%20%203.98.0%20-%20Authenticated%20SQL%20Injection&amp;severity=medium&amp;id=6941062315f8de78ec7f7386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10900-cwe-787-out-of-bounds-write-in-auto-0f23ab01</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10900%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=6940a116d9bcdf3f3d0ad539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10899-cwe-787-out-of-bounds-write-in-auto-b3f70d7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10899%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=6940a116d9bcdf3f3d0ad535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10898-cwe-787-out-of-bounds-write-in-auto-1220e63c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10898%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=6940a116d9bcdf3f3d0ad531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pornhub-extorted-after-hackers-steal-premium-membe-35c054a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PornHub%20extorted%20after%20hackers%20steal%20Premium%20member%20activity%20data&amp;severity=high&amp;id=69409d8ad9bcdf3f3d09c512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10889-cwe-120-buffer-copy-without-checkin-aadcd24c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10889%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=6940a116d9bcdf3f3d0ad52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10888-cwe-787-out-of-bounds-write-in-auto-a477ebcd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10888%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10887-cwe-120-buffer-copy-without-checkin-eb07023e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10887%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10886-cwe-120-buffer-copy-without-checkin-1ecf1926</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10886%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10884-cwe-787-out-of-bounds-write-in-auto-e66a526d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10884%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10883-cwe-125-out-of-bounds-read-in-autod-d51543c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10883%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10882-cwe-787-out-of-bounds-write-in-auto-08fa27e3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10882%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10881-cwe-122-heap-based-buffer-overflow--c1e428e6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10881%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9460-cwe-125-out-of-bounds-read-in-autode-98e778e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9460%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9459-cwe-125-out-of-bounds-read-in-autode-a4610cfd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9459%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9457-cwe-120-buffer-copy-without-checking-a078e733</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9457%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9456-cwe-120-buffer-copy-without-checking-96381e35</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9456%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66407-cwe-352-cross-site-request-forgery--bfb6621f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66407%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69409d9cd9bcdf3f3d09c710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9455-cwe-125-out-of-bounds-read-in-autode-66f2c235</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9455%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9454-cwe-125-out-of-bounds-read-in-autode-58273f8a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9454%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9453-cwe-125-out-of-bounds-read-in-autode-1cbab4b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9453%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9452-cwe-120-buffer-copy-without-checking-403f5cb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9452%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14731-improper-neutralization-of-special--8752e394</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14731%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20CTCMS%20Content%20Management%20System&amp;severity=medium&amp;id=69409d9ed9bcdf3f3d09c741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14593-cwe-125-out-of-bounds-read-in-autod-fa228c31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14593%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66482-cwe-307-improper-restriction-of-exc-9f26c8c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66482%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20misskey-dev%20misskey&amp;severity=medium&amp;id=69409a3bd9bcdf3f3d093948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66402-cwe-862-missing-authorization-in-mi-47451996</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66402%3A%20CWE-862%3A%20Missing%20Authorization%20in%20misskey-dev%20misskey&amp;severity=high&amp;id=6940db0754c229a9f5cc423e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14730-code-injection-in-ctcms-content-man-25b007c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14730%3A%20Code%20Injection%20in%20CTCMS%20Content%20Management%20System&amp;severity=medium&amp;id=69409685d9bcdf3f3d08b5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14729-code-injection-in-ctcms-content-man-ad7fee5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14729%3A%20Code%20Injection%20in%20CTCMS%20Content%20Management%20System&amp;severity=medium&amp;id=69409685d9bcdf3f3d08b5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64338-2856e089</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64338%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=690d7e3a3ea13e495ec6402c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9121-cwe-502-deserialization-of-untrusted-8844fc9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9121%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hitachi%20Vantara%20Pentaho%20Data%20Integration%20and%20Analytics&amp;severity=high&amp;id=69409306d9bcdf3f3d07fefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9122-cwe-209-generation-of-error-message--93abb040</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9122%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Hitachi%20Vantara%20Pentaho%20Data%20Integration%20and%20Analytics&amp;severity=medium&amp;id=69409306d9bcdf3f3d07feff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/featured-chrome-browser-extension-caught-intercept-08650a51</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Featured%20Chrome%20Browser%20Extension%20Caught%20Intercepting%20Millions%20of%20Users&apos;%20AI%20Chats&amp;severity=high&amp;id=694084f1d9bcdf3f3d0519a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defending-against-the-cve-2025-55182-react2shell-v-2ba359a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Defending%20against%20the%20CVE-2025-55182%20(React2Shell)%20vulnerability%20in%20React%20Server%20Components&amp;severity=medium&amp;id=694121d1594e45819d7c8716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/makop-ransomware-guloader-and-privilege-escalation-dd31bfb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Makop%20ransomware%3A%20GuLoader%20and%20privilege%20escalation%20in%20attacks%20against%20Indian%20businesses&amp;severity=medium&amp;id=69407a67d9bcdf3f3d02bafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-discover-and-secure-ownerless-corporate-it--580d01a2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20discover%20and%20secure%20ownerless%20corporate%20IT%20assets&amp;severity=medium&amp;id=6940736ed9bcdf3f3d00c64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53879-stack-based-buffer-overflow-in-neon-8bd783f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53879%3A%20Stack-based%20Buffer%20Overflow%20in%20neonguvenlik%20NVClient&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14722-cross-site-scripting-in-vion707-dma-24aeaf84</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14722%3A%20Cross%20Site%20Scripting%20in%20vion707%20DMadmin&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53893-server-side-request-forgery-ssrf-in-b776626d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53893%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ateme%20TITAN&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53892-unrestricted-upload-of-file-with-da-0ac5cfc6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53892%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blackcat-cms%20Blackcat%20CMS&amp;severity=high&amp;id=69407362d9bcdf3f3d00c437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53891-improper-neutralization-of-input-du-fe4191a5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blackcat-cms%20Blackcat%20CMS&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53886-stack-based-buffer-overflow-in-xlig-cd288835</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53886%3A%20Stack-based%20Buffer%20Overflow%20in%20Xlightftpd%20Xlight%20FTP%20Server&amp;severity=medium&amp;id=69407361d9bcdf3f3d00c42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53884-improper-neutralization-of-input-du-8c695424</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webedition%20Webedition%20CMS&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53883-improper-control-of-generation-of-c-7c105846</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53883%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Webedition%20Webedition%20CMS&amp;severity=high&amp;id=69407360d9bcdf3f3d00c3e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53882-improper-neutralization-of-input-du-ef822bfa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jlexart%20JLex%20GuestBook&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53881-cleartext-transmission-of-sensitive-a67e9315</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53881%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Ruijie%20ReyeeOS&amp;severity=critical&amp;id=69407360d9bcdf3f3d00c3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53878-inconsistent-interpretation-of-http-8a2502f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53878%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Phpjabbers%20Member%20Login%20Script&amp;severity=high&amp;id=69407360d9bcdf3f3d00c3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53877-improper-neutralization-of-special--9cb2dff2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53877%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Phpjabbers%20Bus%20Reservation%20System&amp;severity=critical&amp;id=69407360d9bcdf3f3d00c3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53876-unrestricted-upload-of-file-with-da-ca3dfcfc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53876%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Creativeitem%20Academy%20LMS&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53875-cleartext-transmission-of-sensitive-4affd249</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53875%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Gomlab%20GOM%20Player&amp;severity=high&amp;id=69407360d9bcdf3f3d00c3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53874-buffer-copy-without-checking-size-o-266a59c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53874%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Gomlab%20GOM%20Player&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53868-unrestricted-upload-of-file-with-da-d8d59762</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53868%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Coppermine%20coppermine-gallery&amp;severity=high&amp;id=69406fd9d9bcdf3f3d0056a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64725-cwe-286-incorrect-user-management-i-649a9abe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64725%3A%20CWE-286%3A%20Incorrect%20User%20Management%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=69406fd9d9bcdf3f3d0056ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13489-cwe-319-cleartext-transmission-of-s-061fede2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13489%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20UCD%20-%20IBM%20DevOps%20Deploy&amp;severity=medium&amp;id=694068d4d9bcdf3f3dfeb53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14503-cwe-266-incorrect-privilege-assignm-951716a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14503%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20AWS%20Harmonix%20on%20AWS&amp;severity=high&amp;id=694068d4d9bcdf3f3dfeb539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14148-cwe-522-insufficiently-protected-cr-1bb94094</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14148%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20UCD%20-%20IBM%20DevOps%20Deploy&amp;severity=medium&amp;id=694068d4d9bcdf3f3dfeb545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12035-integer-overflow-or-wraparound-in-z-93bfce85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12035%3A%20Integer%20Overflow%20or%20Wraparound%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36360-cwe-613-insufficient-session-expira-5a6f2530</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36360%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20UCD%20-%20IBM%20UrbanCode%20Deploy&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14038-cwe-862-missing-authorization-in-en-fc7c4832</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14038%3A%20CWE-862%20Missing%20Authorization%20in%20EnterpriseDB%20Hybrid%20Manager%20-%20LTS&amp;severity=high&amp;id=69405034d9bcdf3f3df776ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/featured-chrome-browser-extension-caught-intercept-c07f5bad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Featured%20Chrome%20Browser%20Extension%20Caught%20Intercepting%20Millions%20of%20Users&apos;%20AI%20Chats&amp;severity=medium&amp;id=6941068815f8de78ec7fc214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-links-more-chinese-hacking-groups-to-react2-b12ff58f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20links%20more%20Chinese%20hacking%20groups%20to%20React2Shell%20attacks&amp;severity=high&amp;id=69404cb0d9bcdf3f3df63af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freepbx-patches-critical-sqli-file-upload-and-auth-2fb17efb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FreePBX%20Patches%20Critical%20SQLi%2C%20File-Upload%2C%20and%20AUTHTYPE%20Bypass%20Flaws%20Enabling%20RCE&amp;severity=critical&amp;id=69404cb0d9bcdf3f3df63aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/700credit-data-breach-impacts-58-million-vehicle-d-43fd0225</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=700Credit%20data%20breach%20impacts%205.8%20million%20vehicle%20dealership%20customers&amp;severity=high&amp;id=69404927d9bcdf3f3df49985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/militant-groups-are-experimenting-with-ai-and-the--88181817</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Militant%20Groups%20Are%20Experimenting%20With%20AI%2C%20and%20the%20Risks%20Are%20Expected%20to%20Grow&amp;severity=medium&amp;id=6940459fd9bcdf3f3df2aa9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11393-unintended-proxy-or-intermediary-co-620255c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11393%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20Red%20Hat%20Red%20Hat%20Lightspeed%20(formerly%20Insights)%20for%20Runtimes%201&amp;severity=high&amp;id=69404222d9bcdf3f3df0a13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-fragile-lock-novel-bypasses-for-saml-authentic-6519dcb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Fragile%20Lock%3A%20Novel%20Bypasses%20For%20SAML%20Authentication&amp;severity=medium&amp;id=69403093d9bcdf3f3de86a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13888-incorrect-privilege-assignment-in-r-34919c9f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13888%3A%20Incorrect%20Privilege%20Assignment%20in%20redhat-developer%20gitops-operator&amp;severity=critical&amp;id=69402d09d9bcdf3f3de5a0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14387-cwe-79-improper-neutralization-of-i-8d8eea0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69402d09d9bcdf3f3de5a0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13824-cwe-763-release-of-invalid-pointer--c8fe8d72</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13824%3A%20CWE-763%3A%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Rockwell%20Automation%20Micro820%C2%AE%2C%20Micro850%C2%AE%2C%20%20Micro870%C2%AE&amp;severity=high&amp;id=69402985d9bcdf3f3de49055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13823-cwe-1395-dependency-on-vulnerable-t-e3b87deb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13823%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Rockwell%20Automation%20Micro820%C2%AE%2C%20Micro850%C2%AE%2C%20%20Micro870%C2%AE&amp;severity=high&amp;id=69402985d9bcdf3f3de49052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34412-cwe-693-protection-mechanism-failur-ec5556ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34412&amp;severity=medium&amp;id=6940227fd9bcdf3f3de2753d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34411-cwe-862-missing-authorization-in-eq-39897481</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34411&amp;severity=high&amp;id=6940227fd9bcdf3f3de27537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34181-cwe-22-improper-limitation-of-a-pat-86c1f77a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34181%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NetSupport%20Software%20Manager&amp;severity=high&amp;id=6940227fd9bcdf3f3de27533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34180-cwe-257-storing-passwords-in-a-reco-8310c550</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34180%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20NetSupport%20Software%20Manager&amp;severity=high&amp;id=6940227fd9bcdf3f3de2752f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34179-cwe-89-improper-neutralization-of-s-aea9afd2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34179%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NetSupport%20Software%20Manager&amp;severity=high&amp;id=6940227fd9bcdf3f3de2752b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14156-cwe-20-improper-input-validation-in-c485fe9f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14156%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ays-pro%20Fox%20LMS%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=critical&amp;id=69401ef9d9bcdf3f3de12798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13950-cwe-862-missing-authorization-in-on-85c14803</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13950%3A%20CWE-862%20Missing%20Authorization%20in%20onesignal%20OneSignal%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de12790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13728-cwe-79-improper-neutralization-of-i-ec83f04d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13728%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20FluentAuth%20%E2%80%93%20The%20Ultimate%20Authorization%20%26%20Security%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de1278c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14383-cwe-89-improper-neutralization-of-s-ac94675e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14383%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=high&amp;id=69401ef9d9bcdf3f3de1279c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12900-cwe-862-missing-authorization-in-ni-108bcb0b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12900%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20FileBird%20%E2%80%93%20WordPress%20Media%20Library%20Folders%20%26%20File%20Manager&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de1277a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13610-cwe-79-improper-neutralization-of-i-a361d5ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13610%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de12788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14003-cwe-862-missing-authorization-in-wp-70ed37ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14003%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Modula%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de12794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13367-cwe-79-improper-neutralization-of-i-e471635d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de1277e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13608-cwe-79-improper-neutralization-of-i-0695e3c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20caterhamcomputing%20CC%20Child%20Pages&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de12784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sees-5-chinese-groups-exploiting-react2shel-775d2d47</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Sees%205%20Chinese%20Groups%20Exploiting%20React2Shell%20for%20Malware%20Delivery&amp;severity=medium&amp;id=6940146ad9bcdf3f3dddfa16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/16tb-of-mongodb-database-exposes-43-billion-lead-g-ce6f65ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=16TB%20of%20MongoDB%20Database%20Exposes%204.3%20Billion%20Lead%20Gen%20Records&amp;severity=medium&amp;id=694010e7d9bcdf3f3ddd33d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/more-react2shell-exploits-cve-2025-55182-mon-dec-1-e2ae8110</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=More%20React2Shell%20Exploits%20CVE-2025-55182%2C%20(Mon%2C%20Dec%2015th)&amp;severity=medium&amp;id=69400d5fd9bcdf3f3ddc5ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/15th-december-threat-intelligence-report-a6fd60cc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=15th%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=694009e2d9bcdf3f3ddb9e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frogblight-banking-trojan-targets-android-users-in-28fb5a82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frogblight%20banking%20Trojan%20targets%20Android%20users%20in%20Turkey&amp;severity=medium&amp;id=69404937d9bcdf3f3df4a5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hamas-linked-hackers-using-ashtag-malware-against--60dd9bd5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hamas%20Linked%20Hackers%20Using%20AshTag%20Malware%20Against%20Diplomatic%20Offices&amp;severity=medium&amp;id=6940065cd9bcdf3f3ddab940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-apple-0-days-winrar-exploit-lastpass--18ea88b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Apple%200-Days%2C%20WinRAR%20Exploit%2C%20LastPass%20Fines%2C%20.NET%20RCE%2C%20OAuth%20Scams%20%26%20More&amp;severity=critical&amp;id=6941068815f8de78ec7fc21a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nextjs-59k-servers-compromised-in-48h-i-breached-t-7082090a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Next.js%3A%2059k%20servers%20compromised%20in%2048h%20-%20I%20breached%20the%20attackers&apos;%20C2%20and%20here&apos;s%20what%20I%20found&amp;severity=medium&amp;id=693ffbd1d9bcdf3f3dd7fb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-browser-extension-risk-guide-after-the-shadypand-11eea072</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Browser%20Extension%20Risk%20Guide%20After%20the%20ShadyPanda%20Campaign&amp;severity=medium&amp;id=6941068815f8de78ec7fc21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66388-cwe-201-insertion-of-sensitive-info-baac17da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66388%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=693ff4c7d9bcdf3f3dd5a059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-ceo-steps-down-after-data-breach-hits-337--c2fc7f86</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20CEO%20Steps%20Down%20After%20Data%20Breach%20Hits%2033.7%20Million%20Users&amp;severity=high&amp;id=693ff143d9bcdf3f3dd4f67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cert-fr-recommends-completely-deactivate-wi-fi-whe-0eecae5a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CERT-FR%20recommends%20completely%20deactivate%20Wi-Fi%20whenever%20it%E2%80%99s%20not%20in%20use&amp;severity=medium&amp;id=693ff143d9bcdf3f3dd4f67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11670-cwe-200-exposure-of-sensitive-infor-57e69760</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11670%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Zohocorp%20ManageEngine%20ADManager%20Plus&amp;severity=medium&amp;id=693fedd0d9bcdf3f3dd41433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atlassian-patches-critical-apache-tika-flaw-47955dff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atlassian%20Patches%20Critical%20Apache%20Tika%20Flaw&amp;severity=critical&amp;id=693fedbcd9bcdf3f3dd41015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37731-cwe-287-improper-authentication-in--c4df8dd0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37731%3A%20CWE-287%20Improper%20Authentication%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=693fea3cd9bcdf3f3dd304fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/third-draftkings-hacker-pleads-guilty-c799614c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Third%20DraftKings%20Hacker%20Pleads%20Guilty&amp;severity=medium&amp;id=693fe6b3d9bcdf3f3dce5191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14714-cwe-288-authentication-bypass-using-cd727fa5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14714%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20The%20Document%20Foundation%20LibreOffice&amp;severity=low&amp;id=693fea3cd9bcdf3f3dd304f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/volklocker-ransomware-exposed-by-hard-coded-master-6c991677</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VolkLocker%20Ransomware%20Exposed%20by%20Hard-Coded%20Master%20Key%20Allowing%20Free%20Decryption&amp;severity=high&amp;id=693fe331d9bcdf3f3dcd632a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37732-cwe-79-improper-neutralization-of-i-33a3e897</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=693fe6dbd9bcdf3f3dce5d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantom-stealer-spread-by-iso-phishing-emails-hitt-db941019</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phantom%20Stealer%20Spread%20by%20ISO%20Phishing%20Emails%20Hitting%20Russian%20Finance%20Sector&amp;severity=medium&amp;id=6941068815f8de78ec7fc220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/700credit-data-breach-impacts-58-million-individua-db8ea5b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=700Credit%20Data%20Breach%20Impacts%205.8%20Million%20Individuals&amp;severity=medium&amp;id=693fd51fd9bcdf3f3dc8a7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snakes-in-the-castle-inside-the-walls-of-python-dr-c0d471ae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Snakes%20in%20the%20Castle%3A%20Inside%20the%20Walls%20of%20Python-Driven%20CastleLoader%20Delivery&amp;severity=medium&amp;id=693fd19fd9bcdf3f3dc76eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-two-zero-days-tied-to-mysterious-exp-9383fbc3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Two%20Zero-Days%20Tied%20to%20Mysterious%20Exploited%20Chrome%20Flaw&amp;severity=medium&amp;id=693fce1ad9bcdf3f3dc61c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14711-sql-injection-in-fantasticlbp-hotel-df384f6a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14711%3A%20SQL%20Injection%20in%20FantasticLBP%20Hotels%20Server&amp;severity=medium&amp;id=693fc3c1d9bcdf3f3dc24d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14710-sql-injection-in-fantasticlbp-hotel-0343299c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14710%3A%20SQL%20Injection%20in%20FantasticLBP%20Hotels%20Server&amp;severity=medium&amp;id=693fbc87d9bcdf3f3dbffad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14709-buffer-overflow-in-shiguangwu-sgwbo-9e06ff4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14709%3A%20Buffer%20Overflow%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693fb590d9bcdf3f3dbe2eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14023-na-in-line-corporation-line-client--ff86cd7a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14023%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=low&amp;id=693fb1fed9bcdf3f3dbd0788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14022-na-in-line-corporation-line-client--dfe05da8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14022%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=high&amp;id=693fb1fed9bcdf3f3dbd0785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14021-na-in-line-corporation-line-client--29071296</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14021%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=medium&amp;id=693fb1fed9bcdf3f3dbd0782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14020-na-in-line-corporation-line-client--7769a125</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14020%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20Android&amp;severity=medium&amp;id=693fb1fed9bcdf3f3dbd077f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14019-na-in-line-corporation-line-client--3c6bbad5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14019%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20Android&amp;severity=low&amp;id=693fb1fed9bcdf3f3dbd077c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14708-buffer-overflow-in-shiguangwu-sgwbo-53f42704</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14708%3A%20Buffer%20Overflow%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693fae77d9bcdf3f3dbb3e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14707-command-injection-in-shiguangwu-sgw-931e2bae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14707%3A%20Command%20Injection%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693fa76fd9bcdf3f3db90012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13355-cwe-79-cross-site-scripting-xss-in--df9ac663</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13355%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20URL%20Shortify&amp;severity=high&amp;id=693fa76fd9bcdf3f3db9000f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12684-cwe-79-cross-site-scripting-xss-in--7093858e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12684%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20URL%20Shortify&amp;severity=high&amp;id=693fa76fd9bcdf3f3db9000b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11363-cwe-434-unrestricted-upload-of-file-af6f3d14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11363%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Royal%20Addons%20for%20Elementor&amp;severity=medium&amp;id=693fa76fd9bcdf3f3db90008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14712-cwe-497-exposure-of-sensitive-syste-cc121420</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14712%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20JHENG%20GAO%20Student%20Learning%20Assessment%20and%20Support%20System&amp;severity=high&amp;id=693fa079d9bcdf3f3db5fb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/volklocker-ransomware-exposed-by-hard-coded-master-dc2792a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VolkLocker%20Ransomware%20Exposed%20by%20Hard-Coded%20Master%20Key%20Allowing%20Free%20Decryption&amp;severity=low&amp;id=6941068815f8de78ec7fc223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14706-command-injection-in-shiguangwu-sgw-4786a150</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14706%3A%20Command%20Injection%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693fa079d9bcdf3f3db5fb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14705-command-injection-in-shiguangwu-sgw-5b1fe27c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14705%3A%20Command%20Injection%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693f9960d9bcdf3f3db32099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14704-path-traversal-in-shiguangwu-sgwbox-f43657a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14704%3A%20Path%20Traversal%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=medium&amp;id=693f95ffd9bcdf3f3db20cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14703-improper-authentication-in-shiguang-2b16c39b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14703%3A%20Improper%20Authentication%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=medium&amp;id=693f8b50d9bcdf3f3da77ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67907-706df7bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67907&amp;severity=null&amp;id=693f87d9d9bcdf3f3da2a96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14702-path-traversal-in-smartbit-commv-sm-e90913a8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14702%3A%20Path%20Traversal%20in%20Smartbit%20CommV%20Smartschool%20App&amp;severity=medium&amp;id=693f87d9d9bcdf3f3da2a967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13740-cwe-79-improper-neutralization-of-i-d404172e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13740%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20someguy9%20Lightweight%20Accordion&amp;severity=medium&amp;id=693f87d9d9bcdf3f3da2a963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14699-path-traversal-in-municorn-fax-app-7fc9a4fa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14699%3A%20Path%20Traversal%20in%20Municorn%20FAX%20App&amp;severity=medium&amp;id=693f7e6cb0f1e1d5304c6a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14698-path-traversal-in-atlaszz-ai-photo--7466cca7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14698%3A%20Path%20Traversal%20in%20atlaszz%20AI%20Photo%20Team%20Galleryit%20App&amp;severity=medium&amp;id=693f898ad9bcdf3f3da64752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14697-files-or-directories-accessible-in--f7a7303d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14697%3A%20Files%20or%20Directories%20Accessible%20in%20Shenzhen%20Sixun%20Software%20Sixun%20Shanghui%20Group%20Business%20Management%20System&amp;severity=medium&amp;id=693f898ad9bcdf3f3da6474b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14696-weak-password-recovery-in-shenzhen--53664c48</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14696%3A%20Weak%20Password%20Recovery%20in%20Shenzhen%20Sixun%20Software%20Sixun%20Shanghui%20Group%20Business%20Management%20System&amp;severity=medium&amp;id=693f6ccdb0f1e1d5304319ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14695-dynamically-managed-code-resources--d30fa4cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14695%3A%20Dynamically-Managed%20Code%20Resources%20in%20SamuNatsu%20HaloBot&amp;severity=medium&amp;id=693f6265b0f1e1d5303925e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14694-sql-injection-in-ketr-jepaas-5d7f7428</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14694%3A%20SQL%20Injection%20in%20ketr%20JEPaaS&amp;severity=medium&amp;id=693f5b33b0f1e1d53033ca22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14693-symlink-following-in-ugreen-dh2100-cbc10b10</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14693%3A%20Symlink%20Following%20in%20Ugreen%20DH2100%2B&amp;severity=high&amp;id=693f5b33b0f1e1d53033ca1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-15-5179208d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-15&amp;severity=medium&amp;id=6940a486d9bcdf3f3d0c54db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55895-na-027eb7e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55895%3A%20n%2Fa&amp;severity=critical&amp;id=694076f2d9bcdf3f3d023769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38913-na-9407046e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38913%3A%20n%2Fa&amp;severity=medium&amp;id=694076f2d9bcdf3f3d023765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36338-na-ec042ebb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36338%3A%20n%2Fa&amp;severity=medium&amp;id=694076f2d9bcdf3f3d023761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55703-na-77aee29e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55703%3A%20n%2Fa&amp;severity=low&amp;id=694068d4d9bcdf3f3dfeb541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67809-na-e0da105a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67809%3A%20n%2Fa&amp;severity=medium&amp;id=6940654ed9bcdf3f3dfde263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65213-na-4ff21a86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65213%3A%20n%2Fa&amp;severity=critical&amp;id=69405ac4d9bcdf3f3dfb23d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51962-na-ce7addc8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51962%3A%20n%2Fa&amp;severity=medium&amp;id=69405ac4d9bcdf3f3dfb23ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36337-na-f317b36b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36337%3A%20n%2Fa&amp;severity=medium&amp;id=69405ac4d9bcdf3f3dfb23c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65835-na-81efe64d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65835%3A%20n%2Fa&amp;severity=medium&amp;id=69405ac4d9bcdf3f3dfb23c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65176-na-fac74852</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65176%3A%20n%2Fa&amp;severity=high&amp;id=69405ac4d9bcdf3f3dfb23bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kunai-analysis-report-malware-sample-abusing-open--aba43cac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kunai%20Analysis%20Report%20-%20Malware%20Sample%20Abusing%20Open%20Recursive%20DNS%20for%20Exfiltration&amp;severity=medium&amp;id=69405ab7d9bcdf3f3dfb1be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66438-na-e5f56ca0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66438%3A%20n%2Fa&amp;severity=critical&amp;id=69404938d9bcdf3f3df4a610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66440-na-521cb8e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66440%3A%20n%2Fa&amp;severity=critical&amp;id=694045bfd9bcdf3f3df2bea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66439-na-1a777ee7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66439%3A%20n%2Fa&amp;severity=critical&amp;id=694045bfd9bcdf3f3df2be9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66437-na-5300a490</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66437%3A%20n%2Fa&amp;severity=high&amp;id=694045bfd9bcdf3f3df2be9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66436-na-589804a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66436%3A%20n%2Fa&amp;severity=medium&amp;id=694045bfd9bcdf3f3df2be97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55901-na-11eafa79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55901%3A%20n%2Fa&amp;severity=medium&amp;id=69404222d9bcdf3f3df0a143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55893-na-29151203</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55893%3A%20n%2Fa&amp;severity=medium&amp;id=69404222d9bcdf3f3df0a13e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66435-na-9669dd17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66435%3A%20n%2Fa&amp;severity=medium&amp;id=69403ea1d9bcdf3f3deea90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66434-na-34073bfb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66434%3A%20n%2Fa&amp;severity=high&amp;id=69403ea1d9bcdf3f3deea906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65742-na-dcdf4357</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65742%3A%20n%2Fa&amp;severity=high&amp;id=69403ea1d9bcdf3f3deea902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60786-na-b147fe3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60786%3A%20n%2Fa&amp;severity=high&amp;id=69403410d9bcdf3f3de9937e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44599-na-41f8cf07</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44599%3A%20n%2Fa&amp;severity=high&amp;id=69403410d9bcdf3f3de9937a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44598-na-6e5e7c3f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44598%3A%20n%2Fa&amp;severity=high&amp;id=69403410d9bcdf3f3de99376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66963-na-dea6632a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66963%3A%20n%2Fa&amp;severity=medium&amp;id=69403091d9bcdf3f3de86a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66843-na-99552eba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66843%3A%20n%2Fa&amp;severity=medium&amp;id=69403091d9bcdf3f3de86a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66844-na-3fcfcd51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66844%3A%20n%2Fa&amp;severity=critical&amp;id=69403091d9bcdf3f3de86a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65782-na-3ca73d4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65782%3A%20n%2Fa&amp;severity=medium&amp;id=694017f1d9bcdf3f3ddec59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65781-na-21d62d3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65781%3A%20n%2Fa&amp;severity=high&amp;id=694017f1d9bcdf3f3ddec595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65780-na-e3dbf689</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65780%3A%20n%2Fa&amp;severity=high&amp;id=694017f1d9bcdf3f3ddec58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65779-na-b5420b02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65779%3A%20n%2Fa&amp;severity=high&amp;id=694017f1d9bcdf3f3ddec589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65778-na-9af62770</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65778%3A%20n%2Fa&amp;severity=high&amp;id=694017f1d9bcdf3f3ddec583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65431-na-40b8f153</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65431%3A%20n%2Fa&amp;severity=medium&amp;id=694017f1d9bcdf3f3ddec580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65430-na-fa2935d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65430%3A%20n%2Fa&amp;severity=medium&amp;id=694017f1d9bcdf3f3ddec57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67901-cwe-1284-improper-validation-of-spe-52d7049e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67901%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20kristapsdz%20openrsync&amp;severity=medium&amp;id=693f50a7b0f1e1d5302d6805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14692-open-redirect-in-mayan-edms-1827b2b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14692%3A%20Open%20Redirect%20in%20Mayan%20EDMS&amp;severity=medium&amp;id=693f4d23b0f1e1d5302caa57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14691-cross-site-scripting-in-mayan-edms-f917a4a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14691%3A%20Cross%20Site%20Scripting%20in%20Mayan%20EDMS&amp;severity=medium&amp;id=693f461cb0f1e1d5302a462d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67900-cwe-829-inclusion-of-functionality--155a752c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67900%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20NXLog%20NXLog%20Agent&amp;severity=high&amp;id=693f42a8b0f1e1d53029ac6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67899-cwe-674-uncontrolled-recursion-in-u-26411a0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67899%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20uriparser%20project%20uriparser&amp;severity=low&amp;id=693f3b90b0f1e1d530275ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/capabilities-are-the-only-way-to-secure-agent-dele-18321400</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Capabilities%20Are%20the%20Only%20Way%20to%20Secure%20Agent%20Delegation&amp;severity=medium&amp;id=693f380eb0f1e1d530263cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beware-paypal-subscriptions-abused-to-send-fake-pu-fc28d827</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beware%3A%20PayPal%20subscriptions%20abused%20to%20send%20fake%20purchase%20emails&amp;severity=high&amp;id=693f2d7db0f1e1d5302341e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14674-injection-in-aizuda-snail-job-6d238b41</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14674%3A%20Injection%20in%20aizuda%20snail-job&amp;severity=medium&amp;id=693effcdb0f1e1d53011dae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14673-heap-based-buffer-overflow-in-gmg13-211600e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14673%3A%20Heap-based%20Buffer%20Overflow%20in%20gmg137%20snap7-rs&amp;severity=medium&amp;id=693ef8c5b0f1e1d5300e83c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14672-heap-based-buffer-overflow-in-gmg13-0335456d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14672%3A%20Heap-based%20Buffer%20Overflow%20in%20gmg137%20snap7-rs&amp;severity=medium&amp;id=693effcdb0f1e1d53011daec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14668-sql-injection-in-campcodes-advanced-136e252d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14668%3A%20SQL%20Injection%20in%20campcodes%20Advanced%20Online%20Examination%20System&amp;severity=medium&amp;id=693ee8f15a3f956d14b1f862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-462-released-sun-dec-14th-8d0ac67a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.6.2%20Released%2C%20(Sun%2C%20Dec%2014th)&amp;severity=medium&amp;id=693ee1e95a3f956d14aa014a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14667-sql-injection-in-itsourcecode-covid-234f0a01</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14667%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=693ee1f85a3f956d14aa0f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14666-sql-injection-in-itsourcecode-covid-02dbd20a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14666%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=693edcf93c5c518da22e3b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14665-stack-based-buffer-overflow-in-tend-27bfc3c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14665%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=693ed5ec3c5c518da224526c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14664-sql-injection-in-campcodes-supplier-d2ff4a37</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14664%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=693ecdcc5f8758ba47d4695a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14663-cross-site-scripting-in-code-projec-c2f0e7d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14663%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693ec6c15f8758ba47c9dbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14662-cross-site-scripting-in-code-projec-95dd2efe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14662%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693ebffd5f8758ba47c2e121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14661-sql-injection-in-itsourcecode-stude-b38cfc67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14661%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Managemen%20System&amp;severity=medium&amp;id=693ebaa4cd21bcc771e2fc31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14660-improper-access-controls-in-decocms-44e20bbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14660%3A%20Improper%20Access%20Controls%20in%20DecoCMS%20Mesh&amp;severity=medium&amp;id=693ebe20cd21bcc771e7ab9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-found-an-unsecured-16tb-database-containin-f1eb7b4b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20found%20an%20unsecured%2016TB%20database%20containing%204.3B%20professional%20records&amp;severity=high&amp;id=693ea79451e054acf32ab656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14659-command-injection-in-d-link-dir-860-f54db216</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14659%3A%20Command%20Injection%20in%20D-Link%20DIR-860LB1&amp;severity=high&amp;id=693eaea151e054acf3354728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14656-buffer-overflow-in-tenda-ac20-26c310a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14656%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=693e9ba865369625b09f1b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14655-stack-based-buffer-overflow-in-tend-e9864b69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14655%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=693e949f65369625b096c0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14654-stack-based-buffer-overflow-in-tend-a5f2ddfb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14654%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=693e9015f795bf52904ccd6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14653-sql-injection-in-itsourcecode-stude-b19caa17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14653%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693e84eaf795bf52903ec977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14652-sql-injection-in-itsourcecode-onlin-5ce71ab1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14652%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=693e7fbd6ded7774d2f4ad11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14651-use-of-hard-coded-cryptographic-key-b47d6645</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14651%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20MartialBE%20one-hub&amp;severity=medium&amp;id=693e78bf6ded7774d2ea03fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14650-sql-injection-in-itsourcecode-onlin-47026e3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14650%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=693e71bf6ded7774d2e18b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14649-sql-injection-in-itsourcecode-onlin-c9589dbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14649%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=693e69fde4d3911676ba2e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14648-command-injection-in-dedebiz-49cc483b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14648%3A%20Command%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=693e6316e4d3911676b3275d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14647-sql-injection-in-code-projects-comp-07a7d828</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14647%3A%20SQL%20Injection%20in%20code-projects%20Computer%20Book%20Store&amp;severity=medium&amp;id=693e5e61b7454206b45b08df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14646-sql-injection-in-code-projects-stud-24edb2dc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14646%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693e53edb7454206b44f10e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12696-cwe-862-missing-authorization-in-he-491a2493</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12696%3A%20CWE-862%20Missing%20Authorization%20in%20HelloLeads%20CRM%20Form%20Shortcode&amp;severity=medium&amp;id=693e53edb7454206b44f10df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14645-sql-injection-in-code-projects-stud-a4a92679</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14645%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693e4f9cc223240c4b621aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12537-cwe-79-improper-neutralization-of-i-e159bef2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpvibes%20Addon%20Elements%20for%20Elementor%20(formerly%20Elementor%20Addon%20Elements)&amp;severity=medium&amp;id=693e4c24c223240c4b5cf0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67897-cwe-195-signed-to-unsigned-conversi-9c7a013f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67897%3A%20CWE-195%20Signed%20to%20Unsigned%20Conversion%20Error%20in%20sequoia-pgp%20sequoia&amp;severity=medium&amp;id=693e40e9230e04755d15db8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13126-cwe-89-improper-neutralization-of-s-ffb42f94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13126%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=693e3d5a230e04755d107f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14644-sql-injection-in-itsourcecode-stude-37855f68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14644%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693e35e094fb796273326d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14643-sql-injection-in-code-projects-simp-df9097a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14643%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Attendance%20Record%20System&amp;severity=medium&amp;id=693e2ed894fb7962733072cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14642-unrestricted-upload-in-code-project-207e6f9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14642%3A%20Unrestricted%20Upload%20in%20code-projects%20Computer%20Laboratory%20System&amp;severity=medium&amp;id=693e27da94fb7962732e5068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14641-unrestricted-upload-in-code-project-0a55ce91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14641%3A%20Unrestricted%20Upload%20in%20code-projects%20Computer%20Laboratory%20System&amp;severity=medium&amp;id=693e27da94fb7962732e5061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14640-sql-injection-in-code-projects-stud-698edd21</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14640%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693e1d4594fb7962731e0cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/germany-calls-in-russian-ambassador-over-air-traff-33638060</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Germany%20calls%20in%20Russian%20Ambassador%20over%20air%20traffic%20control%20hack%20claims&amp;severity=medium&amp;id=693e136e94fb7962731203ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14639-sql-injection-in-itsourcecode-stude-7b68f121</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14639%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693e138194fb7962731227f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14638-sql-injection-in-itsourcecode-onlin-13472fa1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14638%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Pet%20Shop%20Management%20System&amp;severity=medium&amp;id=693e0bb194fb796273058a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-14-4d892203</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-14&amp;severity=medium&amp;id=693f5421b0f1e1d5302e7a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attacks-still-using-the-finger-sat-dec-13-a56ccd28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attacks%20Still%20Using%20the%20Finger%2C%20(Sat%2C%20Dec%2013th)&amp;severity=medium&amp;id=693dc1e296904561db586efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14637-sql-injection-in-itsourcecode-onlin-35753e1b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14637%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Pet%20Shop%20Management%20System&amp;severity=medium&amp;id=693dc1f196904561db587985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14636-use-of-weak-hash-in-tenda-ax9-53457b65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14636%3A%20Use%20of%20Weak%20Hash%20in%20Tenda%20AX9&amp;severity=medium&amp;id=693dbe2f5e445230437e2446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14623-sql-injection-in-code-projects-stud-02390b1b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14623%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693db0395e445230436e3a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14622-sql-injection-in-code-projects-stud-5647dab3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14622%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693db0395e445230436e3a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-actively-exploited-sierra-wireless-route-cd87c321</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Actively%20Exploited%20Sierra%20Wireless%20Router%20Flaw%20Enabling%20RCE%20Attacks&amp;severity=high&amp;id=693da3ef241bd09a9280dfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14621-sql-injection-in-code-projects-stud-5007c55f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14621%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693d9a7ada1dfeffd84e3e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14620-sql-injection-in-code-projects-stud-c7eb4f56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14620%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693d92a3da1dfeffd840fc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/offline-decryption-messenger-concept-proposal-and--2fe27b4b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Offline%20Decryption%20Messenger%3A%20Concept%20Proposal%20and%20Request%20for%20Constructive%20Feedback&amp;severity=medium&amp;id=693d8f20da1dfeffd83d88f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uks-ico-fine-lastpass-12-million-over-2022-securit-d610bc22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%E2%80%99s%20ICO%20Fine%20LastPass%20%C2%A31.2%20Million%20Over%202022%20Security%20Breach&amp;severity=high&amp;id=693d88810ce66cbce37cbabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14619-sql-injection-in-code-projects-stud-d42ce29c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14619%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693d88960ce66cbce37d0915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14617-path-traversal-in-jehovahs-witnesse-98452149</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14617%3A%20Path%20Traversal%20in%20Jehovahs%20Witnesses%20JW%20Library%20App&amp;severity=medium&amp;id=693d75402c268cf8855cb26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14607-memory-corruption-in-offis-dcmtk-8717237e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14607%3A%20Memory%20Corruption%20in%20OFFIS%20DCMTK&amp;severity=medium&amp;id=693d666c38f0070a6570c1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-actively-exploited-sierra-wireless-route-7362fe33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Actively%20Exploited%20Sierra%20Wireless%20Router%20Flaw%20Enabling%20RCE%20Attacks&amp;severity=high&amp;id=693d796a2c268cf8856201af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14606-deserialization-in-tiny-rdm-tiny-rd-78dae41c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14606%3A%20Deserialization%20in%20tiny-rdm%20Tiny%20RDM&amp;severity=low&amp;id=693d630838f0070a656ba6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14590-sql-injection-in-code-projects-pris-c1f2133c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14590%3A%20SQL%20Injection%20in%20code-projects%20Prison%20Management%20System&amp;severity=medium&amp;id=693d5cc238f0070a6566cb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14589-sql-injection-in-code-projects-pris-34679355</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14589%3A%20SQL%20Injection%20in%20code-projects%20Prison%20Management%20System&amp;severity=medium&amp;id=693d41eacfba580c44f20e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14588-sql-injection-in-itsourcecode-stude-c7295743</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14588%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693d3aaccf86d060b98c8baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14542-cwe-501-trust-boundary-violation-15837d61</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14542%3A%20CWE-501%20Trust%20Boundary%20Violation&amp;severity=high&amp;id=693d3aaccf86d060b98c8ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-issues-security-updates-after-two-webkit-fla-f7cb6e1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Issues%20Security%20Updates%20After%20Two%20WebKit%20Flaws%20Found%20Exploited%20in%20the%20Wild&amp;severity=high&amp;id=693d3a72cf86d060b98c5eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14587-sql-injection-in-itsourcecode-onlin-1551ef15</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14587%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Pet%20Shop%20Management%20System&amp;severity=medium&amp;id=693d36fbcf86d060b987576b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8780-cwe-79-improper-neutralization-of-in-7b0d5872</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8780%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20SiteOrigin%20Widgets&amp;severity=medium&amp;id=693d2749f35c2264d84723aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9856-cwe-79-improper-neutralization-of-in-ac2e0cce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9856%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20popupbuilder%20Popup%20Builder%20%E2%80%93%20Create%20highly%20converting%2C%20mobile%20friendly%20marketing%20popups.&amp;severity=medium&amp;id=693d2749f35c2264d84723b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8687-cwe-79-improper-neutralization-of-in-aa917f6f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8687%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelooks%20Enter%20Addons%20%E2%80%93%20Ultimate%20Template%20Builder%20for%20Elementor&amp;severity=medium&amp;id=693d2749f35c2264d84723a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8199-cwe-79-improper-neutralization-of-in-f220f592</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8199%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20debuggersstudio%20Marquee%20Addons%20for%20Elementor%20%E2%80%93%20Essential%20Motion%20Widgets%20%26%20Templates&amp;severity=medium&amp;id=693d2749f35c2264d84723a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8195-cwe-79-improper-neutralization-of-in-7dfbef45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8195%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20JetWidgets%20For%20Elementor&amp;severity=medium&amp;id=693d2747f35c2264d8472304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0969-cwe-359-exposure-of-private-personal-52597f6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0969%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=693d2747f35c2264d84722e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7960-cwe-79-improper-neutralization-of-in-3b2a27de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7960%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%2080%2B%20Elementor%20Widgets%2C%204%20000%2B%20Elementor%20Templates%2C%20WooCommerce%2C%20Mega%20Menu%2C%20Popup%20Builder&amp;severity=medium&amp;id=693d2747f35c2264d8472300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36747-cwe-798-use-of-hard-coded-credentia-55cb0be8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36747%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Growatt%20ShineLan-X&amp;severity=critical&amp;id=693d2747f35c2264d84722ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36752-cwe-798-use-of-hard-coded-credentia-6ed12f6d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36752%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Growatt%20ShineLan-X&amp;severity=critical&amp;id=693d2747f35c2264d84722f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36754-cwe-290-authentication-bypass-by-sp-a4d6b30d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36754%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Growatt%20ShineLan-X&amp;severity=critical&amp;id=693d2747f35c2264d84722fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36748-cwe-79-improper-neutralization-of-i-8e97e071</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Growatt%20ShineLan-X&amp;severity=high&amp;id=693d2747f35c2264d84722ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36750-cwe-79-improper-neutralization-of-i-0ce8ddc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Growatt%20ShineLan-X&amp;severity=high&amp;id=693d2747f35c2264d84722f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36753-cwe-290-authentication-bypass-by-sp-4f3c0251</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36753%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Growatt%20ShineLan-X&amp;severity=high&amp;id=693d2747f35c2264d84722f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36751-cwe-311-missing-encryption-of-sensi-f552bd97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36751%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Growatt%20ShineLan-X&amp;severity=critical&amp;id=693d2747f35c2264d84722f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/building-an-open-source-ai-powered-auto-exploiter--9194f102</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Building%20an%20Open-Source%20AI-Powered%20Auto-Exploiter%20with%20a%201.7B%20Parameter%20Model&amp;severity=high&amp;id=693d1dc5dd056aa40b78a293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10289-cwe-89-improper-neutralization-of-s-c5987c83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10289%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wssoffice21%20YMC%20Filter&amp;severity=medium&amp;id=693d169bdd056aa40b71808d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8779-cwe-79-improper-neutralization-of-in-040eeb06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8779%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shamsbd71%20All-in-One%20Addons%20for%20Elementor%20%E2%80%93%20WidgetKit&amp;severity=medium&amp;id=693d169bdd056aa40b718091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9207-cwe-20-improper-input-validation-in--47a9b844</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9207%3A%20CWE-20%20Improper%20Input%20Validation%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=693d169bdd056aa40b718096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10738-cwe-89-improper-neutralization-of-s-08eed048</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10738%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rupok98%20URL%20Shortener%20Plugin%20For%20WordPress&amp;severity=critical&amp;id=693d0b25fa0068b267d3239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14586-os-command-injection-in-totolink-x5-c2536654</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14586%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20X5000R&amp;severity=medium&amp;id=693d0b25fa0068b267d323a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9116-cwe-79-cross-site-scripting-xss-in-w-c44cc957</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9116%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WPS%20Visitor%20Counter&amp;severity=medium&amp;id=693d05d0fa0068b267cfe0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12362-cwe-862-missing-authorization-in-sa-686288c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12362%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Points%20Management%20System%20For%20Gamification%2C%20Ranks%2C%20Badges%2C%20and%20Loyalty%20Rewards%20Program%20%E2%80%93%20myCred&amp;severity=medium&amp;id=693cff4ed69a8ed577177bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-issues-security-updates-after-two-webkit-fla-ad401b82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Issues%20Security%20Updates%20After%20Two%20WebKit%20Flaws%20Found%20Exploited%20in%20the%20Wild&amp;severity=low&amp;id=693d796a2c268cf8856201b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14446-cwe-862-missing-authorization-in-gh-37afa328</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14446%3A%20CWE-862%20Missing%20Authorization%20in%20ghozylab%20Easy%20Notify%20Lite&amp;severity=medium&amp;id=693cef65d977419e584a508f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11693-cwe-200-exposure-of-sensitive-infor-d010e42a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11693%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20recorp%20Export%20WordPress%20Pages%20to%20Static%20HTML%20%26%20PDF%20%E2%80%94%20Static%20Site%20Export&amp;severity=critical&amp;id=693cef62d977419e584a4fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9488-cwe-79-improper-neutralization-of-in-21b8e657</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidanderson%20Redux%20Framework&amp;severity=medium&amp;id=693cef67d977419e584a527e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12109-cwe-79-improper-neutralization-of-i-172775d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12109%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mahethekiller%20Header%20Footer%20Script%20Adder%20%E2%80%93%20Insert%20Code%20in%20Header%2C%20Body%20%26%20Footer&amp;severity=medium&amp;id=693cef62d977419e584a4fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13092-cwe-862-missing-authorization-in-aj-31fad52d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13092%3A%20CWE-862%20Missing%20Authorization%20in%20ajitdas%20Devs%20CRM%20%E2%80%93%20Manage%20tasks%2C%20attendance%20and%20teams%20all%20together&amp;severity=medium&amp;id=693cef62d977419e584a4fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14394-cwe-352-cross-site-request-forgery--b0984d25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14394%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20melodicmedia%20Popover%20Windows&amp;severity=medium&amp;id=693cef64d977419e584a5039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14365-cwe-862-missing-authorization-in-du-93846379</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14365%3A%20CWE-862%20Missing%20Authorization%20in%20dugudlabs%20Eyewear%20prescription%20form&amp;severity=medium&amp;id=693cef64d977419e584a5026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12077-cwe-79-improper-neutralization-of-i-90c8a3a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20WP%20to%20LinkedIn%20Auto%20Publish&amp;severity=medium&amp;id=693cef62d977419e584a4fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11164-cwe-862-missing-authorization-in-cr-d234eee8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11164%3A%20CWE-862%20Missing%20Authorization%20in%20creativthemes%20Mavix%20Education&amp;severity=medium&amp;id=693cef62d977419e584a4fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11707-cwe-330-use-of-insufficiently-rando-c34fa2c2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11707%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20webfactory%20Login%20Lockdown%20%26%20Protection&amp;severity=medium&amp;id=693cef62d977419e584a4fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14440-cwe-565-reliance-on-cookies-without-51904fb2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14440%3A%20CWE-565%20Reliance%20on%20Cookies%20without%20Validation%20and%20Integrity%20Checking%20in%20jayarsiech%20JAY%20Login%20%26%20Register&amp;severity=critical&amp;id=693cef65d977419e584a508b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14508-cwe-862-missing-authorization-in-ya-055ddbcb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14508%3A%20CWE-862%20Missing%20Authorization%20in%20yalogica%20MediaCommander%20%E2%80%93%20Bring%20Folders%20to%20Media%2C%20Posts%2C%20and%20Pages&amp;severity=medium&amp;id=693cef65d977419e584a50b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14539-cwe-94-improper-control-of-generati-78707cd6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14539%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rang501%20Shortcode%20Ajax&amp;severity=medium&amp;id=693cef65d977419e584a50b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8617-cwe-79-improper-neutralization-of-in-c82c23f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yithemes%20YITH%20WooCommerce%20Quick%20View&amp;severity=medium&amp;id=693cef67d977419e584a5273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14367-cwe-862-missing-authorization-in-co-5c81d537</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14367%3A%20CWE-862%20Missing%20Authorization%20in%20corsonr%20Easy%20Theme%20Options&amp;severity=medium&amp;id=693cef64d977419e584a5030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7058-cwe-79-improper-neutralization-of-in-47b06241</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Kingcabs&amp;severity=medium&amp;id=693cef67d977419e584a526e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12076-cwe-79-improper-neutralization-of-i-d77b7073</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20Social%20Media%20Auto%20Publish&amp;severity=medium&amp;id=693cef62d977419e584a4fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13093-cwe-862-missing-authorization-in-aj-d92aa8b9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13093%3A%20CWE-862%20Missing%20Authorization%20in%20ajitdas%20Devs%20CRM%20%E2%80%93%20Manage%20tasks%2C%20attendance%20and%20teams%20all%20together&amp;severity=medium&amp;id=693cef64d977419e584a5014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13077-cwe-89-improper-neutralization-of-s-80e91189</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13077%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20payamito%20%D8%A7%D9%81%D8%B2%D9%88%D9%86%D9%87%20%D9%BE%DB%8C%D8%A7%D9%85%DA%A9%20%D9%88%D9%88%DA%A9%D8%A7%D9%85%D8%B1%D8%B3%20%D9%81%D9%88%D9%82%20%D8%AD%D8%B1%D9%81%D9%87%20%D8%A7%DB%8C%20(%D8%AC%D8%AF%DB%8C%D8%AF)%20payamito%20sms%20woocommerce&amp;severity=high&amp;id=693cef62d977419e584a4fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14451-cwe-601-url-redirection-to-untruste-3141468e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14451%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20solutionsbysteve%20Solutions%20Ad%20Manager&amp;severity=medium&amp;id=693cef65d977419e584a5099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9218-cwe-862-missing-authorization-in-rtc-0bf41431</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9218%3A%20CWE-862%20Missing%20Authorization%20in%20rtcamp%20rtMedia%20for%20WordPress%2C%20BuddyPress%20and%20bbPress&amp;severity=low&amp;id=693cef67d977419e584a5279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14288-cwe-862-missing-authorization-in-ga-b8cb4c68</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14288%3A%20CWE-862%20Missing%20Authorization%20in%20gallerycreator%20Mixed%20Media%20Gallery%20Blocks&amp;severity=medium&amp;id=693cef64d977419e584a5021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13705-cwe-79-improper-neutralization-of-i-b90c4c4b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blakelong%20Custom%20Frames&amp;severity=medium&amp;id=693cef64d977419e584a501c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14476-cwe-502-deserialization-of-untruste-dfa78ab0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14476%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20unitecms%20Doubly%20%E2%80%93%20Cross%20Domain%20Copy%20Paste%20for%20WordPress&amp;severity=high&amp;id=693cef65d977419e584a50ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14475-cwe-98-improper-control-of-filename-a5e88b36</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14475%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nenad-obradovic%20Extensive%20VC%20Addons%20for%20WPBakery%20page%20builder&amp;severity=high&amp;id=693cef65d977419e584a50a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14462-cwe-352-cross-site-request-forgery--a80032df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14462%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20owais4377%20Lucky%20Draw%20Contests&amp;severity=medium&amp;id=693cef65d977419e584a509e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11376-cwe-79-improper-neutralization-of-i-6269575a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=693cef62d977419e584a4fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13094-cwe-434-unrestricted-upload-of-file-7b235ab5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13094%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wp3d%20WP3D%20Model%20Import%20Viewer&amp;severity=high&amp;id=693cef64d977419e584a5018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14447-cwe-862-missing-authorization-in-pc-67d8d364</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14447%3A%20CWE-862%20Missing%20Authorization%20in%20pcantoni%20AnnunciFunebri&amp;severity=medium&amp;id=693cef65d977419e584a5094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14397-cwe-862-missing-authorization-in-fr-88bbb22e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14397%3A%20CWE-862%20Missing%20Authorization%20in%20franciscopalacios%20Postem%20Ipsum&amp;severity=high&amp;id=693cef65d977419e584a5087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14378-cwe-79-improper-neutralization-of-i-15c9df4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeregion%20Quick%20Testimonials&amp;severity=medium&amp;id=693cef64d977419e584a5035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14366-cwe-862-missing-authorization-in-du-1c33d54d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14366%3A%20CWE-862%20Missing%20Authorization%20in%20dugudlabs%20Eyewear%20prescription%20form&amp;severity=medium&amp;id=693cef64d977419e584a502b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9873-cwe-79-improper-neutralization-of-in-22f15364</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20a3rev%20a3%20Lazy%20Load&amp;severity=medium&amp;id=693cef67d977419e584a5284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14395-cwe-862-missing-authorization-in-me-a0edaadc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14395%3A%20CWE-862%20Missing%20Authorization%20in%20melodicmedia%20Popover%20Windows&amp;severity=medium&amp;id=693cef64d977419e584a503d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11970-cwe-918-server-side-request-forgery-7913ba3d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11970%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20emplibot%20Emplibot%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%2C%20Infographics%2C%20and%20Linking%20%7C%20SEO%20Optimized%20%7C%20Fully%20Automated&amp;severity=medium&amp;id=693cef62d977419e584a4fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14454-cwe-352-cross-site-request-forgery--82bb628a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14454%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Image%20Slider%20by%20Ays-%20Responsive%20Slider%20and%20Carousel&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14050-cwe-89-improper-neutralization-of-s-02d0e604</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14050%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20uxl%20Design%20Import%2FExport%20%E2%80%93%20Styles%2C%20Templates%2C%20Template%20Parts%20and%20Patterns&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13089-cwe-89-improper-neutralization-of-s-39a10248</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13089%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdirectorykit%20WP%20Directory%20Kit&amp;severity=high&amp;id=693ce0d37c4acd10e84d925b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14278-cwe-79-improper-neutralization-of-i-bd6716ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20HT%20Slider%20For%20Elementor&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14056-cwe-79-improper-neutralization-of-i-b168ccba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webdevstudios%20Custom%20Post%20Type%20UI&amp;severity=medium&amp;id=693ce0d37c4acd10e84d926c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12512-cwe-200-exposure-of-sensitive-infor-d96935a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12512%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20edge22%20GenerateBlocks&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14581-cwe-862-missing-authorization-in-vi-a15f8241</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14581%3A%20CWE-862%20Missing%20Authorization%20in%20villatheme%20HAPPY%20%E2%80%93%20Helpdesk%20Support%20Ticket%20System&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14477-cwe-89-improper-neutralization-of-s-8ee7385d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14477%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aaron13100%20404%20Solution&amp;severity=medium&amp;id=693ce0d37c4acd10e84d927e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13403-cwe-862-missing-authorization-in-em-c55ad222</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13403%3A%20CWE-862%20Missing%20Authorization%20in%20emarket-design%20Employee%20Spotlight%20%E2%80%93%20Team%20Member%20Showcase%20%26%20Meet%20the%20Team%20Plugin&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-microsoft-teams-and-google-meet-downloads-spr-8cacf627</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Microsoft%20Teams%20and%20Google%20Meet%20Downloads%20Spread%20Oyster%20Backdoor&amp;severity=medium&amp;id=693cb109b3e344112f52a0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-13-1948210f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-13&amp;severity=medium&amp;id=693e00181ee4c1247d8579ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brickstorm-backdoor-mar-251165c1v1-e9af8144</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BRICKSTORM%20Backdoor%20%20-%20MAR-251165.c1.v1&amp;severity=medium&amp;id=693d8f0cda1dfeffd83d742d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14585-sql-injection-in-itsourcecode-covid-8fc482c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14585%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=693c99885292e65bc6167f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14584-sql-injection-in-itsourcecode-covid-3581ea2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14584%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=693c99885292e65bc6167f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67721-cwe-201-insertion-of-sensitive-info-9e76d5da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67721%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20airlift%20aircompressor&amp;severity=medium&amp;id=693c99885292e65bc6167f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14583-unrestricted-upload-in-campcodes-on-61c8170c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14583%3A%20Unrestricted%20Upload%20in%20campcodes%20Online%20Student%20Enrollment%20System&amp;severity=medium&amp;id=693c958a5292e65bc6123153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14582-unrestricted-upload-in-campcodes-on-49946dba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14582%3A%20Unrestricted%20Upload%20in%20campcodes%20Online%20Student%20Enrollment%20System&amp;severity=medium&amp;id=693c958a5292e65bc612314c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14611-vulnerability-in-gladinet-centresta-e4cb3dcd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14611%3A%20Vulnerability%20in%20Gladinet%20CentreStack%20and%20TrioFox&amp;severity=high&amp;id=693c8579f55ccbd2c799d2b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43518-an-app-may-be-able-to-inappropriate-07489bb5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43518%3A%20An%20app%20may%20be%20able%20to%20inappropriately%20access%20files%20through%20the%20spellcheck%20API%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c857ff55ccbd2c799d3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43522-an-app-may-be-able-to-access-user-s-76060859</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43522%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c857ff55ccbd2c799d3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43467-an-app-may-be-able-to-gain-root-pri-aa5ce0fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43467%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=693c857bf55ccbd2c799d327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43471-an-app-may-be-able-to-access-sensit-baf40b9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43471%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d32d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43406-an-app-may-be-able-to-access-sensit-42ecb5ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43406%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8579f55ccbd2c799d2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43410-an-attacker-with-physical-access-ma-7a4c5b43</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43410%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20view%20deleted%20notes%20in%20Apple%20macOS&amp;severity=low&amp;id=693c8579f55ccbd2c799d2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43538-an-app-may-be-able-to-access-sensit-82249638</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43538%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c8581f55ccbd2c799d97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43539-processing-a-file-may-lead-to-memor-3167418b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43539%3A%20Processing%20a%20file%20may%20lead%20to%20memory%20corruption%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c8581f55ccbd2c799d97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43542-password-fields-may-be-unintentiona-f3880dc9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43542%3A%20Password%20fields%20may%20be%20unintentionally%20revealed%20when%20remotely%20controlling%20a%20device%20over%20FaceTime%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c8581f55ccbd2c799d982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43470-a-standard-user-may-be-able-to-view-25e5cebd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43470%3A%20A%20standard%20user%20may%20be%20able%20to%20view%20files%20made%20from%20a%20disk%20image%20belonging%20to%20an%20administrator%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43523-an-app-may-be-able-to-access-sensit-d3d5352c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43523%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857ff55ccbd2c799d3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43466-an-app-may-be-able-to-access-sensit-d3f98a04</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43466%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43519-an-app-may-be-able-to-access-sensit-282ddde6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43519%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=693c857ff55ccbd2c799d3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43512-an-app-may-be-able-to-elevate-privi-db51bec9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43512%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c857df55ccbd2c799d383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43416-an-app-may-be-able-to-access-protec-b51956c9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43416%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=693c857bf55ccbd2c799d30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43482-an-app-may-be-able-to-cause-a-denia-b790be61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43482%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46287-an-attacker-may-be-able-to-spoof-th-d3989ce5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46287%3A%20An%20attacker%20may%20be%20able%20to%20spoof%20their%20FaceTime%20caller%20ID%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=693c8581f55ccbd2c799d98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43494-an-attacker-may-be-able-to-cause-a--b39d8ca2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43494%3A%20An%20attacker%20may%20be%20able%20to%20cause%20a%20persistent%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c857df55ccbd2c799d363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43461-an-app-may-be-able-to-access-protec-c971b4cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43461%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43532-processing-malicious-data-may-lead--33a20304</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43532%3A%20Processing%20malicious%20data%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c8581f55ccbd2c799d977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43437-an-app-may-be-able-to-fingerprint-t-2df07c4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43437%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c857bf55ccbd2c799d313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43509-an-app-may-be-able-to-access-sensit-d388ee1f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43509%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43381-a-malicious-app-may-be-able-to-dele-c823cfa1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43381%3A%20A%20malicious%20app%20may%20be%20able%20to%20delete%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8579f55ccbd2c799d2c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43513-an-app-may-be-able-to-read-sensitiv-39e79f0b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43513%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46285-an-app-may-be-able-to-gain-root-pri-a88a0e43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46285%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c8581f55ccbd2c799d989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43506-icloud-private-relay-may-not-activa-48e060af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43506%3A%20iCloud%20Private%20Relay%20may%20not%20activate%20when%20more%20than%20one%20user%20is%20logged%20in%20at%20the%20same%20time%20in%20Apple%20macOS&amp;severity=high&amp;id=693c857df55ccbd2c799d36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43510-a-malicious-application-may-cause-u-bad5be46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43510%3A%20A%20malicious%20application%20may%20cause%20unexpected%20changes%20in%20memory%20shared%20between%20processes%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c857df55ccbd2c799d376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43402-an-app-may-be-able-to-cause-unexpec-9ddec6d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43402%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=693c8579f55ccbd2c799d2c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43530-an-app-may-be-able-to-access-sensit-087d9b6c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43530%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=693c857ff55ccbd2c799d3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46289-an-app-may-be-able-to-access-protec-48947548</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46289%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8581f55ccbd2c799d991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43463-an-app-may-be-able-to-access-sensit-5be9bf76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43463%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43320-an-app-may-be-able-to-bypass-launch-e0fcbed2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43320%3A%20An%20app%20may%20be%20able%20to%20bypass%20launch%20constraint%20protections%20and%20execute%20malicious%20code%20with%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=693c8579f55ccbd2c799d2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43527-an-app-may-be-able-to-gain-root-pri-5d4f8a40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43527%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=693c857ff55ccbd2c799d3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43511-processing-maliciously-crafted-web--866beccc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43511%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=693c857df55ccbd2c799d380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43497-an-app-may-be-able-to-break-out-of--abb90150</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43497%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43473-an-app-may-be-able-to-access-sensit-99d654fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43473%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46276-an-app-may-be-able-to-access-sensit-f9ee6c74</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46276%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c8581f55ccbd2c799d985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43465-an-app-may-be-able-to-access-sensit-10171174</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43465%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c857bf55ccbd2c799d321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43520-a-malicious-application-may-be-able-9c96a0e0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43520%3A%20A%20malicious%20application%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=693c857ff55ccbd2c799d3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43388-an-app-may-be-able-to-access-sensit-3a7dd7fd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43388%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c8579f55ccbd2c799d2c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43351-an-app-may-be-able-to-access-protec-655c9795</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43351%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8579f55ccbd2c799d2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43516-a-user-with-voice-control-enabled-m-29f8339a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43516%3A%20A%20user%20with%20Voice%20Control%20enabled%20may%20be%20able%20to%20transcribe%20another%20user&apos;s%20activity%20in%20Apple%20macOS&amp;severity=low&amp;id=693c857ff55ccbd2c799d399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43404-an-app-may-be-able-to-access-sensit-ecdaa94e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43404%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c8579f55ccbd2c799d2cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43393-an-app-may-be-able-to-break-out-of--4c1b39dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43393%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8579f55ccbd2c799d2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43517-an-app-may-be-able-to-access-protec-edd90752</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43517%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c857ff55ccbd2c799d39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43464-visiting-a-website-may-lead-to-an-a-c1bce520</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43464%3A%20Visiting%20a%20website%20may%20lead%20to%20an%20app%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43521-an-app-may-be-able-to-access-sensit-6943692b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43521%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857ff55ccbd2c799d3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11266-cwe-787-out-of-bounds-write-in-gras-98e3097f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11266%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Grassroots%20DICOM%20(GDCM)&amp;severity=medium&amp;id=693c821af55ccbd2c7950af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67634-cwe-79-improper-neutralization-of-i-3368d246</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67634%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CISA%20Software%20Acquisition%20Guide%20Tool&amp;severity=medium&amp;id=693c7e77f55ccbd2c792b9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14580-cross-site-scripting-in-qualitor-86c5b4e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14580%3A%20Cross%20Site%20Scripting%20in%20Qualitor&amp;severity=medium&amp;id=693c7e77f55ccbd2c792b9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58316-cwe-89-improper-neutralization-of-s-75b8a88f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58316%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PuneethReddyHC%20online-shopping-system-advanced&amp;severity=high&amp;id=693c7a77b31a4aba68228b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67750-cwe-94-improper-control-of-generati-d91bc995</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67750%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Flow-Scanner%20lightning-flow-scanner&amp;severity=high&amp;id=693c7a77b31a4aba68228b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14578-sql-injection-in-itsourcecode-stude-5f624a28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14578%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693c7642a3f11564d0d3b87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58314-cwe-78-improper-neutralization-of-s-7a6e1d4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58314%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ATCOM%20Technology%20co.%2C%20LTD.%20100M%20IP%20Phones&amp;severity=high&amp;id=693c7642a3f11564d0d3b893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58311-cwe-1245-improper-finite-state-mach-32a65046</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58311%3A%20CWE-1245%3A%20Improper%20Finite%20State%20Machines%20(FSMs)%20in%20Hardware%20Logic%20in%20dormakaba%20Dormakaba%20Saflok%20System%206000&amp;severity=high&amp;id=693c7642a3f11564d0d3b88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58299-cwe-121-stack-based-buffer-overflow-7ee849d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58299%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=critical&amp;id=693c7642a3f11564d0d3b889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14010-cwe-78-improper-neutralization-of-s-7831f1ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14010%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Typora&amp;severity=high&amp;id=693c7642a3f11564d0d3b884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67734-cwe-79-improper-neutralization-of-i-dfd406fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67734%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=medium&amp;id=693c72e1a3f11564d0cebd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-one-battle-after-another-torrent-hides-malwar-f0f7ea32</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20%E2%80%98One%20Battle%20After%20Another%E2%80%99%20torrent%20hides%20malware%20in%20subtitles&amp;severity=high&amp;id=693c72b9a3f11564d0cea0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-data-breach-traced-to-ex-employee-who-reta-107f9445</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20data%20breach%20traced%20to%20ex-employee%20who%20retained%20system%20access&amp;severity=high&amp;id=693c72b9a3f11564d0cea0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14572-memory-corruption-in-utt-512w-2fa95b9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14572%3A%20Memory%20Corruption%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=693c72e1a3f11564d0cebd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8083-cwe-1321-improperly-controlled-modif-c5e30987</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8083%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20Vuetify&amp;severity=high&amp;id=693c6f38a3f11564d0ccbef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14373-inappropriate-implementation-in-goo-aedcf9d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14373%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=693c6bdfa3f11564d0c8e407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14372-use-after-free-in-google-chrome-f5bfb1f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14372%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=693c6bdfa3f11564d0c8e403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14174-out-of-bounds-memory-access-in-goog-689e7b53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14174%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=693c6bdfa3f11564d0c8e3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-osint-and-gpt-utility-github-repos-spread-pys-a03b1168</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20OSINT%20and%20GPT%20Utility%20GitHub%20Repos%20Spread%20PyStoreRAT%20Malware%20Payloads&amp;severity=medium&amp;id=693c6b3f53767fe238bb232a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8082-cwe-79-improper-neutralization-of-in-1fc08562</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vuetify&amp;severity=medium&amp;id=693c630553767fe238afb27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14571-sql-injection-in-projectworlds-adva-bd7d9afd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14571%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=693c630553767fe238afb276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14570-sql-injection-in-projectworlds-adva-fff9f021</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14570%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=693c630553767fe238afb270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pystorerat-malware-targets-osint-researchers-t-b46e50dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20PyStoreRAT%20Malware%20Targets%20OSINT%20Researchers%20Through%20GitHub%20Repos&amp;severity=medium&amp;id=693c592876ef5759461a92bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14569-use-after-free-in-ggml-org-whisperc-f57ef2ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14569%3A%20Use%20After%20Free%20in%20ggml-org%20whisper.cpp&amp;severity=medium&amp;id=693c5c0653767fe238a8342f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14568-sql-injection-in-haxxorsid-stock-ma-598e5b10</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14568%3A%20SQL%20Injection%20in%20haxxorsid%20Stock-Management-System&amp;severity=medium&amp;id=693c5c0653767fe238a83428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14567-missing-authentication-in-haxxorsid-a179e138</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14567%3A%20Missing%20Authentication%20in%20haxxorsid%20Stock-Management-System&amp;severity=medium&amp;id=693c404ddc37602712b89673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13733-cwe-732-incorrect-permission-assign-b1c014be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13733%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dr.Buho%20BuhoNTFS&amp;severity=high&amp;id=693c3cd3dc37602712b2e436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-promptpwnd-attack-small-macos-bounti-2b649030</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20PromptPwnd%20Attack%2C%20macOS%20Bounty%20Complaints%2C%20Chinese%20Hackers%20Trained%20in%20Cisco%20Academy&amp;severity=medium&amp;id=693c393adc37602712b0a19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14566-sql-injection-in-kidaze-courseselec-e5357e67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14566%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=693c45b972d8eb03a613ec58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14565-sql-injection-in-kidaze-courseselec-21484611</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14565%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=693c45b972d8eb03a613ec52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53960-cwe-1240-use-of-a-cryptographic-pri-48981d7c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53960%3A%20CWE-1240%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=medium&amp;id=693c347d2e981ee9614b5b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54947-cwe-321-use-of-hard-coded-cryptogra-9ac5d2b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54947%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=medium&amp;id=693c347f2e981ee9614b5c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54981-cwe-327-use-of-a-broken-or-risky-cr-f8d9d0af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54981%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=high&amp;id=693c347f2e981ee9614b5c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36746-cwe-79-improper-neutralization-of-i-99a76f94</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SolarEdge%20SolarEdge%20Monitoring%20platform%20(SaaS)&amp;severity=medium&amp;id=693c347d2e981ee9614b5bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36743-cwe1191-onchip-debug-and-test-inter-fda56fb3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36743%3A%20CWE%E2%80%911191%20%E2%80%94%20On%E2%80%91Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20SolarEdge%20SE3680H&amp;severity=high&amp;id=693c347d2e981ee9614b5bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36744-cwe-1295-debug-messages-revealing-u-66f4b80e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36744%3A%20CWE-1295%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information%20in%20SolarEdge%20SE3680H&amp;severity=low&amp;id=693c347d2e981ee9614b5bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36745-cwe-1104-use-of-unmaintained-third--0f29a977</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36745%3A%20CWE-1104%20%E2%80%94%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20SolarEdge%20SE3680H&amp;severity=high&amp;id=693c347d2e981ee9614b5bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58770-cwe-280-improper-handling-of-insuff-43ffced4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58770%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20AMI%20AptioV&amp;severity=high&amp;id=693c302e2e981ee96144cd93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36755-cwe-1244-internal-asset-exposed-to--74976005</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36755%3A%20CWE-1244%3A%20Internal%20Asset%20Exposed%20to%20Unsafe%20Debug%20Access%20Level%20or%20State%20in%20CleverDisplay%20B.V.%20BlueOne%20(CleverDisplay%20Hardware%20Player)&amp;severity=low&amp;id=693c302e2e981ee96144cd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-advanced-phishing-kits-use-ai-and-mfa-bypass-t-294d398c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Advanced%20Phishing%20Kits%20Use%20AI%20and%20MFA%20Bypass%20Tactics%20to%20Steal%20Credentials%20at%20Scale&amp;severity=medium&amp;id=693c23bffd2a1aad42520e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gladinet-centrestack-flaw-exploited-to-hack-organi-73ae464e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gladinet%20CentreStack%20Flaw%20Exploited%20to%20Hack%20Organizations&amp;severity=medium&amp;id=693c203ffd2a1aad424d3905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fieldtex-data-breach-impacts-238000-7640327b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fieldtex%20Data%20Breach%20Impacts%20238%2C000&amp;severity=medium&amp;id=693c1506b9e9371f90075e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/where-does-the-data-stolen-in-a-phishing-attack-go-f57e008a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Where%20does%20the%20data%20stolen%20in%20a%20phishing%20attack%20go%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=693c14b1b9e9371f9007430e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-windows-rasman-zero-day-flaw-gets-free-unoffic-9792c89b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Windows%20RasMan%20zero-day%20flaw%20gets%20free%2C%20unofficial%20patches&amp;severity=critical&amp;id=693c148fb9e9371f90071098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13506-cwe-250-execution-with-unnecessary--4054c5c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13506%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Nebim%20Neyir%20Computer%20Industry%20and%20Services%20Inc.%20Nebim%20V3%20ERP&amp;severity=high&amp;id=693c0957b9e9371f90f9bcb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-geoserver-vulnerability-exploited-in-attack-25287504</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20GeoServer%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=medium&amp;id=693c093cb9e9371f90f9a4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-releases-2025-list-of-top-25-most-dangerous--d14b241d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Releases%202025%20List%20of%20Top%2025%20Most%20Dangerous%20Software%20Vulnerabilities&amp;severity=low&amp;id=693c05102d1261d38d8c737b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-exploitation-escalates-into-large-scal-f0372734</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Exploitation%20Escalates%20into%20Large-Scale%20Global%20Attacks%2C%20Forcing%20Emergency%20Mitigation&amp;severity=critical&amp;id=693c03992d1261d38d8b6064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-shares-2025s-top-25-most-dangerous-software--954768c0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20shares%202025&apos;s%20top%2025%20most%20dangerous%20software%20weaknesses&amp;severity=high&amp;id=693c03992d1261d38d8b606c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-react-rsc-vulnerabilities-enable-dos-and-sourc-437727c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20React%20RSC%20Vulnerabilities%20Enable%20DoS%20and%20Source%20Code%20Exposure&amp;severity=high&amp;id=693c03992d1261d38d8b6068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-orders-feds-to-patch-actively-exploited-geose-093e92e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20orders%20feds%20to%20patch%20actively%20exploited%20Geoserver%20flaw&amp;severity=high&amp;id=693c03992d1261d38d8b6060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14030-cwe-79-improper-neutralization-of-i-be5b344c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14030%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20soportecibeles%20AI%20Feeds&amp;severity=medium&amp;id=693bfc942d1261d38d80bda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12407-cwe-352-cross-site-request-forgery--aef49e26</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12407%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=693bfc942d1261d38d80bd93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12408-cwe-200-exposure-of-sensitive-infor-6551acb4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12408%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=693bfc942d1261d38d80bd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12965-cwe-79-improper-neutralization-of-i-ea6b2227</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12965%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nalam-1%20Magical%20Posts%20Display%20%E2%80%93%20Elementor%20Advanced%20Posts%20widgets&amp;severity=medium&amp;id=693bfc942d1261d38d80bd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14159-cwe-352-cross-site-request-forgery--8174a78b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14159%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=693bfc942d1261d38d80bdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14442-cwe-552-files-or-directories-access-c509e64d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14442%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=693bfc942d1261d38d80bdb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14065-cwe-862-missing-authorization-in-ro-637ebb6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14065%3A%20CWE-862%20Missing%20Authorization%20in%20rodolforizzo76%20Simple%20Bike%20Rental&amp;severity=medium&amp;id=693bfc942d1261d38d80bda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-bug-bounty-program-expanded-to-third-par-e131d1b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Bug%20Bounty%20Program%20Expanded%20to%20Third-Party%20Code&amp;severity=critical&amp;id=693bf9052d1261d38d7e8caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-patches-updater-flaw-after-reports-of-traf-c29f0eef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Patches%20Updater%20Flaw%20After%20Reports%20of%20Traffic%20Hijacking&amp;severity=medium&amp;id=693bf53ee96055a68ba4f468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12835-cwe-22-improper-limitation-of-a-pat-476f2329</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12835%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WooMulti&amp;severity=high&amp;id=693beffae96055a68b9f7a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-genai-in-the-browser-policy-isolation-and-9a646a75</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20GenAI%20in%20the%20Browser%3A%20Policy%2C%20Isolation%2C%20and%20Data%20Controls%20That%20Actually%20Work&amp;severity=medium&amp;id=693bf4c0e96055a68ba4d1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12841-cwe-862-missing-authorization-in-bo-8c1282c4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12841%3A%20CWE-862%20Missing%20Authorization%20in%20Bookit&amp;severity=medium&amp;id=693beffae96055a68b9f7a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rto-challan-fraud-a-technical-report-on-apk-based--b19c1d20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RTO%20Challan%20Fraud%3A%20A%20Technical%20Report%20on%20APK-Based%20Financial%20and%20Identity%20Theft&amp;severity=medium&amp;id=693c104eb9e9371f90018228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26866-cwe-502-deserialization-of-untruste-6c3628b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26866%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20HugeGraph-Server&amp;severity=high&amp;id=693be422406b3dd4e02223e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58137-cwe-639-authorization-bypass-throug-4c06f0de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58137%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Apache%20Software%20Foundation%20Apache%20Fineract&amp;severity=high&amp;id=693be422406b3dd4e02223e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12348-cwe-306-missing-authentication-for--76fba38b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12348%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20icegram%20Email%20Subscribers%20%26%20Newsletters%20%E2%80%93%20Email%20Marketing%2C%20Post%20Notifications%20%26%20Newsletter%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=693be422406b3dd4e02223ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13993-cwe-79-improper-neutralization-of-i-7de801d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13993%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailerlite%20MailerLite%20%E2%80%93%20Signup%20forms%20(official)&amp;severity=medium&amp;id=693be422406b3dd4e02223d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14074-cwe-862-missing-authorization-in-ad-126b6e61</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14074%3A%20CWE-862%20Missing%20Authorization%20in%20addonsorg%20PDF%20for%20Contact%20Form%207%20%2B%20Drag%20and%20Drop%20Template%20Builder&amp;severity=medium&amp;id=693be422406b3dd4e02223d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58130-cwe-522-insufficiently-protected-cr-6279900a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58130%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Apache%20Software%20Foundation%20Apache%20Fineract&amp;severity=critical&amp;id=693be422406b3dd4e02223e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23408-cwe-521-weak-password-requirements--0eac94fd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23408%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Apache%20Software%20Foundation%20Apache%20Fineract&amp;severity=high&amp;id=693be422406b3dd4e02223de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-react-rsc-vulnerabilities-enable-dos-and-sourc-5809e665</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20React%20RSC%20Vulnerabilities%20Enable%20DoS%20and%20Source%20Code%20Exposure&amp;severity=critical&amp;id=693be412406b3dd4e0220011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-the-blackforce-phishing-kit-a95b6a4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20the%20BlackForce%20Phishing%20Kit&amp;severity=medium&amp;id=693c14a1b9e9371f90071a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-moneymount-iso-deploying-phantom-stealer-3ba40aea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20MoneyMount%2C%20ISO%20Deploying%20Phantom%20Stealer&amp;severity=medium&amp;id=693c14a1b9e9371f900719fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-exploitation-escalates-into-large-scal-824b0580</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Exploitation%20Escalates%20into%20Large-Scale%20Global%20Attacks%2C%20Forcing%20Emergency%20Mitigation&amp;severity=critical&amp;id=693be412406b3dd4e0220014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40829-cwe-908-use-of-uninitialized-resour-f06185d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40829%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=693be422406b3dd4e02223eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12960-cwe-22-improper-limitation-of-a-pat-ba77376c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12960%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iworks%20Simple%20CSV%20Table&amp;severity=medium&amp;id=693bd715406b3dd4e013825b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/320000-paid-out-at-zerodaycloud-for-open-source-so-f457dce5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%24320%2C000%20Paid%20Out%20at%20Zeroday.Cloud%20for%20Open%20Source%20Software%20Exploits&amp;severity=medium&amp;id=693bc7515f3fdafda4341007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67731-cwe-400-uncontrolled-resource-consu-02a51622</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67731%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Aarondoran%20servify-express&amp;severity=high&amp;id=693bcae15f3fdafda43757dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67730-cwe-79-improper-neutralization-of-i-1496ff0e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67730%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14169-cwe-89-improper-neutralization-of-s-4a2d287b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14169%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20amans2k%20FunnelKit%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20Checkout&amp;severity=high&amp;id=693bc3e35f3fdafda42e6cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10583-cwe-862-missing-authorization-in-em-c0f4b2af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10583%3A%20CWE-862%20Missing%20Authorization%20in%20emrevona%20WP%20Fastest%20Cache%20Premium&amp;severity=low&amp;id=693bc3e35f3fdafda42e6cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13891-cwe-22-improper-limitation-of-a-pat-d8ebe694</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13891%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpchill%20Modula%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14049-cwe-79-improper-neutralization-of-i-761c3487</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14049%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikRentItems%20Flexible%20Rental%20Management%20System&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4970-cwe-79-improper-neutralization-of-in-cb5bb5ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4970%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bannersky%20BSK%20PDF%20Manager&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11876-cwe-79-improper-neutralization-of-i-2bd7342f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jbrinley%20Mailgun%20Subscriptions&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67728-cwe-77-improper-neutralization-of-s-a1dfe2f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67728%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20ShaneIsrael%20fireshare&amp;severity=critical&amp;id=693bc168e6d9263eb359d8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67727-cwe-94-improper-control-of-generati-b7d52253</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67727%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=693bbde4e6d9263eb3549393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12655-cwe-862-missing-authorization-in-hi-d4865ad5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12655%3A%20CWE-862%20Missing%20Authorization%20in%20hippooo%20Hippoo%20Mobile%20App%20for%20WooCommerce&amp;severity=medium&amp;id=693bbde4e6d9263eb3549376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14068-cwe-89-improper-neutralization-of-s-c3380dc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14068%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20qdonow%20WPNakama%20%E2%80%93%20Team%20and%20multi-Client%20Collaboration%2C%20Editorial%20and%20Project%20Management&amp;severity=high&amp;id=693bbde4e6d9263eb3549382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14356-cwe-639-authorization-bypass-throug-79d0807a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14356%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themefic%20Ultra%20Addons%20for%20Contact%20Form%207&amp;severity=medium&amp;id=693bbde4e6d9263eb354938b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12570-cwe-79-improper-neutralization-of-i-692aab01</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12570%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=high&amp;id=693bbde4e6d9263eb3549372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13660-cwe-200-exposure-of-sensitive-infor-64ba535c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13660%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20rcatheme%20Guest%20Support&amp;severity=medium&amp;id=693bbde4e6d9263eb354937c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67726-cwe-834-excessive-iteration-in-torn-d8384ca3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67726%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=693bc3e35f3fdafda42e6cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10684-cwe-287-improper-authentication-in--a6a3ae6c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10684%3A%20CWE-287%20Improper%20Authentication%20in%20Construction%20Light&amp;severity=medium&amp;id=693bb1545785fd87b5fd1ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67725-cwe-400-uncontrolled-resource-consu-0eec4b4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67725%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=693badd05785fd87b5f80b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67724-cwe-79-improper-neutralization-of-i-fa04bcb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67724%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tornadoweb%20tornado&amp;severity=medium&amp;id=693badd05785fd87b5f80b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67508-cwe-77-improper-neutralization-of-s-1176e27d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67508%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20gardener%20gardenctl-v2&amp;severity=high&amp;id=693baa4c5785fd87b5e9ed61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-dlls-entrypoint-for-the-fun-fri-dec-12th-b3d5725a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20DLLs%20EntryPoint%20for%20the%20Fun%2C%20(Fri%2C%20Dec%2012th)&amp;severity=medium&amp;id=693ba6bb5785fd87b5e7d019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64781-initialization-of-a-resource-with-a-d249a40d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64781%3A%20Initialization%20of%20a%20resource%20with%20an%20insecure%20default%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62192-improper-neutralization-of-special--c1c210ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62192%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58576-cross-site-request-forgery-csrf-in--7d19f4be</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58576%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61987-missing-origin-validation-in-websoc-0b285ee6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61987%3A%20Missing%20origin%20validation%20in%20WebSockets%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347333f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61950-authorization-bypass-through-user-c-8967ae86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61950%3A%20Authorization%20bypass%20through%20user-controlled%20key%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347333b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65120-cross-site-scripting-xss-in-japan-t-76d34d29</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65120%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347334b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57883-cross-site-scripting-xss-in-japan-t-75770a32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57883%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66284-cross-site-scripting-xss-in-japan-t-2b2ce0a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66284%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53523-cross-site-scripting-xss-in-japan-t-595b3b46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53523%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347332a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54407-cross-site-scripting-xss-in-japan-t-143ab61e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54407%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347332e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-actively-exploited-geoserver-xxe-flaw-i-68ecd68d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Actively%20Exploited%20GeoServer%20XXE%20Flaw%20in%20Updated%20KEV%20Catalog&amp;severity=high&amp;id=693bb2fb5785fd87b5fe5343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-fines-lastpass-over-2022-data-breach-impacting--f8babf64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20fines%20LastPass%20over%202022%20data%20breach%20impacting%201.6%20million%20users&amp;severity=high&amp;id=693b96d58624ffdf9f6d3250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-fixes-flaw-that-let-attackers-push-malicio-05e5b9b8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20fixes%20flaw%20that%20let%20attackers%20push%20malicious%20update%20files&amp;severity=high&amp;id=693b96d58624ffdf9f6d3258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-gladinet-centrestack-cryptographic-0ee91230</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploit%20Gladinet%20CentreStack%20cryptographic%20flaw%20in%20RCE%20attacks&amp;severity=high&amp;id=693b96d58624ffdf9f6d3254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14138-cwe-79-improper-neutralization-of-i-ec61bd66</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14138%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpletsgo%20WPLG%20Default%20Mail%20From&amp;severity=medium&amp;id=693b9189650da22753edbda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13975-cwe-79-improper-neutralization-of-i-c693a115</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13975%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20izuchy%20Contact%20Form%207%20with%20ChatWork&amp;severity=medium&amp;id=693b9187650da22753edbd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13843-cwe-79-improper-neutralization-of-i-2686031f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13843%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20susantabeura%20VigLink%20SpotLight%20By%20ShortCode&amp;severity=medium&amp;id=693b9183650da22753edbb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14391-cwe-352-cross-site-request-forgery--651d09b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14391%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20darendev%20Simple%20Theme%20Changer&amp;severity=medium&amp;id=693b918d650da22753edbee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13366-cwe-352-cross-site-request-forgery--c5410d2d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13366%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frapesce%20Rabbit%20Hole&amp;severity=medium&amp;id=693b9183650da22753edbb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13747-cwe-79-improper-neutralization-of-i-725044a9</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ice00%20NewStatPress&amp;severity=medium&amp;id=693b9183650da22753edbb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13850-cwe-79-improper-neutralization-of-i-ccef74de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13850%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ladislavsoukupgmailcom%20LS%20Google%20Map%20Router&amp;severity=medium&amp;id=693b9183650da22753edbb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14137-cwe-79-improper-neutralization-of-i-1fde2ba6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14137%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexdtn%20Simple%20AL%20Slider&amp;severity=medium&amp;id=693b9189650da22753edbda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12650-cwe-79-improper-neutralization-of-i-02f38bac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sgcoskey%20Simple%20post%20listing&amp;severity=medium&amp;id=693b9182650da22753edbad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12834-cwe-79-improper-neutralization-of-i-563a19f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12834%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zealopensource%20Accept%20Stripe%20Payments%20Using%20Contact%20Form%207&amp;severity=medium&amp;id=693b9182650da22753edbae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13334-cwe-862-missing-authorization-in-bl-990573e2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13334%3A%20CWE-862%20Missing%20Authorization%20in%20blazethemes%20Blaze%20Demo%20Importer&amp;severity=high&amp;id=693b9183650da22753edbb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12830-cwe-79-improper-neutralization-of-i-c9b89ad5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdive%20Better%20Addons%20for%20Elementor&amp;severity=medium&amp;id=693b9182650da22753edbae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14160-cwe-352-cross-site-request-forgery--bf35eba0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14160%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20justdave%20Upcoming%20for%20Calendly&amp;severity=medium&amp;id=693b918b650da22753edbe28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13963-cwe-79-improper-neutralization-of-i-d94e1fd9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13963%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falselight%20FX%20Currency%20Converter&amp;severity=medium&amp;id=693b9185650da22753edbcf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13962-cwe-79-improper-neutralization-of-i-087bee1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13962%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20klemmkeil%20Divelogs%20Widget&amp;severity=medium&amp;id=693b9185650da22753edbcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13987-cwe-352-cross-site-request-forgery--da60f628</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13987%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codnloc%20Purchase%20and%20Expense%20Manager&amp;severity=medium&amp;id=693b9187650da22753edbd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13314-cwe-862-missing-authorization-in-ma-7fa9ef25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13314%3A%20CWE-862%20Missing%20Authorization%20in%20markutos987%20Filter%20Plus%20%E2%80%93%20Product%20Filter%20%26%20WordPress%20Filter&amp;severity=medium&amp;id=693b9182650da22753edbaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13885-cwe-79-improper-neutralization-of-i-b73e4df9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imran3229%20Zenost%20Shortcodes&amp;severity=medium&amp;id=693b9185650da22753edbcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14062-cwe-352-cross-site-request-forgery--063ebd73</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14062%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tekafran%20Animated%20Pixel%20Marquee%20Creator&amp;severity=medium&amp;id=693b9189650da22753edbd7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12963-cwe-862-missing-authorization-in-la-b7f1f84a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12963%3A%20CWE-862%20Missing%20Authorization%20in%20lazycoders%20LazyTasks%20%E2%80%93%20Project%20%26%20Task%20Management%20with%20Collaboration%2C%20Kanban%20and%20Gantt%20Chart&amp;severity=critical&amp;id=693b9182650da22753edbaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14132-cwe-79-improper-neutralization-of-i-ab50fa19</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pandikamal03%20Category%20Dropdown%20List&amp;severity=medium&amp;id=693b9189650da22753edbd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13971-cwe-79-improper-neutralization-of-i-af82166b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13971%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thewellnessway%20TWW%20Protein%20Calculator&amp;severity=medium&amp;id=693b9187650da22753edbd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13906-cwe-79-improper-neutralization-of-i-6be4ffdf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13906%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ysh%20WP%20Flot&amp;severity=medium&amp;id=693b9185650da22753edbce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13988-cwe-79-improper-neutralization-of-i-ce7dc585</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=693b9187650da22753edbd48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13966-cwe-79-improper-neutralization-of-i-4ca0107e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13966%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonlamtn200%20Paypal%20Payment%20Shortcode&amp;severity=medium&amp;id=693b9187650da22753edbd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13961-cwe-79-improper-neutralization-of-i-efc0c043</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13961%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20subhransu-sekhar%20Data%20Visualizer&amp;severity=medium&amp;id=693b9185650da22753edbced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13884-cwe-79-improper-neutralization-of-i-9564ef9c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13884%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20buntegiraffe%20Hide%20Email%20Address&amp;severity=medium&amp;id=693b9185650da22753edbccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14035-cwe-79-improper-neutralization-of-i-af4e7124</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14035%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeremybmerrill%20DebateMaster&amp;severity=medium&amp;id=693b9187650da22753edbd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13840-cwe-79-improper-neutralization-of-i-b6e4c93f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13840%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobvanoorschot%20Bukazu%20Search%20Widget&amp;severity=medium&amp;id=693b9183650da22753edbb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13960-cwe-79-improper-neutralization-of-i-4d19a4d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13960%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidkeen%20GPXpress&amp;severity=medium&amp;id=693b9185650da22753edbce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13320-cwe-73-external-control-of-file-nam-d9d80c6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13320%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wpusermanager%20WP%20User%20Manager%20%E2%80%93%20User%20Profile%20Builder%20%26%20Membership&amp;severity=medium&amp;id=693b9182650da22753edbafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13440-cwe-862-missing-authorization-in-pr-ed7a5975</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13440%3A%20CWE-862%20Missing%20Authorization%20in%20premmerce%20Premmerce%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=693b9183650da22753edbb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14392-cwe-862-missing-authorization-in-da-4b669c19</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14392%3A%20CWE-862%20Missing%20Authorization%20in%20darendev%20Simple%20Theme%20Changer&amp;severity=medium&amp;id=693b918d650da22753edbeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14032-cwe-79-improper-neutralization-of-i-6f3f032a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Timeline%20Lite&amp;severity=medium&amp;id=693b9187650da22753edbd54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13969-cwe-79-improper-neutralization-of-i-1ce0c56d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13969%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eurisko%20Reviews%20Sorted&amp;severity=medium&amp;id=693b9187650da22753edbd29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14161-cwe-352-cross-site-request-forgery--ec9f279b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14161%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20truefy%20Truefy%20Embed&amp;severity=medium&amp;id=693b918b650da22753edbe2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14354-cwe-352-cross-site-request-forgery--d3eb44f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14354%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20doubledome%20Resource%20Library%20for%20Logged%20In%20Users&amp;severity=medium&amp;id=693b918b650da22753edbe51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14165-cwe-352-cross-site-request-forgery--aaa6f8dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14165%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20developerke%20Kirim.Email%20WooCommerce%20Integration&amp;severity=medium&amp;id=693b918b650da22753edbe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13846-cwe-79-improper-neutralization-of-i-2f30df6b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13846%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qrevo%20Easy%20Map%20Creator&amp;severity=medium&amp;id=693b9183650da22753edbb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13363-cwe-352-cross-site-request-forgery--9374c5ce</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13363%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20imaqpress%20IMAQ%20CORE&amp;severity=medium&amp;id=693b9183650da22753edbb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12783-cwe-862-missing-authorization-in-pr-0d7b5bff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12783%3A%20CWE-862%20Missing%20Authorization%20in%20premmerce%20Premmerce%20Brands%20for%20WooCommerce&amp;severity=medium&amp;id=693b9182650da22753edbad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14044-cwe-502-deserialization-of-untruste-5184c6b8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14044%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20rodgerholl%20Visitor%20Logic%20Lite&amp;severity=high&amp;id=693b9187650da22753edbd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14166-cwe-94-improper-control-of-generati-b0b6b56e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14166%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ludwigyou%20WPMasterToolKit%20(WPMTK)%20%E2%80%93%20All%20in%20one%20plugin&amp;severity=medium&amp;id=693b918b650da22753edbe40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14119-cwe-79-improper-neutralization-of-i-f373f1de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14119%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themebon%20App%20Landing%20Template%20Blocks%20for%20WPBakery%20(Visual%20Composer)%20Page%20Builder&amp;severity=medium&amp;id=693b9189650da22753edbd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14158-cwe-352-cross-site-request-forgery--b0e715e0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14158%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20octagonsimon%20Coding%20Blocks&amp;severity=medium&amp;id=693b918b650da22753edbe22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13904-cwe-79-improper-neutralization-of-i-b58215a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lesion%20WPGancio&amp;severity=medium&amp;id=693b9185650da22753edbcde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14045-cwe-862-missing-authorization-in-ap-c9c0c6fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14045%3A%20CWE-862%20Missing%20Authorization%20in%20apprhyme%20URL%20Media%20Uploader&amp;severity=medium&amp;id=693b9189650da22753edbd71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12968-cwe-434-unrestricted-upload-of-file-a1f600ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12968%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20infility%20Infility%20Global&amp;severity=high&amp;id=693b9182650da22753edbaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12824-cwe-22-improper-limitation-of-a-pat-d1a5ce73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12824%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tharkun69%20Player%20Leaderboard&amp;severity=high&amp;id=693b9182650da22753edbadb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13408-cwe-352-cross-site-request-forgery--5a6e4aa6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13408%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20foxtheme%20Foxtool%20All-in-One%3A%20Contact%20chat%20button%2C%20Custom%20login%2C%20Media%20optimize%20images&amp;severity=medium&amp;id=693b9183650da22753edbb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14344-cwe-22-improper-limitation-of-a-pat-561e2c4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14344%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sh1zen%20Multi%20Uploader%20for%20Gravity%20Forms&amp;severity=critical&amp;id=693b918b650da22753edbe4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12883-cwe-639-authorization-bypass-throug-7300795b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12883%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20campay%20Campay%20Woocommerce%20Payment%20Gateway&amp;severity=medium&amp;id=693b9182650da22753edbaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14048-cwe-79-improper-neutralization-of-i-e4e016a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonahsc%20SimplyConvert&amp;severity=medium&amp;id=693b9189650da22753edbd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14129-cwe-79-improper-neutralization-of-i-5eb2072a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14129%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wasiul99%20Like%20DisLike%20Voting&amp;severity=medium&amp;id=693b9189650da22753edbd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13989-cwe-79-improper-neutralization-of-i-9c97668b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nazsabuz%20WP%20Dropzone&amp;severity=medium&amp;id=693b9187650da22753edbd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14125-cwe-79-improper-neutralization-of-i-b4fcf910</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andru1%20Complag&amp;severity=medium&amp;id=693b9189650da22753edbd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14393-cwe-79-improper-neutralization-of-i-ca4b5e1f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14393%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awanhrp%20Wpik%20WordPress%20Basic%20Ajax%20Form&amp;severity=medium&amp;id=693b918d650da22753edbef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14143-cwe-79-improper-neutralization-of-i-95fcf899</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14143%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ayothemes%20Ayo%20Shortcodes&amp;severity=medium&amp;id=693b918b650da22753edbe1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14064-cwe-862-missing-authorization-in-cy-67eb0895</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14064%3A%20CWE-862%20Missing%20Authorization%20in%20cytechltd%20BuddyTask&amp;severity=medium&amp;id=693b9189650da22753edbd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14467-cwe-79-improper-neutralization-of-i-c75495a6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14467%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=693b918d650da22753edbef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13889-cwe-79-improper-neutralization-of-i-f9a88be9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tmus%20Simple%20Nivo%20Slider&amp;severity=medium&amp;id=693b9185650da22753edbcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14170-cwe-862-missing-authorization-in-st-5f350ba2</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14170%3A%20CWE-862%20Missing%20Authorization%20in%20stiand%20Vimeo%20SimpleGallery&amp;severity=medium&amp;id=693b918b650da22753edbe48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13866-cwe-862-missing-authorization-in-lo-175b6c3a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13866%3A%20CWE-862%20Missing%20Authorization%20in%20looks_awesome%20Flow-Flow%20Social%20Feed%20Stream&amp;severity=medium&amp;id=693b9185650da22753edbcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14162-cwe-352-cross-site-request-forgery--6d7a069b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14162%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20magblogapi%20BMLT%20WordPress%20Satellite&amp;severity=medium&amp;id=693b918b650da22753edbe34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13053-cwe-311-missing-encryption-of-sensi-5eb16f58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13053%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=693b86d8650da22753ea479b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13670-cwe-427-uncontrolled-search-path-el-b7281b97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13670%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20High%20Level%20Synthesis%20Compiler&amp;severity=medium&amp;id=693b86d8650da22753ea47a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13052-cwe-295-improper-certificate-valida-9228cdf2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13052%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=693b86d8650da22753ea4798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13669-cwe-427-uncontrolled-search-path-el-0e7845a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13669%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20High%20Level%20Synthesis%20Compiler&amp;severity=medium&amp;id=693b86d8650da22753ea479e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13886-cwe-98-improper-control-of-filename-3aaef83c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13886%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cvedovini%20LT%20Unleashed&amp;severity=high&amp;id=693b7fd3650da22753e7b18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13839-cwe-79-improper-neutralization-of-i-7045e665</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13839%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jenyay%20LJUsers&amp;severity=medium&amp;id=693b7fd3650da22753e7b189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13665-cwe-427-uncontrolled-search-path-el-175d60d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13665%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=693b7fd3650da22753e7b186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10451-cwe-787-out-of-bounds-write-in-insy-dffa50ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10451%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=693b63bf650da2275388ef61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/require-google-to-remove-one-click-full-logout-url-659cdc63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Require%20Google%20to%20Remove%20One-Click%20Full%20Logout%20URLs&amp;severity=medium&amp;id=693b605e650da227537cb9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-12-5ba91531</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-12&amp;severity=medium&amp;id=693cad76b3e344112f4b8ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64011-na-970a9fd2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64011%3A%20n%2Fa&amp;severity=medium&amp;id=693c4cbf72d8eb03a61c7d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67819-na-d8ffe073</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67819%3A%20n%2Fa&amp;severity=medium&amp;id=693c45b972d8eb03a613ec4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67818-na-405845cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67818%3A%20n%2Fa&amp;severity=high&amp;id=693c45b972d8eb03a613ec4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29144-na-80357863</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29144%3A%20n%2Fa&amp;severity=low&amp;id=693c45b972d8eb03a613ec46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67342-na-a591b460</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67342%3A%20n%2Fa&amp;severity=medium&amp;id=693c43d3dc37602712bdbc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67341-na-a14f45aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67341%3A%20n%2Fa&amp;severity=medium&amp;id=693c404ddc37602712b89679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65854-na-a27cd0ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65854%3A%20n%2Fa&amp;severity=critical&amp;id=693c3cd3dc37602712b2e43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67344-na-934a5a82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67344%3A%20n%2Fa&amp;severity=medium&amp;id=693c3cd3dc37602712b2e43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66430-na-91279388</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66430%3A%20n%2Fa&amp;severity=critical&amp;id=693c3957dc37602712b0d798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65530-na-acaaa52f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65530%3A%20n%2Fa&amp;severity=high&amp;id=693c3957dc37602712b0d793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67779-cwe-502-deserialization-of-untruste-32dce7b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67779%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data%2C%20(CWE-400)%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-parcel&amp;severity=high&amp;id=693b579d8a7c12acf2c1d539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67780-cwe-306-missing-authentication-for--aec69acd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67780%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SpaceX%20Starlink%20Dish&amp;severity=medium&amp;id=693b524b8a7c12acf2bed11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66452-cwe-79-improper-neutralization-of-i-eed0b410</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66452%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=693b4f8722246175c6a88f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66451-cwe-20-improper-input-validation-in-cbc28275</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66451%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=693b487c22246175c6a6ed55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66450-cwe-80-improper-neutralization-of-s-52aec781</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66450%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=693b450222246175c6a639de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13668-cwe-427-uncontrolled-search-path-el-732e7a77</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13668%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=693b450222246175c6a639db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66446-cwe-362-concurrent-execution-using--b298b86e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66446%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=high&amp;id=693b3df122246175c6a4709d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34506-cwe-434-unrestricted-upload-of-file-2ee0c03e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34506%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WBCE%20WBCE%20CMS&amp;severity=high&amp;id=693b3df122246175c6a47094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34504-cwe-601-url-redirection-to-untruste-8398e97b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34504%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=693b3df122246175c6a4708e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58310-cwe-22-improper-limitation-of-a-pat-2db30a42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58310%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apc%20Network%20Management%20Card%204&amp;severity=high&amp;id=693b3df122246175c6a47089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58308-cwe-89-improper-neutralization-of-s-b853f96e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58308%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opensolution%20Quick.CMS&amp;severity=critical&amp;id=693b3df122246175c6a47083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58304-cwe-79-improper-neutralization-of-i-362a7411</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58304%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SPA-Cart%20SPA-CART%20CMS&amp;severity=medium&amp;id=693b3df322246175c6a4713b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58303-cwe-1336-improper-neutralization-of-8aa5302d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58303%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20(SSTI)%20in%20Flarum%20FriendsofFlarum%20Pretty%20Mail&amp;severity=high&amp;id=693b3df322246175c6a47135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58302-cwe-98-improper-control-of-filename-a20d2e84</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58302%3A%20CWE-98%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Flarum%20FriendsofFlarum%20Pretty%20Mail&amp;severity=medium&amp;id=693b3df322246175c6a4712f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58301-cwe-89-improper-neutralization-of-s-e423d703</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58301%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20purei%20Purei%20CMS&amp;severity=critical&amp;id=693b3df322246175c6a4712a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58300-cwe-306-missing-authentication-for--d60ba640</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58300%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siklu%20MultiHaul%20TG%20series&amp;severity=high&amp;id=693b3df322246175c6a47125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66419-cwe-362-concurrent-execution-using--8f2b565c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66419%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=high&amp;id=693b3df322246175c6a47140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58298-cwe-434-unrestricted-upload-of-file-dd284420</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58298%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20BMC%20Software%20Compuware%20iStrobe%20Web&amp;severity=critical&amp;id=693b3df122246175c6a470c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58296-cwe-79-improper-neutralization-of-i-b507e6f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58296%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PhoenixCart%20CE%20Phoenix&amp;severity=medium&amp;id=693b3df122246175c6a470b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58295-cwe-434-unrestricted-upload-of-file-8939f84b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58295%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20elkarte%20ElkArte%20Forum&amp;severity=high&amp;id=693b3df122246175c6a470b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58292-cwe-79-improper-neutralization-of-i-5da1f4f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58292%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xmbforum2%20XMB%20Forum&amp;severity=medium&amp;id=693b3df122246175c6a470ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58290-cwe-89-improper-neutralization-of-s-193455b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58290%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Elements%20Xhibiter%20NFT%20Marketplace&amp;severity=critical&amp;id=693b3df122246175c6a470a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58288-cwe-428-unquoted-search-path-or-ele-348aada4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58288%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Genexus%20Genexus%20Protection%20Server&amp;severity=high&amp;id=693b3a6c22246175c6a3cf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58286-cwe-78-improper-neutralization-of-s-e573a495</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58286%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20vexorian%20dizqueTV&amp;severity=critical&amp;id=693b3a6c22246175c6a3cf17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64721-cwe-190-integer-overflow-or-wraparo-1c3827ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64721%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20sandboxie-plus%20Sandboxie&amp;severity=critical&amp;id=693b36e922246175c6a34f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14538-cross-site-scripting-in-yangshare-w-6d48ab27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14538%3A%20Cross%20Site%20Scripting%20in%20yangshare%20warehouseManager%20%E4%BB%93%E5%BA%93%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=693b450222246175c6a639e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66584-cwe-121-stack-based-buffer-overflow-d53558a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66584&amp;severity=null&amp;id=693b336622246175c6a2b863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66585-cwe-416-use-after-free-in-azeotech--779a7eac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66585%3A%20CWE-416%20Use%20After%20Free%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b336622246175c6a2b866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13664-cwe-427-uncontrolled-search-path-el-6dd1c9c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13664%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=693b450222246175c6a639e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66586-cwe-843-access-of-resource-using-in-af0dc2d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66586%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b450222246175c6a639eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66587-cwe-122-heap-based-buffer-overflow--ca48a191</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66587&amp;severity=null&amp;id=693b450222246175c6a639ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66588-cwe-824-access-of-uninitialized-poi-3480f610</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66588%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b450222246175c6a639f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66589-cwe-125-out-of-bounds-read-in-azeot-531f080c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66589%3A%20CWE-125%20Out-of-bounds%20Read%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b2fe222246175c69eaa80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66590-cwe-787-out-of-bounds-write-in-azeo-f7b7355d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66590%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b2fe222246175c69eaa83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13663-cwe-279-incorrect-execution-assigne-fbc00d91</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13663%3A%20CWE-279%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=693b2fe222246175c69eaa86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14537-sql-injection-in-code-projects-clas-e978ac52</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14537%3A%20SQL%20Injection%20in%20code-projects%20Class%20and%20Exam%20Timetable%20Management&amp;severity=medium&amp;id=693b2c5f22246175c6996d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14293-cwe-22-improper-limitation-of-a-pat-50edf3c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14293%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=693b2c5f22246175c6996d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55184-cwe-502-deserialization-of-untruste-59984423</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55184%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data.%20(CWE-400)%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-webpack&amp;severity=high&amp;id=693b270d22246175c6965c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55183-cwe-502-deserialization-of-untruste-7a101b26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55183%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data.%20(CWE-497)%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Actor%20in%20Meta%20react-server-dom-webpack&amp;severity=medium&amp;id=693b270d22246175c6965c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14536-sql-injection-in-code-projects-clas-d5947bee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14536%3A%20SQL%20Injection%20in%20code-projects%20Class%20and%20Exam%20Timetable%20Management&amp;severity=medium&amp;id=693b270d22246175c6965c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13214-cwe-89-improper-neutralization-of-s-1e0fba3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13214%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Aspera%20Orchestrator&amp;severity=high&amp;id=693b24d97d4c6f31f7c3ec33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13148-cwe-620-unverified-password-change--b0f8539e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13148%3A%20CWE-620%20Unverified%20Password%20Change%20in%20IBM%20Aspera%20Orchestrator&amp;severity=high&amp;id=693b270d22246175c6965c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13481-cwe-78-improper-neutralization-of-s-284019e8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13481%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Aspera%20Orchestrator&amp;severity=high&amp;id=693b21637d4c6f31f7c352f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13211-cwe-799-improper-control-of-interac-29c34e7a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13211%3A%20CWE-799%20Improper%20Control%20of%20Interaction%20Frequency%20in%20IBM%20Aspera%20Orchestrator&amp;severity=medium&amp;id=693b21637d4c6f31f7c352ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42197-cwe-256-plaintext-storage-of-a-pass-9912afb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42197%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20HCL%20Software%20Workload%20Scheduler&amp;severity=medium&amp;id=693b21637d4c6f31f7c352f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36938-elevation-of-privilege-in-google-an-a07add33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36938%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=693b21667d4c6f31f7c3537b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36937-remote-code-execution-in-google-and-45492619</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36937%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=693b21667d4c6f31f7c35378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36936-elevation-of-privilege-in-google-an-d7686d50</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36936%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c35375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36935-elevation-of-privilege-in-google-an-11970228</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36935%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c35372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36934-elevation-of-privilege-in-google-an-7b7613ad</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36934%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c3536f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36932-elevation-of-privilege-in-google-an-433d6ce1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36932%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c3536c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36931-elevation-of-privilege-in-google-an-d573d50f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36931%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c35369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36930-elevation-of-privilege-in-google-an-49fa2dd8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36930%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c35337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36929-information-disclosure-in-google-an-ccd89043</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36929%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=693b21657d4c6f31f7c35334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36928-elevation-of-privilege-in-google-an-3001b801</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36928%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c35331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36927-elevation-of-privilege-in-google-an-847468e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36927%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c3532e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36925-elevation-of-privilege-in-google-an-993858bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36925%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c3532b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36924-elevation-of-privilege-in-google-an-2c80c1b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36924%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c35328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36923-elevation-of-privilege-in-google-an-cbebcde4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36923%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c35325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36922-elevation-of-privilege-in-google-an-cacc31d2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36922%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=693b21657d4c6f31f7c35322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36921-information-disclosure-in-google-an-8a1b88ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36921%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=693b21657d4c6f31f7c3531f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36919-elevation-of-privilege-in-google-an-68939231</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36919%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c3531c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36918-elevation-of-privilege-in-google-an-1da2394b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36918%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21637d4c6f31f7c3530f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36917-denial-of-service-in-google-android-15428c78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36917%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=693b21637d4c6f31f7c3530c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36916-elevation-of-privilege-in-google-an-c8270119</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36916%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21637d4c6f31f7c35309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36912-denial-of-service-in-google-android-6ac1f15b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36912%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=693b21637d4c6f31f7c35306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36889-information-disclosure-in-google-an-76128643</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36889%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=693b21637d4c6f31f7c35302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14535-buffer-overflow-in-utt-512w-d00ee28b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14535%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=critical&amp;id=693b21637d4c6f31f7c352fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14534-buffer-overflow-in-utt-512w-46bf1244</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14534%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=critical&amp;id=693b1a517d4c6f31f7c1d601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14531-crlf-injection-in-code-projects-ren-41420a31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14531%3A%20CRLF%20Injection%20in%20code-projects%20Rental%20Management%20System&amp;severity=medium&amp;id=693b0fc17d4c6f31f7bf9f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13780-vulnerability-in-pgadminorg-pgadmin-21431ea8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13780%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=critical&amp;id=693b0fc17d4c6f31f7bf9f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ais-exploiting-smart-contracts-schneier-on-securit-e8fa41f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AIs%20Exploiting%20Smart%20Contracts%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=693b0c397d4c6f31f7befa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-modern-tale-of-blinkenlights-560ab5f8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20modern%20tale%20of%20blinkenlights&amp;severity=medium&amp;id=693b0c547d4c6f31f7beff53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64669-cwe-284-improper-access-control-in--6452b96e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64669%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14046-cwe-79-improper-neutralization-of-i-ff6a5891</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14046%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=693b08b87d4c6f31f7be3ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14530-unrestricted-upload-in-sourcecodest-789dbf63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14530%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Real%20Estate%20Property%20Listing%20App&amp;severity=medium&amp;id=693b01b07d4c6f31f7bc5fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14529-sql-injection-in-campcodes-retro-ba-7e4aa8dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14529%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=693b01b07d4c6f31f7bc5fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-visual-studio-code-extensions-hide-troja-9d61238d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Visual%20Studio%20Code%20Extensions%20Hide%20Trojan%20in%20Fake%20PNG%20Files&amp;severity=medium&amp;id=693afe2a7d4c6f31f7bb5d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/empirical-analysis-non-linear-token-consumption-in-88c3bbce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Empirical%20Analysis%3A%20Non-Linear%20Token%20Consumption%20in%20AI%20Security%20Agents&amp;severity=medium&amp;id=693afe3d7d4c6f31f7bb62e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14528-information-disclosure-in-d-link-di-44183a7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14528%3A%20Information%20Disclosure%20in%20D-Link%20DIR-803&amp;severity=medium&amp;id=693b21667d4c6f31f7c35384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14527-sql-injection-in-projectworlds-adva-848d3888</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14527%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=693b21667d4c6f31f7c3537e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66048-cwe-121-stack-based-buffer-overflow-63acfcba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66048%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66047-cwe-121-stack-based-buffer-overflow-558eb0a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66047%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66046-cwe-121-stack-based-buffer-overflow-488eccfa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66046%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66045-cwe-121-stack-based-buffer-overflow-39fd2846</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66045%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66044-cwe-121-stack-based-buffer-overflow-9bbd1d59</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66044%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66043-cwe-121-stack-based-buffer-overflow-e5b994bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66043%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14526-buffer-overflow-in-tenda-ch22-4c5a0970</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14526%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=693af7247d4c6f31f7ba56eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8273-cwe-290-authentication-bypass-by-spo-f2b13a60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8273%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20HYPR%20Server&amp;severity=high&amp;id=693af7247d4c6f31f7ba56e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14522-unrestricted-upload-in-baowzh-hfly-5b21e5fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14522%3A%20Unrestricted%20Upload%20in%20baowzh%20hfly&amp;severity=medium&amp;id=693af01c7d4c6f31f7b8523c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14521-path-traversal-in-baowzh-hfly-a9b21e5d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14521%3A%20Path%20Traversal%20in%20baowzh%20hfly&amp;severity=medium&amp;id=693af01c7d4c6f31f7b85236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14520-path-traversal-in-baowzh-hfly-69820617</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14520%3A%20Path%20Traversal%20in%20baowzh%20hfly&amp;severity=medium&amp;id=693ae5917d4c6f31f7b66fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67742-cwe-22-in-jetbrains-teamcity-806e6fe1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67742%3A%20CWE-22%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=693ae5917d4c6f31f7b66ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67741-cwe-79-in-jetbrains-teamcity-f3b1e374</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67741%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=693ae5917d4c6f31f7b66ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67740-cwe-863-in-jetbrains-teamcity-3a7f0d29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67740%3A%20CWE-863%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=693ae5917d4c6f31f7b66ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67739-cwe-939-in-jetbrains-teamcity-7d768ed3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67739%3A%20CWE-939%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=693ae5917d4c6f31f7b66ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breach-of-120-000-ip-cameras-in-south-korea-securi-83a7314b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Breach%20of%20120%20000%20IP%20cameras%20in%20South%20Korea%3A%20security%20tips%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=693ae21c7d4c6f31f7b56f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14519-cross-site-scripting-in-baowzh-hfly-ecaea1f1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14519%3A%20Cross%20Site%20Scripting%20in%20baowzh%20hfly&amp;severity=medium&amp;id=693ade897d4c6f31f7b4ab93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14518-server-side-request-forgery-in-powe-a9e81fba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14518%3A%20Server-Side%20Request%20Forgery%20in%20PowerJob&amp;severity=medium&amp;id=693ade897d4c6f31f7b4ab8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-droidlock-android-malware-locks-users-out-and--f5b691a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98DroidLock%E2%80%99%20Android%20Malware%20Locks%20Users%20Out%20and%20Spies%20via%20Front%20Camera&amp;severity=medium&amp;id=693adb047d4c6f31f7b42ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nanoremote-malware-uses-google-drive-api-for-hidde-327d2869</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NANOREMOTE%20Malware%20Uses%20Google%20Drive%20API%20for%20Hidden%20Control%20on%20Windows%20Systems&amp;severity=high&amp;id=693adb047d4c6f31f7b42acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13124-cwe-639-authorization-bypass-throug-3b0ad761</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13124%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Netiket%20Information%20Technologies%20Ltd.%20Co.%20ApplyLogic&amp;severity=high&amp;id=693ad7807d4c6f31f7b3bc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14265-cwe-494-download-of-code-without-in-33bc719b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14265%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ConnectWise%20ScreenConnect&amp;severity=critical&amp;id=693ad7807d4c6f31f7b3bc47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40593-improper-access-control-in-fortinet-050250af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40593%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=693ad4127d4c6f31f7b2bf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/former-accenture-employee-charged-over-cybersecuri-35e7011a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Former%20Accenture%20Employee%20Charged%20Over%20Cybersecurity%20Fraud&amp;severity=medium&amp;id=693ad3f17d4c6f31f7b2badc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14517-improper-export-of-android-applicat-55724918</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14517%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Yalantis%20uCrop&amp;severity=medium&amp;id=693ad0797d4c6f31f7b1f560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14516-server-side-request-forgery-in-yala-fb47778b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14516%3A%20Server-Side%20Request%20Forgery%20in%20Yalantis%20uCrop&amp;severity=medium&amp;id=693ad0797d4c6f31f7b1f559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-posts-results-of-2025-attck-enterprise-evalu-0eb3a600</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Posts%20Results%20of%202025%20ATT%26CK%20Enterprise%20Evaluations&amp;severity=medium&amp;id=693accfb7d4c6f31f7b0b9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-targeted-by-active-in-the-wild-exploit-tied-116bbe5d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Targeted%20by%20Active%20In-the-Wild%20Exploit%20Tied%20to%20Undisclosed%20High-Severity%20Flaw&amp;severity=high&amp;id=693acd187d4c6f31f7b0c101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-spyware-alerts-mirai-strikes-d-730faa97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Spyware%20Alerts%2C%20Mirai%20Strikes%2C%20Docker%20Leaks%2C%20ValleyRAT%20Rootkit%20%E2%80%94%20and%2020%20More%20Stories&amp;severity=medium&amp;id=693acce57d4c6f31f7b0b4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-gogs-zero-day-exploited-across-700-insta-b391b33d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20Gogs%20Zero-Day%20Exploited%20Across%20700%2B%20Instances%20Amid%20Active%20Attacks&amp;severity=critical&amp;id=693acd187d4c6f31f7b0c0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wirte-leverages-ashenloader-sideloading-to-install-3b1a361f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WIRTE%20Leverages%20AshenLoader%20Sideloading%20to%20Install%20the%20AshTag%20Espionage%20Backdoor&amp;severity=high&amp;id=693acd187d4c6f31f7b0c105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pierce-county-library-data-breach-impacts-340000-457ba017</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pierce%20County%20Library%20Data%20Breach%20Impacts%20340%2C000&amp;severity=medium&amp;id=693ac25c7d4c6f31f7ae2375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-sent-40000-e-signature-phishing-emails-sh-b78c2148</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Sent%2040%2C000%20E-Signature%20Phishing%20Emails%20(SharePoint%20and%20DocuSign)%20to%206%2C000%20Firms%20in%20Just%202%20Weeks&amp;severity=medium&amp;id=693abee27d4c6f31f7ad98f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14523-inconsistent-interpretation-of-http-4cbaaaee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14523%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=693abef77d4c6f31f7ada077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wide-range-of-malware-delivered-in-react2shell-att-e4cc449e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wide%20Range%20of%20Malware%20Delivered%20in%20React2Shell%20Attacks&amp;severity=medium&amp;id=693ab7d17d4c6f31f7aaecf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13003-cwe-639-authorization-bypass-throug-4b1cef45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13003%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Aksis%20Computer%20Services%20and%20Consulting%20Inc.%20AxOnboard&amp;severity=high&amp;id=693ab7f17d4c6f31f7aaff14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hamas-affiliated-ashen-lepus-targets-middle-easter-89ba00b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hamas-Affiliated%20Ashen%20Lepus%20Targets%20Middle%20Eastern%20Diplomatic%20Entities%20With%20New%20AshTag%20Malware%20Suite&amp;severity=medium&amp;id=693ae20b7d4c6f31f7b56950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gold-salem-tradecraft-for-deploying-warlock-ransom-79ef8b24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GOLD%20SALEM%20tradecraft%20for%20deploying%20Warlock%20ransomware&amp;severity=medium&amp;id=693ae20b7d4c6f31f7b56928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vs-code-extensions-contain-trojan-laden-fake-image-389d08f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VS%20Code%20extensions%20contain%20trojan-laden%20fake%20image&amp;severity=medium&amp;id=693adb2d7d4c6f31f7b42f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14515-sql-injection-in-campcodes-supplier-7c827075</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14515%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=693ab7f17d4c6f31f7aaff17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-gogs-zero-day-exploited-for-months-2cec6881</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20Gogs%20Zero-Day%20Exploited%20for%20Months&amp;severity=critical&amp;id=693ab44c7d4c6f31f7a8e69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14514-sql-injection-in-campcodes-supplier-fd2e52e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14514%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=693ab0d47d4c6f31f7a6d986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-impact-of-robotic-process-automation-rpa-on-id-cd999196</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Impact%20of%20Robotic%20Process%20Automation%20(RPA)%20on%20Identity%20and%20Access%20Management&amp;severity=medium&amp;id=693b444622246175c6a5d1b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64995-cwe-427-uncontrolled-search-path-el-2664f923</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64995%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad537d4c6f31f7a5046b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64994-cwe-427-uncontrolled-search-path-el-58b16924</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64994%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad537d4c6f31f7a50468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64993-cwe-20-improper-input-validation-in-76053925</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64993%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad537d4c6f31f7a50465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64992-cwe-20-improper-input-validation-in-3ae08afb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64992%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64991-cwe-20-improper-input-validation-in-142d08d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64991%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64990-cwe-20-improper-input-validation-in-93368dbe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64990%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64989-cwe-20-improper-input-validation-in-4486ee6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64989%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64988-cwe-20-improper-input-validation-in-d94761f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64988%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64987-cwe-20-improper-input-validation-in-ba36c12c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64987%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64986-cwe-20-improper-input-validation-in-2309631f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64986%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46266-cwe-20-improper-input-validation-in-de06bcfa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46266%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44016-cwe-20-improper-input-validation-in-2ebc4e53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44016%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12687-cwe-20-improper-input-validation-in-653d9b1c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12687%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-gogs-zero-day-exploited-across-700-insta-0bd31457</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20Gogs%20Zero-Day%20Exploited%20Across%20700%2B%20Instances%20Amid%20Active%20Attacks&amp;severity=high&amp;id=693a9f317d4c6f31f79c024c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-attacks-exploit-gladinets-hard-coded-keys-f-4b87d4b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Attacks%20Exploit%20Gladinet&apos;s%20Hard-Coded%20Keys%20for%20Unauthorized%20Access%20and%20Code%20Execution&amp;severity=high&amp;id=693a9f527d4c6f31f79c062a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-fixes-eighth-chrome-zero-day-exploited-in-a-e1392167</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20fixes%20eighth%20Chrome%20zero-day%20exploited%20in%20attacks%20in%202025&amp;severity=critical&amp;id=693a9f527d4c6f31f79c062e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ibm-patches-over-100-vulnerabilities-06bb5c85</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IBM%20Patches%20Over%20100%20Vulnerabilities&amp;severity=critical&amp;id=693a9bb37d4c6f31f79b1658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-malware-now-uses-python-loader-to-byp-e67c2569</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Malware%20Now%20Uses%20Python%20Loader%20to%20Bypass%20Security&amp;severity=medium&amp;id=693a912e7d4c6f31f7964e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64701-privilege-chaining-in-qualitysoft-c-9f7cc552</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64701%3A%20Privilege%20chaining%20in%20QualitySoft%20Corporation%20QND%20Premium%2FAdvance%2FStandard&amp;severity=high&amp;id=693a7fa47d4c6f31f78f4e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-mysterious-chrome-zero-day-exploite-907589a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20Mysterious%20Chrome%20Zero-Day%20Exploited%20in%20the%20Wild&amp;severity=medium&amp;id=693a788e7d4c6f31f78cf3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14512-integer-overflow-or-wraparound-in-r-bbc3ea86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14512%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GNOME%20glib&amp;severity=medium&amp;id=693a726596da2fc9d6ded0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-targeted-by-active-in-the-wild-exploit-tied-838c9e82</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Targeted%20by%20Active%20In-the-Wild%20Exploit%20Tied%20to%20Undisclosed%20High-Severity%20Flaw&amp;severity=high&amp;id=693b444622246175c6a5d1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-attacks-exploit-gladinets-hard-coded-keys-f-43cb43d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Attacks%20Exploit%20Gladinet&apos;s%20Hard-Coded%20Keys%20for%20Unauthorized%20Access%20and%20Code%20Execution&amp;severity=critical&amp;id=693a718296da2fc9d6dd0936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9436-cwe-79-improper-neutralization-of-in-e72015b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9436%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Widgets%20for%20Google%20Reviews&amp;severity=medium&amp;id=693a3ebcbbbecd30a6fa3302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10163-cwe-89-improper-neutralization-of-s-c79701db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10163%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fernandobt%20List%20category%20posts&amp;severity=medium&amp;id=693a3ebcbbbecd30a6fa32fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14485-command-injection-in-efm-iptime-a30-ddc1c3db</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14485%3A%20Command%20Injection%20in%20EFM%20ipTIME%20A3004T&amp;severity=low&amp;id=693a37b4bbbecd30a6f5d200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-ai-gemma-3-locally-with-a-single-cpu-wed-dec-ae410137</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20%2C%20(Wed%2C%20Dec%2010th)&amp;severity=medium&amp;id=693a309cbbbecd30a6f44004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13764-cwe-269-improper-privilege-manageme-e97de041</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13764%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ApusTheme%20WP%20CarDealer&amp;severity=critical&amp;id=693a30aebbbecd30a6f44761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11467-cwe-918-server-side-request-forgery-0e91ec94</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11467%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20themeisle%20RSS%20Aggregator%20by%20Feedzy%20%E2%80%93%20Feed%20to%20Post%2C%20Autoblogging%2C%20News%20%26%20YouTube%20Video%20Feeds%20Aggregator&amp;severity=medium&amp;id=693a30aebbbecd30a6f4475d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67720-cwe-22-improper-limitation-of-a-pat-98a8df5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67720%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mayuri-Chan%20pyrofork&amp;severity=medium&amp;id=693a262ebbbecd30a6f23cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67719-cwe-620-unverified-password-change--b84becb0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67719%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20ibexa%20user&amp;severity=high&amp;id=693a262ebbbecd30a6f23ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67716-cwe-184-incomplete-list-of-disallow-9665847a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67716%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20auth0%20nextjs-auth0&amp;severity=medium&amp;id=693a149dbbbecd30a6dedd3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67713-cwe-601-url-redirection-to-untruste-47c2726a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67713%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20miniflux%20v2&amp;severity=medium&amp;id=693a0f09e425ca5072e7e482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-11-7ee2fc62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-11&amp;severity=medium&amp;id=693b5e948a7c12acf2ca9aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66429-na-d7c48408</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66429%3A%20n%2Fa&amp;severity=high&amp;id=693b2c5f22246175c6996d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55816-na-5130dac0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55816%3A%20n%2Fa&amp;severity=medium&amp;id=693b28e322246175c6977630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56130-na-00db804b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56130%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56129-na-90d1c0b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56129%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56127-na-09de8e5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56127%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56124-na-32e7efad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56124%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56123-na-198b52d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56123%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56122-na-1114a23d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56122%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56120-na-1f7a7a7c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56120%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56118-na-13c7ce23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56118%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56117-na-fd038fb9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56117%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56114-na-73fffd18</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56114%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56113-na-0eef2fd9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56113%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56111-na-9c6c9a52</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56111%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56110-na-ba168e6f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56110%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56109-na-320a31a6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56109%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56108-na-f319f1b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56108%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56107-na-3895fa32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56107%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56106-na-78a308ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56106%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56102-na-4e1cc633</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56102%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56101-na-e04406b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56101%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56099-na-af426c88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56099%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56091-na-93b6fc72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56091%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56090-na-a70936d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56090%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56089-na-2e7a5644</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56089%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56088-na-6bd8c186</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56088%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56087-na-6cb764c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56087%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56086-na-e64eb0b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56086%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56085-na-93c616a9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56085%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56084-na-69eaba9d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56084%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56083-na-8e0df2a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56083%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56082-na-cffd4927</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56082%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56079-na-42d0e74d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56079%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56077-na-a2b35e43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56077%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56098-na-45b83694</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56098%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56097-na-e262ebb8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56097%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56096-na-b69f14ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56096%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56095-na-cd23e6ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56095%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56094-na-53ee51f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56094%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56093-na-535a78b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56093%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56092-na-cb46fcdf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56092%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66918-na-a5f1de48</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66918%3A%20n%2Fa&amp;severity=high&amp;id=693b01b07d4c6f31f7bc5fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65474-na-267bce03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65474%3A%20n%2Fa&amp;severity=high&amp;id=693af7247d4c6f31f7ba56f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65471-na-3a47ebd6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65471%3A%20n%2Fa&amp;severity=high&amp;id=693af7247d4c6f31f7ba56f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65473-na-acaf427e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65473%3A%20n%2Fa&amp;severity=critical&amp;id=693af3a07d4c6f31f7b8f5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65472-na-a783b09a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65472%3A%20n%2Fa&amp;severity=high&amp;id=693af3a07d4c6f31f7b8f5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55314-na-402053f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55314%3A%20n%2Fa&amp;severity=high&amp;id=693ae91d7d4c6f31f7b7120f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55313-na-0f55f7b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55313%3A%20n%2Fa&amp;severity=high&amp;id=693ae91d7d4c6f31f7b7120c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55312-na-50996030</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55312%3A%20n%2Fa&amp;severity=high&amp;id=693ae91d7d4c6f31f7b71209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55311-na-04eda2b5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55311%3A%20n%2Fa&amp;severity=medium&amp;id=693ae91d7d4c6f31f7b71206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55310-na-2f7ab0fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55310%3A%20n%2Fa&amp;severity=high&amp;id=693ae91d7d4c6f31f7b71203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55309-na-43679c77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55309%3A%20n%2Fa&amp;severity=medium&amp;id=693ae91d7d4c6f31f7b71200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55308-na-3169c443</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55308%3A%20n%2Fa&amp;severity=medium&amp;id=693ae91d7d4c6f31f7b711fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59803-na-a3093274</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59803%3A%20n%2Fa&amp;severity=medium&amp;id=693ae5917d4c6f31f7b66ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59802-na-6b412f40</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59802%3A%20n%2Fa&amp;severity=high&amp;id=693ae5917d4c6f31f7b66fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55307-na-e9ea8c0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55307%3A%20n%2Fa&amp;severity=low&amp;id=693ae5917d4c6f31f7b66feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67646-cwe-352-cross-site-request-forgery--bd97fdf9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67646%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Telepedia%20TableProgressTracking&amp;severity=low&amp;id=693a0800e425ca5072db0c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67644-cwe-89-improper-neutralization-of-s-753ef587</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67644%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20langchain-ai%20langgraph&amp;severity=high&amp;id=693a0800e425ca5072db0c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-droidlock-malware-locks-android-devices-and-de-0810409b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20DroidLock%20malware%20locks%20Android%20devices%20and%20demands%20a%20ransom&amp;severity=high&amp;id=693a047be425ca5072d903d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67511-cwe-77-improper-neutralization-of-s-63820d7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67511%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20aliasrobotics%20cai&amp;severity=critical&amp;id=693a12a7bbbecd30a6dd4e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67509-cwe-94-improper-control-of-generati-ff5dc9b2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67509%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20neuron-core%20neuron-ai&amp;severity=high&amp;id=6939ff557cb4621ebe9f6bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67510-cwe-250-execution-with-unnecessary--4cf6ea08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67510%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20neuron-core%20neuron-ai&amp;severity=critical&amp;id=6939fbd37cb4621ebe9b284d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67513-cwe-521-weak-password-requirements--883ee506</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67513%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20FreePBX%20endpoint&amp;severity=medium&amp;id=6939f84c7cb4621ebe960e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67505-cwe-362-concurrent-execution-using--8547fbfa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67505%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20okta%20okta-sdk-java&amp;severity=high&amp;id=6939f4c87cb4621ebe93c168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67490-cwe-863-incorrect-authorization-in--805f2ce7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67490%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20auth0%20nextjs-auth0&amp;severity=medium&amp;id=6939f4c87cb4621ebe93c164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66474-cwe-95-improper-neutralization-of-d-8b993f01</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66474%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwiki%20xwiki-rendering&amp;severity=high&amp;id=6939efe25ab76fdc5f31bfa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66473-cwe-770-allocation-of-resources-wit-74624010</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66473%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=6939efe25ab76fdc5f31bfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66033-cwe-401-missing-release-of-memory-a-867c1ec9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66033%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20okta%20okta-sdk-java&amp;severity=medium&amp;id=6939ec5a5ab76fdc5f2d8880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66472-cwe-79-improper-neutralization-of-i-5defd6b7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66472%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=6939ec5a5ab76fdc5f2d8884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58283-cwe-434-unrestricted-upload-of-file-897086fd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58283%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wbce%20WBCE%20CMS&amp;severity=high&amp;id=6939e5605ab76fdc5f2656e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58279-cwe-434-unrestricted-upload-of-file-6de1e447</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58279%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20apprain%20appRain%20CMF&amp;severity=high&amp;id=6939e5605ab76fdc5f2656e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53776-cwe-384-session-fixation-in-db-elet-5166dbc1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53776%3A%20CWE-384%3A%20Session%20Fixation%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20Series%20-%20Compact%20Radio%20DAB%20Transmitter&amp;severity=high&amp;id=6939e5605ab76fdc5f2656db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-10000-docker-hub-images-found-leaking-credent-8ebfb8b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2010%2C000%20Docker%20Hub%20images%20found%20leaking%20credentials%2C%20auth%20keys&amp;severity=high&amp;id=6939e54f5ab76fdc5f264c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53775-cwe-384-session-fixation-in-db-elet-ccb422bf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53775%3A%20CWE-384%3A%20Session%20Fixation%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20Series%20-%20Compact%20Radio%20DAB%20Transmitter&amp;severity=high&amp;id=6939e5605ab76fdc5f2656d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53741-cwe-384-session-fixation-in-db-elet-0c9487fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53741%3A%20CWE-384%3A%20Session%20Fixation%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20Series%20-%20Compact%20Radio%20DAB%20Transmitter&amp;severity=medium&amp;id=6939e1d75ab76fdc5f21095a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53740-cwe-862-missing-authorization-in-db-cf46e30d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53740%3A%20CWE-862%3A%20Missing%20Authorization%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20Series%20-%20Compact%20Radio%20DAB%20Transmitter&amp;severity=high&amp;id=6939e1d75ab76fdc5f210952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62181-cwe-204-observable-response-discrep-d58506b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62181%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=6939dce9a97935729e774028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65950-cwe-89-improper-neutralization-of-s-dae8c159</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65950%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WBCE%20WBCE_CMS&amp;severity=critical&amp;id=6939dceba97935729e77408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67460-cwe-693-protection-mechanism-failur-6af4b16b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67460%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=high&amp;id=6939dceba97935729e774094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67461-cwe-73-external-control-of-file-nam-8861551b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67461%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=medium&amp;id=6939dceba97935729e774097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/torrent-for-dicaprios-one-battle-after-another-mov-167c803a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Torrent%20for%20DiCaprio%E2%80%99s%20%E2%80%9COne%20Battle%20After%20Another%E2%80%9D%20Movie%20Drops%20Agent%20Tesla&amp;severity=medium&amp;id=6939d960a97935729e728209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-exploitation-delivers-crypto-miners-an-21a1bb4a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Exploitation%20Delivers%20Crypto%20Miners%20and%20New%20Malware%20Across%20Multiple%20Sectors&amp;severity=medium&amp;id=6939dea8a97935729e794a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/browser-hijacking-techniques-some-education-requir-9af8a4ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Browser%20Hijacking%20Techniques%3A%20Some%20education%20required&amp;severity=medium&amp;id=693a8a287d4c6f31f792ee34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/net-soapwn-flaw-opens-door-for-file-writes-and-rem-394da945</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=.NET%20SOAPwn%20Flaw%20Opens%20Door%20for%20File%20Writes%20and%20Remote%20Code%20Execution%20via%20Rogue%20WSDL&amp;severity=critical&amp;id=6939dea8a97935729e794a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigating-an-adversary-in-the-middle-phishing--13d77b93</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigating%20an%20adversary-in-the-middle%20phishing%20campaign%20targeting%20Microsoft%20365%20and%20Okta%20users&amp;severity=medium&amp;id=693a8a287d4c6f31f792ee0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures-16ab5e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gogs%20Zero-Day%20RCE%20(CVE-2025-8110)%20Actively%20Exploited&amp;severity=medium&amp;id=682c992c7960f6956616ab5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nanoremote-cousin-of-finaldraft-bfb18425</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NANOREMOTE%2C%20cousin%20of%20FINALDRAFT&amp;severity=medium&amp;id=693a8a287d4c6f31f792edfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covert-red-team-phishing-343db125</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Covert%20red%20team%20phishing&amp;severity=medium&amp;id=6939bdc1fe7b3954b690bfdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64622-cross-site-scripting-stored-xss-cwe-d5c989da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64622%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64582-cross-site-scripting-stored-xss-cwe-0ab4605c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64582%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64547-cross-site-scripting-stored-xss-cwe-0355764f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64547%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64833-cross-site-scripting-stored-xss-cwe-f514a9ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64833%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64613-cross-site-scripting-stored-xss-cwe-c1fac439</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64613%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64829-cross-site-scripting-stored-xss-cwe-ff0c1d1f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64829%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64553-cross-site-scripting-stored-xss-cwe-ff291706</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64553%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64545-cross-site-scripting-dom-based-xss--9c6cf7ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64545%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690adf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64546-cross-site-scripting-stored-xss-cwe-6b7ad79c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64546%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690adf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64537-cross-site-scripting-dom-based-xss--ea0e3922</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64537%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=6939bda4fe7b3954b690addf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64574-cross-site-scripting-stored-xss-cwe-949d77fd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64574%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64550-cross-site-scripting-dom-based-xss--8decbdfe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64550%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64827-cross-site-scripting-stored-xss-cwe-e4b0761f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64827%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64602-cross-site-scripting-stored-xss-cwe-01fd320a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64602%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64593-cross-site-scripting-stored-xss-cwe-5dfbfb82</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64593%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64539-cross-site-scripting-dom-based-xss--a31615bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64539%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=6939bda4fe7b3954b690ade5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64887-cross-site-scripting-dom-based-xss--9165240e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64887%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64548-cross-site-scripting-stored-xss-cwe-9c2a0040</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64548%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64563-cross-site-scripting-dom-based-xss--f8f6a49d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64563%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64800-cross-site-scripting-stored-xss-cwe-5840d6fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64800%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64559-cross-site-scripting-stored-xss-cwe-c4f076fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64559%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64817-cross-site-scripting-stored-xss-cwe-3dab139f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64817%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64888-cross-site-scripting-dom-based-xss--84efb933</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64888%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64600-cross-site-scripting-stored-xss-cwe-eb45f841</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64600%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64583-cross-site-scripting-dom-based-xss--0f144197</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64583%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64826-cross-site-scripting-stored-xss-cwe-0ee70e86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64826%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64538-cross-site-scripting-dom-based-xss--a462f6dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64538%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=6939bda4fe7b3954b690ade2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64605-cross-site-scripting-stored-xss-cwe-b48df603</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64605%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64875-cross-site-scripting-stored-xss-cwe-e02846b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64875%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64598-cross-site-scripting-stored-xss-cwe-6df1eda5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64598%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64558-cross-site-scripting-stored-xss-cwe-787b9263</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64558%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64616-cross-site-scripting-stored-xss-cwe-a4c649c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64616%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64820-cross-site-scripting-stored-xss-cwe-e40127dd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64820%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64861-cross-site-scripting-stored-xss-cwe-900f0c1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64861%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64801-cross-site-scripting-stored-xss-cwe-50e02b46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64801%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64620-cross-site-scripting-stored-xss-cwe-18993c03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64620%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64601-cross-site-scripting-stored-xss-cwe-43929457</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64601%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64560-cross-site-scripting-dom-based-xss--48d58b86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64560%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64556-cross-site-scripting-stored-xss-cwe-e3dd1b42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64556%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64565-cross-site-scripting-dom-based-xss--28650235</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64565%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64606-cross-site-scripting-stored-xss-cwe-abd6c6b7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64606%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64823-cross-site-scripting-stored-xss-cwe-92bd1b51</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64823%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64596-cross-site-scripting-stored-xss-cwe-501a521b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64596%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64572-cross-site-scripting-stored-xss-cwe-f72dcda4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64572%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64541-cross-site-scripting-stored-xss-cwe-993e417d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64541%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690ade8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64609-cross-site-scripting-stored-xss-cwe-39d027a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64609%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64822-cross-site-scripting-stored-xss-cwe-47fdc99e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64822%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64789-cross-site-scripting-stored-xss-cwe-4f685868</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64789%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64881-cross-site-scripting-stored-xss-cwe-7fad6cea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64881%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64825-cross-site-scripting-stored-xss-cwe-45644575</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64825%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64845-cross-site-scripting-stored-xss-cwe-b433f035</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64845%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64626-cross-site-scripting-stored-xss-cwe-b9a34e65</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64626%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64544-cross-site-scripting-dom-based-xss--ffff894d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64544%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690adee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64597-cross-site-scripting-stored-xss-cwe-609d6ed5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64597%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64611-cross-site-scripting-stored-xss-cwe-96c8dbc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64611%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64821-cross-site-scripting-stored-xss-cwe-652105dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64821%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64580-cross-site-scripting-stored-xss-cwe-62250efd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64580%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64586-cross-site-scripting-stored-xss-cwe-329887b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64586%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64627-cross-site-scripting-stored-xss-cwe-3e24f0a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64627%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64566-cross-site-scripting-dom-based-xss--aae7d734</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64566%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64604-cross-site-scripting-stored-xss-cwe-bb5ebe7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64604%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64599-cross-site-scripting-stored-xss-cwe-203e2085</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64599%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64804-cross-site-scripting-stored-xss-cwe-f9af0c28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64804%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64623-cross-site-scripting-stored-xss-cwe-5737cd57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64623%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64858-cross-site-scripting-stored-xss-cwe-4f77fa3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64858%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64847-cross-site-scripting-stored-xss-cwe-06581d7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64847%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64607-cross-site-scripting-stored-xss-cwe-9f9a71ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64607%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64803-cross-site-scripting-stored-xss-cwe-d92d291a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64803%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34429-cwe-352-cross-site-request-forgery--cdc26e79</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34429%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LXware%201Panel&amp;severity=high&amp;id=6939bda4fe7b3954b690add5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64577-cross-site-scripting-stored-xss-cwe-c620d46f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64577%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64863-cross-site-scripting-stored-xss-cwe-fcd0ec3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64863%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64853-cross-site-scripting-stored-xss-cwe-0dbbd564</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64853%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64814-cross-site-scripting-stored-xss-cwe-c999e1f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64814%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64612-cross-site-scripting-stored-xss-cwe-9064e575</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64612%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64857-cross-site-scripting-stored-xss-cwe-abeb7e82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64857%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64794-cross-site-scripting-stored-xss-cwe-6baa027a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64794%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64591-cross-site-scripting-stored-xss-cwe-cc44b1b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64591%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64555-cross-site-scripting-stored-xss-cwe-c6eb5c56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64555%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64549-cross-site-scripting-stored-xss-cwe-cbb97323</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64549%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64808-cross-site-scripting-stored-xss-cwe-db0c87a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64808%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64840-cross-site-scripting-stored-xss-cwe-c8da1c70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64840%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690bea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64564-cross-site-scripting-dom-based-xss--ca078768</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64564%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64551-cross-site-scripting-dom-based-xss--47dfa67f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64551%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64569-cross-site-scripting-dom-based-xss--7b2d3a31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64569%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64850-cross-site-scripting-stored-xss-cwe-d9c57326</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64850%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64592-cross-site-scripting-stored-xss-cwe-dcc86619</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64592%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64543-cross-site-scripting-dom-based-xss--33f4d9b0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64543%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690adeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64578-cross-site-scripting-stored-xss-cwe-7b36503f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64578%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64839-cross-site-scripting-stored-xss-cwe-1ac36baa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64839%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34430-cwe-352-cross-site-request-forgery--bc04049c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34430%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LXware%201Panel&amp;severity=medium&amp;id=6939bda4fe7b3954b690adda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64554-cross-site-scripting-stored-xss-cwe-96dfce29</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64554%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64791-cross-site-scripting-stored-xss-cwe-44682a38</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64791%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64841-cross-site-scripting-stored-xss-cwe-a7d263d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64841%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64619-cross-site-scripting-stored-xss-cwe-dc5f7c0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64619%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64799-cross-site-scripting-stored-xss-cwe-606de0e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64799%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64581-cross-site-scripting-stored-xss-cwe-90cab848</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64581%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64852-cross-site-scripting-stored-xss-cwe-2d46487f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64852%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64576-cross-site-scripting-stored-xss-cwe-40028bc8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64576%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64615-cross-site-scripting-stored-xss-cwe-5b9ac2d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64615%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64873-cross-site-scripting-stored-xss-cwe-da9ce92e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64873%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64590-cross-site-scripting-stored-xss-cwe-d7725f89</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64590%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64557-cross-site-scripting-stored-xss-cwe-1c49cb63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64557%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64790-cross-site-scripting-stored-xss-cwe-07d86705</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64790%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64585-cross-site-scripting-stored-xss-cwe-4ff1c024</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64585%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64797-cross-site-scripting-stored-xss-cwe-14e06d79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64797%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64579-cross-site-scripting-stored-xss-cwe-a9daae9b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64579%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64869-cross-site-scripting-stored-xss-cwe-47ed696a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64869%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64796-cross-site-scripting-stored-xss-cwe-83437c29</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64796%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64603-cross-site-scripting-stored-xss-cwe-b4b1b0ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64603%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64792-cross-site-scripting-stored-xss-cwe-909e434d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64792%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64575-cross-site-scripting-stored-xss-cwe-c2717fed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64575%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64802-cross-site-scripting-stored-xss-cwe-f966ae2b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64802%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64793-cross-site-scripting-stored-xss-cwe-c3079333</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64793%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64594-cross-site-scripting-stored-xss-cwe-f85a0e88</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64594%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64614-cross-site-scripting-stored-xss-cwe-ab85b942</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64614%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64872-cross-site-scripting-stored-xss-cwe-21ead94f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64872%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690beda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64562-cross-site-scripting-dom-based-xss--88bcc4f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64562%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65199-cwe-78-improper-neutralization-of-s-275a32aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65199%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Windscribe%20Windscribe%20for%20Linux%20Desktop%20App&amp;severity=high&amp;id=6939ba1ffe7b3954b68b96e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5467-cwe-708-incorrect-ownership-assignme-3a4651f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5467%3A%20CWE-708%3A%20Incorrect%20Ownership%20Assignment%20in%20Canonical%20apport&amp;severity=low&amp;id=6939b696fe7b3954b689178f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-stealer-hiding-in-blender-3d-models-kaspersky-of-14ce5b74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20stealer%20hiding%20in%20Blender%203D%20models%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6939b6a0fe7b3954b6891b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-ruse-valleyrat-hits-china-via-fake-microso-b28fbd5d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Ruse%3A%20ValleyRAT%20Hits%20China%20via%20Fake%20Microsoft%20Teams%20Attack&amp;severity=medium&amp;id=693a8a287d4c6f31f792edc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13607-cwe-306-missing-authentication-for--49c1ceb8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13607%3A%20CWE-306%20in%20D-Link%20DCS-F5614-L1&amp;severity=critical&amp;id=6939ae2d62aa6c8a0e4448a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soapwn-pwning-net-framework-applications-through-h-d0196e41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SOAPwn%3A%20Pwning%20.NET%20Framework%20Applications%20Through%20HTTP%20Client%20Proxies%20And%20WSDL%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=6939ae3162aa6c8a0e444984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-has-entered-the-chat-3ff6e63a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20has%20entered%20the%20chat&amp;severity=high&amp;id=6939a67462aa6c8a0e3c6b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67643-vulnerability-in-jenkins-project-je-61431caa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67643%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Redpen%20-%20Pipeline%20Reporter%20for%20Jira%20Plugin&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67642-vulnerability-in-jenkins-project-je-81600b0d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67642%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20HashiCorp%20Vault%20Plugin&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67641-vulnerability-in-jenkins-project-je-b7f4f1d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67641%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Coverage%20Plugin&amp;severity=high&amp;id=6939a66f62aa6c8a0e3c6b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67640-vulnerability-in-jenkins-project-je-07d868d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67640%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Git%20client%20Plugin&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67639-vulnerability-in-jenkins-project-je-324e19b5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67639%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=low&amp;id=6939a66f62aa6c8a0e3c6b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67638-vulnerability-in-jenkins-project-je-617b3e61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67638%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67637-vulnerability-in-jenkins-project-je-d015ddf2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67637%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67636-vulnerability-in-jenkins-project-je-26a550b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67636%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67635-vulnerability-in-jenkins-project-je-e676f964</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67635%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=6939a66f62aa6c8a0e3c6b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-deploy-etherrat-malware-in-re-b48ea74c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Deploy%20EtherRAT%20Malware%20in%20React2Shell%20Exploits&amp;severity=medium&amp;id=6939a2f762aa6c8a0e36f854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-pcie-encryption-weaknesses-expose-pcie-50-sy-9aadf782</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20PCIe%20Encryption%20Weaknesses%20Expose%20PCIe%205.0%2B%20Systems%20to%20Faulty%20Data%20Handling&amp;severity=high&amp;id=6939a1a8b45ef26b31b81e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34410-cwe-352-cross-site-request-forgery--ff5d8ced</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LXware%201Panel&amp;severity=high&amp;id=69399ca286adcdec9b1a61f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-fake-video-scams-schneier-on-security-322efc99</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Fake%20Video%20Scams%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6939991e86adcdec9b16478c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-hacker-charged-with-helping-russian-hack-1fc3c034</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20hacker%20charged%20with%20helping%20Russian%20hacktivist%20groups&amp;severity=high&amp;id=6939991e86adcdec9b164788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34395-cwe-22-improper-limitation-of-a-pat-d21fd03a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34395%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Barracuda%20Networks%20RMM&amp;severity=high&amp;id=6939994886adcdec9b166036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34394-cwe-502-deserialization-of-untruste-9032e7c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34394%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Barracuda%20Networks%20RMM&amp;severity=critical&amp;id=6939994886adcdec9b166031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34393-cwe-470-use-of-externally-controlle-f9b8725c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34393%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Barracuda%20Networks%20RMM&amp;severity=critical&amp;id=6939994886adcdec9b16602c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34392-cwe-36-absolute-path-traversal-in-b-1926d191</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34392%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Barracuda%20Networks%20RMM&amp;severity=critical&amp;id=6939994886adcdec9b166027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/possible-exploit-variant-for-cve-2024-9042-kuberne-e93b1ef6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Possible%20exploit%20variant%20for%20CVE-2024-9042%20(Kubernetes%20OS%20Command%20Injection)%2C%20(Wed%2C%20Dec%2010th)&amp;severity=medium&amp;id=6939920a86adcdec9b0f4365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cracking-valleyrat-from-builder-secrets-to-kernel--5cc63cce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cracking%20ValleyRAT%3A%20From%20Builder%20Secrets%20to%20Kernel%20Rootkits&amp;severity=high&amp;id=693989485f410c6b20afc44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13125-cwe-639-authorization-bypass-throug-b2e7c443</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13125%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Im%20Park%20Information%20Technology%2C%20Electronics%2C%20Press%2C%20Publishing%20and%20Advertising%2C%20Education%20Ltd.%20Co.%20DijiDemi&amp;severity=medium&amp;id=6939823e5f410c6b20a8995d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13155-cwe-276-incorrect-default-permissio-b276ee43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13155%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20Baiying%20Client&amp;severity=high&amp;id=6939823e5f410c6b20a89964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13152-cwe-427-uncontrolled-search-path-el-f35f2b7c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13152%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20One%20Client&amp;severity=high&amp;id=6939823e5f410c6b20a89960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12046-cwe-427-uncontrolled-search-path-el-0210ef82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12046%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20App%20Store&amp;severity=high&amp;id=6939823e5f410c6b20a8995a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-indicts-extradited-ukrainian-on-charges-of-aidi-908fa38b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Indicts%20Extradited%20Ukrainian%20on%20Charges%20of%20Aiding%20Russian%20Hacking%20Groups&amp;severity=medium&amp;id=69397b3b471be09b6e3bf760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-pcie-encryption-weaknesses-expose-pcie-50-sy-205ba99f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20PCIe%20Encryption%20Weaknesses%20Expose%20PCIe%205.0%2B%20Systems%20to%20Faulty%20Data%20Handling&amp;severity=medium&amp;id=69398a745f410c6b20b073ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13127-cwe-79-improper-neutralization-of-i-abd031cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TAC%20Information%20Services%20Internal%20and%20External%20Trade%20Inc.%20GoldenHorn&amp;severity=low&amp;id=69397d1d471be09b6e3e8e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2105-cwe-1287-improper-validation-of-spec-bcb25c66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2105%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20JBL%20Flip%205&amp;severity=medium&amp;id=69397292471be09b6e332fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2104-cwe-306-missing-authentication-for-c-3d0772bc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2104%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20JBL%20LIVE%20PRO%202%20TWS&amp;severity=high&amp;id=69397292471be09b6e332ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-gemini-enterprise-vulnerability-exp-0971881f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20Gemini%20Enterprise%20Vulnerability%20Exposing%20Corporate%20Data&amp;severity=medium&amp;id=69396f0a471be09b6e2de08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-authentication-bypass-vu-38652f63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20Authentication%20Bypass%20Vulnerabilities&amp;severity=critical&amp;id=69396a548e5e216c62f539e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-issues-security-fixes-for-56-flaws-inclu-22efa0f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Issues%20Security%20Fixes%20for%2056%20Flaws%2C%20Including%20Active%20Exploit%20and%20Two%20Zero-Days&amp;severity=high&amp;id=69396a6f8e5e216c62f54396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-microsoft-windows-and-winrar-flaws-to-485c8f26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Microsoft%20Windows%20and%20WinRAR%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=69396a6f8e5e216c62f5439a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13184-cwe-306-missing-authentication-for--6aa8fc80</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13184%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Toto%20Link%20X5000R&apos;s%20(AX1800%20router)&amp;severity=critical&amp;id=69396f2b471be09b6e2e184c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-poisoning-amos-stealer-how-trust-became-the-big-96e2d626</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Poisoning%20%26%20AMOS%20Stealer%3A%20How%20Trust%20Became%20the%20Biggest%20Mac%20Threat&amp;severity=medium&amp;id=693985c05f410c6b20aa8a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warning-winrar-vulnerability-cve-2025-6218-under-a-3751b2b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warning%3A%20WinRAR%20Vulnerability%20CVE-2025-6218%20Under%20Active%20Attack%20by%20Multiple%20Threat%20Groups&amp;severity=medium&amp;id=693962928e5e216c62ed6a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-how-attackers-exploit-cloud-misconfigurati-7c23d909</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20How%20Attackers%20Exploit%20Cloud%20Misconfigurations%20Across%20AWS%2C%20AI%20Models%2C%20and%20Kubernetes&amp;severity=medium&amp;id=693962928e5e216c62ed6a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-epm-update-patches-critical-remote-code-exe-3e64c730</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20EPM%20Update%20Patches%20Critical%20Remote%20Code%20Execution%20Flaw&amp;severity=critical&amp;id=693962ba8e5e216c62ed8d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13953-cwe-290-authentication-bypass-by-sp-ba953c19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13953%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20GTT%20Sistema%20de%20Informaci%C3%B3n%20Tributario&amp;severity=critical&amp;id=69395cf9e27bef3ae4bfd886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41358-cwe-639-authorization-bypass-throug-31721b4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41358%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CronosWeb%20i2A%20CronosWeb&amp;severity=high&amp;id=69395a3ce27bef3ae4bc14fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-vulnerabilities-with-december-b8b2aaaf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20Vulnerabilities%20With%20December%202025%20Security%20Updates&amp;severity=critical&amp;id=693955e7e27bef3ae4b677e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41732-cwe-121-stack-based-buffer-overflow-83be94cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41732%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WAGO%20Indsutrial-Managed-Switches&amp;severity=critical&amp;id=69395606e27bef3ae4b69151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41730-cwe-121-stack-based-buffer-overflow-997ca2ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41730%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WAGO%20Indsutrial-Managed-Switches&amp;severity=critical&amp;id=69395606e27bef3ae4b6914e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-woman-in-us-custody-for-aiding-russian-n-b69c49c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Woman%20in%20US%20Custody%20for%20Aiding%20Russian%20NoName057%20and%20CyberArmyofRussia_Reborn%20(CARR)%20Hacker%20Groups&amp;severity=medium&amp;id=69394a29681246c13df8636c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7073-cwe-59-improper-link-resolution-befo-55aefd0b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7073%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Bitdefender%20Total%20Security&amp;severity=high&amp;id=693945e9681246c13df087ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-c81b34b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Fixed%20by%20Siemens%2C%20Rockwell%2C%20Schneider&amp;severity=medium&amp;id=69394257681246c13decfdd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/udpgangster-campaigns-target-multiple-countries-36af0845</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UDPGangster%20Campaigns%20Target%20Multiple%20Countries&amp;severity=medium&amp;id=693945e8681246c13df08639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-byovd-loader-behind-deadlock-ransomware-attack-21e84d6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20BYOVD%20loader%20behind%20DeadLock%20ransomware%20attack&amp;severity=medium&amp;id=693945e8681246c13df0864c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-chimerawire-trojan-boosts-website-popularity-b-8e4db2c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20ChimeraWire%20trojan%20boosts%20website%20popularity%20by%20skillfully%20pretending%20to%20be%20human&amp;severity=medium&amp;id=693945e8681246c13df08656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66675-cwe-459-incomplete-cleanup-in-apach-61559a01</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66675%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Apache%20Software%20Foundation%20Apache%20Struts&amp;severity=high&amp;id=693945e9681246c13df087fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14390-cwe-434-unrestricted-upload-of-file-147fbd1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14390%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20videomerchant%20Video%20Merchant&amp;severity=high&amp;id=69393d10fd479f45ea600bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-spotlight-storm-0249-moves-from-mass-phishi-472482eb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Spotlight%3A%20Storm-0249%20Moves%20from%20Mass%20Phishing%20to%20Precision%20EDR%20Exploitation&amp;severity=medium&amp;id=69393d10fd479f45ea600b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66004-cwe-35-path-traversal-in-libimobile-a616342a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66004%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20libimobiledevice%20usbmuxd&amp;severity=medium&amp;id=69393d10fd479f45ea600bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14082-improper-access-control-in-red-hat--8439bcda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14082%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69393d10fd479f45ea600bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1161-cwe-648-incorrect-use-of-privileged--9a69feca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1161%3A%20CWE-648%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20NomySoft%20Information%20Technology%20Training%20and%20Consulting%20Inc.%20Nomysem&amp;severity=high&amp;id=69393d10fd479f45ea600bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14087-integer-overflow-or-wraparound-in-r-f2a8850d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14087%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GNOME%20glib&amp;severity=medium&amp;id=6939398dfd479f45ea5b2e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-issues-security-fixes-for-56-flaws-inclu-72859fb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Issues%20Security%20Fixes%20for%2056%20Flaws%2C%20Including%20Active%20Exploit%20and%20Two%20Zero-Days&amp;severity=critical&amp;id=69394a9c681246c13df8f911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9315-cwe-915-improperly-controlled-modifi-42e07a3c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9315%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Moxa%20MXsecurity%20Series&amp;severity=medium&amp;id=69393610fd479f45ea552451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13955-cwe-330-use-of-insufficiently-rando-ef4a57fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13955%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=critical&amp;id=69393610fd479f45ea55244e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13954-cwe-798-use-of-hard-coded-credentia-75c8e886</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13954%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=critical&amp;id=69393610fd479f45ea55244b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intel-amd-processors-affected-by-pcie-vulnerabilit-ed071ff5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intel%2C%20AMD%20Processors%20Affected%20by%20PCIe%20Vulnerabilities&amp;severity=low&amp;id=69392a434db6a6ddfda90a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/free-honey-tokens-for-breach-detection-no-signup-0150b93e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Free%20Honey%20Tokens%20for%20Breach%20Detection%20-%20No%20Signup&amp;severity=high&amp;id=6939261a4db6a6ddfda2455a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12952-cwe-269-improper-privilege-manageme-e43c89ee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12952%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Google%20Cloud%20Dialogflow%20CX&amp;severity=high&amp;id=69392a654db6a6ddfda93e0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9571-cwe-502-deserialization-of-untrusted-57d07aa3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9571%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Google%20Cloud%20Cloud%20Data%20Fusion&amp;severity=high&amp;id=69391d0bed5c5e39c813c142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13073-cwe-79-cross-site-scripting-xss-in--eacde70e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13073%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20HandL%20UTM%20Grabber%20%2F%20Tracker&amp;severity=high&amp;id=69390de80d2afef9e5da1fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13072-cwe-79-cross-site-scripting-xss-in--a7caa04c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13072%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20HandL%20UTM%20Grabber%20%2F%20Tracker&amp;severity=high&amp;id=69390de80d2afef9e5da1fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-ivanti-and-sap-issue-urgent-patches-for-a-9a0f9a74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%2C%20Ivanti%2C%20and%20SAP%20Issue%20Urgent%20Patches%20for%20Authentication%20and%20Code%20Execution%20Flaws&amp;severity=critical&amp;id=6938fe57422a156f1941a383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13339-cwe-22-improper-limitation-of-a-pat-8a3e757b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13339%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20hippooo%20Hippoo%20Mobile%20App%20for%20WooCommerce&amp;severity=high&amp;id=6938fae1422a156f193ca26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9056-cwe-863-incorrect-authorization-in-t-3cc06726</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9056%3A%20CWE-863%20Incorrect%20Authorization%20in%20TECNO%20com.transsion.audiosmartconnect&amp;severity=medium&amp;id=6938ec92bc985c89a3e00f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13677-cwe-22-improper-limitation-of-a-pat-d2914fa3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13677%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20specialk%20Simple%20Download%20Counter&amp;severity=medium&amp;id=6938ec92bc985c89a3e00f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-sanctions-russian-and-chinese-firms-suspected-o-f6ec3f82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Sanctions%20Russian%20and%20Chinese%20Firms%20Suspected%20of%20Being%20%E2%80%98Malign%20Actors%E2%80%99%20in%20Information%20Warfare&amp;severity=critical&amp;id=6938de74bc985c89a3db811d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13613-cwe-289-authentication-bypass-by-al-337c03b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13613%3A%20CWE-289%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Elated%20Themes%20Elated%20Membership&amp;severity=critical&amp;id=6938de9abc985c89a3dc30ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67507-cwe-287-improper-authentication-in--ba9bcc7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67507%3A%20CWE-287%3A%20Improper%20Authentication%20in%20filamentphp%20filament&amp;severity=high&amp;id=6938c96abc985c89a39766e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67485-cwe-693-protection-mechanism-failur-ecaac0e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67485%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20machphy%20mad-proxy&amp;severity=medium&amp;id=6938c4f57205ca471f2ee9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-10-15c6d22a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-10&amp;severity=medium&amp;id=693a0b73e425ca5072e02556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65297-na-48f48ec7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65297%3A%20n%2Fa&amp;severity=high&amp;id=6939efe25ab76fdc5f31bfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65296-na-d9c9fce4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65296%3A%20n%2Fa&amp;severity=medium&amp;id=6939efe25ab76fdc5f31bfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65295-na-a3ec530c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65295%3A%20n%2Fa&amp;severity=high&amp;id=6939ec5a5ab76fdc5f2d887d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65294-na-59ea7988</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65294%3A%20n%2Fa&amp;severity=critical&amp;id=6939e8d65ab76fdc5f28af17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65293-na-71da3245</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65293%3A%20n%2Fa&amp;severity=medium&amp;id=6939e8d65ab76fdc5f28af14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65292-na-efd74866</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65292%3A%20n%2Fa&amp;severity=high&amp;id=6939e8d65ab76fdc5f28af11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65291-na-ac461b5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65291%3A%20n%2Fa&amp;severity=high&amp;id=6939e5605ab76fdc5f2656f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65290-na-bac4e138</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65290%3A%20n%2Fa&amp;severity=high&amp;id=6939e5605ab76fdc5f2656ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65832-na-e570b36f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65832%3A%20n%2Fa&amp;severity=medium&amp;id=6939e076a97935729e7b806d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65831-na-f69ea1c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65831%3A%20n%2Fa&amp;severity=high&amp;id=6939e076a97935729e7b8069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65830-na-3199f22e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65830%3A%20n%2Fa&amp;severity=critical&amp;id=6939e076a97935729e7b8065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65829-na-d61fbce7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65829%3A%20n%2Fa&amp;severity=medium&amp;id=6939e076a97935729e7b8061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65828-na-00871c42</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65828%3A%20n%2Fa&amp;severity=medium&amp;id=6939dceba97935729e77408b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65827-na-cd303f74</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65827%3A%20n%2Fa&amp;severity=critical&amp;id=6939dce9a97935729e774048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65826-na-72c16726</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65826%3A%20n%2Fa&amp;severity=critical&amp;id=6939dce9a97935729e774044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65825-na-8d5e22e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65825%3A%20n%2Fa&amp;severity=medium&amp;id=6939dce9a97935729e774040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65824-na-dd523ced</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65824%3A%20n%2Fa&amp;severity=high&amp;id=6939dce9a97935729e77403c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65823-na-20e0c8a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65823%3A%20n%2Fa&amp;severity=critical&amp;id=6939dce9a97935729e774038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65822-na-406ca77e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65822%3A%20n%2Fa&amp;severity=medium&amp;id=6939dce9a97935729e774034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65821-na-a422c937</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65821%3A%20n%2Fa&amp;severity=high&amp;id=6939dce9a97935729e774030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65820-na-1aa1e722</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65820%3A%20n%2Fa&amp;severity=critical&amp;id=6939dce9a97935729e77402b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24857-na-ec5847ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24857%3A%20n%2Fa&amp;severity=high&amp;id=6939dce9a97935729e774025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65512-na-694d07ed</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65512%3A%20n%2Fa&amp;severity=high&amp;id=6939d96fa97935729e728440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65602-na-ebac8a04</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65602%3A%20n%2Fa&amp;severity=critical&amp;id=6939d0b8c9771d4f43425bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63895-na-3154bb99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63895%3A%20n%2Fa&amp;severity=high&amp;id=6939cd32c9771d4f433dddb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56431-na-b38ca49e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56431%3A%20n%2Fa&amp;severity=high&amp;id=6939c62bc9771d4f4336c991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56430-na-6587a6ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56430%3A%20n%2Fa&amp;severity=high&amp;id=6939c2b1c9771d4f43317e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56429-na-21e193fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56429%3A%20n%2Fa&amp;severity=medium&amp;id=6939c2b1c9771d4f43317e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65754-na-81bd12d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65754%3A%20n%2Fa&amp;severity=medium&amp;id=6939b31dfe7b3954b6837bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63094-na-af680748</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63094%3A%20n%2Fa&amp;severity=high&amp;id=6939b0fa62aa6c8a0e4897a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52493-na-cbaaee07</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52493%3A%20n%2Fa&amp;severity=medium&amp;id=6939a9f462aa6c8a0e3e35f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65815-na-f22a9cc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65815%3A%20n%2Fa&amp;severity=medium&amp;id=6939a47a62aa6c8a0e3b194b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65814-na-d80f8477</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65814%3A%20n%2Fa&amp;severity=medium&amp;id=6939a47a62aa6c8a0e3b1947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65792-na-271a8ac3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65792%3A%20n%2Fa&amp;severity=critical&amp;id=6939a30c62aa6c8a0e375594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65807-na-3d03cacc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65807%3A%20n%2Fa&amp;severity=high&amp;id=6939921d86adcdec9b0f4b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65803-na-b44e725c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65803%3A%20n%2Fa&amp;severity=medium&amp;id=6939921d86adcdec9b0f4b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67502-cwe-601-url-redirection-to-untruste-9ad65c05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67502%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20remram44%20taguette&amp;severity=medium&amp;id=6938b8747205ca471f053ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67501-cwe-89-improper-neutralization-of-s-14e94ab2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67501%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=6938b6b4b56b439e93ee886a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61808-unrestricted-upload-of-file-with-da-35155246</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61808%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20(CWE-434)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=6938b6b4b56b439e93ee886f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61813-improper-restriction-of-xml-externa-3444802a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61813%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=6938b6b4b56b439e93ee887e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61812-improper-input-validation-cwe-20-in-2d638faf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61812%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=6938b6b4b56b439e93ee887b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61821-improper-restriction-of-xml-externa-ff48f269</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61821%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b4b56b439e93ee8881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64898-insufficiently-protected-credential-73fed4fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64898%3A%20Insufficiently%20Protected%20Credentials%20(CWE-522)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b6b56b439e93ee88a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61810-deserialization-of-untrusted-data-c-f27bc1e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61810%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=6938b6b4b56b439e93ee8875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61809-improper-input-validation-cwe-20-in-f5a3ca2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61809%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=6938b6b4b56b439e93ee8872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61822-improper-input-validation-cwe-20-in-916a397f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61822%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b4b56b439e93ee8884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64897-improper-access-control-cwe-284-in--c3b971b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64897%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b6b56b439e93ee88a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61823-improper-restriction-of-xml-externa-da5215ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61823%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b4b56b439e93ee8887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61811-improper-access-control-cwe-284-in--df9b3e90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61811%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=6938b6b4b56b439e93ee8878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67499-cwe-200-exposure-of-sensitive-infor-eb778acf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67499%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20containernetworking%20plugins&amp;severity=medium&amp;id=6938aedab56b439e93e4e8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67496-cwe-79-improper-neutralization-of-i-9b629976</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67496%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6938a95ab56b439e93e1dcc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-spiderman-phishing-kit-targets-european-banks--092c0b4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Spiderman%20Phishing%20Kit%20Targets%20European%20Banks%20with%20Real-Time%20Credential%20Theft&amp;severity=medium&amp;id=6938a337d4eb7e5ad78128f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36437-cwe-209-generation-of-error-message-b9195b06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36437%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=69389fb7d4eb7e5ad77c2812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66645-cwe-22-improper-limitation-of-a-pat-4abc9d25</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66645%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zauberzeug%20nicegui&amp;severity=high&amp;id=69389a31d4eb7e5ad778aab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66039-cwe-287-improper-authentication-in--caeaff94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66039%3A%20CWE-287%3A%20Improper%20Authentication%20in%20FreePBX%20framework&amp;severity=critical&amp;id=693897e052fe50f9a4957ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53774-cwe-306-missing-authentication-for--706e5168</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53774%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MiniDVBLinux%20Simple%20VideoDiskRecorder%20Protocol%20SVDRP%20(svdrpsend.sh)%20Exploit&amp;severity=medium&amp;id=693890dd52fe50f9a48c9bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53771-cwe-306-missing-authentication-for--5900f5a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53771%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MiniDVBLinux%20MiniDVBLinux%20Change%20Root%20Password%20PoC&amp;severity=critical&amp;id=693890dd52fe50f9a48c9bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67489-cwe-94-improper-control-of-generati-dafe53aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67489%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vitejs%20vite-plugin-react&amp;severity=critical&amp;id=693890dd52fe50f9a48c9bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53770-cwe-260-password-in-configuration-f-2e22b9e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53770%3A%20CWE-260%3A%20Password%20in%20Configuration%20File%20in%20MiniDVBLinux%20MiniDVBLinux(TM)%20Distribution%20(MLD)&amp;severity=high&amp;id=693890dd52fe50f9a48c9bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53739-cwe-260-password-in-configuration-f-bd0ef598</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53739%3A%20CWE-260%3A%20Password%20in%20Configuration%20File%20in%20Tinycontrol%20Tinycontrol%20LAN%20Controller%20v&amp;severity=critical&amp;id=69388d5552fe50f9a48acd12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13743-cwe-532-insertion-of-sensitive-info-5471929f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13743%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Docker%20Docker%20Desktop&amp;severity=low&amp;id=693889e152fe50f9a4851f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64896-creation-of-temporary-file-in-direc-d8c28ae3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64896%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Incorrect%20Permissions%20(CWE-379)%20in%20Adobe%20Creative%20Cloud%20Desktop&amp;severity=medium&amp;id=693889e152fe50f9a4851f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-nearly-140-vulnerabilities-b7196b0e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Nearly%20140%20Vulnerabilities&amp;severity=medium&amp;id=6938887ef4a79be77cce0cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67488-cwe-22-improper-limitation-of-a-pat-b778b9f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67488%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=693888a8f4a79be77cce2017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-57-vulnerabilities-three-zero-da-c36bdb2a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%2057%20Vulnerabilities%2C%20Three%20Zero-Days&amp;severity=low&amp;id=6938887ef4a79be77cce0cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64899-out-of-bounds-read-cwe-125-in-adobe-c55f424b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64899%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69388b5252fe50f9a48983c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64785-untrusted-search-path-cwe-426-in-ad-9c2ad417</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64785%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69388b5252fe50f9a48983b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64786-improper-verification-of-cryptograp-fad1612e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64786%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20(CWE-347)%20in%20Adobe%20Acrobat%20Reader&amp;severity=low&amp;id=69388b5252fe50f9a48983b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64787-improper-verification-of-cryptograp-0b8443f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64787%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20(CWE-347)%20in%20Adobe%20Acrobat%20Reader&amp;severity=low&amp;id=69388b5252fe50f9a48983bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-december-2025-tue-dec-9th-44777e0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20December%202025%2C%20(Tue%2C%20Dec%209th)&amp;severity=critical&amp;id=6938954452fe50f9a4927f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66626-cwe-23-relative-path-traversal-in-a-aa6110fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66626%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=69388b5252fe50f9a48983c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-critical-forticloud-sso-login-au-00e63c42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20warns%20of%20critical%20FortiCloud%20SSO%20login%20auth%20bypass%20flaws&amp;severity=critical&amp;id=69388506f4a79be77cca2917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66625-cwe-200-exposure-of-sensitive-infor-e91dd722</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66625%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=69388517f4a79be77cca2bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66457-cwe-94-improper-control-of-generati-0be57f6a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66457%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20elysiajs%20elysia&amp;severity=high&amp;id=69388517f4a79be77cca2bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66456-cwe-1321-improperly-controlled-modi-88a4b2e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66456%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20elysiajs%20elysia&amp;severity=critical&amp;id=69387e02f4a79be77cc30993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66214-cwe-502-deserialization-of-untruste-ad9b4fc7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66214%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wearefrank%20ladybug&amp;severity=high&amp;id=69388517f4a79be77cca2bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14337-sql-injection-in-itsourcecode-stude-581de7c3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14337%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69388517f4a79be77cca2bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/broadside-botnet-hits-tbk-dvrs-raising-alarms-for--3174ec3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Broadside%20botnet%20hits%20TBK%20DVRs%2C%20raising%20alarms%20for%20maritime%20logistics&amp;severity=medium&amp;id=693878cbef540ebbadc60712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-iab-abuses-edr-for-stealthy-malware-exe-1349a142</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20IAB%20abuses%20EDR%20for%20stealthy%20malware%20execution&amp;severity=high&amp;id=693878cbef540ebbadc6070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spain-arrests-teen-who-stole-64-million-personal-d-b546dba8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spain%20arrests%20teen%20who%20stole%2064%20million%20personal%20data%20records&amp;severity=high&amp;id=693878cbef540ebbadc6070e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-warns-of-critical-endpoint-manager-code-exe-ea7b1d32</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20warns%20of%20critical%20Endpoint%20Manager%20code%20execution%20flaw&amp;severity=critical&amp;id=693878cbef540ebbadc606fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64113-cwe-640-weak-password-recovery-mech-c6550325</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64113%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20EmbySupport%20security&amp;severity=critical&amp;id=6938790eef540ebbadc6252b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14336-sql-injection-in-itsourcecode-stude-70660a6c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14336%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69387706ef540ebbadc35cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14335-sql-injection-in-itsourcecode-stude-a0e990a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14335%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69387706ef540ebbadc35ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9613-cwe-459-incomplete-cleanup-in-pci-si-fc6fc5a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9613%3A%20CWE-459%3A%20Incomplete%20Cleanup%20in%20PCI-SIG%20PCI%20Express%20Integrity%20and%20Data%20Encryption%20(PCIe%20IDE)%20Specification&amp;severity=medium&amp;id=693871e8ef540ebbadbcf674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9614-cwe-354-improper-validation-of-integ-f867a994</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9614%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20PCI-SIG%20PCI%20Express%20Integrity%20and%20Data%20Encryption%20(PCIe%20IDE)%20Specification&amp;severity=medium&amp;id=693871e8ef540ebbadbcf677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9612-cwe-404-improper-resource-shutdown-o-5eff9416</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9612%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20PCI-SIG%20PCI%20Express%20Integrity%20and%20Data%20Encryption%20(PCIe%20IDE)%20Specification&amp;severity=medium&amp;id=693871e8ef540ebbadbcf671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14334-sql-injection-in-itsourcecode-stude-a3a1f160</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14334%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69386e50ef540ebbadbb02e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11531-cwe-22-improper-limitation-of-a-pat-9f005c87</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11531%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20HP%20Inc%20HP%20System%20Event%20Utility&amp;severity=medium&amp;id=69386e50ef540ebbadbb02dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-actors-exploit-react2shell-to-d-9b86b0ec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-linked%20Actors%20Exploit%20React2Shell%20to%20Deploy%20New%20EtherRAT%20Malware&amp;severity=critical&amp;id=69387729ef540ebbadc365b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34414-cwe-502-deserialization-of-untruste-f62487a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34414%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Entrust%20Corporation%20Instant%20Financial%20Issuance%20(IF)&amp;severity=critical&amp;id=693867e174ebaa3babaf6f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34413-cwe-693-protection-mechanism-failur-88097e70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34413%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20DigitalPA%20S.r.l.%20Legality%20WHISTLEBLOWING&amp;severity=high&amp;id=693867e174ebaa3babaf6f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62221-cwe-416-use-after-free-in-microsoft-4c0e0d1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62221%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e174ebaa3babaf6f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54100-cwe-77-improper-neutralization-of-s-56e11712</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54100%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e174ebaa3babaf6f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64680-cwe-122-heap-based-buffer-overflow--0204fd83</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64680%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=693867eb74ebaa3babafb7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64679-cwe-122-heap-based-buffer-overflow--0674a726</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64679%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=693867eb74ebaa3babafb7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64678-cwe-122-heap-based-buffer-overflow--c0a7ae6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64678%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867eb74ebaa3babafb7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64672-cwe-79-improper-neutralization-of-i-90ca043f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64672%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Server%20Subscription%20Edition&amp;severity=high&amp;id=693867eb74ebaa3babafb7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64671-cwe-77-improper-neutralization-of-s-1a452cf6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64671%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20GitHub%20Copilot%20Plugin%20for%20JetBrains%20IDEs&amp;severity=high&amp;id=693867eb74ebaa3babafb7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64661-cwe-362-concurrent-execution-using--e1d6745a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64661%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e974ebaa3babafb704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62565-cwe-416-use-after-free-in-microsoft-412c450f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62565%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e974ebaa3babafb6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62570-cwe-284-improper-access-control-in--fea7ccb7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62570%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=693867e974ebaa3babafb6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62569-cwe-416-use-after-free-in-microsoft-bb3caabf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62569%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=693867e974ebaa3babafb6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62567-cwe-191-integer-underflow-wrap-or-w-f8d0da72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62567%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=693867e974ebaa3babafb6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62560-cwe-822-untrusted-pointer-dereferen-df9ce3a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62560%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62559-cwe-416-use-after-free-in-microsoft-c9c241a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62559%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62558-cwe-416-use-after-free-in-microsoft-d7817460</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62558%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62557-cwe-416-use-after-free-in-microsoft-ad420750</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62557%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62556-cwe-822-untrusted-pointer-dereferen-a769aee8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62556%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62555-cwe-416-use-after-free-in-microsoft-246f5577</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62555%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62554-cwe-843-access-of-resource-using-in-106f4f2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62554%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62553-cwe-416-use-after-free-in-microsoft-85669f53</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62553%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e574ebaa3babafb3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62552-cwe-23-relative-path-traversal-in-m-185ee976</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62552%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e574ebaa3babafb3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62550-cwe-787-out-of-bounds-write-in-micr-389e1f59</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62550%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=693867e574ebaa3babafb3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62474-cwe-284-improper-access-control-in--e8c6f36f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62474%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e574ebaa3babafb39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62468-cwe-125-out-of-bounds-read-in-micro-1041844b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62468%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=693867e574ebaa3babafb38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62467-cwe-190-integer-overflow-or-wraparo-3470a249</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62467%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55233-cwe-125-out-of-bounds-read-in-micro-50ee2fc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55233%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e174ebaa3babaf6f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62465-cwe-476-null-pointer-dereference-in-5653b24e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62465%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=693867e374ebaa3babaf6ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62464-cwe-126-buffer-over-read-in-microso-154b74f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62464%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62463-cwe-476-null-pointer-dereference-in-ba9af8f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62463%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=693867e374ebaa3babaf6fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62462-cwe-126-buffer-over-read-in-microso-a7af1c74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62462%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62461-cwe-126-buffer-over-read-in-microso-7e852e52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62461%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62455-cwe-20-improper-input-validation-in-c7819a26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62455%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e174ebaa3babaf6f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59517-cwe-284-improper-access-control-in--2fb8cc37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59517%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e174ebaa3babaf6f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59516-cwe-306-missing-authentication-for--3f64e08b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59516%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e174ebaa3babaf6f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64673-cwe-284-improper-access-control-in--1e4b2440</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64673%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867eb74ebaa3babafb7f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64670-cwe-200-exposure-of-sensitive-infor-23fd6f99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64670%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=693867eb74ebaa3babafb7e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64666-cwe-20-improper-input-validation-in-6a3a2311</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64666%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=693867eb74ebaa3babafb7e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64667-cwe-451-user-interface-ui-misrepres-b79402df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64667%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=693867eb74ebaa3babafb7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64658-cwe-362-concurrent-execution-using--33d73186</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64658%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e974ebaa3babafb701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62573-cwe-416-use-after-free-in-microsoft-4b105914</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62573%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e974ebaa3babafb6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62572-cwe-125-out-of-bounds-read-in-micro-7d92b211</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62572%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=693867e974ebaa3babafb6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62571-cwe-20-improper-input-validation-in-e5298d66</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62571%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e974ebaa3babafb6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62564-cwe-125-out-of-bounds-read-in-micro-4bd1b933</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62564%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e974ebaa3babafb6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62563-cwe-416-use-after-free-in-microsoft-dc52c52d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62563%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62562-cwe-416-use-after-free-in-microsoft-f45ea8b5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62562%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62561-cwe-822-untrusted-pointer-dereferen-883e48d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62561%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62549-cwe-822-untrusted-pointer-dereferen-7b61d989</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62549%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e574ebaa3babafb39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62473-cwe-126-buffer-over-read-in-microso-c65b8fab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62473%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=693867e574ebaa3babafb397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62472-cwe-908-use-of-uninitialized-resour-8fc74d8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62472%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e574ebaa3babafb394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62470-cwe-122-heap-based-buffer-overflow--bf8c4644</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62470%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e574ebaa3babafb391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62469-cwe-362-concurrent-execution-using--d16bbf63</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62469%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=693867e574ebaa3babafb38e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62466-cwe-476-null-pointer-dereference-in-a8524255</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62466%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e374ebaa3babaf6ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62458-cwe-122-heap-based-buffer-overflow--7d64282b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62458%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e374ebaa3babaf6fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62457-cwe-125-out-of-bounds-read-in-micro-908d948e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62457%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62456-cwe-122-heap-based-buffer-overflow--967b8009</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62456%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=693867e374ebaa3babaf6fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62454-cwe-122-heap-based-buffer-overflow--f81300dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62454%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e174ebaa3babaf6f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33214-cwe-502-deserialization-of-untruste-30b025c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33214%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NVTabular&amp;severity=high&amp;id=693867eb74ebaa3babafb7fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33213-cwe-502-deserialization-of-untruste-d59c5935</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33213%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Merlin%20Transformers4Rec&amp;severity=high&amp;id=693867ed74ebaa3babafb8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-dismantle-eur-700-million-crypto-scam-that--e184d41d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20Dismantle%20EUR%20700%20Million%20Crypto%20Scam%20That%20Used%20Deepfakes&amp;severity=medium&amp;id=6938611874ebaa3baba454b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64784-heap-based-buffer-overflow-cwe-122--8a02c151</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64784%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=693867ed74ebaa3babafb8bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64894-integer-overflow-or-wraparound-cwe--842e6216</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64894%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=693867ed74ebaa3babafb8c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64893-out-of-bounds-read-cwe-125-in-adobe-e4ecb79d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64893%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=693867ed74ebaa3babafb8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64783-integer-overflow-or-wraparound-cwe--22b0cfca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64783%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=693867ed74ebaa3babafb8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46636-cwe-59-improper-link-resolution-bef-4942ae5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46636%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Dell%20Encryption&amp;severity=medium&amp;id=6938612b74ebaa3baba47aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46637-cwe-59-improper-link-resolution-bef-b894dd04</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46637%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Dell%20Encryption&amp;severity=high&amp;id=6938612b74ebaa3baba47aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13924-cwe-352-cross-site-request-forgery--fc7fc2e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13924%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20maartenbelmans%20Advanced%20Product%20Fields%20(Product%20Addons)%20for%20WooCommerce&amp;severity=medium&amp;id=69385e4c74ebaa3baba14004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47570-escalation-of-privilege-in-fortinet-81742f65</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47570%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSASE&amp;severity=medium&amp;id=69385e4c74ebaa3baba14001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59718-improper-access-control-in-fortinet-0f876669</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59718%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSwitchManager&amp;severity=critical&amp;id=69385e4c74ebaa3baba14018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59719-improper-access-control-in-fortinet-0920e1a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59719%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=critical&amp;id=69385e4c74ebaa3baba1401b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53679-execute-unauthorized-code-or-comman-fa38c6e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53679%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69385e4c74ebaa3baba14009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54353-execute-unauthorized-code-or-comman-b58aab62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54353%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69385e4c74ebaa3baba1400f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53949-execute-unauthorized-code-or-comman-db263690</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53949%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=69385e4c74ebaa3baba1400c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59810-information-disclosure-in-fortinet--b96c4fc1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59810%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69385e4e74ebaa3baba142a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59808-improper-access-control-in-fortinet-d7f8a0a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59808%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69385e4c74ebaa3baba1401e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54838-denial-of-service-in-fortinet-forti-e8d0a8dc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54838%3A%20Denial%20of%20service%20in%20Fortinet%20FortiPortal&amp;severity=medium&amp;id=69385e4c74ebaa3baba14012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62631-improper-access-control-in-fortinet-62f1b11c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62631%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=69385e4e74ebaa3baba142af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57823-information-disclosure-in-fortinet--8a6cd450</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57823%3A%20Information%20disclosure%20in%20Fortinet%20FortiAuthenticator&amp;severity=low&amp;id=69385e4c74ebaa3baba14015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64153-execute-unauthorized-code-or-comman-e30e4830</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64153%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiExtender&amp;severity=medium&amp;id=69385e4e74ebaa3baba142b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59923-escalation-of-privilege-in-fortinet-6fbcb894</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59923%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiAuthenticator&amp;severity=low&amp;id=69385e4e74ebaa3baba142a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64156-execute-unauthorized-code-or-comman-af1c03a1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64156%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiVoice&amp;severity=medium&amp;id=69385e4e74ebaa3baba142b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64471-escalation-of-privilege-in-fortinet-8c5b7680</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64471%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69385e4e74ebaa3baba142bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60024-escalation-of-privilege-in-fortinet-f779c471</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60024%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiVoice&amp;severity=high&amp;id=69385e4e74ebaa3baba142ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64447-escalation-of-privilege-in-fortinet-c796bd90</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64447%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiWeb&amp;severity=high&amp;id=69385e4e74ebaa3baba142b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deceptive-layoff-themed-hr-email-distributes-remco-3d46f4ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deceptive%20Layoff-Themed%20HR%20Email%20Distributes%20Remcos%20RAT%20Malware&amp;severity=medium&amp;id=69393d10fd479f45ea600b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-deep-dive-cve-2025-55182-exploit-mecha-e59529aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Deep%20Dive%3A%20CVE-2025-55182%20Exploit%20Mechanics&amp;severity=medium&amp;id=69385e4a74ebaa3baba13e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12946-cwe-20-improper-input-validation-in-32c2e1ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12946%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20RS700&amp;severity=medium&amp;id=693859487515e08d31691a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12945-cwe-20-improper-input-validation-in-da55affa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12945%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20R7000P&amp;severity=low&amp;id=693859487515e08d31691a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12941-cwe-306-missing-authentication-for--35b134a0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12941%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NETGEAR%20C6220&amp;severity=medium&amp;id=693859487515e08d31691a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22675-cwe-352-cross-site-request-forgery--2d9848f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22675%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Taylor%20Hawkes%20WP%20Fast%20Cache&amp;severity=medium&amp;id=693856d07515e08d316631d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23729-cwe-862-missing-authorization-in-br-7808f784</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23729%3A%20CWE-862%20Missing%20Authorization%20in%20Brainstorm%20Force%20Spectra&amp;severity=medium&amp;id=693856d07515e08d316631d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13662-cwe-347-improper-verification-of-cr-f05b8f97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13662%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69384a3e795dcaf6c511e715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13661-cwe-22-improper-limitation-of-a-pat-70c8d3fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13661%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69384a3e795dcaf6c511e712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-threat-clusters-using-castleloader-as-graybra-6ffca990</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Threat%20Clusters%20Using%20CastleLoader%20as%20GrayBravo%20Expands%20Its%20Malware%20Service%20Infrastructure&amp;severity=medium&amp;id=693856987515e08d31661ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13659-cwe-913-improper-control-of-dynamic-a0dcaef6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13659%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69384a3e795dcaf6c511e70f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9638-cwe-79-improper-neutralization-of-in-fcf4868d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9638%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=69384a3e795dcaf6c511e718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5469-cwe-427-uncontrolled-search-path-ele-8e154ec9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5469%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Yandex%20Messenger&amp;severity=high&amp;id=69384a3e795dcaf6c511e71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10573-cwe-79-improper-neutralization-of-i-6f6b03b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10573%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=69384a3e795dcaf6c511e71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5471-cwe-427-uncontrolled-search-path-ele-ba521245</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5471%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Yandex%20Telemost&amp;severity=high&amp;id=69384a3e795dcaf6c511e722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5470-cwe-427-uncontrolled-search-path-ele-6ba69e90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5470%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Yandex%20Disk&amp;severity=high&amp;id=693846bf795dcaf6c50de093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13642-cwe-94-improper-control-of-generati-c7ae8165</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13642%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=69383fbf795dcaf6c50728aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-attacks-linked-to-north-korean-hackers-7b3221f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Attacks%20Linked%20to%20North%20Korean%20Hackers&amp;severity=medium&amp;id=69383fa3795dcaf6c506fbbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67467-cross-site-request-forgery-csrf-in--9a0b18d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67467%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StellarWP%20GiveWP&amp;severity=medium&amp;id=69383cf4795dcaf6c5045d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66533-improper-control-of-generation-of-c-6530de79</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66533%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20StellarWP%20GiveWP&amp;severity=medium&amp;id=69383cf4795dcaf6c5045d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-geminijack-0-click-flaw-in-gemini-ai-exposed-u-7d49ff8f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20GeminiJack%200-Click%20Flaw%20in%20Gemini%20AI%20Exposed%20Users%20to%20Data%20Leaks&amp;severity=medium&amp;id=69383a9b29cea75c35b75806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2296-cwe-20-improper-input-validation-in--66719f1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2296%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TianoCore%20EDK2&amp;severity=high&amp;id=69383abe29cea75c35b76e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14345-cwe-667-improper-locking-in-mongodb-0773889f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14345%3A%20CWE-667%20Improper%20Locking%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=medium&amp;id=69383abe29cea75c35b76e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38798-cwe-200-exposure-of-sensitive-infor-d77915c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38798%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TianoCore%20EDK2&amp;severity=medium&amp;id=69383abe29cea75c35b76e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63077-missing-authorization-in-happymonst-785e6147</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63077%3A%20Missing%20Authorization%20in%20HappyMonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69383acf29cea75c35b7703e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63076-improper-control-of-filename-for-in-96a02240</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Dream-Theme%20The7%20Elements&amp;severity=high&amp;id=69383acf29cea75c35b7703b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63075-improper-neutralization-of-input-du-d215a044</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63075%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20muffingroup%20Betheme&amp;severity=medium&amp;id=69383acf29cea75c35b77038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63074-improper-control-of-filename-for-in-ac7d45e6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63074%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Dream-Theme%20The7&amp;severity=high&amp;id=69383acf29cea75c35b77035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63073-improper-neutralization-of-input-du-d0d5b764</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63073%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dream-Theme%20The7&amp;severity=medium&amp;id=69383acf29cea75c35b77032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63072-improper-neutralization-of-input-du-e44b6168</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20THEMECO%20Cornerstone&amp;severity=medium&amp;id=69383acd29cea75c35b77013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63071-insertion-of-sensitive-information--88c7db5f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63071%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=69383acd29cea75c35b77010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63070-exposure-of-sensitive-system-inform-70e8417d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63070%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Shahjada%20Download%20Manager&amp;severity=medium&amp;id=69383acd29cea75c35b7700d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63069-missing-authorization-in-vinod-dalv-8299237e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63069%3A%20Missing%20Authorization%20in%20Vinod%20Dalvi%20Ivory%20Search&amp;severity=medium&amp;id=69383acd29cea75c35b7700a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63068-improper-neutralization-of-script-r-4fe6f810</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63068%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20sevenspark%20Contact%20Form%207%20%E2%80%93%20Dynamic%20Text%20Extension&amp;severity=medium&amp;id=69383acd29cea75c35b77007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63067-missing-authorization-in-p-themes-p-66a25afc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63067%3A%20Missing%20Authorization%20in%20p-themes%20Porto%20Theme%20-%20Functionality&amp;severity=medium&amp;id=69383acd29cea75c35b77004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63066-improper-neutralization-of-input-du-11dc8daa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63066%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20p-themes%20Porto%20Theme%20-%20Functionality&amp;severity=medium&amp;id=69383acd29cea75c35b77001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63065-authorization-bypass-through-user-c-aefb1ca5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63065%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=medium&amp;id=69383acd29cea75c35b76ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63064-improper-neutralization-of-input-du-46273717</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63064%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ashanjay%20EventON&amp;severity=medium&amp;id=69383acd29cea75c35b76ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63063-missing-authorization-in-yandex-met-5efa5a8c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63063%3A%20Missing%20Authorization%20in%20Yandex%20Metrika%20Yandex.Metrica&amp;severity=medium&amp;id=69383acd29cea75c35b76ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63062-improper-control-of-filename-for-in-e964683c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AndonDesign%20UDesign%20Core&amp;severity=high&amp;id=69383acb29cea75c35b76fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63061-improper-neutralization-of-input-du-430ac3c4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63061%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hogash%20KALLYAS&amp;severity=medium&amp;id=69383acb29cea75c35b76fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63060-cross-site-request-forgery-csrf-in--b203696b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63060%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hogash%20KALLYAS&amp;severity=medium&amp;id=69383acb29cea75c35b76fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63059-improper-neutralization-of-input-du-7eb35267</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arscode%20Ninja%20Popups&amp;severity=medium&amp;id=69383acb29cea75c35b76fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63058-exposure-of-sensitive-system-inform-1a819795</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63058%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Hiroaki%20Miyashita%20Custom%20Field%20Template&amp;severity=medium&amp;id=69383acb29cea75c35b76fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63057-improper-neutralization-of-input-du-bb038a8a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Roxnor%20Wp%20Ultimate%20Review&amp;severity=medium&amp;id=69383acb29cea75c35b76fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63056-missing-authorization-in-bestwebsof-ad070b73</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63056%3A%20Missing%20Authorization%20in%20bestwebsoft%20Contact%20Form%20by%20BestWebSoft&amp;severity=medium&amp;id=69383acb29cea75c35b76fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63055-improper-neutralization-of-input-du-231e3c9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63055%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69383acb29cea75c35b76fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63054-missing-authorization-in-expresstec-b23a1914</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63054%3A%20Missing%20Authorization%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=69383acb29cea75c35b76fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63052-improper-neutralization-of-input-du-7cbb11a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63052%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GalleryCreator%20SimpLy%20Gallery&amp;severity=medium&amp;id=69383acb29cea75c35b76fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63050-improper-neutralization-of-input-du-86f99dcf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63050%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sizam%20REHub%20Framework&amp;severity=medium&amp;id=69383ac929cea75c35b76f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63049-missing-authorization-in-cridiostud-5896101b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63049%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro%20Lead%20Form&amp;severity=medium&amp;id=69383ac929cea75c35b76f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63048-improper-neutralization-of-input-du-5386c11e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63048%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro%20Lead%20Form&amp;severity=medium&amp;id=69383ac929cea75c35b76f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63047-missing-authorization-in-cridiostud-cc0e655a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63047%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro&amp;severity=medium&amp;id=69383ac929cea75c35b76f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63046-improper-neutralization-of-input-du-bacbd573</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63046%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=medium&amp;id=69383ac929cea75c35b76f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63045-improper-neutralization-of-input-du-9e7aa94f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63045%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider%20Pro&amp;severity=medium&amp;id=69383ac929cea75c35b76f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63044-improper-neutralization-of-input-du-64a85726</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63044%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xpro%20Xpro%20Elementor%20Addons&amp;severity=medium&amp;id=69383ac929cea75c35b76f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63042-improper-neutralization-of-input-du-c4b3100a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20Tutor%20LMS%20Elementor%20Addons&amp;severity=medium&amp;id=69383ac929cea75c35b76f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63037-improper-neutralization-of-input-du-c9f9cedb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DFDevelopment%20Ronneby%20Theme%20Core&amp;severity=medium&amp;id=69383ac929cea75c35b76f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63036-improper-control-of-filename-for-in-69cfb5e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63036%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20DFDevelopment%20Ronneby%20Theme%20Core&amp;severity=high&amp;id=69383ac929cea75c35b76f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63035-improper-neutralization-of-input-du-8d5bcbcf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63035%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=medium&amp;id=69383ac729cea75c35b76f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63034-missing-authorization-in-steve-trum-11a1c383</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63034%3A%20Missing%20Authorization%20in%20Steve%20Truman%20Page%20View%20Count&amp;severity=medium&amp;id=69383ac729cea75c35b76f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63033-improper-neutralization-of-input-du-6a96a2d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Riyadh%20Ahmed%20Make%20Section%20%26%20Column%20Clickable%20For%20Elementor&amp;severity=medium&amp;id=69383ac729cea75c35b76f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63030-cross-site-request-forgery-csrf-in--bfb022de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63030%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=high&amp;id=69383ac729cea75c35b76f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63028-missing-authorization-in-shinetheme-6a80dce8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63028%3A%20Missing%20Authorization%20in%20shinetheme%20Traveler&amp;severity=medium&amp;id=69383ac729cea75c35b76f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63024-missing-authorization-in-tychesoftw-1fd23310</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63024%3A%20Missing%20Authorization%20in%20tychesoftwares%20Order%20Delivery%20Date%20for%20WooCommerce&amp;severity=medium&amp;id=69383ac729cea75c35b76f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63023-missing-authorization-in-easy-payme-c33060bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63023%3A%20Missing%20Authorization%20in%20Easy%20Payment%20Payment%20Gateway%20for%20PayPal%20on%20WooCommerce&amp;severity=medium&amp;id=69383ac729cea75c35b76f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63015-missing-authorization-in-paysera-wo-764d677f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63015%3A%20Missing%20Authorization%20in%20paysera%20WooCommerce%20Payment%20Gateway%20-%20Paysera&amp;severity=medium&amp;id=69383ac729cea75c35b76f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63013-exposure-of-sensitive-system-inform-879cfbe4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63013%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ThimPress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=69383ac729cea75c35b76f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63012-cross-site-request-forgery-csrf-in--e32dac84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63012%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThimPress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=69383ac729cea75c35b76f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63011-improper-neutralization-of-input-du-8e77617a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=69383ac529cea75c35b76f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63010-server-side-request-forgery-ssrf-in-5bd4188b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63010%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThemesInflow%20Hercules%20Core&amp;severity=medium&amp;id=69383ac529cea75c35b76f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63009-exposure-of-sensitive-system-inform-e29bc895</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63009%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20yuvalo%20WP%20Google%20Analytics%20Events&amp;severity=medium&amp;id=69383ac529cea75c35b76f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63008-missing-authorization-in-wedevs-wp--e2f0fb76</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63008%3A%20Missing%20Authorization%20in%20weDevs%20WP%20ERP&amp;severity=medium&amp;id=69383ac529cea75c35b76f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63007-insertion-of-sensitive-information--14143a49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63007%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Metagauss%20EventPrime&amp;severity=medium&amp;id=69383ac529cea75c35b76f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63006-missing-authorization-in-metagauss--67cb0e84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63006%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=medium&amp;id=69383ac529cea75c35b76f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63003-improper-control-of-filename-for-in-1404e90d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63003%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20North%20-%20Required%20Plugin&amp;severity=high&amp;id=69383ac529cea75c35b76f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62999-missing-authorization-in-themezaa-l-c625092a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62999%3A%20Missing%20Authorization%20in%20themezaa%20Litho%20Addons&amp;severity=medium&amp;id=69383ac529cea75c35b76f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62997-insertion-of-sensitive-information--b76045cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62997%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20levelfourdevelopment%20WP%20EasyCart&amp;severity=medium&amp;id=69383ac529cea75c35b76f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62996-missing-authorization-in-code-amp-c-32eb9273</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62996%3A%20Missing%20Authorization%20in%20Code%20Amp%20Custom%20Layouts%20%E2%80%93%20Post%20%2B%20Product%20grids%20made%20easy&amp;severity=medium&amp;id=69383ac529cea75c35b76f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62995-missing-authorization-in-multiparce-ce24186a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62995%3A%20Missing%20Authorization%20in%20multiparcels%20MultiParcels%20Shipping%20For%20WooCommerce&amp;severity=medium&amp;id=69383ac329cea75c35b76f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62994-insertion-of-sensitive-information--078c693b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62994%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WP%20Messiah%20WP%20AI%20CoPilot&amp;severity=medium&amp;id=69383ac329cea75c35b76f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62993-missing-authorization-in-rainafarai-d17511ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62993%3A%20Missing%20Authorization%20in%20rainafarai%20Notification%20for%20Telegram&amp;severity=medium&amp;id=69383ac329cea75c35b76f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62873-cross-site-request-forgery-csrf-in--a45528b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62873%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flashyapp%20WP%20Flashy%20Marketing%20Automation&amp;severity=medium&amp;id=69383ac329cea75c35b76f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62872-cross-site-request-forgery-csrf-in--eb3469b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62872%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JK%20Social%20Photo%20Fetcher&amp;severity=medium&amp;id=69383ac329cea75c35b76f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62871-cross-site-request-forgery-csrf-in--497b6be8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62871%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alex%20Prokopenko%20%2F%20JustCoded%20Just%20TinyMCE%20Custom%20Styles&amp;severity=medium&amp;id=69383ac329cea75c35b76f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62870-missing-authorization-in-eupago-eup-a35029c7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62870%3A%20Missing%20Authorization%20in%20Eupago%20Eupago%20Gateway%20For%20Woocommerce&amp;severity=medium&amp;id=69383ac329cea75c35b76f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62869-missing-authorization-in-gravitecne-0e2bb350</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62869%3A%20Missing%20Authorization%20in%20Gravitec.net%20-%20Web%20Push%20Notifications%20Gravitec.net%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=medium&amp;id=69383ac329cea75c35b76f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62867-missing-authorization-in-ergonet-er-a17844a3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62867%3A%20Missing%20Authorization%20in%20ergonet%20Ergonet%20Cache&amp;severity=medium&amp;id=69383ac329cea75c35b76f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62866-cross-site-request-forgery-csrf-in--6f328beb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62866%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Valerio%20Monti%20Auto%20Alt%20Text&amp;severity=medium&amp;id=69383ac329cea75c35b76f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62865-missing-authorization-in-evan-herma-ec74df0e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62865%3A%20Missing%20Authorization%20in%20Evan%20Herman%20Post%20Cloner&amp;severity=medium&amp;id=69383ac129cea75c35b76eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62762-cross-site-request-forgery-csrf-in--aea9bc4a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62762%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20photoboxone%20SMTP%20Mail&amp;severity=medium&amp;id=69383ac129cea75c35b76ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62740-missing-authorization-in-mario-pesh-d8b55eba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62740%3A%20Missing%20Authorization%20in%20Mario%20Peshev%20WP-CRM%20System&amp;severity=medium&amp;id=69383ac129cea75c35b76ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62739-cross-site-request-forgery-csrf-in--ae737b66</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62739%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SaifuMak%20Add%20Custom%20Codes&amp;severity=medium&amp;id=69383ac129cea75c35b76ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62738-missing-authorization-in-mmattax-fo-2ed827ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62738%3A%20Missing%20Authorization%20in%20mmattax%20Formstack%20Online%20Forms&amp;severity=medium&amp;id=69383ac129cea75c35b76ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62737-exposure-of-sensitive-system-inform-9616ecea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62737%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20opicron%20Image%20Cleanup&amp;severity=medium&amp;id=69383ac129cea75c35b76edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62736-missing-authorization-in-opicron-im-9b627ff4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62736%3A%20Missing%20Authorization%20in%20opicron%20Image%20Cleanup&amp;severity=medium&amp;id=69383ac129cea75c35b76ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62735-exposure-of-sensitive-system-inform-7955f5a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62735%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Joel%20User%20Spam%20Remover&amp;severity=medium&amp;id=69383ac129cea75c35b76ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62734-cross-site-request-forgery-csrf-in--568b1d08</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62734%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20M.Code%20Media%20Library%20Downloader&amp;severity=medium&amp;id=69383ac129cea75c35b76ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62733-cross-site-request-forgery-csrf-in--8d31b1cb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62733%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ProteusThemes%20Custom%20Sidebars%20by%20ProteusThemes&amp;severity=medium&amp;id=69383ac129cea75c35b76ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62153-missing-authorization-in-graham-qui-f17eeeb9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62153%3A%20Missing%20Authorization%20in%20Graham%20Quick%20Interest%20Slider&amp;severity=medium&amp;id=69383abf29cea75c35b76eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62151-missing-authorization-in-virtuaria--57b64cca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62151%3A%20Missing%20Authorization%20in%20Virtuaria%20Virtuaria%20PagBank%20%2F%20PagSeguro%20para%20Woocommerce&amp;severity=medium&amp;id=69383abf29cea75c35b76ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62109-insertion-of-sensitive-information--cfacd158</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62109%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20INFINITUM%20FORM%20Geo%20Controller&amp;severity=medium&amp;id=69383abf29cea75c35b76ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62103-cross-site-request-forgery-csrf-in--6bd47f17</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62103%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpmediadownload%20Media%20Library%20File%20Download&amp;severity=medium&amp;id=69383abf29cea75c35b76ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62102-cross-site-request-forgery-csrf-in--2793e6dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62102%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20apasionados%20DoFollow%20Case%20by%20Case&amp;severity=medium&amp;id=69383abf29cea75c35b76e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62100-missing-authorization-in-themerain--fbab56d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62100%3A%20Missing%20Authorization%20in%20themerain%20ThemeRain%20Core&amp;severity=medium&amp;id=69383abf29cea75c35b76e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62093-improper-neutralization-of-special--20834e1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62093%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Image%26Video%20FullScreen%20Background&amp;severity=high&amp;id=69383abf29cea75c35b76e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62090-missing-authorization-in-jegstudio--fd1cae60</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62090%3A%20Missing%20Authorization%20in%20Jegstudio%20Gutenverse%20News%20%E2%80%93%20Advanced%20News%20Magazine%20Blog%20Gutenberg%20Blocks%20Addons&amp;severity=medium&amp;id=69383abf29cea75c35b76e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62086-missing-authorization-in-akazanstev-28a7de5f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62086%3A%20Missing%20Authorization%20in%20akazanstev%20%D0%AF%D0%BD%D0%B4%D0%B5%D0%BA%D1%81%20%D0%94%D0%BE%D1%81%D1%82%D0%B0%D0%B2%D0%BA%D0%B0%20(Boxberry)&amp;severity=medium&amp;id=69383abf29cea75c35b76e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62085-missing-authorization-in-berthaai-b-f1d24aff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62085%3A%20Missing%20Authorization%20in%20Bertha%20AI%20%E2%80%93%20Andrew%20Palmer%20BERTHA%20AI&amp;severity=medium&amp;id=69383abf29cea75c35b76e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62082-improper-neutralization-of-input-du-6ac34db4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62082%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nasir%20Uddin%20Generic%20Elements&amp;severity=medium&amp;id=69383abe29cea75c35b76e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59132-cross-site-request-forgery-csrf-in--c571cccc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59132%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Badi%20Jones%20Duplicate%20Content%20Cure&amp;severity=medium&amp;id=69383abe29cea75c35b76e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49351-cross-site-request-forgery-csrf-in--2eb8ee63</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49351%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Valentin%20Agachi%20Create%20Posts%20%26%20Terms&amp;severity=high&amp;id=69383abe29cea75c35b76e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49350-missing-authorization-in-marcoingra-a530dcf3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49350%3A%20Missing%20Authorization%20in%20marcoingraiti%20Actionwear%20products%20sync&amp;severity=medium&amp;id=69383abe29cea75c35b76e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49347-cross-site-request-forgery-csrf-in--f7ce8d0b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49347%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jupitercow%20WP%20sIFR&amp;severity=high&amp;id=69383abe29cea75c35b76e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49341-cross-site-request-forgery-csrf-in--6503febd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49341%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alex%20Furr%20PDF%20Creator%20Lite&amp;severity=high&amp;id=69383abe29cea75c35b76e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10655-cwe-89-improper-neutralization-of-s-208859b6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10655%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Frappe%20Frappe%20HelpDesk&amp;severity=high&amp;id=69383abe29cea75c35b76e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12504-cwe-89-improper-neutralization-of-s-68b62eb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12504%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Talent%20Software%20UNIS&amp;severity=critical&amp;id=6938372729cea75c35b3810a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6923-cwe-79-improper-neutralization-of-in-effdb21e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6923%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Talent%20Software%20UNIS&amp;severity=medium&amp;id=693833b029cea75c35ae5795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67599-missing-authorization-in-webtoffee--c35558b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67599%3A%20Missing%20Authorization%20in%20WebToffee%20WebToffee%20eCommerce%20Marketing%20Automation&amp;severity=medium&amp;id=693833b029cea75c35ae5792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67598-cross-site-request-forgery-csrf-in--b67e0650</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67598%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PSM%20Plugins%20SupportCandy&amp;severity=medium&amp;id=693833b029cea75c35ae578f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67597-missing-authorization-in-shahjahan--25738481</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67597%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20Fluent%20Booking&amp;severity=medium&amp;id=693833b029cea75c35ae578c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67596-cross-site-request-forgery-csrf-in--173af554</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67596%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Strategy11%20Team%20Business%20Directory&amp;severity=medium&amp;id=693833ae29cea75c35ae5779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67595-cross-site-request-forgery-csrf-in--ebd40c1e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67595%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=medium&amp;id=693833ae29cea75c35ae5776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67594-authorization-bypass-through-user-c-3361b4dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67594%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ThimPress%20Thim%20Elementor%20Kit&amp;severity=medium&amp;id=693833ae29cea75c35ae5773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67593-cross-site-request-forgery-csrf-in--630227aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67593%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stiofan%20UsersWP&amp;severity=medium&amp;id=693833ae29cea75c35ae5770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67592-missing-authorization-in-joe-dolson-cf0837cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67592%3A%20Missing%20Authorization%20in%20Joe%20Dolson%20My%20Calendar&amp;severity=medium&amp;id=693833ae29cea75c35ae576d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67591-cross-site-request-forgery-csrf-in--596b00b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67591%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jegtheme%20JNews%20Paywall&amp;severity=medium&amp;id=693833ae29cea75c35ae576a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67590-cross-site-request-forgery-csrf-in--5d9bc0e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67590%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rustaurius%20Ultimate%20FAQ&amp;severity=medium&amp;id=693833ae29cea75c35ae5767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67589-missing-authorization-in-wp-overnig-13cca67e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67589%3A%20Missing%20Authorization%20in%20WP%20Overnight%20WooCommerce%20PDF%20Invoices%20%26%20Packing%20Slips&amp;severity=medium&amp;id=693833ae29cea75c35ae5764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67588-missing-authorization-in-elementor--ab56bbcd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67588%3A%20Missing%20Authorization%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=medium&amp;id=693833ae29cea75c35ae5761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67587-url-redirection-to-untrusted-site-o-9bb99b66</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67587%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20FreshDesk%20Plugin&amp;severity=medium&amp;id=693833ae29cea75c35ae575e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67586-missing-authorization-in-ronald-hue-95f96fa2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67586%3A%20Missing%20Authorization%20in%20Ronald%20Huereca%20Highlight%20and%20Share&amp;severity=medium&amp;id=693833ad29cea75c35ae571d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67585-url-redirection-to-untrusted-site-o-b688a46f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67585%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20flexmls%20Flexmls%C2%AE%20IDX&amp;severity=medium&amp;id=693833ad29cea75c35ae571a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67584-missing-authorization-in-rtcamp-god-1f3e88a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67584%3A%20Missing%20Authorization%20in%20rtCamp%20GoDAM&amp;severity=medium&amp;id=693833ad29cea75c35ae5717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67583-missing-authorization-in-themeateli-4ff15b64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67583%3A%20Missing%20Authorization%20in%20Foysal%20Imran%20IDonate&amp;severity=medium&amp;id=693833ad29cea75c35ae5714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67582-missing-authorization-in-wbcomdesig-4b6b752c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67582%3A%20Missing%20Authorization%20in%20wbcomdesigns%20Wbcom%20Designs&amp;severity=medium&amp;id=693833ad29cea75c35ae5711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67581-missing-authorization-in-themetechm-00e4a9a8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67581%3A%20Missing%20Authorization%20in%20themetechmount%20TrueBooker&amp;severity=medium&amp;id=693833ad29cea75c35ae570e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67580-missing-authorization-in-constant-c-d339a2c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67580%3A%20Missing%20Authorization%20in%20Constant%20Contact%20Constant%20Contact%20%2B%20WooCommerce&amp;severity=medium&amp;id=693833ad29cea75c35ae570b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67579-missing-authorization-in-vanquish-u-2d6a3a8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67579%3A%20Missing%20Authorization%20in%20vanquish%20User%20Extra%20Fields&amp;severity=medium&amp;id=693833ad29cea75c35ae5708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67578-missing-authorization-in-rhys-wynne-0ad3314a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67578%3A%20Missing%20Authorization%20in%20Rhys%20Wynne%20WP%20Email%20Capture&amp;severity=medium&amp;id=693833ad29cea75c35ae5705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67577-missing-authorization-in-hassantafr-e71a04c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67577%3A%20Missing%20Authorization%20in%20hassantafreshi%20Easy%20Form%20Builder&amp;severity=medium&amp;id=693833ad29cea75c35ae5702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67576-missing-authorization-in-quantumclo-6a55b341</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67576%3A%20Missing%20Authorization%20in%20QuantumCloud%20Simple%20Link%20Directory&amp;severity=medium&amp;id=693833ab29cea75c35ae56ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67575-missing-authorization-in-andrew-lim-c9f95871</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67575%3A%20Missing%20Authorization%20in%20Andrew%20Lima%20Sitewide%20Notice%20WP&amp;severity=medium&amp;id=693833ab29cea75c35ae56e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67574-missing-authorization-in-wpdevart-b-2be34c23</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67574%3A%20Missing%20Authorization%20in%20wpdevart%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=medium&amp;id=693833ab29cea75c35ae56e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67573-missing-authorization-in-thimpress--af14614a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67573%3A%20Missing%20Authorization%20in%20ThimPress%20Sailing&amp;severity=medium&amp;id=693833ab29cea75c35ae56e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67572-missing-authorization-in-pencidesig-572e2687</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67572%3A%20Missing%20Authorization%20in%20PenciDesign%20PenNews&amp;severity=medium&amp;id=693833ab29cea75c35ae56e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67570-missing-authorization-in-gsheetconn-e5c06848</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67570%3A%20Missing%20Authorization%20in%20WesternDeal%20WPForms%20Google%20Sheet%20Connector&amp;severity=medium&amp;id=693833ab29cea75c35ae56dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67569-missing-authorization-in-scriptsbun-5654b18b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67569%3A%20Missing%20Authorization%20in%20scriptsbundle%20AdForest&amp;severity=medium&amp;id=693833ab29cea75c35ae56da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67568-missing-authorization-in-xtemos-bas-81a72714</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67568%3A%20Missing%20Authorization%20in%20xtemos%20Basel&amp;severity=medium&amp;id=693833ab29cea75c35ae56d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67567-exposure-of-sensitive-system-inform-4ef39e2d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67567%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20uixthemes%20Sober&amp;severity=medium&amp;id=693833ab29cea75c35ae56d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67566-missing-authorization-in-wofficeio--f4c32b89</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67566%3A%20Missing%20Authorization%20in%20WofficeIO%20Woffice%20Core&amp;severity=medium&amp;id=693833ab29cea75c35ae56d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67565-exposure-of-sensitive-system-inform-823bd606</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67565%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20sizam%20Rehub&amp;severity=medium&amp;id=693833a929cea75c35ae56b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67564-exposure-of-sensitive-system-inform-5708047f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67564%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20alekv%20Pixel%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=693833a929cea75c35ae56b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67563-missing-authorization-in-saad-iqbal-4b60609c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67563%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20Post%20SMTP&amp;severity=medium&amp;id=693833a929cea75c35ae56af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67562-missing-authorization-in-webcodingp-3e1f68bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67562%3A%20Missing%20Authorization%20in%20WebCodingPlace%20Image%20Caption%20Hover%20Pro&amp;severity=medium&amp;id=693833a929cea75c35ae56ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67561-missing-authorization-in-oleksandr--c4e44fe9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67561%3A%20Missing%20Authorization%20in%20Oleksandr%20Lysyi%20Debug%20Log%20Viewer&amp;severity=medium&amp;id=693833a929cea75c35ae56a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67560-missing-authorization-in-webilia-in-31c6cbaa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67560%3A%20Missing%20Authorization%20in%20Webilia%20Inc.%20Listdom&amp;severity=medium&amp;id=693833a929cea75c35ae56a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67559-missing-authorization-in-vcita-onli-38afffd3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67559%3A%20Missing%20Authorization%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=medium&amp;id=693833a929cea75c35ae56a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67558-improper-neutralization-of-input-du-a6fcfee4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jacques%20Malgrange%20Rencontre&amp;severity=medium&amp;id=693833a929cea75c35ae56a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67557-improper-neutralization-of-input-du-f68e3c0b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rhys%20Wynne%20WP%20eBay%20Product%20Feeds&amp;severity=medium&amp;id=693833a929cea75c35ae569d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67556-improper-neutralization-of-input-du-f525e7ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHigh%20Advanced%20FAQ%20Manager&amp;severity=medium&amp;id=693833a929cea75c35ae569a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67555-improper-neutralization-of-input-du-df68242c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20useStrict%20UseStrict&apos;s%20Calendly%20Embedder&amp;severity=medium&amp;id=693833a729cea75c35ae534e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67554-improper-neutralization-of-input-du-5acad7ef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Humanityco%20Cookie%20Notice%20%26%20Compliance%20for%20GDPR%20%2F%20CCPA&amp;severity=medium&amp;id=693833a729cea75c35ae534b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67553-improper-neutralization-of-input-du-7c578907</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHigh%20Advanced%20FAQ%20Manager&amp;severity=medium&amp;id=693833a729cea75c35ae5348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67552-improper-neutralization-of-input-du-8921e8d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67552%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WalkerWP%20Walker%20Core&amp;severity=medium&amp;id=693833a729cea75c35ae5345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67551-improper-neutralization-of-input-du-41b2bc27</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wappointment%20team%20Wappointment&amp;severity=medium&amp;id=693833a729cea75c35ae5342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67550-improper-neutralization-of-input-du-a3322e64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rhewlif%20Donation%20Thermometer&amp;severity=medium&amp;id=693833a729cea75c35ae533f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67549-improper-neutralization-of-input-du-40b567a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobbingwide%20oik&amp;severity=medium&amp;id=693833a729cea75c35ae533c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67545-improper-neutralization-of-input-du-6518bc15</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FirePlugins%20FireBox&amp;severity=medium&amp;id=693833a729cea75c35ae5339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67544-improper-neutralization-of-input-du-5cd294d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Get%20Bowtied%20Shopkeeper%20Extender&amp;severity=medium&amp;id=693833a729cea75c35ae5336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67543-improper-neutralization-of-input-du-8b7a965c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67543%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Catch%20Themes%20Essential%20Widgets&amp;severity=medium&amp;id=693833a729cea75c35ae5333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67542-improper-neutralization-of-input-du-5340c43d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SilkyPress%20Multi-Step%20Checkout%20for%20WooCommerce&amp;severity=medium&amp;id=693833a629cea75c35ae52fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67541-improper-neutralization-of-input-du-8d13c3bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lester%20Chan%20WP-ShowHide&amp;severity=medium&amp;id=693833a629cea75c35ae52fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67540-missing-authorization-in-wealcoder--aa599489</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67540%3A%20Missing%20Authorization%20in%20Wealcoder%20Animation%20Addons%20for%20Elementor&amp;severity=medium&amp;id=693833a629cea75c35ae52f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67539-improper-neutralization-of-input-du-adf6bc3e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Select-Themes%20Select%20Core&amp;severity=medium&amp;id=693833a629cea75c35ae52f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67538-improper-neutralization-of-input-du-99313a42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20JNews%20Gallery&amp;severity=medium&amp;id=693833a629cea75c35ae52f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67537-improper-neutralization-of-input-du-ce35981c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Blair%20Williams%20ThirstyAffiliates&amp;severity=medium&amp;id=693833a529cea75c35ae52ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67536-improper-neutralization-of-input-du-85a929de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20LearnPress&amp;severity=medium&amp;id=693833a529cea75c35ae52ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67535-deserialization-of-untrusted-data-i-56be1f60</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67535%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Flipper%20Code%20-%20WordPress%20Development%20Company%20WP%20Maps&amp;severity=medium&amp;id=693833a529cea75c35ae52e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67534-cross-site-request-forgery-csrf-in--e617f5a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67534%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jacques%20Malgrange%20Rencontre&amp;severity=high&amp;id=693833a529cea75c35ae52e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67533-improper-neutralization-of-input-du-5331b767</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67533%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Portfolio%20Post&amp;severity=high&amp;id=693833a529cea75c35ae52e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67532-improper-control-of-filename-for-in-146f7fdf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67532%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Hara&amp;severity=high&amp;id=693833a329cea75c35ae52af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67531-improper-control-of-filename-for-in-c1d5d142</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67531%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20trippleS%20Turitor&amp;severity=high&amp;id=693833a329cea75c35ae52ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67530-improper-control-of-filename-for-in-370cb7d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67530%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Besa&amp;severity=high&amp;id=693833a329cea75c35ae52a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67529-improper-control-of-filename-for-in-c6112063</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67529%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Opal_WP%20Fashion&amp;severity=high&amp;id=693833a329cea75c35ae52a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67528-improper-control-of-filename-for-in-6d24602e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67528%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Urna&amp;severity=high&amp;id=693833a329cea75c35ae52a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67527-improper-control-of-filename-for-in-0575eb75</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67527%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20trippleS%20Digiqole&amp;severity=high&amp;id=693833a329cea75c35ae52a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67526-improper-control-of-filename-for-in-ee00b5fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67526%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20Sailing&amp;severity=high&amp;id=693833a329cea75c35ae529d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67525-improper-control-of-filename-for-in-4d090bb9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67525%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Opal_WP%20ekommart&amp;severity=high&amp;id=693833a329cea75c35ae529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67524-improper-control-of-filename-for-in-500122e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67524%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20NooTheme%20Jobmonster%20Elementor%20Addon&amp;severity=high&amp;id=693833a329cea75c35ae5297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67523-improper-control-of-filename-for-in-dd897ff0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67523%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20trippleS%20Exhibz&amp;severity=high&amp;id=693833a329cea75c35ae5294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67522-improper-control-of-filename-for-in-52b6c00f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67522%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=high&amp;id=693833a229cea75c35ae5248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67521-improper-control-of-filename-for-in-a5e6f293</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67521%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Select%20Core&amp;severity=high&amp;id=693833a229cea75c35ae5245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67520-improper-neutralization-of-special--86b58465</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67520%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tiny%20Solutions%20Media%20Library%20Tools&amp;severity=high&amp;id=693833a229cea75c35ae5242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67519-improper-neutralization-of-special--e8cf7b3e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67519%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjahan%20Jewel%20Ninja%20Tables&amp;severity=high&amp;id=693833a129cea75c35ae523e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67518-improper-neutralization-of-special--762ace43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67518%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Accordion%20Slider%20PRO&amp;severity=high&amp;id=693833a129cea75c35ae523b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67517-improper-neutralization-of-special--54a116cb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67517%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20artplacer%20ArtPlacer%20Widget&amp;severity=high&amp;id=693833a129cea75c35ae5238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67516-improper-neutralization-of-special--0dae50fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67516%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Agile%20Logix%20Store%20Locator%20WordPress&amp;severity=high&amp;id=693833a129cea75c35ae5235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67515-improper-control-of-filename-for-in-c5ce483f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67515%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Wilm%C3%ABr&amp;severity=high&amp;id=693833a129cea75c35ae5232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67474-missing-authorization-in-ultimate-m-8201ffb2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67474%3A%20Missing%20Authorization%20in%20Ultimate%20Member%20ForumWP&amp;severity=medium&amp;id=693833a129cea75c35ae522f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67473-cross-site-request-forgery-csrf-in--986a518e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67473%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codeworkweb%20CWW%20Companion&amp;severity=medium&amp;id=693833a129cea75c35ae522c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67472-cross-site-request-forgery-csrf-in--860719ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67472%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=medium&amp;id=693833a029cea75c35ae51f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67471-cross-site-request-forgery-csrf-in--ce1fd08c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67471%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saad%20Iqbal%20Quick%20Contact%20Form&amp;severity=medium&amp;id=693833a029cea75c35ae51f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67470-exposure-of-sensitive-system-inform-f678fb99</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67470%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Essential%20Plugin%20Portfolio%20and%20Projects&amp;severity=medium&amp;id=693833a029cea75c35ae51f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67469-cross-site-request-forgery-csrf-in--3a1db176</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67469%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kubiq%20PDF%20Thumbnail%20Generator&amp;severity=medium&amp;id=693833a029cea75c35ae51ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67468-missing-authorization-in-crm-perks--04a5b423</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67468%3A%20Missing%20Authorization%20in%20CRM%20Perks%20Integration%20for%20Salesforce%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%2C%20Ninja%20Forms&amp;severity=medium&amp;id=693833a029cea75c35ae51eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67466-missing-authorization-in-sergiotrin-9dc6fdf4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67466%3A%20Missing%20Authorization%20in%20sergiotrinity%20Trinity%20Audio&amp;severity=medium&amp;id=693833a029cea75c35ae51e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67465-cross-site-request-forgery-csrf-in--c5bf03ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67465%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20QuantumCloud%20Simple%20Link%20Directory&amp;severity=medium&amp;id=693833a029cea75c35ae51e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66534-missing-authorization-in-elated-the-547c0344</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66534%3A%20Missing%20Authorization%20in%20Elated-Themes%20The%20Aisle&amp;severity=medium&amp;id=693833a029cea75c35ae51e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66532-missing-authorization-in-mikado-the-e11e371c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66532%3A%20Missing%20Authorization%20in%20Mikado-Themes%20Powerlift&amp;severity=medium&amp;id=693833a029cea75c35ae51df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66531-cross-site-request-forgery-csrf-in--56483f6d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66531%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=medium&amp;id=693833a029cea75c35ae51dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66530-missing-authorization-in-webba-appo-4968db25</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66530%3A%20Missing%20Authorization%20in%20Webba%20Appointment%20Booking%20Webba%20Booking&amp;severity=medium&amp;id=6938339e29cea75c35ae4c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66529-cross-site-request-forgery-csrf-in--7d6d14f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66529%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Chartify&amp;severity=medium&amp;id=6938339e29cea75c35ae4c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66528-missing-authorization-in-villatheme-358cbc5d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66528%3A%20Missing%20Authorization%20in%20VillaTheme%20Thank%20You%20Page%20Customizer%20for%20WooCommerce&amp;severity=medium&amp;id=6938339e29cea75c35ae4c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66527-missing-authorization-in-vankarwai--51e99026</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66527%3A%20Missing%20Authorization%20in%20VanKarWai%20Lobo&amp;severity=medium&amp;id=6938339e29cea75c35ae4c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66526-missing-authorization-in-essekia-ta-19147bb4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66526%3A%20Missing%20Authorization%20in%20Essekia%20Tablesome&amp;severity=medium&amp;id=6938339e29cea75c35ae4c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66525-missing-authorization-in-elastic-em-1e36780c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66525%3A%20Missing%20Authorization%20in%20Elastic%20Email%20Elastic%20Email%20Sender&amp;severity=medium&amp;id=6938339e29cea75c35ae4c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64257-missing-authorization-in-joe-dolson-37698cfa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64257%3A%20Missing%20Authorization%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=medium&amp;id=6938339e29cea75c35ae4c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64256-cross-site-request-forgery-csrf-in--2f42f9f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64256%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PressTigers%20Simple%20Folio&amp;severity=medium&amp;id=6938339e29cea75c35ae4c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64255-missing-authorization-in-bowo-admin-7ca4ddbb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64255%3A%20Missing%20Authorization%20in%20Bowo%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=low&amp;id=6938339e29cea75c35ae4c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64254-missing-authorization-in-ronald-hue-b5959794</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64254%3A%20Missing%20Authorization%20in%20Ronald%20Huereca%20Photo%20Block&amp;severity=low&amp;id=6938339e29cea75c35ae4c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9368-cwe-770-allocation-of-resources-with-37c19149</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9368%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Rockwell%20Automation%20432ES-IG3%20Series%20A&amp;severity=high&amp;id=6938301129cea75c35ac7daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12807-cwe-89-improper-neutralization-of-s-87565862</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12807%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20DataMosaix%E2%84%A2%20Private%20Cloud&amp;severity=high&amp;id=69382bbdabbdc4595cd8b6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12558-cwe-200-exposure-of-sensitive-infor-d9e6dad6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12558%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=69382bbdabbdc4595cd8b6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12705-cwe-79-improper-neutralization-of-i-267f3118</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20widgetpack%20Reviews%20Widgets%20for%20Google%2C%20Yelp%20%26%20TripAdvisor&amp;severity=high&amp;id=69382bbdabbdc4595cd8b6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10876-cwe-79-improper-neutralization-of-i-536c4b49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Talent%20Software%20e-BAP%20Automation&amp;severity=medium&amp;id=69382bbdabbdc4595cd8b6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12381-cwe-269-improper-privilege-manageme-b5ea9b7a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12381%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20AlgoSec%20Firewall%20Analyzer&amp;severity=medium&amp;id=69382bbdabbdc4595cd8b6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6924-cwe-79-improper-neutralization-of-in-81334038</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6924%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Talent%20Software%20e-BAP%20Automation&amp;severity=medium&amp;id=69382835abbdc4595cd48505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14333-vulnerability-in-mozilla-firefox-338be044</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14333%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382835abbdc4595cd48500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14332-vulnerability-in-mozilla-firefox-a8b9cae5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14332%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382835abbdc4595cd484fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14331-vulnerability-in-mozilla-firefox-f5731ea9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14331%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69382835abbdc4595cd484f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14330-vulnerability-in-mozilla-firefox-d3f25089</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14330%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69382835abbdc4595cd484f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14329-vulnerability-in-mozilla-firefox-41afe31c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14329%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd484b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14328-vulnerability-in-mozilla-firefox-64edfbb7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14328%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd484ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14327-vulnerability-in-mozilla-firefox-1f64f716</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14327%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd484a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14326-vulnerability-in-mozilla-firefox-47304e2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14326%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69382833abbdc4595cd484a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14325-vulnerability-in-mozilla-firefox-339f7358</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14325%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd4849f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14324-vulnerability-in-mozilla-firefox-23edcca8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14324%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69382833abbdc4595cd48499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14323-vulnerability-in-mozilla-firefox-7f450cf1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14323%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd48493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14322-vulnerability-in-mozilla-firefox-2a656996</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14322%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd4848d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14321-vulnerability-in-mozilla-firefox-d6dd328a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14321%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69382833abbdc4595cd48488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-0249-escalates-ransomware-attacks-with-click-b1c0ccc9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-0249%20Escalates%20Ransomware%20Attacks%20with%20ClickFix%2C%20Fileless%20PowerShell%2C%20and%20DLL%20Sideloading&amp;severity=low&amp;id=693835f429cea75c35b236f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stac6565-targets-canada-in-80-of-attacks-as-gold-b-064d51de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=STAC6565%20Targets%20Canada%20in%2080%25%20of%20Attacks%20as%20Gold%20Blade%20Deploys%20QWCrypt%20Ransomware&amp;severity=high&amp;id=693824acabbdc4595cceb6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56464-cwe-548-in-ibm-ibm-qradar-siem-4947e234</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56464%3A%20CWE-548%20in%20IBM%20IBM%20QRadar%20SIEM&amp;severity=low&amp;id=69382833abbdc4595cd48485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simplex-chat-x-account-hacked-fake-site-promotes-c-5fac797c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SimpleX%20Chat%20X%20Account%20Hacked%2C%20Fake%20Site%20Promotes%20Crypto%20Wallet%20Scam&amp;severity=medium&amp;id=693824acabbdc4595cceb6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneeit-wordpress-rce-exploited-in-the-wild-while-i-211edcb3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneeit%20WordPress%20RCE%20Exploited%20in%20the%20Wild%20While%20ICTBroadcast%20Bug%20Fuels%20Frost%20Botnet%20Attacks&amp;severity=medium&amp;id=69381cd61b76610347c61f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-lazaruss-it-workers-scheme-was-caught-live-on--00a199ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Lazarus&apos;s%20IT%20Workers%20Scheme%20Was%20Caught%20Live%20on%20Camera&amp;severity=medium&amp;id=69381cd61b76610347c61f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11022-cwe-352-cross-site-request-forgery--17082a46</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11022%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Personal%20Project%20Panilux&amp;severity=critical&amp;id=69381cd71b76610347c61fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-posts-10-million-bounty-for-iranian-hackers-73d9ee27</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Posts%20%2410%20Million%20Bounty%20for%20Iranian%20Hackers&amp;severity=medium&amp;id=693817c81b76610347be18df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-broadside-botnet-poses-risk-to-shipping-compan-766cd5e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98Broadside%E2%80%99%20Botnet%20Poses%20Risk%20to%20Shipping%20Companies&amp;severity=medium&amp;id=69380ec81b76610347b0f87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-streamline-zero-trust-using-the-shared-sign-834f41d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20Streamline%20Zero%20Trust%20Using%20the%20Shared%20Signals%20Framework&amp;severity=medium&amp;id=6938173f1b76610347bd8cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-adds-layered-defenses-to-chrome-to-block-in-5e8cf916</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Adds%20Layered%20Defenses%20to%20Chrome%20to%20Block%20Indirect%20Prompt%20Injection%20Threats&amp;severity=low&amp;id=6938173f1b76610347bd8cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40941-cwe-200-exposure-of-sensitive-infor-4b7cba68</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40941%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=medium&amp;id=6938009429016b16de45ff5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40940-cwe-200-exposure-of-sensitive-infor-c879c455</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40940%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=medium&amp;id=6938009229016b16de45fef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40939-cwe-284-improper-access-control-in--a833a871</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40939%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=medium&amp;id=6938009229016b16de45fef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40938-cwe-798-use-of-hard-coded-credentia-2d01bae9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40938%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=high&amp;id=6938009229016b16de45fef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40937-cwe-77-improper-neutralization-of-s-11d658c8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40937%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=high&amp;id=6938009229016b16de45feed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40935-cwe-20-improper-input-validation-in-a1cf7e89</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40935%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20RUGGEDCOM%20RMC8388%20V5.X&amp;severity=medium&amp;id=6938009229016b16de45feea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40831-cwe-20-improper-input-validation-in-f6c49cb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40831%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=medium&amp;id=6938009229016b16de45fee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40830-cwe-285-improper-authorization-in-s-a35e877d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40830%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=medium&amp;id=6938009229016b16de45fee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40820-cwe-940-improper-verification-of-so-205975b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40820%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Siemens%20SIDOOR%20ATD430W&amp;severity=high&amp;id=6938009229016b16de45fee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40819-cwe-863-incorrect-authorization-in--28af2c58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40819%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=6938009229016b16de45fede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40818-cwe-732-incorrect-permission-assign-0d67538c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40818%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=low&amp;id=6938009229016b16de45fedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40807-cwe-294-authentication-bypass-by-ca-a2c79d8f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40807%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Siemens%20Gridscale%20X%20Prepay&amp;severity=medium&amp;id=6938009029016b16de45feae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40806-cwe-204-observable-response-discrep-022bcb0f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40806%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Siemens%20Gridscale%20X%20Prepay&amp;severity=medium&amp;id=6938009029016b16de45feab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40801-cwe-295-improper-certificate-valida-a9403f7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40801%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20COMOS%20V10.6&amp;severity=high&amp;id=6938009029016b16de45fea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40800-cwe-295-improper-certificate-valida-524ee832</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40800%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20COMOS%20V10.6&amp;severity=high&amp;id=6938009029016b16de45fea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56840-cwe-74-improper-neutralization-of-s-bbdbcc10</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56840%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56839-cwe-74-improper-neutralization-of-s-4ce939fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56839%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56838-cwe-74-improper-neutralization-of-s-06f53dd2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56838%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56837-cwe-77-improper-neutralization-of-s-7849a436</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56837%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56836-cwe-77-improper-neutralization-of-s-578b6f12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56836%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56835-cwe-74-improper-neutralization-of-s-509c330a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56835%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-gangs-turn-to-shanya-exe-packer-to-hide-0b4fe55b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20gangs%20turn%20to%20Shanya%20EXE%20packer%20to%20hide%20EDR%20killers&amp;severity=high&amp;id=6938006b29016b16de45e52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-malicious-vs-code-go-npm-and-rust-3a2ba24e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20Malicious%20VS%20Code%2C%20Go%2C%20npm%2C%20and%20Rust%20Packages%20Stealing%20Developer%20Data&amp;severity=high&amp;id=6938006b29016b16de45e535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-300000-individuals-impacted-by-vitas-hospice--afd2e027</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20300%2C000%20Individuals%20Impacted%20by%20Vitas%20Hospice%20Data%20Breach&amp;severity=medium&amp;id=6937f19127e9f45fce65528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stac6565-targets-canada-in-80-of-attacks-as-gold-b-4e1065a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=STAC6565%20Targets%20Canada%20in%2080%25%20of%20Attacks%20as%20Gold%20Blade%20Deploys%20QWCrypt%20Ransomware&amp;severity=high&amp;id=6938069e29016b16de4f9968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-amos-infostealer-is-piggybacking-chatgpts-chat-49a39f2d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20AMOS%20infostealer%20is%20piggybacking%20ChatGPT%E2%80%99s%20chat-sharing%20feature%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6937ee2327e9f45fce633bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59029-cwe-617-reachable-assertion-in-powe-52b30495</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59029%3A%20CWE-617%20Reachable%20Assertion%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=6937f1ad27e9f45fce65730b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59030-cwe-276-incorrect-default-permissio-0c33e98f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59030%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20PowerDNS%20Recursor&amp;severity=high&amp;id=6937f1ad27e9f45fce65730e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66271-unquoted-search-path-or-element-in--88268e8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66271%3A%20Unquoted%20search%20path%20or%20element%20in%20ELECOM%20CO.%2CLTD.%20Clone%20for%20Windows&amp;severity=medium&amp;id=6937e2ceca0f3871ecb6363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64696-use-of-cache-containing-sensitive-i-d2a72885</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64696%3A%20Use%20of%20cache%20containing%20sensitive%20information%20in%20Brother%20Industries%2C%20Ltd.%20Android%20App%20%22Brother%20iPrint%26Scan%22&amp;severity=low&amp;id=6937def0ca0f3871ecb2c5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41693-cwe-770-allocation-of-resources-wit-a73993fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41693%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41696-cwe-798-use-of-hard-coded-credentia-11a96c38</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41696%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41694-cwe-770-allocation-of-resources-wit-9e794692</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41694%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41692-cwe-916-use-of-password-hash-with-i-476e0764</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41692%3A%20CWE-916%20Use%20of%20Password%20Hash%20With%20Insufficient%20Computational%20Effort%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41697-cwe-1299-missing-protection-mechani-0fdb4d6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41697%3A%20CWE-1299%20Missing%20Protection%20Mechanism%20for%20Alternate%20Hardware%20Interface%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41695-cwe-79-improper-neutralization-of-i-cca55d68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41745-cwe-79-improper-neutralization-of-i-d9a0a9f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41745%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41746-cwe-79-improper-neutralization-of-i-39f72e90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41747-cwe-79-improper-neutralization-of-i-ae45e959</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41748-cwe-79-improper-neutralization-of-i-6e52ee35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41749-cwe-79-improper-neutralization-of-i-a32d191e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da92964788758a8a4048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41750-cwe-79-improper-neutralization-of-i-7c678f4c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da92964788758a8a404b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41751-cwe-79-improper-neutralization-of-i-c5f7c48b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da92964788758a8a404e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41752-cwe-79-improper-neutralization-of-i-11daa6b4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da92964788758a8a4051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-malicious-vs-code-go-npm-and-rust-d7223e55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20Malicious%20VS%20Code%2C%20Go%2C%20npm%2C%20and%20Rust%20Packages%20Stealing%20Developer%20Data&amp;severity=medium&amp;id=6937ea6bca0f3871ecc0fe59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14309-cwe-476-null-pointer-dereference-in-d0ed9382</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14309%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20ravynsoft%20ravynos&amp;severity=high&amp;id=6937d709964788758a861be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14308-cwe-190-integer-overflow-or-wraparo-15413a22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14308%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Robocode%20Project%20Robocode&amp;severity=critical&amp;id=6937d709964788758a861be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14307-cwe-377-in-robocode-project-robocod-28898719</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14307%3A%20CWE-377%20in%20Robocode%20Project%20Robocode&amp;severity=critical&amp;id=6937d385964788758a7fe753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14306-cwe-22-improper-limitation-of-a-pat-c54e87ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14306%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Robocode%20Project%20Robocode&amp;severity=critical&amp;id=6937d709964788758a861be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13428-cwe-20-improper-input-validation-in-257aa804</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13428%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20Cloud%20Google%20Cloud%20SecOps%20SOAR&amp;severity=high&amp;id=6937c4a55092139813fc0f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13071-cwe-79-cross-site-scripting-xss-in--48937ecc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13071%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Custom%20Admin%20Menu&amp;severity=high&amp;id=6937bd663ce8502056bafcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13070-cwe-22-improper-limitation-of-a-pat-9c609082</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13070%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CSV%20to%20SortTable&amp;severity=medium&amp;id=6937bd663ce8502056bafcc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13031-cwe-79-cross-site-scripting-xss-in--2d39b083</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13031%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=medium&amp;id=6937bd663ce8502056bafcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-activity-clusters-target-multiple-ind-43d97952</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Activity%20Clusters%20Target%20Multiple%20Industries&amp;severity=medium&amp;id=693819561b76610347bfb3b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14284-cross-site-scripting-xss-in-tiptape-17ed7e90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14284%3A%20Cross-site%20Scripting%20(XSS)%20in%20%40tiptap%2Fextension-link&amp;severity=medium&amp;id=6937aed7c0f7ae2eacecdbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13604-cwe-79-improper-neutralization-of-i-adbf2583</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13604%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cleantalk%20Login%20Security%2C%20FireWall%2C%20Malware%20removal%20by%20CleanTalk&amp;severity=high&amp;id=6937aa2bf0d475f65e959edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67504-cwe-331-insufficient-entropy-in-wbc-5bf971f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67504%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20WBCE%20WBCE_CMS&amp;severity=critical&amp;id=69379c1c0af42da4c573d331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66631-cwe-502-deserialization-of-untruste-6f9015f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66631%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20MarimerLLC%20csla&amp;severity=high&amp;id=69379c1c0af42da4c573d32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66627-cwe-416-use-after-free-in-wasmi-lab-12994177</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66627%3A%20CWE-416%3A%20Use%20After%20Free%20in%20wasmi-labs%20wasmi&amp;severity=high&amp;id=6937a044f0d475f65e8bac86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66578-cwe-248-uncaught-exception-in-robri-9f49337f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66578%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20robrichards%20xmlseclibs&amp;severity=medium&amp;id=6937a044f0d475f65e8bac81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42928-cwe-502-deserialization-of-untruste-9ab39dbb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42928%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20jConnect%20-%20SDK%20for%20ASE&amp;severity=critical&amp;id=69378a8b0af42da4c56f97c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42904-cwe-549-missing-password-field-mask-b1d71738</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42904%3A%20CWE-549%3A%20Missing%20Password%20Field%20Masking%20in%20SAP_SE%20Application%20Server%20ABAP&amp;severity=medium&amp;id=69378a8b0af42da4c56f97c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42896-cwe-116-improper-encoding-or-escapi-31d1342b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42896%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=medium&amp;id=69378a890af42da4c56f96d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42891-cwe-862-missing-authorization-in-sa-631c1b08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42891%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Enterprise%20Search%20for%20ABAP&amp;severity=medium&amp;id=69378a890af42da4c56f96d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42880-cwe-94-improper-control-of-generati-51f11621</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42880%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Solution%20Manager&amp;severity=critical&amp;id=69378a890af42da4c56f96d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42878-cwe-1244-internal-asset-exposed-to--d50ed2de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42878%3A%20CWE-1244%3A%20Internal%20Asset%20Exposed%20to%20Unsafe%20Debug%20Access%20Level%20or%20State%20in%20SAP_SE%20SAP%20Web%20Dispatcher%20and%20Internet%20Communication%20Manager%20(ICM)&amp;severity=high&amp;id=69378a890af42da4c56f96cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42877-cwe-787-out-of-bounds-write-in-saps-4e99348d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42877%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20SAP_SE%20SAP%20Web%20Dispatcher%2C%20Internet%20Communication%20Manager%20and%20SAP%20Content%20Server&amp;severity=high&amp;id=69378a890af42da4c56f96c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42876-cwe-405-asymmetric-resource-consump-c168cc00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42876%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAP%20S%2F4%20HANA%20Private%20Cloud%20(Financials%20General%20Ledger)&amp;severity=high&amp;id=69378a890af42da4c56f96c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42875-cwe-306-missing-authentication-for--47f7742c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42875%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SAP_SE%20SAP%20NetWeaver%20Internet%20Communication%20Framework&amp;severity=medium&amp;id=69378a890af42da4c56f96c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42874-cwe-405-asymmetric-resource-consump-4ce1bcd3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42874%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAP%20NetWeaver%20(remote%20service%20for%20Xcelsius)&amp;severity=high&amp;id=69378a890af42da4c56f96bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42873-cwe-405-asymmetric-resource-consump-002faf62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42873%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAPUI5%20framework%20(Markdown-it%20component)&amp;severity=medium&amp;id=69378a890af42da4c56f96b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42872-cwe-489-active-debug-code-in-sapse--7d460c4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42872%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal&amp;severity=medium&amp;id=69378a890af42da4c56f96b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66622-cwe-755-improper-handling-of-except-969a34b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66622%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20matrix-org%20matrix-rust-sdk&amp;severity=low&amp;id=69378a8b0af42da4c56f97d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66568-cwe-347-improper-verification-of-cr-3227f29f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66568%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAML-Toolkits%20ruby-saml&amp;severity=critical&amp;id=69378a8b0af42da4c56f97cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66567-cwe-347-improper-verification-of-cr-c4aef5a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66567%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAML-Toolkits%20ruby-saml&amp;severity=critical&amp;id=69378a8b0af42da4c56f97ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66565-cwe-252-unchecked-return-value-in-g-89b510f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66565%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20gofiber%20utils&amp;severity=critical&amp;id=693783830af42da4c56cfe7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66508-cwe-290-authentication-bypass-by-sp-ea0053f3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66508%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%201Panel-dev%201Panel&amp;severity=medium&amp;id=693783830af42da4c56cfe76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14286-information-disclosure-in-tenda-ac9-b6d0c498</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14286%3A%20Information%20Disclosure%20in%20Tenda%20AC9&amp;severity=medium&amp;id=693783830af42da4c56cfe6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53835-9236f4e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53835&amp;severity=null&amp;id=6937d709964788758a861bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66507-cwe-602-client-side-enforcement-of--e0e5b8e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66507%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%201Panel-dev%201Panel&amp;severity=high&amp;id=693783830af42da4c56cfe71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14285-sql-injection-in-code-projects-empl-8baecf01</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14285%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=693779c10af42da4c555dffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66481-cwe-80-improper-neutralization-of-s-13a5bdaf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66481%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=693771bc9bbcd7dc91e5c88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66470-cwe-79-improper-neutralization-of-i-ed065f81</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66470%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69376b769bbcd7dc91d243c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53805-985112e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53805&amp;severity=null&amp;id=6937dce3ca0f3871ecb1621e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53779-f67384b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53779&amp;severity=low&amp;id=695b8f06db813ff03e463842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-09-dc261da7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-09&amp;severity=medium&amp;id=6938ba537205ca471f065815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65513-na-22176379</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65513%3A%20n%2Fa&amp;severity=high&amp;id=6938956652fe50f9a492979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65882-na-7d1d5ed6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65882%3A%20n%2Fa&amp;severity=critical&amp;id=69387706ef540ebbadc35cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65741-na-4d681e7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65741%3A%20n%2Fa&amp;severity=critical&amp;id=69387706ef540ebbadc35ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65572-na-006ced74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65572%3A%20n%2Fa&amp;severity=medium&amp;id=693871e8ef540ebbadbcf66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65300-na-de53d473</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65300%3A%20n%2Fa&amp;severity=medium&amp;id=693871e8ef540ebbadbcf667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65573-na-f55e4ea1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65573%3A%20n%2Fa&amp;severity=high&amp;id=69386e50ef540ebbadbb02e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61258-na-a34410c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61258%3A%20n%2Fa&amp;severity=high&amp;id=693867ed74ebaa3babafb8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61078-na-d19b7157</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61078%3A%20n%2Fa&amp;severity=medium&amp;id=693867ed74ebaa3babafb8ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65594-na-3c6098e0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65594%3A%20n%2Fa&amp;severity=high&amp;id=693867e174ebaa3babaf6f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64085-na-c623bbcb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64085%3A%20n%2Fa&amp;severity=medium&amp;id=6938612b74ebaa3baba47ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64086-na-7fbb2559</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64086%3A%20n%2Fa&amp;severity=medium&amp;id=69385b9074ebaa3bab9ecced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63742-na-4fa27747</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63742%3A%20n%2Fa&amp;severity=critical&amp;id=693856d07515e08d316631e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63740-na-fd775487</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63740%3A%20n%2Fa&amp;severity=medium&amp;id=693856d07515e08d316631e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63739-na-f4063b4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63739%3A%20n%2Fa&amp;severity=medium&amp;id=693856d07515e08d316631e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63738-na-d84bc5ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63738%3A%20n%2Fa&amp;severity=medium&amp;id=693856d07515e08d316631df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63737-na-737624fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63737%3A%20n%2Fa&amp;severity=medium&amp;id=693856d07515e08d316631dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56704-na-1ebe633b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56704%3A%20n%2Fa&amp;severity=high&amp;id=693856d07515e08d316631d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65289-na-e29a5368</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65289%3A%20n%2Fa&amp;severity=medium&amp;id=693852147515e08d31601b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65288-na-da37b364</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65288%3A%20n%2Fa&amp;severity=medium&amp;id=693852147515e08d31601b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65287-na-b43a1068</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65287%3A%20n%2Fa&amp;severity=high&amp;id=693843e8795dcaf6c50a72c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61075-na-4fe468ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61075%3A%20n%2Fa&amp;severity=high&amp;id=69383fbf795dcaf6c50728b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61074-na-357642de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61074%3A%20n%2Fa&amp;severity=medium&amp;id=69383fbf795dcaf6c50728b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66469-cwe-79-improper-neutralization-of-i-fdd6e9a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66469%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=6937671f9bbcd7dc91cb4c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66204-cwe-307-improper-restriction-of-exc-5e29a722</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66204%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20WBCE%20WBCE_CMS&amp;severity=medium&amp;id=693765059bbcd7dc91c9e948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66202-cwe-647-use-of-non-canonical-url-pa-8f58c5f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66202%3A%20CWE-647%3A%20Use%20of%20Non-Canonical%20URL%20Paths%20for%20Authorization%20Decisions%20in%20withastro%20astro&amp;severity=medium&amp;id=693763792bceb4b25b4513aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65964-cwe-829-inclusion-of-functionality--14b531c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65964%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=693763792bceb4b25b4513af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65962-cwe-352-cross-site-request-forgery--80114d16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65962%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=69375ffc2bceb4b25b402a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64760-cwe-352-cross-site-request-forgery--4bf27619</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64760%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=69375c702bceb4b25b3c00be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64499-cwe-352-cross-site-request-forgery--164979cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64499%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=693756d12bceb4b25b3829eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64498-cwe-352-cross-site-request-forgery--0550d940</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64498%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=693755498d836cc4e0fc05cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64497-cwe-639-authorization-bypass-throug-1c2837ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64497%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=693755498d836cc4e0fc05d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36140-cwe-770-allocation-of-resources-wit-95180fbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36140%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20watsonx.data&amp;severity=medium&amp;id=693751c58d836cc4e0f76ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12635-cwe-79-improper-neutralization-of-i-7d6e371b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12635%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=69374abd8d836cc4e0f08cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64650-cwe-532-insertion-of-sensitive-info-a31ea1e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64650%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Storage%20Defender%20-%20Resiliency%20Service&amp;severity=medium&amp;id=69374abd8d836cc4e0f08cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12832-cwe-918-server-side-request-forgery-b954c793</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12832%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=693748a28d836cc4e0ef5ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36017-cwe-526-in-ibm-controller-209cce35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36017%3A%20CWE-526%20in%20IBM%20Controller&amp;severity=medium&amp;id=693746f956e18237059c6663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14276-command-injection-in-ilevia-eve-x1--6e7a3738</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14276%3A%20Command%20Injection%20in%20Ilevia%20EVE%20X1%20Server&amp;severity=medium&amp;id=693746f956e18237059c6666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36102-cwe-602-client-side-enforcement-of--5cf9a494</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36102%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Controller&amp;severity=low&amp;id=693746f956e18237059c666f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33111-cwe-379-creation-of-temporary-file--8b08ffae</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33111%3A%20CWE-379%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Insecure%20Permissions%20in%20IBM%20Controller&amp;severity=medium&amp;id=693746f956e18237059c666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36015-cwe-1284-improper-validation-of-spe-c39f93cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36015%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Controller&amp;severity=medium&amp;id=6937437656e1823705989915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrimerawire-trojan-targets-windows-fakes-chrome-a-a936c1d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChrimeraWire%20Trojan%20Targets%20Windows%2C%20Fakes%20Chrome%20Activity%20to%20Manipulate%20Search%20Rankings&amp;severity=medium&amp;id=69373866d081e9e7fd351a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-confirm-jssmuggler-uses-compromised-sites--e0097b19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Confirm%20JS%23SMUGGLER%20Uses%20Compromised%20Sites%20to%20Deploy%20NetSupport%20RAT&amp;severity=high&amp;id=69372a5ed081e9e7fd22dc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-crooks-manipulate-online-photos-to-fuel-virtua-98398763</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20Crooks%20manipulate%20online%20photos%20to%20fuel%20virtual%20kidnapping%20ransoms&amp;severity=medium&amp;id=69372a5ed081e9e7fd22dc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/poland-arrests-ukrainians-utilizing-advanced-hacki-d125e355</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Poland%20arrests%20Ukrainians%20utilizing%20&apos;advanced&apos;%20hacking%20equipment&amp;severity=high&amp;id=69372a5ed081e9e7fd22dc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-users-watch-out-new-jssmuggler-campaign-dr-a750fc34</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Users%20Watch%20Out%3A%20New%20JS%23SMUGGLER%20Campaign%20Drops%20NetSupport%20RAT%20Through%20Infected%20Sites&amp;severity=medium&amp;id=693717a306c06374c7fc8c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14261-cwe-331-insufficient-entropy-in-lit-bb85e4c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14261%3A%20CWE-331%20Insufficient%20Entropy%20in%20Litmuschaos%20litmus&amp;severity=high&amp;id=693717ba06c06374c7fca710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14259-sql-injection-in-jihai-jshop-minipr-19e45c64</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14259%3A%20SQL%20Injection%20in%20Jihai%20Jshop%20MiniProgram%20Mall%20System&amp;severity=medium&amp;id=6937143506c06374c7f73fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-fortifies-chrome-agentic-ai-against-indirec-d4380cb5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Fortifies%20Chrome%20Agentic%20AI%20Against%20Indirect%20Prompt%20Injection%20Attacks&amp;severity=medium&amp;id=6937141b06c06374c7f7189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-not-so-hidden-dangers-of-age-verification-a818daf4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20(Not%20So)%20Hidden%20Dangers%20of%20Age%20Verification&amp;severity=medium&amp;id=6937109b06c06374c7f4e2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/campaign-uses-clickfix-page-to-push-netsupport-rat-a45f131d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Campaign%20uses%20ClickFix%20page%20to%20push%20NetSupport%20RAT&amp;severity=medium&amp;id=693819561b76610347bfb3a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-confirm-jssmuggler-uses-compromised-sites--c2faf5b8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Confirm%20JS%23SMUGGLER%20Uses%20Compromised%20Sites%20to%20Deploy%20NetSupport%20RAT&amp;severity=medium&amp;id=6937244c7c9ad9ea57bd6eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14258-sql-injection-in-itsourcecode-stude-88d71820</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14258%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69370e8e06c06374c7f392fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48625-elevation-of-privilege-in-google-an-28202f83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48625%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69370e8e06c06374c7f3930c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48608-information-disclosure-in-google-an-92b970a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48608%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69370e8e06c06374c7f39309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48606-elevation-of-privilege-in-google-an-d4f639b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48606%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69370e8e06c06374c7f39306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48569-denial-of-service-in-google-android-b3ffd32e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48569%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69370e8e06c06374c7f39303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lummastealer-dropped-via-fake-updates-from-itchio--c868d435</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LummaStealer%20dropped%20via%20fake%20updates%20from%20itch.io%20and%20Patreon&amp;severity=medium&amp;id=693819561b76610347bfb39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14257-sql-injection-in-itsourcecode-stude-7df91217</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14257%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6937057e52c2eb5957f2e56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-critical-vulnerability-in-react-290a3101</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2shell%3A%20Critical%20vulnerability%20in%20react&amp;severity=critical&amp;id=6937058c52c2eb5957f3550c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48639-elevation-of-privilege-in-google-an-daf63e16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48639%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48638-elevation-of-privilege-in-google-an-489b6fec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48638%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48637-elevation-of-privilege-in-google-an-0e76eb7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48637%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48633-information-disclosure-in-google-an-e5379ff0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48633%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058652c2eb5957f2f179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48632-elevation-of-privilege-in-google-an-40461887</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48632%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48631-denial-of-service-in-google-android-512e0f76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48631%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058552c2eb5957f2f12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48629-elevation-of-privilege-in-google-an-2bae4244</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48629%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48628-information-disclosure-in-google-an-17e3c9e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48628%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48627-elevation-of-privilege-in-google-an-b751909a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48627%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48626-elevation-of-privilege-in-google-an-8e0be547</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48626%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48624-elevation-of-privilege-in-google-an-5702f9df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48624%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48623-elevation-of-privilege-in-google-an-9d6a36df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48623%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48622-information-disclosure-in-google-an-fb77859e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48622%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058552c2eb5957f2f10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48621-elevation-of-privilege-in-google-an-af90a51b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48621%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48620-elevation-of-privilege-in-google-an-63495e7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48620%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48618-elevation-of-privilege-in-google-an-67fe9929</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48618%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48615-elevation-of-privilege-in-google-an-5187df21</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48615%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058352c2eb5957f2f0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48614-denial-of-service-in-google-android-c19955ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48614%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48612-elevation-of-privilege-in-google-an-4c540405</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48612%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058352c2eb5957f2f0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48610-information-disclosure-in-google-an-d4c57874</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48610%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48607-denial-of-service-in-google-android-3032c148</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48607%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48604-information-disclosure-in-google-an-0815471d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48604%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48603-denial-of-service-in-google-android-12d0a9a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48603%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48601-elevation-of-privilege-in-google-an-d417be9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48601%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48600-information-disclosure-in-google-an-60be2def</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48600%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48599-elevation-of-privilege-in-google-an-fdf1c792</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48599%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48598-elevation-of-privilege-in-google-an-6c6a9f3e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48598%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937058152c2eb5957f2eed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48597-elevation-of-privilege-in-google-an-7b795845</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48597%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48596-elevation-of-privilege-in-google-an-7ea14d68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48596%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48594-elevation-of-privilege-in-google-an-ae9ef588</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48594%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48592-information-disclosure-in-google-an-67223ba5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48592%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058152c2eb5957f2eec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48591-information-disclosure-in-google-an-2c72e8b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48591%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058152c2eb5957f2eec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48590-denial-of-service-in-google-android-4ca6dfe4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48590%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058152c2eb5957f2eebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48589-elevation-of-privilege-in-google-an-a5c08000</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48589%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48588-elevation-of-privilege-in-google-an-9b5d5df6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48588%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48586-elevation-of-privilege-in-google-an-3f0a5c62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48586%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48584-denial-of-service-in-google-android-a87802f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48584%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937057f52c2eb5957f2e5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48583-elevation-of-privilege-in-google-an-78dcd99f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48583%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48580-elevation-of-privilege-in-google-an-32d568ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48580%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48576-denial-of-service-in-google-android-b9b3c429</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48576%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937057f52c2eb5957f2e5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48575-elevation-of-privilege-in-google-an-9444c0c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48575%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48573-elevation-of-privilege-in-google-an-0ea2933f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48573%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48572-elevation-of-privilege-in-google-an-9ca789a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48572%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48566-elevation-of-privilege-in-google-an-436aed13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48566%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48565-elevation-of-privilege-in-google-an-0e329f99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48565%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48564-elevation-of-privilege-in-google-an-af230c2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48564%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48555-information-disclosure-in-google-an-9b3aa07a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48555%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48536-elevation-of-privilege-in-google-an-c886a5fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48536%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48525-elevation-of-privilege-in-google-an-2c155039</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48525%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32329-elevation-of-privilege-in-google-an-f9fdd96f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32329%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32328-elevation-of-privilege-in-google-an-03e61eaa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32328%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32319-elevation-of-privilege-in-google-an-6db421ea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32319%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937057e52c2eb5957f2e57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22432-elevation-of-privilege-in-google-an-957a188d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22432%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937057e52c2eb5957f2e579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22420-elevation-of-privilege-in-google-an-8704b66e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22420%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-automated-threat-hunting-brings-ghostpenguin-ou-22b1db0e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Automated%20Threat%20Hunting%20Brings%20GhostPenguin%20Out%20of%20the%20Shadows&amp;severity=medium&amp;id=693819561b76610347bfb394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14256-sql-injection-in-itsourcecode-stude-af143abb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14256%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693701f752c2eb5957f05743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14251-sql-injection-in-code-projects-onli-fee5fe78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14251%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6936fa8b3bff8e510987a749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14250-sql-injection-in-code-projects-onli-27dd2930</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14250%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6936f16d3bff8e51097ebcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14271-625b0c4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14271&amp;severity=null&amp;id=6936f16d3bff8e51097ebd00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aws-china-linked-threat-actors-weaponized-react2sh-7bee9779</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AWS%3A%20China-linked%20threat%20actors%20weaponized%20React2Shell%20hours%20after%20disclosure&amp;severity=medium&amp;id=6936ebcf04c1ddb1a4e1f16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14249-sql-injection-in-code-projects-onli-50d28fa0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14249%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6936ebea04c1ddb1a4e2085a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14248-sql-injection-in-code-projects-simp-9c63831c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14248%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=6936e4d104c1ddb1a4d9d98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14247-sql-injection-in-code-projects-simp-7ac88ecb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14247%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=6936dd48dc63120ed94d35de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14246-sql-injection-in-code-projects-simp-0a6b705d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14246%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=6936d63fdc63120ed944e4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/substitution-cipher-based-on-the-voynich-manuscrip-2fc98498</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Substitution%20Cipher%20Based%20on%20The%20Voynich%20Manuscript%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6936d2c1dc63120ed93d5df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/space-bears-ransomware-claims-comcast-data-theft-t-9e39c14a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Space%20Bears%20Ransomware%20Claims%20Comcast%20Data%20Theft%20Through%20Quasar%20Breach&amp;severity=high&amp;id=6936d210e64c706dbb206f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/8th-december-threat-intelligence-report-62e2aaf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=8th%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6936ce90e64c706dbb1c6278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tri-century-eye-care-data-breach-impacts-200000-in-199c9ff7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tri-Century%20Eye%20Care%20Data%20Breach%20Impacts%20200%2C000%20Individuals&amp;severity=medium&amp;id=6936cb04e64c706dbb17160c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-usb-malware-react2shell-whatsapp-worm-21762801</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20USB%20Malware%2C%20React2Shell%2C%20WhatsApp%20Worms%2C%20AI%20IDE%20Bugs%20%26%20More&amp;severity=medium&amp;id=6936db3cdc63120ed94b30fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14245-sql-injection-in-ideacms-4ff3b032</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14245%3A%20SQL%20Injection%20in%20IdeaCMS&amp;severity=medium&amp;id=6936c788e64c706dbb14c805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-payments-surpassed-45-billion-us-treasu-745c68d7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Payments%20Surpassed%20%244.5%20Billion%3A%20US%20Treasury&amp;severity=high&amp;id=6936c3085f72f49d1523d830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42620-cwe-79-improper-neutralization-of-i-436bc029</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42620%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20CIRCL%20Vulnerability-Lookup&amp;severity=high&amp;id=6936c3245f72f49d1523dfdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42616-cwe-352-cross-site-request-forgery--d8f2c7ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42616%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CIRCL%20Vulnerability-Lookup&amp;severity=high&amp;id=6936c3245f72f49d1523dfda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14244-cross-site-scripting-in-greencms-1c58531f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14244%3A%20Cross%20Site%20Scripting%20in%20GreenCMS&amp;severity=medium&amp;id=6936c3245f72f49d1523dfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42615-cwe-307-improper-restriction-of-exc-4574821b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42615%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20CIRCL%20Vulnerability-Lookup&amp;severity=high&amp;id=6936c3245f72f49d1523dfe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-can-retailers-cyber-prepare-for-the-most-vulne-f9f19d1b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Can%20Retailers%20Cyber-Prepare%20for%20the%20Most%20Vulnerable%20Time%20of%20the%20Year%3F&amp;severity=high&amp;id=6936db3cdc63120ed94b3101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-70-domains-used-in-months-long-phishing-spree-e27c96d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2070%20Domains%20Used%20in%20Months-Long%20Phishing%20Spree%20Against%20US%20Universities&amp;severity=medium&amp;id=6936bc035f72f49d1519692f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14230-sql-injection-in-code-projects-dail-c92f6367</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14230%3A%20SQL%20Injection%20in%20code-projects%20Daily%20Time%20Recording%20System&amp;severity=medium&amp;id=6936bc165f72f49d1519946d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14229-csv-injection-in-sourcecodester-inv-4c6c3adf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14229%3A%20CSV%20Injection%20in%20SourceCodester%20Inventory%20Management%20System&amp;severity=medium&amp;id=6936b3f681782ca67e5acd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-fvncbot-seedsnatcher-and-clayrat-g-32b3fd39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Malware%20FvncBot%2C%20SeedSnatcher%2C%20and%20ClayRat%20Gain%20Stronger%20Data%20Theft%20Features&amp;severity=medium&amp;id=6936bda25f72f49d151d2502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-apache-tika-vulnerability-leads-to-xxe-in-0a72bacd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Apache%20Tika%20Vulnerability%20Leads%20to%20XXE%20Injection&amp;severity=critical&amp;id=6936ace781782ca67e50ab4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14228-cross-site-scripting-in-yealink-sip-248d48cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14228%3A%20Cross%20Site%20Scripting%20in%20Yealink%20SIP-T21P%20E2&amp;severity=medium&amp;id=6936b07281782ca67e564521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneeit-wordpress-rce-exploited-in-the-wild-while-i-36d737ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneeit%20WordPress%20RCE%20Exploited%20in%20the%20Wild%20While%20ICTBroadcast%20Bug%20Fuels%20Frost%20Botnet%20Attacks&amp;severity=high&amp;id=6936a96681782ca67e4dd963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14227-sql-injection-in-philipinho-simple--8c570b89</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14227%3A%20SQL%20Injection%20in%20Philipinho%20Simple-PHP-Blog&amp;severity=medium&amp;id=6936a54eb488c525a1e13b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-react2shell-surges-d6677c2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20React2Shell%20Surges&amp;severity=medium&amp;id=69369e41b488c525a1d6f755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14262-cwe-708-in-knime-knime-business-hub-3cb6320c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14262%3A%20CWE-708%20in%20KNIME%20KNIME%20Business%20Hub&amp;severity=medium&amp;id=69369e58b488c525a1d75c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14226-sql-injection-in-itsourcecode-stude-4f7b60af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14226%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69369e58b488c525a1d75c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66461-unquoted-search-path-or-element-in--7d3873c2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66461%3A%20Unquoted%20search%20path%20or%20element%20in%20GS%20Yuasa%20International%20Ltd.%20FULLBACK%20Manager%20Pro%20(for%20Windows)&amp;severity=medium&amp;id=69369e58b488c525a1d75c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27020-cwe-306-missing-authentication-for--156b66fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27020%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Infinera%20MTC-9&amp;severity=critical&amp;id=69369ac1b488c525a1d4258d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27019-cwe-306-missing-authentication-for--a0e783ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27019%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Infinera%20MTC-9&amp;severity=critical&amp;id=69369ac1b488c525a1d4258a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneeit-wordpress-rce-exploited-in-the-wild-while-i-a61dcbf5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneeit%20WordPress%20RCE%20Exploited%20in%20the%20Wild%20While%20ICTBroadcast%20Bug%20Fuels%20Frost%20Botnet%20Attacks&amp;severity=critical&amp;id=6936ae6081782ca67e53c78f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14225-command-injection-in-d-link-dcs-930-5a0af0d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14225%3A%20Command%20Injection%20in%20D-Link%20DCS-930L&amp;severity=medium&amp;id=693698b3b488c525a1d24590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26489-cwe-20-improper-input-validation-in-3d027e23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26489%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Infinera%20MTC-9&amp;severity=medium&amp;id=693696a4ddfbd9e35f9789a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26488-cwe-20-improper-input-validation-in-c6c4479b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26488%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Infinera%20MTC-9&amp;severity=high&amp;id=693696a4ddfbd9e35f97899e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26487-cwe-918-server-side-request-forgery-2e6cf9cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26487%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Infinera%20MTC-9&amp;severity=high&amp;id=69369326ddfbd9e35f933089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12956-cwe-79-improper-neutralization-of-i-7c179921</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12956%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=69369326ddfbd9e35f933086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66330-cwe-200-exposure-of-sensitive-infor-3284f659</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66330%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66329-cwe-264-permissions-privileges-and--e1f97561</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66329%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14224-path-traversal-in-yottamaster-dm2-9267bdc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14224%3A%20Path%20Traversal%20in%20Yottamaster%20DM2&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66325-cwe-264-permissions-privileges-and--0504e50a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66325%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58279-cwe-200-exposure-of-sensitive-infor-e033fe1e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58279%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66334-cwe-494-download-of-code-without-in-0e54d12b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66334%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69368f9cddfbd9e35f8dc88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66333-cwe-494-download-of-code-without-in-944d5e6c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66333%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69368c28ddfbd9e35f8b2791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66332-cwe-494-download-of-code-without-in-3ec9848b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66332%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69368c28ddfbd9e35f8b278e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66331-cwe-494-download-of-code-without-in-583f79a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66331%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69368c28ddfbd9e35f8b278b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66328-cwe-362-concurrent-execution-using--cc58afbc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66328%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69368c28ddfbd9e35f8b2788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66327-cwe-362-concurrent-execution-using--a5ee53a0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66327%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69368c28ddfbd9e35f8b2785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66326-cwe-416-use-after-free-in-huawei-ha-ac3c914a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66326%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368a07ddfbd9e35f898b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66324-cwe-269-improper-privilege-manageme-d7215e4c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66324%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69368a07ddfbd9e35f898b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66323-cwe-358-improperly-implemented-secu-8ff1cb71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66323%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368a07ddfbd9e35f898b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14223-sql-injection-in-code-projects-simp-61984c4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14223%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Leave%20Manager&amp;severity=medium&amp;id=69368a07ddfbd9e35f898b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66322-cwe-362-concurrent-execution-using--2e27a1ce</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66322%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368a07ddfbd9e35f898b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66321-cwe-362-concurrent-execution-using--3b37d24c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66321%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6936848645c01810695adba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66320-cwe-362-concurrent-execution-using--fdf61234</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66320%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6936848645c01810695adba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14255-cwe-89-improper-neutralization-of-s-ff6c5314</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14255%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=6936848645c01810695adbb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14254-cwe-89-improper-neutralization-of-s-3df14a20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14254%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=6936848645c01810695adbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14253-cwe-36-absolute-path-traversal-in-g-fbc31473</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14253%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=medium&amp;id=6936848645c01810695adba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14222-sql-injection-in-code-projects-empl-647a88c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14222%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=6936810245c0181069558092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14221-cross-site-scripting-in-sourcecodes-9cb71bb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14221%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Banking%20System&amp;severity=medium&amp;id=693678a9232db2b373874e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-deploys-udpgangster-backdoor-in-targete-29053629</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20Deploys%20UDPGangster%20Backdoor%20in%20Targeted%20Turkey-Israel-Azerbaijan%20Campaign&amp;severity=low&amp;id=6936824d45c0181069588df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14220-path-traversal-in-orico-cd3510-7d4148fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14220%3A%20Path%20Traversal%20in%20ORICO%20CD3510&amp;severity=medium&amp;id=69367514232db2b37382295c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14219-unrestricted-upload-in-campcodes-re-c28386d7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14219%3A%20Unrestricted%20Upload%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=69367514232db2b373822965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/publishing-malicious-vs-code-extensions-bypassing--7319308e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Publishing%20Malicious%20VS%20Code%20Extensions%3A%20Bypassing%20VS%20Code%20Marketplace%20Analysis%20and%20the%20Insecurity%20of%20OpenVSX%20(Cursor%20AI%2FWindsurf)&amp;severity=medium&amp;id=69366aa7232db2b3737222ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14218-sql-injection-in-code-projects-curr-1aeb0557</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14218%3A%20SQL%20Injection%20in%20code-projects%20Currency%20Exchange%20System&amp;severity=medium&amp;id=6936668b6c0bb4b65b3ec243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14217-sql-injection-in-code-projects-curr-5f5339a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14217%3A%20SQL%20Injection%20in%20code-projects%20Currency%20Exchange%20System&amp;severity=medium&amp;id=69365f946c0bb4b65b365d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14216-sql-injection-in-code-projects-curr-89649ece</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14216%3A%20SQL%20Injection%20in%20code-projects%20Currency%20Exchange%20System&amp;severity=medium&amp;id=693657e9b529634ccd8059f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14215-sql-injection-in-code-projects-curr-a1011fae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14215%3A%20SQL%20Injection%20in%20code-projects%20Currency%20Exchange%20System&amp;severity=medium&amp;id=69365457b529634ccd7a72eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14214-sql-injection-in-itsourcecode-stude-5c53fb03</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14214%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=69364a1f28b66c5f4ed25052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14212-sql-injection-in-projectworlds-adva-a82932ea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14212%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=6936430628b66c5f4ed00063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14211-sql-injection-in-projectworlds-adva-29e9f6f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14211%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=6936430628b66c5f4ed0005d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14210-sql-injection-in-projectworlds-adva-2e0f00f3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14210%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=69364ecab529634ccd756ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14209-sql-injection-in-campcodes-school-f-89a5b979</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14209%3A%20SQL%20Injection%20in%20Campcodes%20School%20File%20Management%20System&amp;severity=medium&amp;id=6936317e28b66c5f4ec304b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53749-9149de2c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53749&amp;severity=null&amp;id=695450bcdb813ff03e2bf884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14208-command-injection-in-d-link-dir-823-7504327e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14208%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=693626f928b66c5f4ebbe7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14207-sql-injection-in-tushar-2223-hotel--19a9ca9c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14207%3A%20SQL%20Injection%20in%20tushar-2223%20Hotel-Management-System&amp;severity=medium&amp;id=69361ff428b66c5f4eb47eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14206-improper-authorization-in-sourcecod-9b34dba6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14206%3A%20Improper%20Authorization%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=69361c2c4a07f71cf650fcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-08-4165bff2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-08&amp;severity=medium&amp;id=69376a7f9bbcd7dc91cd7d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65228-na-35081934</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65228%3A%20n%2Fa&amp;severity=low&amp;id=6937387cd081e9e7fd35434b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65229-na-bb737467</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65229%3A%20n%2Fa&amp;severity=medium&amp;id=693734e9d081e9e7fd30bf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65230-na-7891b0f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65230%3A%20n%2Fa&amp;severity=medium&amp;id=69372dddd081e9e7fd297ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65231-na-61f295cc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65231%3A%20n%2Fa&amp;severity=medium&amp;id=693722bf7c9ad9ea57ba3097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65849-na-92cbcf05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65849%3A%20n%2Fa&amp;severity=critical&amp;id=69371f3a7c9ad9ea57b7cd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65548-na-9771dc99</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65548%3A%20n%2Fa&amp;severity=critical&amp;id=693717ba06c06374c7fca71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65271-na-f866e554</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65271%3A%20n%2Fa&amp;severity=high&amp;id=693717ba06c06374c7fca714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64081-na-681a6197</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64081%3A%20n%2Fa&amp;severity=critical&amp;id=6937143506c06374c7f73fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65804-na-a92d6b98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65804%3A%20n%2Fa&amp;severity=medium&amp;id=69370e8e06c06374c7f3930f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pluck-477-dev2-php-code-execution-d4449686</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pluck%204.7.7-dev2%20-%20%20PHP%20Code%20Execution&amp;severity=medium&amp;id=693708ee52c2eb5957f7d791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59391-na-c7eddd49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59391%3A%20n%2Fa&amp;severity=medium&amp;id=6937058652c2eb5957f2f18c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63721-na-b46b935d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63721%3A%20n%2Fa&amp;severity=critical&amp;id=693701f752c2eb5957f0574b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65799-na-0462fce9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65799%3A%20n%2Fa&amp;severity=medium&amp;id=6936fe0c3bff8e51098be2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65363-na-c47dbb22</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65363%3A%20n%2Fa&amp;severity=high&amp;id=6936fe0c3bff8e51098be2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65796-na-f0a5aa8b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65796%3A%20n%2Fa&amp;severity=medium&amp;id=6936fa8b3bff8e510987a750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65797-na-9a9e22f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65797%3A%20n%2Fa&amp;severity=medium&amp;id=6936fa8b3bff8e510987a743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65795-na-e7b7aa51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65795%3A%20n%2Fa&amp;severity=high&amp;id=6936fa8b3bff8e510987a73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65798-na-4de357d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65798%3A%20n%2Fa&amp;severity=medium&amp;id=6936f7043bff8e5109832fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61318-na-7df04a53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61318%3A%20n%2Fa&amp;severity=medium&amp;id=6936f16d3bff8e51097ebd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60912-na-553e54c3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60912%3A%20n%2Fa&amp;severity=low&amp;id=6936ebea04c1ddb1a4e20861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telegram-phishing-and-related-activities-88211766</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telegram%20phishing%20and%20related%20activities&amp;severity=medium&amp;id=6936d9b6dc63120ed947a35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14205-cross-site-scripting-in-code-projec-8a342957</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14205%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Chamber%20of%20Commerce%20Membership%20Management%20System&amp;severity=medium&amp;id=69360f7d4a07f71cf640fdce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14204-os-command-injection-in-tykodev-che-126a4b21</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14204%3A%20OS%20Command%20Injection%20in%20TykoDev%20cherry-studio-TykoFork&amp;severity=medium&amp;id=69360a2e96e8d1719bc52541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14203-sql-injection-in-code-projects-ques-01b21e25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14203%3A%20SQL%20Injection%20in%20code-projects%20Question%20Paper%20Generator&amp;severity=medium&amp;id=6935f4ac4dfbcbe9ef77b262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/portugal-updates-cybercrime-law-to-exempt-security-e1a7abd5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Portugal%20updates%20cybercrime%20law%20to%20exempt%20security%20researchers&amp;severity=high&amp;id=6935f0e6a6cc62dd6e3b64fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14201-cross-site-scripting-in-alokjaiswal-29327f6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14201%3A%20Cross%20Site%20Scripting%20in%20alokjaiswal%20Hotel-Management-services-using-MYSQL-and-php&amp;severity=medium&amp;id=6935c6fc81c8736e4c1ad8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14200-cross-site-scripting-in-alokjaiswal-07fbf7b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14200%3A%20Cross%20Site%20Scripting%20in%20alokjaiswal%20Hotel-Management-services-using-MYSQL-and-php&amp;severity=medium&amp;id=6935bc191ce29f222165335e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14199-unrestricted-upload-6c4e9aaa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14199%3A%20Unrestricted%20Upload&amp;severity=medium&amp;id=6935b5201ce29f22215bf218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-almost-any-phone-number-can-be-tracked-via-wha-c1960e0a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20(almost)%20any%20phone%20number%20can%20be%20tracked%20via%20WhatsApp%20%26%20Signal%20%E2%80%93%20open-source%20PoC&amp;severity=high&amp;id=6935adb3551a24bb8cca3466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14198-information-disclosure-9a5872ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14198%3A%20Information%20Disclosure&amp;severity=medium&amp;id=6935adb1551a24bb8cca33db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patching-pulse-oximeter-firmware-388a4fb5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patching%20Pulse%20Oximeter%20Firmware&amp;severity=medium&amp;id=6935adb3551a24bb8cca346a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14197-information-disclosure-c6ab3803</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14197%3A%20Information%20Disclosure&amp;severity=medium&amp;id=6935aa3c551a24bb8cc60a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14196-buffer-overflow-in-h3c-magic-b1-e84401a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14196%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69359f44ced1bbd5af6778cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14195-unrestricted-upload-in-code-project-da55b800</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14195%3A%20Unrestricted%20Upload%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=6935a119551a24bb8cbbdc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14194-cross-site-scripting-in-code-projec-5828086a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14194%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=693590d756f2fcb39f350249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14193-sql-injection-in-code-projects-empl-3fe72876</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14193%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=69358a9756f2fcb39f2bcb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14192-sql-injection-in-rashmindungrani-on-ff18faf2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14192%3A%20SQL%20Injection%20in%20RashminDungrani%20online-banking&amp;severity=medium&amp;id=69358a9756f2fcb39f2bcb36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14191-buffer-overflow-in-utt-512w-f886a277</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14191%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=69357a6c705c380fd9783155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14190-sql-injection-in-chanjet-tplus-d641a022</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14190%3A%20SQL%20Injection%20in%20Chanjet%20TPlus&amp;severity=medium&amp;id=693572f137e7cb8c9bebccb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14189-sql-injection-in-chanjet-crm-716e2149</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14189%3A%20SQL%20Injection%20in%20Chanjet%20CRM&amp;severity=medium&amp;id=6935691437e7cb8c9be15eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14188-command-injection-in-ugreen-dh2100-7ececf1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14188%3A%20Command%20Injection%20in%20UGREEN%20DH2100%2B&amp;severity=high&amp;id=693560d76d1d87ed0c725dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-50-infrastructure-exposed-in-new-server-ip-fb382e24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%205.0%20Infrastructure%20Exposed%20in%20New%20Server%2C%20IP%2C%20and%20Domain%20Leak&amp;severity=high&amp;id=693556416d1d87ed0c65a0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-wsus-remote-code-execution-cve-2025-5928-9781ebf7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20WSUS%20Remote%20Code%20Execution%20(CVE-2025-59287)%20Actively%20Exploited%20in%20the%20Wild%20(Updated%20November%203)&amp;severity=medium&amp;id=693717b806c06374c7fca668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14187-buffer-overflow-in-ugreen-dh2100-bd7ea556</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14187%3A%20Buffer%20Overflow%20in%20UGREEN%20DH2100%2B&amp;severity=high&amp;id=69353dcaffe3c58b9f071ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stillepost-or-how-to-proxy-your-c2s-http-traffic-t-c0561b51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stillepost%20-%20Or%3A%20How%20to%20Proxy%20your%20C2s%20HTTP-Traffic%20through%20Chromium%20%7C%20mischief&amp;severity=medium&amp;id=69352f35be54460d664f2525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14186-basic-cross-site-scripting-in-grand-cf5b2d9b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14186%3A%20Basic%20Cross%20Site%20Scripting%20in%20Grandstream%20GXP1625&amp;severity=medium&amp;id=69352f32be54460d664f24ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14185-sql-injection-in-yonyou-u8-cloud-eef10b29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14185%3A%20SQL%20Injection%20in%20Yonyou%20U8%20Cloud&amp;severity=medium&amp;id=69350bd6d5925d6ea2ce785f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14184-command-injection-in-sgai-space1-na-2c7efab5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14184%3A%20Command%20Injection%20in%20SGAI%20Space1%20NAS%20N1211DS&amp;severity=medium&amp;id=6935065f5cd7c00bf6e3233d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14183-unprotected-storage-of-credentials--837342c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14183%3A%20Unprotected%20Storage%20of%20Credentials%20in%20SGAI%20Space1%20NAS%20N1211DS&amp;severity=medium&amp;id=6934fd445cd7c00bf6d1c497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14182-path-traversal-in-sobey-media-conve-d7bd707f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14182%3A%20Path%20Traversal%20in%20Sobey%20Media%20Convergence%20System&amp;severity=medium&amp;id=6934e7470265b8b2b61784c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-launch-dual-campaign-on-globalprotect-po-09fd80bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20launch%20dual%20campaign%20on%20GlobalProtect%20portals%20and%20SonicWall%20APIs&amp;severity=medium&amp;id=6934d9340265b8b2b60965a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-07-9a43a65f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-07&amp;severity=medium&amp;id=693618854a07f71cf64a70c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/barts-health-nhs-confirms-oracle-ebs-linked-data-b-9ae7682b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Barts%20Health%20NHS%20Confirms%20Oracle%20EBS%20Linked%20Data%20Breach%20from%20Cl0p%20Ransomware&amp;severity=high&amp;id=69345f416c01a8c605b4dc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14141-buffer-overflow-in-utt-520w-c6cc8954</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14141%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=693456cca98e58ac8622ed62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14140-buffer-overflow-in-utt-520w-c180e378</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14140%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=6934506ea98e58ac861acdba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-30-flaws-in-ai-coding-tools-en-5c971663</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%2030%2B%20Flaws%20in%20AI%20Coding%20Tools%20Enabling%20Data%20Theft%20and%20RCE%20Attacks&amp;severity=critical&amp;id=69345f5b6c01a8c605b56f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/drones-to-diplomas-how-russias-largest-private-uni-847a2067</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Drones%20to%20Diplomas%3A%20How%20Russia%E2%80%99s%20Largest%20Private%20University%20is%20Linked%20to%20a%20%2425M%20Essay%20Mill&amp;severity=medium&amp;id=69344c37a98e58ac86167832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14139-buffer-overflow-in-utt-520w-53617f4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14139%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=medium&amp;id=6934487c0f17eabd84814c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react2shell-flaw-added-to-cisa-kev-after--e293bc02</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React2Shell%20Flaw%20Added%20to%20CISA%20KEV%20After%20Confirmed%20Active%20Exploitation&amp;severity=critical&amp;id=693436d8e435a964bf0ac7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-state-hackers-use-new-brickstorm-malware-a-0556d5d9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20State%20Hackers%20Use%20New%20BRICKSTORM%20Malware%20Against%20VMware%20Systems&amp;severity=medium&amp;id=69342be88daff6a4f6fb7cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14136-stack-based-buffer-overflow-in-link-e0ef136b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14136%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6500&amp;severity=high&amp;id=69342bf48daff6a4f6fb8165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react2shell-flaw-added-to-cisa-kev-after--ea2329c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React2Shell%20Flaw%20Added%20to%20CISA%20KEV%20After%20Confirmed%20Active%20Exploitation&amp;severity=critical&amp;id=6934174311364f3ab440a492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14135-stack-based-buffer-overflow-in-link-fc3b66c1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14135%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6500&amp;severity=high&amp;id=6934172811364f3ab4401e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-prompt-injection-attack-vectors-through-mcp-sa-e3a2ecb6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Prompt%20Injection%20Attack%20Vectors%20Through%20MCP%20Sampling&amp;severity=medium&amp;id=69340f26092893b302a3c94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14134-stack-based-buffer-overflow-in-link-f77fe5c2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14134%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6500&amp;severity=high&amp;id=69340f40092893b302a4ad60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14133-stack-based-buffer-overflow-in-link-0787550c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14133%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6500&amp;severity=high&amp;id=693408d1092893b3029c1957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14126-hard-coded-credentials-in-tozed-zlt-3f98c3ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14126%3A%20Hard-coded%20Credentials%20in%20TOZED%20ZLT%20M30S&amp;severity=high&amp;id=6934009fb96ba7cdea90c2c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13065-cwe-434-unrestricted-upload-of-file-171779c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13065%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20brainstormforce%20Starter%20Templates%20%E2%80%93%20AI-Powered%20Templates%20for%20Elementor%20%26%20Gutenberg&amp;severity=high&amp;id=6933f997b96ba7cdea885820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12966-cwe-434-unrestricted-upload-of-file-e5c2245d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12966%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=high&amp;id=6933f997b96ba7cdea88581c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sharpening-the-knife-strategic-evolution-of-gold-b-c02e52b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sharpening%20the%20knife%3A%20strategic%20evolution%20of%20GOLD%20BLADE&amp;severity=medium&amp;id=69381cd61b76610347c61f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12499-cwe-79-improper-neutralization-of-i-f24346c3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20widgetpack%20Rich%20Showcase%20for%20Google%20Reviews&amp;severity=high&amp;id=6933dd63c1b0382f6aac62a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13377-cwe-22-improper-limitation-of-a-pat-7c7aa1e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13377%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%2010web%2010Web%20Booster%20%E2%80%93%20Website%20speed%20optimization%2C%20Cache%20%26%20Page%20Speed%20optimizer&amp;severity=critical&amp;id=6933d18711163305effc5a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13748-cwe-639-authorization-bypass-throug-41ae3d2f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13748%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=6933d18711163305effc5a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13358-cwe-862-missing-authorization-in-co-6fce8efb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13358%3A%20CWE-862%20Missing%20Authorization%20in%20codeconfig%20Accessiy%20by%20CodeConfig%20%E2%80%93%20Accessibility%20Widgets%20for%20ADA%2C%20EAA%20%26%20WCAG%20Compliance&amp;severity=medium&amp;id=6933c71e11163305efef3dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13309-cwe-862-missing-authorization-in-co-8684df95</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13309%3A%20CWE-862%20Missing%20Authorization%20in%20codeconfig%20Accessiy%20by%20CodeConfig%20%E2%80%93%20Accessibility%20Widgets%20for%20ADA%2C%20EAA%20%26%20WCAG%20Compliance&amp;severity=medium&amp;id=6933c71e11163305efef3dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13894-cwe-79-improper-neutralization-of-i-7399ce59</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sumotto%20CSV%20Sumotto&amp;severity=medium&amp;id=6933c71e11163305efef3df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12091-cwe-862-missing-authorization-in-in-3df67056</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12091%3A%20CWE-862%20Missing%20Authorization%20in%20instantsearchplus%20Search%2C%20Filters%20%26%20Merchandising%20for%20WooCommerce&amp;severity=medium&amp;id=6933c71c11163305efef3527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13857-cwe-79-improper-neutralization-of-i-bfcc147f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13857%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ksakai%20Yet%20Another%20WebClap%20for%20WordPress&amp;severity=medium&amp;id=6933c71e11163305efef3deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13856-cwe-79-improper-neutralization-of-i-0e8648f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13856%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20michaelcole1991%20Extra%20Post%20Images&amp;severity=medium&amp;id=6933c71e11163305efef3de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13863-cwe-79-improper-neutralization-of-i-272b89fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13863%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20krupenik%20RevInsite&amp;severity=medium&amp;id=6933c71e11163305efef3df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13907-cwe-79-improper-neutralization-of-i-3ef7d435</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13907%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tunilame%20CSS3%20Buttons&amp;severity=medium&amp;id=6933c72011163305efef4283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12717-cwe-79-improper-neutralization-of-i-b89f6ee3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12717%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cgrymala%20List%20Attachments%20Shortcode&amp;severity=medium&amp;id=6933c71c11163305efef353e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12577-cwe-862-missing-authorization-in-pa-c454a4fc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12577%3A%20CWE-862%20Missing%20Authorization%20in%20passionui%20Listar%20%E2%80%93%20Directory%20Listing%20%26%20Classifieds%20WordPress%20Plugin&amp;severity=medium&amp;id=6933c71c11163305efef3530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12715-cwe-79-improper-neutralization-of-i-ec4113a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12715%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emaude%20Canadian%20Nutrition%20Facts%20Label&amp;severity=medium&amp;id=6933c71c11163305efef353a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13656-cwe-79-improper-neutralization-of-i-d0e11230</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13656%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arnabkumar%20Cute%20News%20Ticker&amp;severity=medium&amp;id=6933c71e11163305efef3dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13899-cwe-79-improper-neutralization-of-i-8d9d8271</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pntrinh%20TR%20Timthumb&amp;severity=medium&amp;id=6933c72011163305efef427d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13308-cwe-79-improper-neutralization-of-i-446187ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13308%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20georgestephanis%20Application%20Passwords&amp;severity=medium&amp;id=6933c71c11163305efef3553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13666-cwe-862-missing-authorization-in-he-f4f6e251</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13666%3A%20CWE-862%20Missing%20Authorization%20in%20helloprint%20Plug%20your%20WooCommerce%20into%20the%20largest%20catalog%20of%20customized%20print%20products%20from%20Helloprint&amp;severity=medium&amp;id=6933c71e11163305efef3de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13629-cwe-352-cross-site-request-forgery--33e5be1e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13629%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xbenx%20WP%20Landing%20Page&amp;severity=medium&amp;id=6933c71e11163305efef3dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12673-cwe-434-unrestricted-upload-of-file-74b9ba78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12673%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ajitdas%20Flex%20QR%20Code%20Generator&amp;severity=critical&amp;id=6933c71c11163305efef3534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12720-cwe-285-improper-authorization-in-g-429b15e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12720%3A%20CWE-285%20Improper%20Authorization%20in%20garidium%20g-FFL%20Cockpit&amp;severity=medium&amp;id=6933c71c11163305efef3543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12574-cwe-862-missing-authorization-in-pa-5912c10b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12574%3A%20CWE-862%20Missing%20Authorization%20in%20passionui%20Listar%20%E2%80%93%20Directory%20Listing%20%26%20Classifieds%20WordPress%20Plugin&amp;severity=medium&amp;id=6933c71c11163305efef352c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12721-cwe-862-missing-authorization-in-ga-f65f2aea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12721%3A%20CWE-862%20Missing%20Authorization%20in%20garidium%20g-FFL%20Cockpit&amp;severity=medium&amp;id=6933c71c11163305efef3549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13896-cwe-79-improper-neutralization-of-i-ee7ce8d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Social%20Feed%20Gallery%20Portfolio&amp;severity=medium&amp;id=6933c72011163305efef426f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13898-cwe-79-improper-neutralization-of-i-b11b79c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sozan45%20Ultra%20Skype%20Button&amp;severity=medium&amp;id=6933c72011163305efef4276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13137-cwe-79-improper-neutralization-of-i-b4d137a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13137%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20delabon%20Live%20Sales%20Notification%20for%20Woocommerce%20%E2%80%93%20Woomotiv&amp;severity=medium&amp;id=6933c71c11163305efef354f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13626-cwe-79-improper-neutralization-of-i-5041cab0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realloc%20myLCO&amp;severity=medium&amp;id=6933c71e11163305efef3dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14117-cross-site-request-forgery-in-fit2c-f4c93b17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14117%3A%20Cross-Site%20Request%20Forgery%20in%20fit2cloud%20Halo&amp;severity=medium&amp;id=6933c088c86a12d0de69d1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13292-cwe-269-improper-privilege-manageme-ce6b9bde</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13292%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Google%20Cloud%20Apigee-X&amp;severity=high&amp;id=6933bc4bc86a12d0de63b6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13922-cwe-89-improper-neutralization-of-s-2d287121</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13922%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=6933b4e62271496a0fa6c3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12505-cwe-285-improper-authorization-in-w-ce3225cd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12505%3A%20CWE-285%20Improper%20Authorization%20in%20wedevs%20weDocs%3A%20AI%20Powered%20Knowledge%20Base%2C%20Docs%2C%20Documentation%2C%20Wiki%20%26%20AI%20Chatbot&amp;severity=medium&amp;id=6933b4e62271496a0fa6c3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11263-cwe-79-improper-neutralization-of-i-d46d2833</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linkwhspr%20Link%20Whisper%20Free&amp;severity=medium&amp;id=6933a6d1f88dbe026c8d8254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12510-cwe-79-improper-neutralization-of-i-f1941bb8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12510%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Widgets%20for%20Google%20Reviews&amp;severity=high&amp;id=6933a6d1f88dbe026c8d8258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-06-8f68157b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-06&amp;severity=medium&amp;id=6934c75dcc1a9ed479e7a1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14116-server-side-request-forgery-in-xerr-9af87fe9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14116%3A%20Server-Side%20Request%20Forgery%20in%20xerrors%20Yuxi-Know&amp;severity=medium&amp;id=6933607ff88dbe026c285293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14111-path-traversal-in-rarlab-rar-app-fc126145</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14111%3A%20Path%20Traversal%20in%20Rarlab%20RAR%20App&amp;severity=low&amp;id=6933607ff88dbe026c28528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14108-command-injection-in-zspace-q2c-nas-00eaf7f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14108%3A%20Command%20Injection%20in%20ZSPACE%20Q2C%20NAS&amp;severity=high&amp;id=69335977f88dbe026c240f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14107-command-injection-in-zspace-q2c-nas-3fb9b479</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14107%3A%20Command%20Injection%20in%20ZSPACE%20Q2C%20NAS&amp;severity=high&amp;id=6933526ff88dbe026c2031d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14106-command-injection-in-zspace-q2c-nas-49414b8e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14106%3A%20Command%20Injection%20in%20ZSPACE%20Q2C%20NAS&amp;severity=high&amp;id=6933526ff88dbe026c2031cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13426-cwe-913-improper-control-of-dynamic-826cfac1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13426%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Google%20Cloud%20Apigee%20hybrid%20Javacallout%20policy&amp;severity=high&amp;id=69334eebf88dbe026c1f61de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14105-denial-of-service-in-tozed-zlt-m30s-7c2d21fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14105%3A%20Denial%20of%20Service%20in%20TOZED%20ZLT%20M30S&amp;severity=medium&amp;id=69334b6ff88dbe026c1e4442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8148-cwe-732-incorrect-permission-assignm-2ecba3c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8148%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=693347f3f88dbe026c1c0562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/barts-health-nhs-discloses-data-breach-after-oracl-51d2560a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Barts%20Health%20NHS%20discloses%20data%20breach%20after%20Oracle%20zero-day%20hack&amp;severity=critical&amp;id=693347e2f88dbe026c1c039f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46603-cwe-307-improper-restriction-of-exc-142d8db3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46603%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Dell%20CloudBoost%20Virtual%20Appliance&amp;severity=high&amp;id=69332f7ef88dbe026c0dd0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-virtual-kidnapping-scams-using-altere-41363ed9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20warns%20of%20virtual%20kidnapping%20scams%20using%20altered%20social%20media%20photos&amp;severity=high&amp;id=6933283df88dbe026c0463ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66623-cwe-200-exposure-of-sensitive-infor-2d0b4eb0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66623%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20strimzi%20strimzi-kafka-operator&amp;severity=high&amp;id=69332850f88dbe026c04683b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66581-cwe-863-incorrect-authorization-in--38b7daba</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66581%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20frappe%20lms&amp;severity=low&amp;id=69332850f88dbe026c046838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66577-cwe-117-improper-output-neutralizat-a1be9753</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66577%3A%20CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=693324bbf88dbe026c02bd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66570-cwe-290-authentication-bypass-by-sp-dc26efd3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66570%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20yhirose%20cpp-httplib&amp;severity=critical&amp;id=693324bbf88dbe026c02bd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66566-cwe-201-insertion-of-sensitive-info-f71df300</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66566%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20yawkat%20lz4-java&amp;severity=high&amp;id=69332135f88dbe026c014958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66562-cwe-79-improper-neutralization-of-i-431fd684</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66562%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AI-QL%20tuui&amp;severity=high&amp;id=69332135f88dbe026c014953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66558-cwe-639-authorization-bypass-throug-f4d1b6bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66558%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69332135f88dbe026c01494d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-nexus-cyber-threat-groups-rapidly-exploit-re-2ebc0255</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-nexus%20cyber%20threat%20groups%20rapidly%20exploit%20React2Shell%20vulnerability%20(CVE-2025-55182)&amp;severity=medium&amp;id=69331db4f88dbe026c0066bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66556-cwe-639-authorization-bypass-throug-5f362a08</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66556%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69332135f88dbe026c01495c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-click-agentic-browser-attack-can-delete-entir-6ca9b1af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero-Click%20Agentic%20Browser%20Attack%20Can%20Delete%20Entire%20Google%20Drive%20Using%20Crafted%20Emails&amp;severity=medium&amp;id=6933b3cf2271496a0fa5db10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66554-cwe-79-improper-neutralization-of-i-f37d0ba1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66554%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331db5f88dbe026c00670f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66549-cwe-209-generation-of-error-message-b2f541f9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66549%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331db5f88dbe026c00671b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66545-cwe-707-improper-neutralization-in--73fa08a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66545%3A%20CWE-707%3A%20Improper%20Neutralization%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331db5f88dbe026c006715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66515-cwe-287-improper-authentication-in--f26ad275</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66515%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331a32f88dbe026cff02a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66514-cwe-79-improper-neutralization-of-i-2b2ec064</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66514%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331a32f88dbe026cff02aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66557-cwe-284-improper-access-control-in--430a0d0a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66557%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69331a32f88dbe026cff02b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66548-cwe-116-improper-encoding-or-escapi-12e3ac9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66548%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331a32f88dbe026cff02b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34256-cwe-321-use-of-hard-coded-cryptogra-3c681503</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34256%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=critical&amp;id=693316aef88dbe026cfdbdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34265-cwe-79-improper-neutralization-of-i-90adca90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34265%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66553-cwe-639-authorization-bypass-throug-fbf5a7b5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66553%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693316b0f88dbe026cfdbe4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34263-cwe-79-improper-neutralization-of-i-d05244cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34266-cwe-79-improper-neutralization-of-i-5d8e9790</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316b0f88dbe026cfdbe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34264-cwe-79-improper-neutralization-of-i-ebe74830</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34264%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34262-cwe-79-improper-neutralization-of-i-e4e29f91</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34262%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34258-cwe-79-improper-neutralization-of-i-0ecef541</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34258%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34259-cwe-79-improper-neutralization-of-i-a8c88718</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34259%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34261-cwe-79-improper-neutralization-of-i-fa86d9f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34260-cwe-79-improper-neutralization-of-i-5f1a2e84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34260%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34257-cwe-79-improper-neutralization-of-i-5a1eb3a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34257%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66551-cwe-639-authorization-bypass-throug-f3ce54dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66551%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693316b0f88dbe026cfdbe44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66513-cwe-639-authorization-bypass-throug-99516d1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66513%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693316b0f88dbe026cfdbe3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14094-os-command-injection-in-edimax-br-6-f064d969</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14094%3A%20OS%20Command%20Injection%20in%20Edimax%20BR-6478AC%20V3&amp;severity=medium&amp;id=69331326f88dbe026cfc76d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66550-cwe-241-improper-handling-of-unexpe-35a0b1e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66550%3A%20CWE-241%3A%20Improper%20Handling%20of%20Unexpected%20Data%20Type%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69331326f88dbe026cfc76d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66546-cwe-639-authorization-bypass-throug-b63bfb9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66546%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69330fa6f88dbe026cfb407e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66511-cwe-330-use-of-insufficiently-rando-5d56da14</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66511%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69330c20f88dbe026cf88dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66552-cwe-778-insufficient-logging-in-nex-1fc88742</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66552%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69330c20f88dbe026cf88df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66547-cwe-639-authorization-bypass-throug-17681735</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66547%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69330c20f88dbe026cf88df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14093-os-command-injection-in-edimax-br-6-c5b06834</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14093%3A%20OS%20Command%20Injection%20in%20Edimax%20BR-6478AC%20V3&amp;severity=medium&amp;id=69330c20f88dbe026cf88de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intellexa-leaks-reveal-zero-days-and-ads-based-vec-7f25cade</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intellexa%20Leaks%20Reveal%20Zero-Days%20and%20Ads-Based%20Vector%20for%20Predator%20Spyware%20Delivery&amp;severity=high&amp;id=6933089af88dbe026cf7736b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pharma-firm-inotiv-discloses-data-breach-after-ran-1670e3d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pharma%20firm%20Inotiv%20discloses%20data%20breach%20after%20ransomware%20attack&amp;severity=high&amp;id=6933089af88dbe026cf77363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-blames-todays-outage-on-emergency-react-8fa199de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20blames%20today&apos;s%20outage%20on%20emergency%20React2Shell%20patch&amp;severity=critical&amp;id=6933089af88dbe026cf77373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-have-started-exploiting-the-newly--4109413c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Have%20Started%20Exploiting%20the%20Newly%20Disclosed%20React2Shell%20Vulnerability&amp;severity=high&amp;id=6933089af88dbe026cf7736f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-xxe-bug-cve-2025-66516-cvss-100-hits-apac-d08561e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20XXE%20Bug%20CVE-2025-66516%20(CVSS%2010.0)%20Hits%20Apache%20Tika%2C%20Requires%20Urgent%20Patch&amp;severity=critical&amp;id=6933b3cf2271496a0fa5db13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66512-cwe-80-improper-neutralization-of-s-48973679</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66512%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693308e8f88dbe026cf7915a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14104-out-of-bounds-read-in-red-hat-red-h-31ec701d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14104%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=693308e8f88dbe026cf7914e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66510-cwe-359-exposure-of-private-persona-5f77ad95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66510%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693308e8f88dbe026cf79155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65036-cwe-862-missing-authorization-in-xw-9f6355a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65036%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwikisas%20xwiki-pro-macros&amp;severity=high&amp;id=693308e8f88dbe026cf79160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14092-os-command-injection-in-edimax-br-6-4142d319</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14092%3A%20OS%20Command%20Injection%20in%20Edimax%20BR-6478AC%20V3&amp;severity=medium&amp;id=69330517f88dbe026cf63b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14091-sql-injection-in-trippwastaken-php--581f8838</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14091%3A%20SQL%20Injection%20in%20TrippWasTaken%20PHP-Guitar-Shop&amp;severity=medium&amp;id=69330517f88dbe026cf63b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-x-fined-120-million-array-flaw-explo-2fcbc0f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20X%20Fined%20%E2%82%AC120%20Million%2C%20Array%20Flaw%20Exploited%2C%20New%20Iranian%20Backdoor&amp;severity=medium&amp;id=6933b4822271496a0fa66583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14090-sql-injection-in-amtt-hotel-broadba-1cf0bd3e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14090%3A%20SQL%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=6932fe10f88dbe026cf26f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14089-improper-authorization-in-himool-er-bf99091b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14089%3A%20Improper%20Authorization%20in%20Himool%20ERP&amp;severity=medium&amp;id=6932fe10f88dbe026cf26f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-variant-of-clayrat-android-spyware-seizes-full-032ec3e6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Variant%20of%20ClayRat%20Android%20Spyware%20Seizes%20Full%20Device%20Control&amp;severity=medium&amp;id=6932fa88f88dbe026cf03906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-outage-caused-by-react2shell-mitigation-c6e3c984</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Outage%20Caused%20by%20React2Shell%20Mitigations&amp;severity=critical&amp;id=6932f6fbf88dbe026cee6893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14088-improper-authorization-in-ketr-jepa-78a1e9b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14088%3A%20Improper%20Authorization%20in%20ketr%20JEPaaS&amp;severity=medium&amp;id=6932f006f88dbe026ce9d2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-organizations-warned-of-chinese-malware-used-fo-7c023c5f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Organizations%20Warned%20of%20Chinese%20Malware%20Used%20for%20Long-Term%20Persistence&amp;severity=medium&amp;id=6932ec71f88dbe026ce620bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-have-started-exploiting-the-newly--36f9fb99</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Have%20Started%20Exploiting%20the%20Newly%20Disclosed%20React2Shell%20Vulnerability&amp;severity=critical&amp;id=6933b3cf2271496a0fa5db16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14086-improper-access-controls-in-youlait-4c87bed6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14086%3A%20Improper%20Access%20Controls%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=6932e8f6f88dbe026ce496ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14085-improper-control-of-dynamically-ide-01696bc4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14085%3A%20Improper%20Control%20of%20Dynamically-Identified%20Variables%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=6932e8f6f88dbe026ce496a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58098-cwe-201-insertion-of-sensitive-info-8bc5a1d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58098%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6932e1eef88dbe026cde8eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ssrf-payload-generator-for-fuzzing-pdf-generators--80dbefb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SSRF%20Payload%20Generator%20for%20fuzzing%20PDF%20Generators%20etc...&amp;severity=medium&amp;id=6932de75f88dbe026cdbbc1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6966-cwe-476-null-pointer-dereference-in--592f235b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6966%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Canonical%20python-apt&amp;severity=medium&amp;id=6932dae7f88dbe026cd171b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whitebox-simulation-vs-blackbox-red-team-phishing-c25d50a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Whitebox%20(simulation)%20vs.%20blackbox%20(red%20team)%20phishing&amp;severity=medium&amp;id=6932c95df88dbe026c9e697c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intellexa-leaks-reveal-zero-days-and-ads-based-vec-ac3734d3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intellexa%20Leaks%20Reveal%20Zero-Days%20and%20Ads-Based%20Vector%20for%20Predator%20Spyware%20Delivery&amp;severity=medium&amp;id=6933b3cf2271496a0fa5db19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-reports-prc-hackers-using-brickstorm-for-long-0c744b00</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Reports%20PRC%20Hackers%20Using%20BRICKSTORM%20for%20Long-Term%20Access%20in%20U.S.%20Systems&amp;severity=high&amp;id=6932c5d0f88dbe026c9d1935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66200-moduserdirsuexec-bypass-via-allowov-1b3179fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66200%3A%20mod_userdir%2Bsuexec%20bypass%20via%20AllowOverride%20FileInfo%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=6932beccf88dbe026c9a1a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13620-cwe-862-missing-authorization-in-ro-95a9c114</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13620%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20Wp%20Social%20Login%20and%20Register%20Social%20Counter&amp;severity=medium&amp;id=6932d3dff88dbe026cbce002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65082-cwe-150-improper-neutralization-of--e4ae2047</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65082%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=6932bb45f88dbe026c9804e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-botnet-powers-record-ddos-attack-peaking-at-72c320b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20Botnet%20Powers%20Record%20DDoS%20Attack%20Peaking%20at%2029%20Tbps&amp;severity=medium&amp;id=6932b7b3f88dbe026c96858a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59775-cwe-918-server-side-request-forgery-bfa90704</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59775%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6932b486f88dbe026c950fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55753-cwe-190-integer-overflow-or-wraparo-f05daf4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55753%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6932b486f88dbe026c950fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jpcert-confirms-active-command-injection-attacks-o-96e65e96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JPCERT%20Confirms%20Active%20Command%20Injection%20Attacks%20on%20Array%20AG%20Gateways&amp;severity=high&amp;id=6932b0b5f88dbe026c931d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cacti-command-injection-vulnerability-let-attacker-4238439c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cacti%20Command%20Injection%20Vulnerability%20Let%20Attackers%20Execute%20Malicious%20Code%20Remotely&amp;severity=high&amp;id=6932b0b5f88dbe026c931d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13682-cwe-79-improper-neutralization-of-i-b85ee274</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phegman%20Trail%20Manager&amp;severity=medium&amp;id=6932a9b1f88dbe026c8e9fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13614-cwe-79-improper-neutralization-of-i-7f71da3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpkube%20Cool%20Tag%20Cloud&amp;severity=high&amp;id=6932a9b1f88dbe026c8e9fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13678-cwe-79-improper-neutralization-of-i-2308cf35</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13678%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siamlottery%20Thai%20Lottery%20Widget&amp;severity=medium&amp;id=6932a9b1f88dbe026c8e9fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12876-cwe-862-missing-authorization-in-pr-4e1b6675</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12876%3A%20CWE-862%20Missing%20Authorization%20in%20projectopia%20Projectopia%20%E2%80%93%20Project%20Management%20Tool&amp;severity=medium&amp;id=6932a9b1f88dbe026c8e9fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12879-cwe-352-cross-site-request-forgery--b91fd5c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12879%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vinoth06%20User%20Generator%20and%20Importer&amp;severity=high&amp;id=6932a9b1f88dbe026c8e9fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13739-cwe-79-improper-neutralization-of-i-e35bcfcd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20d3395%20CryptX&amp;severity=medium&amp;id=6932a9b1f88dbe026c8e9fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12851-cwe-98-improper-control-of-filename-6253ed97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12851%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=6932a9b1f88dbe026c8e9fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-reports-prc-hackers-using-brickstorm-for-long-cab26aff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Reports%20PRC%20Hackers%20Using%20BRICKSTORM%20for%20Long-Term%20Access%20in%20U.S.%20Systems&amp;severity=medium&amp;id=6933b3cf2271496a0fa5db1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-exploiting-react2shell-vulnerabili-acb8d966</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Exploiting%20React2Shell%20Vulnerability&amp;severity=medium&amp;id=69328d83f88dbe026c81bed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12130-cwe-352-cross-site-request-forgery--7de8683f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12130%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wcvendors%20WC%20Vendors%20%E2%80%93%20WooCommerce%20Multivendor%2C%20WooCommerce%20Marketplace%2C%20Product%20Vendors&amp;severity=medium&amp;id=69328da7f88dbe026c81c65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13684-cwe-352-cross-site-request-forgery--0f41760d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13684%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alexkar%20ARK%20Related%20Posts&amp;severity=medium&amp;id=69328da7f88dbe026c81c65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autoit3-compiled-scripts-dropping-shellcodes-fri-d-a9496d28</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes%2C%20(Fri%2C%20Dec%205th)&amp;severity=medium&amp;id=6933b4eb2271496a0fa6c8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12850-cwe-89-improper-neutralization-of-s-a9c55820</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12850%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=69328306f88dbe026c7e31d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13515-cwe-79-improper-neutralization-of-i-2f20c4e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13515%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danrajkumar%20Nouri.sh%20Newsletter&amp;severity=medium&amp;id=69327c01f88dbe026c7c159f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12093-cwe-862-missing-authorization-in-vo-899ffa1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12093%3A%20CWE-862%20Missing%20Authorization%20in%20voidek%20Voidek%20Employee%20Portal&amp;severity=medium&amp;id=69327c01f88dbe026c7c1587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12355-cwe-862-missing-authorization-in-bi-e14b24b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12355%3A%20CWE-862%20Missing%20Authorization%20in%20bigmaster%20Payaza&amp;severity=medium&amp;id=69327c01f88dbe026c7c1593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12374-cwe-287-improper-authentication-in--8c3c4127</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12374%3A%20CWE-287%20Improper%20Authentication%20in%20pickplugins%20User%20Verification%20by%20PickPlugins&amp;severity=critical&amp;id=69327c01f88dbe026c7c159b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12354-cwe-862-missing-authorization-in-do-b4c1c152</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12354%3A%20CWE-862%20Missing%20Authorization%20in%20dojodigital%20Live%20CSS%20Preview&amp;severity=medium&amp;id=69327c01f88dbe026c7c158f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12373-cwe-352-cross-site-request-forgery--e3abab3d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12373%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20torod%20Torod%20%E2%80%93%20The%20smart%20shipping%20and%20delivery%20portal%20for%20e-shops%20and%20retailers&amp;severity=medium&amp;id=69327c01f88dbe026c7c1597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12186-cwe-79-improper-neutralization-of-i-886b5389</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12186%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20michael_j_reid%20Weekly%20Planner&amp;severity=medium&amp;id=69327c01f88dbe026c7c158b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jpcert-confirms-active-command-injection-attacks-o-cb7c9a43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JPCERT%20Confirms%20Active%20Command%20Injection%20Attacks%20on%20Array%20AG%20Gateways&amp;severity=low&amp;id=6933b3cf2271496a0fa5db22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13528-cwe-862-missing-authorization-in-ne-fd1c163c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13528%3A%20CWE-862%20Missing%20Authorization%20in%20nedwp%20Feedback%20Modal%20for%20Website&amp;severity=medium&amp;id=69327173f88dbe026c7799bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13860-cwe-79-improper-neutralization-of-i-2d970f9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webradykal%20Easy%20Jump%20Links%20Menus&amp;severity=medium&amp;id=69327173f88dbe026c7799da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12154-cwe-434-unrestricted-upload-of-file-d5a5f06b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12154%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20moderntribe%20Auto%20Thumbnailer&amp;severity=high&amp;id=69327172f88dbe026c779911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12190-cwe-352-cross-site-request-forgery--ef6ea5d0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12190%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20duddi%20Image%20Optimizer%20by%20wps.sk&amp;severity=medium&amp;id=69327172f88dbe026c779928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12191-cwe-79-improper-neutralization-of-i-c45b901e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12191%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ovologics%20PDF%20Catalog%20for%20WooCommerce&amp;severity=medium&amp;id=69327173f88dbe026c779992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12189-cwe-352-cross-site-request-forgery--c4477421</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12189%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20breadbutter%20Bread%20%26%20Butter%3A%20AI-Powered%20Lead%20Intelligence&amp;severity=medium&amp;id=69327172f88dbe026c779922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12128-cwe-352-cross-site-request-forgery--b66ed757</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12128%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kaushikankrani%20Hide%20Categories%20Or%20Products%20On%20Shop%20Page&amp;severity=medium&amp;id=69327172f88dbe026c779905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12133-cwe-862-missing-authorization-in-pa-4e091bfd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12133%3A%20CWE-862%20Missing%20Authorization%20in%20paulepro2019%20EPROLO-Dropshipping&amp;severity=medium&amp;id=69327172f88dbe026c779909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12153-cwe-434-unrestricted-upload-of-file-57d99cfb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12153%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tsaiid%20Featured%20Image%20via%20URL&amp;severity=high&amp;id=69327172f88dbe026c77990d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13623-cwe-79-improper-neutralization-of-i-76a162e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20natambu%20Twitscription&amp;severity=medium&amp;id=69327173f88dbe026c7799ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13622-cwe-79-improper-neutralization-of-i-c94fd007</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13622%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20missi%20Jabbernotification&amp;severity=medium&amp;id=69327173f88dbe026c7799c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10055-cwe-352-cross-site-request-forgery--146338ff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10055%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mrdenny%20Time%20Sheets&amp;severity=medium&amp;id=69327172f88dbe026c7798fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13625-cwe-79-improper-neutralization-of-i-eba63968</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13625%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20switch2mac%20WP-SOS-Donate%20Donation%20Sidebar%20Plugin&amp;severity=medium&amp;id=69327173f88dbe026c7799d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13360-cwe-352-cross-site-request-forgery--7dda349c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13360%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20monkeyboz%20Quantic%20Social%20Image%20Hover&amp;severity=medium&amp;id=69327173f88dbe026c7799af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12368-cwe-79-improper-neutralization-of-i-13ec37a1</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12368%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpforchurch%20Sermon%20Manager&amp;severity=medium&amp;id=69327173f88dbe026c779997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13621-cwe-352-cross-site-request-forgery--1e5390c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13621%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20teamdream%20dream%20gallery&amp;severity=medium&amp;id=69327173f88dbe026c7799c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12165-cwe-862-missing-authorization-in-hu-225d6602</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12165%3A%20CWE-862%20Missing%20Authorization%20in%20huyme%20Webcake%20%E2%80%93%20Landing%20Page%20Builder&amp;severity=medium&amp;id=69327172f88dbe026c77991e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12163-cwe-434-unrestricted-upload-of-file-968edd0b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12163%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omnipressteam%20Omnipress&amp;severity=medium&amp;id=69327172f88dbe026c779915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13512-cwe-79-improper-neutralization-of-i-981b6d36</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jiangxin%20CoSign%20Single%20Signon&amp;severity=medium&amp;id=69327173f88dbe026c7799b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12124-cwe-79-improper-neutralization-of-i-658cdaa3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12124%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevindees%20FitVids%20for%20WordPress&amp;severity=medium&amp;id=69327172f88dbe026c779901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13312-cwe-862-missing-authorization-in-dr-e751d33c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13312%3A%20CWE-862%20Missing%20Authorization%20in%20dripadmin%20CRM%20Memberships&amp;severity=medium&amp;id=69326360f88dbe026c71794b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13006-cwe-200-exposure-of-sensitive-infor-cb23fe12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13006%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpeka-club%20SurveyFunnel%20%E2%80%93%20Survey%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69326360f88dbe026c717946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13313-cwe-862-missing-authorization-in-dr-61158105</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13313%3A%20CWE-862%20Missing%20Authorization%20in%20dripadmin%20CRM%20Memberships&amp;severity=critical&amp;id=69326360f88dbe026c717950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13362-cwe-352-cross-site-request-forgery--ae3731db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13362%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jevgenisultanov%20Norby%20AI&amp;severity=medium&amp;id=69326360f88dbe026c717958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13494-cwe-200-exposure-of-sensitive-infor-d7998fb7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13494%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20jimmyredline80%20SSP%20Debug&amp;severity=medium&amp;id=69326360f88dbe026c71795d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12417-cwe-79-improper-neutralization-of-i-d9f9a221</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12417%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeka-club%20SurveyFunnel%20%E2%80%93%20Survey%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69326360f88dbe026c717941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privilege-escalation-with-sagemaker-and-theres-mor-22ea5223</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privilege%20escalation%20with%20SageMaker%20and%20there&apos;s%20more%20hiding%20in%20execution%20roles&amp;severity=medium&amp;id=69325fe5f88dbe026c6cfa4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13066-cwe-434-unrestricted-upload-of-file-299ff291</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13066%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kraftplugins%20Demo%20Importer%20Plus&amp;severity=high&amp;id=693255a910edf2688fec311d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12804-cwe-79-improper-neutralization-of-i-5cfb9f06</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6932441b10edf2688fd42d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11759-cwe-352-cross-site-request-forgery--69653492</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11759%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20watchful%20Backup%2C%20Restore%20and%20Migrate%20your%20sites%20with%20XCloner&amp;severity=medium&amp;id=6932441b10edf2688fd42d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/predator-spyware-uses-new-infection-vector-for-zer-5b9e3101</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Predator%20spyware%20uses%20new%20infection%20vector%20for%20zero-click%20attacks&amp;severity=high&amp;id=6932280a10edf2688fa50fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62223-cwe-451-user-interface-ui-misrepres-4bfccf35</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62223%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69322b9410edf2688fa9d45a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scam-telegram-uncovering-a-network-of-groups-sprea-5d74cf32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scam%20Telegram%3A%20Uncovering%20a%20network%20of%20groups%20spreading%20crypto%20drainers&amp;severity=medium&amp;id=6932250aca35b6b64b3de0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14052-improper-access-controls-in-youlait-d7f43c1b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14052%3A%20Improper%20Access%20Controls%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=69322501ca35b6b64b3d997e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-05-19fb5a30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-05&amp;severity=medium&amp;id=69337586f88dbe026c314958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66644-cwe-78-improper-neutralization-of-s-b695b96a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66644%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Array%20Networks%20ArrayOS%20AG&amp;severity=high&amp;id=69332bc4f88dbe026c09c124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65879-na-9c30855d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65879%3A%20n%2Fa&amp;severity=high&amp;id=693308e8f88dbe026cf79163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65878-na-570405b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65878%3A%20n%2Fa&amp;severity=high&amp;id=693308e8f88dbe026cf79152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65897-na-be1f93c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65897%3A%20n%2Fa&amp;severity=high&amp;id=69330517f88dbe026cf63b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64052-na-d41f7f2d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64052%3A%20n%2Fa&amp;severity=medium&amp;id=6932fe10f88dbe026cf26f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64054-na-c414aa7c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64054%3A%20n%2Fa&amp;severity=critical&amp;id=6932fe10f88dbe026cf26f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64053-na-7d072d57</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64053%3A%20n%2Fa&amp;severity=high&amp;id=6932fe10f88dbe026cf26f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65730-na-d39e0484</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65730%3A%20n%2Fa&amp;severity=high&amp;id=6932faa1f88dbe026cf03a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64056-na-40738bac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64056%3A%20n%2Fa&amp;severity=medium&amp;id=6932faa1f88dbe026cf03a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64057-na-55640d3d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64057%3A%20n%2Fa&amp;severity=high&amp;id=6932f385f88dbe026cec3912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66270-cwe-290-authentication-bypass-by-sp-b75d63e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66270%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20KDE%20KDE%20Connect%20protocol&amp;severity=medium&amp;id=69327175f88dbe026c7799fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32900-cwe-348-use-of-less-trusted-source--9a75dd13</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32900%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20KDE%20KDE%20Connect%20information-exchange%20protocol&amp;severity=medium&amp;id=69327175f88dbe026c7799f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32901-na-a07e35c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32901%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20KDE%20KDEConnect&amp;severity=medium&amp;id=69326a69f88dbe026c743adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32899-cwe-1250-improper-preservation-of-c-9341e416</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32899%3A%20CWE-1250%20Improper%20Preservation%20of%20Consistency%20Between%20Independent%20Representations%20of%20Shared%20State%20in%20KDE%20KDEConnect&amp;severity=medium&amp;id=693266fdf88dbe026c734aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32898-cwe-331-insufficient-entropy-in-kde-617ab461</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32898%3A%20CWE-331%20Insufficient%20Entropy%20in%20KDE%20KDE%20Connect%20verification-code%20protocol&amp;severity=medium&amp;id=69326360f88dbe026c717962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13373-cwe-89-improper-neutralization-of-s-a2ccfc80</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13373%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20iView&amp;severity=high&amp;id=69321472c0111c56163e71de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66564-cwe-405-asymmetric-resource-consump-58f6633f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66564%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20sigstore%20timestamp-authority&amp;severity=high&amp;id=69321040c0111c56163950c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66563-cwe-79-improper-neutralization-of-i-34304f8e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66563%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20monkeytypegame%20monkeytype&amp;severity=high&amp;id=69320cc6c0111c561635040d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14051-improper-control-of-dynamically-ide-fe6d3923</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14051%3A%20Improper%20Control%20of%20Dynamically-Identified%20Variables%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=69320cc6c0111c5616350401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66561-cwe-79-improper-neutralization-of-i-892367d2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66561%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syslifters%20sysreptor&amp;severity=high&amp;id=69320cc6c0111c561635040a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66559-cwe-129-improper-validation-of-arra-c9ff8982</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66559%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20taikoxyz%20taiko-mono&amp;severity=high&amp;id=69320cc6c0111c5616350411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-claims-data-theft-from-church-of--f7a427f4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Claims%20Data%20Theft%20from%20Church%20of%20Scientology&amp;severity=medium&amp;id=6932099a2bd9ee5f78fe6188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1547-cwe-121-stack-based-buffer-overflow--d3aa260d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1547%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693209ac2bd9ee5f78fe683b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66506-cwe-405-asymmetric-resource-consump-1804d010</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66506%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20sigstore%20fulcio&amp;severity=high&amp;id=693209ac2bd9ee5f78fe683e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1910-cwe-77-improper-neutralization-of-sp-9cebf594</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1910%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20WatchGuard%20Mobile%20VPN%20with%20SSL%20Client&amp;severity=medium&amp;id=693206ca2bd9ee5f78fbc0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12986-cwe-410-insufficient-resource-pool--14c293a3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12986%3A%20CWE-410%20Insufficient%20Resource%20Pool%20in%20silabs.com%20Gecko%20SDK&amp;severity=medium&amp;id=693206ca2bd9ee5f78fbc0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6946-cwe-79-improper-neutralization-of-in-7f651186</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6946%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1545-cwe-91-xml-injection-aka-blind-xpath-44b78644</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1545%3A%20CWE-91%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202962bd9ee5f78f6ba10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11838-cwe-763-release-of-invalid-pointer--927400d8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11838%3A%20CWE-763%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202962bd9ee5f78f6b9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13940-cwe-440-expected-behavior-violation-384f17b8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13940%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13939-cwe-79-improper-neutralization-of-i-c7532d91</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13939%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13938-cwe-79-improper-neutralization-of-i-5a4c1d51</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13938%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13937-cwe-79-improper-neutralization-of-i-5dc448e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13936-cwe-79-improper-neutralization-of-i-ee08a34b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13936%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12196-cwe-787-out-of-bounds-write-in-watc-920de881</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12196%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202972bd9ee5f78f6ba26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53704-cwe-640-in-maxhub-pivot-client-appl-76df85fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53704%3A%20CWE-640%20in%20MAXHUB%20Pivot%20client%20application&amp;severity=high&amp;id=693202972bd9ee5f78f6ba29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12195-cwe-787-out-of-bounds-write-in-watc-9bcbbe25</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12195%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202962bd9ee5f78f6ba19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12026-cwe-787-out-of-bounds-write-in-watc-fcb543e2</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12026%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202962bd9ee5f78f6ba16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10285-cwe-200-exposure-of-sensitive-infor-0a366a3a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10285%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20silabs.com%20Simplicity%20Studio%20V6&amp;severity=high&amp;id=693206ca2bd9ee5f78fbc0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13932-cwe-639-authorization-bypass-throug-aa31b8e6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13932%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SolisCloud%20Monitoring%20Platform%20(Cloud%20API%20%26%20Device%20Control%20API)&amp;severity=high&amp;id=6931fbea0459f550ec00bb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66238-cwe-288-authentication-bypass-using-f951a49f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66238%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Sunbird%20DCIM%20dcTrack&amp;severity=high&amp;id=6931fbea0459f550ec00bb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66237-cwe-798-use-of-hard-coded-credentia-00b7a013</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66237%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Sunbird%20DCIM%20dcTrack&amp;severity=high&amp;id=6931f91e0459f550ecfdf6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66479-cwe-693-protection-mechanism-failur-d411fa32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66479%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20anthropic-experimental%20sandbox-runtime&amp;severity=low&amp;id=6931f91e0459f550ecfdf6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66576-cwe-78-improper-neutralization-of-s-60d48901</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66576%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Remotecontrolio%20Remote%20Keyboard%20Desktop&amp;severity=high&amp;id=6931f4df0459f550ecf89e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66575-cwe-428-unquoted-search-path-or-ele-0c73d453</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66575%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20VeePN%20VeeVPN&amp;severity=high&amp;id=6931f4df0459f550ecf89e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66574-cwe-79-improper-neutralization-of-i-e3d906be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66574%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Compass%20Plustechologies%20TranzAxis&amp;severity=medium&amp;id=6931f4df0459f550ecf89e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66573-cwe-319-cleartext-transmission-of-s-e57ea8a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66573%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20mersive%20Solstice%20Pod%20API%20Session%20Key%20Extraction%20via%20API%20Endpoint&amp;severity=medium&amp;id=6931f4e10459f550ecf89e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66572-cwe-78-improper-neutralization-of-s-4e4cc644</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66572%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20loadedcommerce%20Loaded%20Commerce&amp;severity=medium&amp;id=6931f4e10459f550ecf89e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66571-cwe-502-deserialization-of-untruste-c276a0d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66571%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20UNA%20CMS&amp;severity=critical&amp;id=6931f4e10459f550ecf89e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66555-cwe-306-missing-authentication-for--4e34efa3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66555%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20airkeyboardapp%20AirKeyboard%20iOS%20App&amp;severity=high&amp;id=6931f4e10459f550ecf89e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58278-cwe-78-improper-neutralization-of-s-1f5c991d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58278%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IndigoSTAR%20Software%20perl2exe&amp;severity=high&amp;id=6931f4df0459f550ecf89e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58277-cwe-312-cleartext-storage-of-sensit-b570aa70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58277%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20R%20Radio%20Network%20Radio%20Network%20FM%20Transmitter&amp;severity=high&amp;id=6931f4df0459f550ecf89e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58275-cwe-88-improper-neutralization-of-a-f7a91610</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58275%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20jpylypiw%20Easywall&amp;severity=high&amp;id=6931f4df0459f550ecf89e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53734-cwe-89-improper-neutralization-of-s-7c3938e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53734%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mayurik%20dawa-pharma&amp;severity=high&amp;id=6931f4df0459f550ecf89e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27935-cwe-306-missing-authentication-for--f577cd8d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27935%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Ping%20Identity%20One-Time%20Passcode%20Integration%20Kit%20for%20PingFederate&amp;severity=high&amp;id=6931f4df0459f550ecf89e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13543-cwe-434-unrestricted-upload-of-file-8332a041</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13543%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20rtowebsites%20PostGallery&amp;severity=high&amp;id=6931f1640459f550ecf415b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12997-cwe-639-authorization-bypass-throug-cdb1f64b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12997%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Medtronic%20CareLink%20Network&amp;severity=low&amp;id=6931eb9b6255310dc4c890ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12996-cwe-532-insertion-of-sensitive-info-c219bffc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12996%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Medtronic%20CareLink%20Network&amp;severity=medium&amp;id=6931eb9b6255310dc4c890aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12995-cwe-307-improper-restriction-of-exc-f9390566</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12995%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Medtronic%20CareLink%20Network&amp;severity=high&amp;id=6931eb9b6255310dc4c890a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-state-hackers-device-infected-with-lu-a5340a31</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20State%20Hacker&apos;s%20Device%20Infected%20with%20LummaC2%20Infostealer%20Shows%20Links%20to%20%241.4B%20ByBit%20Breach%2C%20Tools%2C%20Specs%20and%20More&amp;severity=high&amp;id=6931eb876255310dc4c888db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12994-cwe-204-observable-response-discrep-9aba6b96</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12994%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Medtronic%20CareLink%20Network&amp;severity=medium&amp;id=6931eb9b6255310dc4c890a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prompt-injection-inside-github-actions-01092a5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prompt%20Injection%20Inside%20GitHub%20Actions&amp;severity=medium&amp;id=6931dffae9ea82452668a673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55182-vulnerability-in-react-and-nextjs-k-612a8fd0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55182%20vulnerability%20in%20React%20and%20Next.js%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6931dd90e9ea82452666b3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/india-rolls-back-order-to-preinstall-cybersecurity-b168cdbc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=India%20Rolls%20Back%20Order%20to%20Preinstall%20Cybersecurity%20App%20on%20Smartphones&amp;severity=medium&amp;id=6931dd27e9ea824526660c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12097-cwe-23-relative-path-traversal-in-n-de70215d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12097%3A%20CWE-23-%20Relative%20Path%20Traversal%20in%20NI%20LabVIEW&amp;severity=high&amp;id=6931dff2e9ea82452668a407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65945-cwe-347-improper-verification-of-cr-7797bebd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65945%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20auth0%20node-jws&amp;severity=high&amp;id=6931d8e6e9ea82452660f546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14016-improper-authorization-in-macrozhen-7a5443ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14016%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6931d8e6e9ea82452660f53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14015-buffer-overflow-in-h3c-magic-b0-6f43cdeb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14015%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B0&amp;severity=high&amp;id=6931d8e6e9ea82452660f535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13488-cwe-79-improper-neutralization-of-i-d2dab45d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=6931d56de9ea8245265c6741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14013-cross-site-scripting-in-jizhicms-824721d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14013%3A%20Cross%20Site%20Scripting%20in%20JIZHICMS&amp;severity=medium&amp;id=6931d6d1e9ea8245265fa5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9127-cwe-116-improper-encoding-or-escapin-13b5596b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9127%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Pure%20Storage%20PX%20Enterprise&amp;severity=high&amp;id=6931cf8f911f2f20c4b83bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/second-order-prompt-injection-attacks-on-serviceno-c993cd29</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Second%20order%20prompt%20injection%20attacks%20on%20ServiceNow%20Now%20Assist&amp;severity=medium&amp;id=6931cb4f911f2f20c4b34d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contractors-with-hacking-records-accused-of-wiping-bdff6e3b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contractors%20with%20hacking%20records%20accused%20of%20wiping%2096%20govt%20databases&amp;severity=high&amp;id=6931cb30911f2f20c4b341af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14012-sql-injection-in-jizhicms-233ea526</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14012%3A%20SQL%20Injection%20in%20JIZHICMS&amp;severity=medium&amp;id=6931c7b5911f2f20c4ae9818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14011-sql-injection-in-jizhicms-404bfb1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14011%3A%20SQL%20Injection%20in%20JIZHICMS&amp;severity=medium&amp;id=6931c7b5911f2f20c4ae9811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-uses-fake-microsoft-teams-installer-to--b14de7ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Uses%20Fake%20Microsoft%20Teams%20Installer%20to%20Spread%20ValleyRAT%20Malware%20in%20China&amp;severity=medium&amp;id=6931cf03911f2f20c4b70883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66287-buffer-copy-without-checking-size-o-ad825aa7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66287%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20The%20WebKitGTK%20Team%20WebKitGTK&amp;severity=high&amp;id=6931bd5b6ade94f1c7900e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-blocks-aisuru-botnet-powered-largest-ev-bc6f6a69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Blocks%20Aisuru%20Botnet%20Powered%20Largest%20Ever%2029.7%20Tbps%20DDoS%20Attack&amp;severity=medium&amp;id=6931b6c3739651d5d52f702a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66516-cwe-611-improper-restriction-of-xml-fa601313</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66516%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Tika%20core&amp;severity=high&amp;id=6931b6d8739651d5d52faf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8074-origin-validation-error-in-synology--c113a79c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8074%3A%20Origin%20Validation%20Error%20in%20Synology%20BeeDrive%20for%20desktop&amp;severity=medium&amp;id=6931a8e704d931fa5b427e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54160-improper-limitation-of-a-pathname-t-82534a15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54160%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20BeeDrive%20for%20desktop&amp;severity=high&amp;id=6931a8e704d931fa5b427e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/svg-clickjacking-a-novel-and-powerful-twist-on-an--b121f58a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SVG%20Clickjacking%3A%20A%20novel%20and%20powerful%20twist%20on%20an%20old%20classic&amp;severity=medium&amp;id=6931a58e04d931fa5b3e2722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54159-missing-authorization-in-synology-b-355a1b0c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54159%3A%20Missing%20Authorization%20in%20Synology%20BeeDrive%20for%20desktop&amp;severity=high&amp;id=6931a8e704d931fa5b427e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54158-missing-authentication-for-critical-ad30c5f3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54158%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Synology%20BeeDrive%20for%20desktop&amp;severity=high&amp;id=6931a8e704d931fa5b427e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2848-missing-authorization-in-synology-sy-c316b554</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2848%3A%20Missing%20Authorization%20in%20Synology%20Synology%20Mail%20Server&amp;severity=medium&amp;id=6931a58504d931fa5b3e25d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inotiv-says-personal-information-stolen-in-ransomw-a96dc2b6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inotiv%20Says%20Personal%20Information%20Stolen%20in%20Ransomware%20Attack&amp;severity=medium&amp;id=6931a56404d931fa5b3df6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14008-server-side-request-forgery-in-dayr-50f3b6b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14008%3A%20Server-Side%20Request%20Forgery%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=6931a58504d931fa5b3e25c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29846-improper-limitation-of-a-pathname-t-4ea0b4cf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29846%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Synology%20Router%20Manager%20(SRM)&amp;severity=high&amp;id=6931a58504d931fa5b3e25ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29845-improper-limitation-of-a-pathname-t-98d02142</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29845%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Synology%20Router%20Manager%20(SRM)&amp;severity=medium&amp;id=6931a58504d931fa5b3e25cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29844-improper-limitation-of-a-pathname-t-e6579483</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29844%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Synology%20Router%20Manager%20(SRM)&amp;severity=medium&amp;id=6931a58504d931fa5b3e25c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29843-improper-limitation-of-a-pathname-t-015a41e3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29843%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Synology%20Router%20Manager%20(SRM)&amp;severity=medium&amp;id=6931a58504d931fa5b3e25dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14007-cross-site-scripting-in-dayrui-xunr-d0f78d5c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14007%3A%20Cross%20Site%20Scripting%20in%20dayrui%20XunRuiCMS&amp;severity=low&amp;id=69319e6104d931fa5b36215c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14006-cross-site-scripting-in-dayrui-xunr-6b756ac1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14006%3A%20Cross%20Site%20Scripting%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=69319e6104d931fa5b36214c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5401-improper-control-of-dynamically-mana-78e4ecce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5401%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=medium&amp;id=69319adf5cc187f88da3627b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45539-out-of-bounds-write-in-synology-dis-c3a17529</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45539%3A%20Out-of-bounds%20Write%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=high&amp;id=69319adf5cc187f88da36278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45538-cross-site-request-forgery-csrf-in--0fd197e9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45538%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=critical&amp;id=69319adf5cc187f88da36275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reporters-without-borders-targeted-by-russian-hack-c491730c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reporters%20Without%20Borders%20Targeted%20by%20Russian%20Hackers&amp;severity=medium&amp;id=693197f05cc187f88da02929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14005-cross-site-scripting-in-dayrui-xunr-4ce13c38</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14005%3A%20Cross%20Site%20Scripting%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=693190595cc187f88d96ed39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14004-server-side-request-forgery-in-dayr-6224eecc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14004%3A%20Server-Side%20Request%20Forgery%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=693190595cc187f88d96ed33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webxr-flaw-hits-4-billion-chromium-users-update-yo-bbd19cbe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WebXR%20Flaw%20Hits%204%20Billion%20Chromium%20Users%2C%20Update%20Your%20Browser%20Now&amp;severity=medium&amp;id=69318d4ba63052f0b8f415a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-cyber-agencies-issue-ai-security-guidance-f-c90bd730</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Cyber%20Agencies%20Issue%20AI%20Security%20Guidance%20for%20Critical%20Infrastructure%20OT&amp;severity=critical&amp;id=69318d2ca63052f0b8f3da9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-sold-albiriox-android-malware-targets-banks--3361558e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Sold%20Albiriox%20Android%20Malware%20Targets%20Banks%20and%20Crypto%20Holders&amp;severity=medium&amp;id=6931862ea63052f0b8ebf220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11222-na-in-line-corporation-central-dogm-d33e4199</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11222%3A%20na%20in%20LINE%20Corporation%20Central%20Dogma&amp;severity=medium&amp;id=69317f86e2bf61707fe31262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/personal-information-compromised-in-freedom-mobile-793d79b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Personal%20Information%20Compromised%20in%20Freedom%20Mobile%20Data%20Breach&amp;severity=medium&amp;id=69317870e2bf61707fdabe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-wi-fi-hack-npm-worm-defi-theft-48af21c2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Wi-Fi%20Hack%2C%20npm%20Worm%2C%20DeFi%20Theft%2C%20Phishing%20Blasts%E2%80%94%20and%2015%20More%20Stories&amp;severity=critical&amp;id=693189bea63052f0b8ef5911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/5-threats-that-reshaped-web-security-this-year-202-48692fa6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=5%20Threats%20That%20Reshaped%20Web%20Security%20This%20Year%20%5B2025%5D&amp;severity=medium&amp;id=69317c20e2bf61707fde762b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marquis-data-breach-impacts-over-780000-people-da17734a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marquis%20Data%20Breach%20Impacts%20Over%20780%2C000%20People&amp;severity=medium&amp;id=69316ef003f8574ee0f5a787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/protecting-llm-chats-from-the-eavesdropping-whispe-df64ff5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Protecting%20LLM%20chats%20from%20the%20eavesdropping%20Whisper%20Leak%20attack%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6931677103f8574ee0ebfa59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-vscode-extension-launches-multi-stage-at-5a020cbc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20VSCode%20Extension%20Launches%20Multi-Stage%20Attack%20Chain%20with%20Anivia%20Loader%20and%20OctoRAT&amp;severity=medium&amp;id=69316adc03f8574ee0f04a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marquis-data-breach-impacts-over-74-us-banks-credi-b690f9f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marquis%20data%20breach%20impacts%20over%2074%20US%20banks%2C%20credit%20unions&amp;severity=high&amp;id=693160f8475c06cd943e1bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kohlers-encrypted-smart-toilet-camera-is-not-actua-1483ebf2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kohler&apos;s%20Encrypted%20Smart%20Toilet%20Camera%20is%20not%20Actually%20end-to-end%20Encrypted&amp;severity=high&amp;id=693160f8475c06cd943e1bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/goldfactory-hits-southeast-asia-with-modified-bank-c713d794</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoldFactory%20Hits%20Southeast%20Asia%20with%20Modified%20Banking%20Apps%20Driving%2011%2C000%2B%20Infections&amp;severity=high&amp;id=693160f8475c06cd943e1bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-in-the-wild-exploitation-expected-for--b4d27fa6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%3A%20In-the-Wild%20Exploitation%20Expected%20for%20Critical%20React%20Vulnerability&amp;severity=critical&amp;id=693160ab475c06cd943d3d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14010-vulnerability-in-red-hat-red-hat-ce-29da00cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14010%3A%20Vulnerability%20in%20ansible-collections%20Ansible%20Community%20General%20Collection&amp;severity=medium&amp;id=69315a47475c06cd943687bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/goldfactory-hits-southeast-asia-with-modified-bank-02d60138</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoldFactory%20Hits%20Southeast%20Asia%20with%20Modified%20Banking%20Apps%20Driving%2011%2C000%2B%20Infections&amp;severity=medium&amp;id=693156a8744de630efd7f37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-corporate-web-26104f3c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Corporate%20Web&amp;severity=medium&amp;id=69316f2803f8574ee0f61229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/record-297-tbps-ddos-attack-linked-to-aisuru-botne-78e9ca71</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Record%2029.7%20Tbps%20DDoS%20Attack%20Linked%20to%20AISURU%20Botnet%20with%20up%20to%204%20Million%20Infected%20Hosts&amp;severity=medium&amp;id=693138a3a5c331a7096817c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12826-cwe-862-missing-authorization-in-we-0d0be3e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12826%3A%20CWE-862%20Missing%20Authorization%20in%20webdevstudios%20Custom%20Post%20Type%20UI&amp;severity=medium&amp;id=69313190a5c331a7095e7764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12782-cwe-862-missing-authorization-in-be-5f0ae18e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12782%3A%20CWE-862%20Missing%20Authorization%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=69313190a5c331a7095e7760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13513-cwe-79-improper-neutralization-of-i-7de1723e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codejunkie%20Clik%20stats&amp;severity=medium&amp;id=69312035c33ce07f96ee3309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11727-cwe-79-improper-neutralization-of-i-5973f017</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codisto%20Omnichannel%20for%20WooCommerce%3A%20Google%2C%20Amazon%2C%20eBay%20%26%20Walmart%20Integration%20%E2%80%93%20Powered%20by%20Codisto&amp;severity=high&amp;id=693111e8654141e59c21c0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11379-cwe-200-exposure-of-sensitive-infor-39e3c0ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11379%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20roselldk%20WebP%20Express&amp;severity=medium&amp;id=693111e8654141e59c21c0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-i-reverse-engineered-a-billion-dollar-legal-ai-cad2ef16</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20I%20Reverse%20Engineered%20a%20Billion-Dollar%20Legal%20AI%20Tool%20and%20Found%20100k%2B%20Confidential%20Files&amp;severity=medium&amp;id=69310764654141e59c0584b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-attack-or-compromised-governmentx3f-x-807f38b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20Attack%20or%20Compromised%20Government%26%23x3f%3B%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Thu%2C%20Dec%204th)&amp;severity=medium&amp;id=6930f0a7899a68ecde2f4009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-04-1cd4a56e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-04&amp;severity=medium&amp;id=693224eeca35b6b64b3d6b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65900-na-4c728d8e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65900%3A%20n%2Fa&amp;severity=medium&amp;id=6931fbea0459f550ec00bb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65899-na-bad1d1a8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65899%3A%20n%2Fa&amp;severity=medium&amp;id=6931fbea0459f550ec00bb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63896-na-99a39207</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63896%3A%20n%2Fa&amp;severity=high&amp;id=6931f4df0459f550ecf89e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55948-na-fedd745d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55948%3A%20n%2Fa&amp;severity=high&amp;id=6931f4df0459f550ecf89e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63499-na-18bfdaf3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63499%3A%20n%2Fa&amp;severity=medium&amp;id=6931e72c6255310dc4c3572f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29269-na-16ef8899</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29269%3A%20n%2Fa&amp;severity=critical&amp;id=6931e372e9ea8245266ca5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29268-na-94efe30c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29268%3A%20n%2Fa&amp;severity=critical&amp;id=6931e372e9ea8245266ca5ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65883-na-e0c8b88e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65883%3A%20n%2Fa&amp;severity=high&amp;id=6931e372e9ea8245266ca5b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65806-na-829274a3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65806%3A%20n%2Fa&amp;severity=medium&amp;id=6931dff2e9ea82452668a427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59788-na-4fd54974</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59788%3A%20n%2Fa&amp;severity=high&amp;id=6931d8e6e9ea82452660f541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63362-na-15a72bb4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63362%3A%20n%2Fa&amp;severity=critical&amp;id=6931d6d1e9ea8245265fa5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63361-na-72a87078</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63361%3A%20n%2Fa&amp;severity=medium&amp;id=6931d6d1e9ea8245265fa5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65637-na-c50d04ee</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65637%3A%20n%2Fa&amp;severity=high&amp;id=6931d56de9ea8245265c6745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63363-na-d6577472</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63363%3A%20n%2Fa&amp;severity=high&amp;id=6931cb48911f2f20c4b34cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66373-na-409527d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66373%3A%20n%2Fa&amp;severity=medium&amp;id=6931bd5b6ade94f1c7900e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63364-na-dc02eac0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63364%3A%20n%2Fa&amp;severity=high&amp;id=6931bd5b6ade94f1c7900e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65516-na-0bd91c4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65516%3A%20n%2Fa&amp;severity=medium&amp;id=6931b411739651d5d52cf9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61148-na-0a686bdf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61148%3A%20n%2Fa&amp;severity=medium&amp;id=6931afbe739651d5d527e7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57213-na-2afcd05a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57213%3A%20n%2Fa&amp;severity=high&amp;id=6931ac46739651d5d523c1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57212-na-efe85f5a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57212%3A%20n%2Fa&amp;severity=high&amp;id=6931ac46739651d5d523c1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57210-na-bc7ede44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57210%3A%20n%2Fa&amp;severity=high&amp;id=6931ac46739651d5d523c1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63681-na-134feafc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63681%3A%20n%2Fa&amp;severity=medium&amp;id=6931a8e704d931fa5b427e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56427-na-6de141a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56427%3A%20n%2Fa&amp;severity=high&amp;id=6931a8e704d931fa5b427e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54306-na-0a159f36</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54306%3A%20n%2Fa&amp;severity=high&amp;id=6931a58604d931fa5b3e2611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54305-na-45043029</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54305%3A%20n%2Fa&amp;severity=high&amp;id=6931a58604d931fa5b3e260c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54304-na-dc4117e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54304%3A%20n%2Fa&amp;severity=critical&amp;id=6931a58604d931fa5b3e2607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54303-na-52a0db41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54303%3A%20n%2Fa&amp;severity=critical&amp;id=6931a58504d931fa5b3e25e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53963-na-97d350e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53963%3A%20n%2Fa&amp;severity=critical&amp;id=6931a58504d931fa5b3e25e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65346-na-16d9c416</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65346%3A%20n%2Fa&amp;severity=critical&amp;id=6931a58504d931fa5b3e25d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54307-na-e6ebcca8</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54307%3A%20n%2Fa&amp;severity=high&amp;id=6931a58504d931fa5b3e25d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freedom-mobile-discloses-data-breach-exposing-cust-55c3e46d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Freedom%20Mobile%20discloses%20data%20breach%20exposing%20customer%20data&amp;severity=high&amp;id=6930ce18cd38a5251eb53e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-diy-retail-giant-leroy-merlin-discloses-a-d-7c36c903</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20DIY%20retail%20giant%20Leroy%20Merlin%20discloses%20a%20data%20breach&amp;severity=high&amp;id=6930ce18cd38a5251eb53e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62173-cwe-89-improper-neutralization-of-s-d682e58e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62173%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20restapps&amp;severity=high&amp;id=6930c7c5cd38a5251eae5a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66404-cwe-77-improper-neutralization-of-s-3a2d92df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66404%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Flux159%20mcp-server-kubernetes&amp;severity=medium&amp;id=6930a178e580ff243da31211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66293-cwe-125-out-of-bounds-read-in-pnggr-15674502</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66293%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=high&amp;id=6930a178e580ff243da3120b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/43-million-browsers-infected-inside-shadypandas-7--0f872fac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=4.3%20Million%20Browsers%20Infected%3A%20Inside%20ShadyPanda&apos;s%207-Year%20Malware%20Campaign&amp;severity=medium&amp;id=69316f2803f8574ee0f6121f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/albiriox-exposed-a-new-rat-mobile-malware-targetin-749c2dc4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Albiriox%20Exposed%3A%20A%20New%20RAT%20Mobile%20Malware%20Targeting%20Global%20Finance%20and%20Crypto%20Wallets&amp;severity=medium&amp;id=69316f2803f8574ee0f61206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-malware-lets-criminals-control-your-ph-8277a9f3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20malware%20lets%20criminals%20control%20your%20phone%20and%20drain%20your%20bank%20account&amp;severity=medium&amp;id=69319e6204d931fa5b362195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/build-script-exposes-pypi-to-domain-takeover-attac-2890f8be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bootstrap%20script%20exposes%20PyPI%20to%20domain%20takeover%20attacks&amp;severity=medium&amp;id=69256fb97e8c0fda07b5dbc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-king-addons-flaw-under-active-attack-let-42f01a83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20King%20Addons%20Flaw%20Under%20Active%20Attack%20Lets%20Hackers%20Make%20Admin%20Accounts&amp;severity=high&amp;id=693096ae728fb3f62eb63b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-blocks-roblox-over-distribution-of-lgbt-pro-7c3b8041</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20blocks%20Roblox%20over%20distribution%20of%20LGBT%20%22propaganda%22&amp;severity=high&amp;id=693096ae728fb3f62eb63b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-silently-patches-windows-lnk-flaw-after--c3b97aa6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Silently%20Patches%20Windows%20LNK%20Flaw%20After%20Years%20of%20Active%20Exploitation&amp;severity=high&amp;id=693096ae728fb3f62eb63b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-rsc-bugs-in-react-and-nextjs-allow-unauth-3bcb230e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20RSC%20Bugs%20in%20React%20and%20Next.js%20Allow%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=693096ae728fb3f62eb63b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66489-cwe-303-incorrect-implementation-of-10655bf9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66489%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20calcom%20cal.com&amp;severity=critical&amp;id=693096f5728fb3f62eb70505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65097-cwe-284-improper-access-control-in--7bc73d15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65097%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20rommapp%20romm&amp;severity=high&amp;id=693096f5728fb3f62eb70502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65096-cwe-284-improper-access-control-in--ca4c2490</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65096%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20rommapp%20romm&amp;severity=medium&amp;id=693096f5728fb3f62eb704ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12385-cwe-770-allocation-of-resources-wit-3651cb1e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12385%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20The%20Qt%20Company%20Qt&amp;severity=high&amp;id=6930935d728fb3f62eb0af7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61727-cwe-295-improper-certificate-valida-3e76eb3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61727%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=medium&amp;id=6930935d728fb3f62eb0af83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65027-cwe-79-improper-neutralization-of-i-5b6b216f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65027%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rommapp%20romm&amp;severity=high&amp;id=6930935d728fb3f62eb0af89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66453-cwe-400-uncontrolled-resource-consu-5df87036</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66453%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20mozilla%20rhino&amp;severity=medium&amp;id=693096f5728fb3f62eb70508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempts-to-bypass-cdns-wed-dec-3rd-4d50d6cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempts%20to%20Bypass%20CDNs%2C%20(Wed%2C%20Dec%203rd)&amp;severity=medium&amp;id=6930934a728fb3f62eb089e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66406-cwe-863-incorrect-authorization-in--bb8ea01e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66406%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20smallstep%20certificates&amp;severity=medium&amp;id=69308fb4728fb3f62ea9b175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13992-side-channel-information-leakage-in-32bb09d4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13992%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=69308c0f7d648701e00af4d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-clickhouse-for-real-time-l7-ddos-bot-traffic-148695cd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20ClickHouse%20for%20Real-Time%20L7%20DDoS%20%26%20Bot%20Traffic%20Analytics%20with%20Tempesta%20FW&amp;severity=high&amp;id=69308c147d648701e00af5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12819-untrusted-search-path-in-pgbouncer-04ecd573</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12819%3A%20Untrusted%20Search%20Path%20in%20PgBouncer&amp;severity=high&amp;id=69308c0f7d648701e00af4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12084-vulnerability-in-python-software-fo-8434a7e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12084%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=693088877d648701e003bbc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/68-of-phishing-websites-are-protected-by-cloudflar-0c03102a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=68%25%20Of%20Phishing%20Websites%20Are%20Protected%20by%20CloudFlare&amp;severity=medium&amp;id=6930888d7d648701e00402d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3884-improper-input-validation-in-red-hat-c30c3e30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3884%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20Red%20Hat%20JBoss%20Enterprise%20Application%20Platform%207.1%20EUS%20for%20RHEL%207&amp;severity=high&amp;id=693088877d648701e003bbd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66222-cwe-94-improper-control-of-generati-ddf80d66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66222%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=693088877d648701e003bbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66220-cwe-170-improper-null-termination-i-b431f4cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66220%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=693088877d648701e003bbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66208-cwe-78-improper-neutralization-of-s-44b853d3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CollaboraOnline%20online&amp;severity=high&amp;id=693081947d648701e0f8358f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33208-cwe-427-uncontrolled-search-path-el-1d33caee</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33208%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20TAO&amp;severity=high&amp;id=693081947d648701e0f83582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-rsc-bugs-in-react-and-nextjs-allow-unauth-4e911b0c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20RSC%20Bugs%20in%20React%20and%20Next.js%20Allow%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=693089977d648701e00701bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66032-cwe-77-improper-neutralization-of-s-4aa2eec3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66032%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=693081947d648701e0f8358c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33211-cwe-1284-improper-validation-of-spe-d6579ed9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33211%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=693081947d648701e0f83587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33201-cwe-754-improper-check-for-unusual--34aa7337</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33201%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=693081947d648701e0f8357d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64763-cwe-693-protection-mechanism-failur-7a66d914</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64763%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20envoyproxy%20envoy&amp;severity=low&amp;id=693081947d648701e0f83595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64527-cwe-476-null-pointer-dereference-in-659d438a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64527%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=693081947d648701e0f83592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dns-uncovers-infrastructure-used-in-sso-attacks-09f47a6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DNS%20Uncovers%20Infrastructure%20Used%20in%20SSO%20Attacks&amp;severity=medium&amp;id=69307b18b129615efa19324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discover-the-ai-tools-fueling-the-next-cybercrime--d9e05e7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discover%20the%20AI%20Tools%20Fueling%20the%20Next%20Cybercrime%20Wave%20%E2%80%94%20Watch%20the%20Webinar&amp;severity=low&amp;id=6930324c720cedca79479e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-silently-patches-windows-lnk-flaw-after--32cf48e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Silently%20Patches%20Windows%20LNK%20Flaw%20After%20Years%20of%20Active%20Exploitation&amp;severity=medium&amp;id=69307a4cb129615efa16ecf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64443-cwe-749-exposed-dangerous-method-or-67ded4cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64443%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20docker%20mcp-gateway&amp;severity=high&amp;id=69307b19b129615efa193349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-chatgpt-atlas-browser-used-in-clickfix-attack-a77a8755</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20ChatGPT%20Atlas%20Browser%20Used%20in%20ClickFix%20Attack%20to%20Steal%20Passwords&amp;severity=medium&amp;id=693076d4b129615efa105af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-king-addons-flaw-under-active-attack-let-7dd87bc3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20King%20Addons%20Flaw%20Under%20Active%20Attack%20Lets%20Hackers%20Make%20Admin%20Accounts&amp;severity=critical&amp;id=69307ac6b129615efa180f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deep-dive-into-dragonforce-ransomware-and-its-scat-6bb1bae3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deep%20dive%20into%20DragonForce%20ransomware%20and%20its%20Scattered%20Spider%20connection&amp;severity=high&amp;id=69306f9387f844e860798c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54065-cwe-913-improper-control-of-dynamic-0af04d93</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54065%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20ZDoom%20gzdoom&amp;severity=high&amp;id=69306fa787f844e8607995d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20388-the-web-server-receives-a-url-or-si-c31f0719</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20388%3A%20The%20web%20server%20receives%20a%20URL%20or%20similar%20request%20from%20an%20upstream%20component%20and%20retrieves%20the%20contents%20of%20this%20URL%2C%20but%20it%20does%20not%20sufficiently%20ensure%20that%20the%20request%20is%20being%20sent%20to%20the%20expected%20destination.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=69306fa787f844e8607995f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20389-the-product-does-not-validate-or-in-395c6662</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20389%3A%20The%20product%20does%20not%20validate%20or%20incorrectly%20validates%20input%20that%20can%20affect%20the%20control%20flow%20or%20data%20flow%20of%20a%20program.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69306fa787f844e8607995f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20387-the-product-specifies-permissions-f-fc097e52</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20387%3A%20The%20product%20specifies%20permissions%20for%20a%20security-critical%20resource%20in%20a%20way%20that%20allows%20that%20resource%20to%20be%20read%20or%20modified%20by%20unintended%20actors.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69306fa787f844e8607995ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20383-the-product-exposes-sensitive-infor-3e262b85</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20383%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69306fa787f844e8607995e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20384-the-software-does-not-neutralize-or-4d803748</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20384%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20output%20that%20is%20written%20to%20logs.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69306fa787f844e8607995e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20386-the-product-specifies-permissions-f-7022fb3a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20386%3A%20The%20product%20specifies%20permissions%20for%20a%20security-critical%20resource%20in%20a%20way%20that%20allows%20that%20resource%20to%20be%20read%20or%20modified%20by%20unintended%20actors.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69306fa787f844e8607995eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20385-the-software-does-not-neutralize-or-41b2ffe3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20385%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=69306fa787f844e8607995e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20381-the-software-performs-an-authorizat-864f96c1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20381%3A%20The%20software%20performs%20an%20authorization%20check%20when%20an%20actor%20attempts%20to%20access%20a%20resource%20or%20perform%20an%20action%2C%20but%20it%20does%20not%20correctly%20perform%20the%20check.%20This%20allows%20attackers%20to%20bypass%20intended%20access%20restrictions.%20in%20Splunk%20Splunk%20MCP%20Server&amp;severity=medium&amp;id=69306fa787f844e8607995dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20382-a-web-application-accepts-a-user-co-fc7491e2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20382%3A%20A%20web%20application%20accepts%20a%20user-controlled%20input%20that%20specifies%20a%20link%20to%20an%20external%20site%2C%20and%20uses%20that%20link%20in%20a%20Redirect.%20This%20simplifies%20phishing%20attacks.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=69306fa787f844e8607995df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34319-cwe-78-improper-neutralization-of-s-9672dc71</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34319%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOTOLINK%20N300RT&amp;severity=critical&amp;id=69306fa987f844e860799605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13492-cwe-363-race-condition-enabling-lin-e2f4b223</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13492%3A%20CWE-363%3A%20Race%20Condition%20Enabling%20Link%20Following%20in%20HP%20Inc%20HP%20Image%20Assistant&amp;severity=medium&amp;id=69306cb887f844e860730073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-security-vulnerability-in-react-server-co-5b266d01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Security%20Vulnerability%20in%20React%20Server%20Components%20%E2%80%93%20React&amp;severity=critical&amp;id=6930642dca1782a906c02ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7044-cwe-269-improper-privilege-managemen-83b8e25f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7044%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Ubuntu%20MAAS&amp;severity=high&amp;id=69305d3dca1782a906b23327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55182-deserialization-of-untrusted-data-c-103df002</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55182%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Meta%20react-server-dom-webpack&amp;severity=critical&amp;id=69305d3dca1782a906b2331e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brazil-hit-by-banking-trojan-spread-via-whatsapp-w-0ea2e022</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brazil%20Hit%20by%20Banking%20Trojan%20Spread%20via%20WhatsApp%20Worm%20and%20RelayNFC%20NFC%20Relay%20Fraud&amp;severity=high&amp;id=69306c7187f844e86071d6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13949-unrestricted-upload-in-proudmubai-g-89572ba0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13949%3A%20Unrestricted%20Upload%20in%20ProudMuBai%20GoFilm&amp;severity=medium&amp;id=69304b991f9e797ee289a5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13948-use-of-hard-coded-cryptographic-key-1935dcd0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13948%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20opsre%20go-ldap-admin&amp;severity=medium&amp;id=69304b991f9e797ee289a5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-spotted-lazaruss-remote-it-workers-in--136485a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20spotted%20Lazarus%E2%80%99s%20remote%20IT%20workers%20in%20action&amp;severity=medium&amp;id=69304b691f9e797ee28988f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-phoenix-discloses-data-breach-after--6b4a089a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Phoenix%20discloses%20data%20breach%20after%20Oracle%20hack&amp;severity=high&amp;id=69304b691f9e797ee28988ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-dupehike-targeting-russian-employees-wit-4fe48642</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20DupeHike%3A%20Targeting%20Russian%20employees%20with%20DUPERUNNER%20and%20AdaptixC2&amp;severity=medium&amp;id=693076e4b129615efa107004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-botnet-behind-new-record-breaking-297-tbps--5b06cbe3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20botnet%20behind%20new%20record-breaking%2029.7%20Tbps%20DDoS%20attack&amp;severity=high&amp;id=69304b691f9e797ee28988e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-zero-to-system-building-printspoofer-from-scr-448e4637</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Zero%20to%20SYSTEM%3A%20Building%20PrintSpoofer%20from%20Scratch&amp;severity=medium&amp;id=693047c951392e1c8b1ec81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13359-cwe-89-improper-neutralization-of-s-158518fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13359%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=6930444551392e1c8b19b53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13756-cwe-862-missing-authorization-in-te-9095e370</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13756%3A%20CWE-862%20Missing%20Authorization%20in%20techjewel%20Fluent%20Booking%20%E2%80%93%20The%20Ultimate%20Appointments%20Scheduling%2C%20Events%20Booking%2C%20Events%20Calendar%20Solution&amp;severity=medium&amp;id=6930444551392e1c8b19b547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13401-cwe-79-improper-neutralization-of-i-a1a02eb5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13401%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimizingmatters%20Autoptimize&amp;severity=medium&amp;id=6930444551392e1c8b19b543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13390-cwe-303-incorrect-implementation-of-72fdb94c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13390%3A%20CWE-303%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20listingthemes%20WP%20Directory%20Kit&amp;severity=critical&amp;id=6930444551392e1c8b19b53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13354-cwe-862-missing-authorization-in-st-a39935ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13354%3A%20CWE-862%20Missing%20Authorization%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=6930444551392e1c8b19b537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-king-addons-vulnerability-exploited-to-ha-ded30ec3</loc>
    <lastmod>2026-04-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20King%20Addons%20Vulnerability%20Exploited%20to%20Hack%20WordPress%20Sites&amp;severity=critical&amp;id=69303d2e51392e1c8b10e82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/picklescan-bugs-allow-malicious-pytorch-models-to--44c7f561</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Picklescan%20Bugs%20Allow%20Malicious%20PyTorch%20Models%20to%20Evade%20Scans%20and%20Execute%20Code&amp;severity=high&amp;id=69303d4551392e1c8b10f034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13109-cwe-639-authorization-bypass-throug-dbf7c3b9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13109%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=medium&amp;id=69302ef1720cedca79452381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12358-cwe-352-cross-site-request-forgery--afcb5b3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12358%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20roxnor%20ShopEngine%20Elementor%20WooCommerce%20Builder%20Addon%20%E2%80%93%20All%20in%20One%20WooCommerce%20Solution&amp;severity=medium&amp;id=69302ef1720cedca79452379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13342-cwe-862-missing-authorization-in-sh-326b132b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13342%3A%20CWE-862%20Missing%20Authorization%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=critical&amp;id=69302ef1720cedca79452385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12887-cwe-862-missing-authorization-in-sa-2584c293</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12887%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=medium&amp;id=69302ef1720cedca7945237d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arizona-attorney-general-sues-chinese-online-retai-5d7ee877</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arizona%20Attorney%20General%20Sues%20Chinese%20Online%20Retailer%20Temu%20Over%20Data%20Theft%20Claims&amp;severity=medium&amp;id=69302ed9720cedca7945161c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/penn-and-phoenix-universities-disclose-data-breach-1eb1293a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Penn%20and%20Phoenix%20Universities%20Disclose%20Data%20Breach%20After%20Oracle%20Hack&amp;severity=medium&amp;id=693020471e6d1f9abb0c6704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-silently-mitigated-exploited-lnk-vulnera-aa5a20a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Silently%20Mitigated%20Exploited%20LNK%20Vulnerability&amp;severity=critical&amp;id=6930184de1f6412a905e92d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/7-year-long-shadypanda-attack-spied-on-43m-chrome--7f0ebe7a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=7%20Year%20Long%20ShadyPanda%20Attack%20Spied%20on%204.3M%20Chrome%20and%20Edge%20Users&amp;severity=medium&amp;id=69301873e1f6412a905e9aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pytorch-users-at-risk-unveiling-3-zero-day-pickles-5a0b81ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PyTorch%20Users%20at%20Risk%3A%20Unveiling%203%20Zero-Day%20PickleScan%20Vulnerabilities&amp;severity=critical&amp;id=69300af87fb5593475cc5f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/korea-arrests-suspects-selling-intimate-videos-fro-ab5b059b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Korea%20arrests%20suspects%20selling%20intimate%20videos%20from%20hacked%20IP%20cameras&amp;severity=high&amp;id=69300ad57fb5593475cc523a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chopping-ai-down-to-size-turning-disruptive-techno-e6994fa9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chopping%20AI%20Down%20to%20Size%3A%20Turning%20Disruptive%20Technology%20into%20a%20Strategic%20Advantage&amp;severity=medium&amp;id=69301494e1f6412a90591c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lets-encrypt-to-reduce-certificate-validity-from-9-7fc8a1d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Let%E2%80%99s%20Encrypt%20to%20Reduce%20Certificate%20Validity%20from%2090%20Days%20to%2045%20Days&amp;severity=high&amp;id=69300ad57fb5593475cc5242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13947-vulnerability-in-red-hat-red-hat-en-a6fdd8f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13947%3A%20Vulnerability%20in%20The%20WebKitGTK%20Team%20webkitgtk&amp;severity=high&amp;id=69300af47fb5593475cc5a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/picklescan-bugs-allow-malicious-pytorch-models-to--366a8dd3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Picklescan%20Bugs%20Allow%20Malicious%20PyTorch%20Models%20to%20Evade%20Scans%20and%20Execute%20Code&amp;severity=critical&amp;id=69301494e1f6412a90591c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teams-social-engineering-attack-threat-actors-impe-f930ae76</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Teams%20Social%20Engineering%20Attack%3A%20Threat%20Actors%20Impersonate%20IT%20to%20Steal%20Credentials%20via%20Quick%20Assist&amp;severity=medium&amp;id=69301885e1f6412a905ea62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/valleyrat-campaign-targets-job-seekers-abuses-foxi-6be9d4fd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ValleyRAT%20Campaign%20Targets%20Job%20Seekers%2C%20Abuses%20Foxit%20PDF%20Reader%20for%20DLL%20Side-loading&amp;severity=medium&amp;id=693014f4e1f6412a905955b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-143-patches-high-severity-vulnerabilities-6db3884c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20143%20Patches%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=692ffc9010a87570525e15d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-matanbuchus-30-258ccfbb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20Matanbuchus%203.0&amp;severity=medium&amp;id=69301885e1f6412a905ea620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-v2-poses-risk-to-npm-supply-chain-fbfc969b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20V2%20Poses%20Risk%20to%20NPM%20Supply%20Chain&amp;severity=medium&amp;id=69301885e1f6412a905ea615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13472-cwe-862-missing-authorization-in-pe-f514d38a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13472%3A%20CWE-862%20Missing%20Authorization%20in%20Perforce%20BlazeMeter&amp;severity=medium&amp;id=692ffe297fb5593475bc861f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-rust-crate-delivers-os-specific-malware--5beded43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Rust%20Crate%20Delivers%20OS-Specific%20Malware%20to%20Web3%20Developer%20Systems&amp;severity=medium&amp;id=69301494e1f6412a90591c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12744-improper-neutralization-of-special--86861de4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12744%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=692ff91810a8757052587e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29864-cwe-693-protection-mechanism-failur-67cfa2c5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29864%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20ESTsoft%20ALZip&amp;severity=medium&amp;id=692ff59510a8757052538201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13946-cwe-835-loop-with-unreachable-exit--b76a7a1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13946%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=692ff21010a87570524f4ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13945-cwe-1325-improperly-controlled-sequ-d601fd2b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13945%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=692ff21010a87570524f4ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13486-cwe-94-improper-control-of-generati-abf63164</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13486%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20hwk-fr%20Advanced%20Custom%20Fields%3A%20Extended&amp;severity=critical&amp;id=692fdfe670961fbaa28b6194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12954-cwe-639-authorization-bypass-throug-e64fd5d2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12954%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Timetable%20and%20Event%20Schedule%20by%20MotoPress&amp;severity=low&amp;id=692fd8dd70961fbaa2808df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10304-cwe-862-missing-authorization-in-ev-477128dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10304%3A%20CWE-862%20Missing%20Authorization%20in%20everestthemes%20Everest%20Backup%20%E2%80%93%20WordPress%20Cloud%20Backup%2C%20Migration%2C%20Restore%20%26%20Cloning%20Plugin&amp;severity=medium&amp;id=692fb1c7619fec35b4585800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12585-cwe-200-exposure-of-sensitive-infor-ef91f6c2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12585%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mxchat%20MxChat%20%E2%80%93%20AI%20Chatbot%20%26%20Content%20Generation%20for%20WordPress&amp;severity=medium&amp;id=692fb1c7619fec35b4585804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13495-cwe-89-improper-neutralization-of-s-ed673efb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13495%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpmanageninja%20FluentCart%20A%20New%20Era%20of%20eCommerce%20%E2%80%93%20Faster%2C%20Lighter%2C%20and%20Simpler&amp;severity=medium&amp;id=692fb1c7619fec35b4585809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13646-cwe-434-unrestricted-upload-of-file-7a8848e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13646%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpchill%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=high&amp;id=692fa033619fec35b4509f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13448-cwe-79-improper-neutralization-of-i-1194198c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anastis%20CSSIgniter%20Shortcodes&amp;severity=medium&amp;id=692fa033619fec35b4509f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13645-cwe-22-improper-limitation-of-a-pat-1c73e0b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13645%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpchill%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=high&amp;id=692fa033619fec35b4509f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-allocated-cves-on-an-ics-5g-modem-47813f69</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20allocated%20CVEs%20on%20an%20ICS%205G%20modem&amp;severity=critical&amp;id=692fa037619fec35b450a37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-the-meatmeet-bbq-probe-ble-bbq-botnet-0d2d2058</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20the%20Meatmeet%20BBQ%20Probe%20%E2%80%94%20BLE%20BBQ%20Botnet&amp;severity=medium&amp;id=692f8824619fec35b4355c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-03-68658295</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-03&amp;severity=medium&amp;id=6930d0dbcd38a5251eb82279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64055-na-ca092a11</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64055%3A%20n%2Fa&amp;severity=critical&amp;id=6930a5c0e580ff243daab7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65868-na-f646e312</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65868%3A%20n%2Fa&amp;severity=critical&amp;id=69309f55e580ff243da01908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65345-na-784b00b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65345%3A%20n%2Fa&amp;severity=medium&amp;id=69309a36728fb3f62ec00aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50361-na-bc646533</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50361%3A%20n%2Fa&amp;severity=medium&amp;id=693096f5728fb3f62eb704fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63402-na-576ee601</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63402%3A%20n%2Fa&amp;severity=medium&amp;id=693088877d648701e003bbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63401-na-7d5265e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63401%3A%20n%2Fa&amp;severity=medium&amp;id=693088877d648701e003bbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50360-na-488fd0cd</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50360%3A%20n%2Fa&amp;severity=high&amp;id=693088877d648701e003bbcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/django-5113-sql-injection-c417d485</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Django%205.1.13%20-%20SQL%20Injection&amp;severity=medium&amp;id=69307a4db129615efa16edc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mangoswebv4-406-reflected-xss-3c807e92</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MaNGOSWebV4%20%204.0.6%20-%20Reflected%20XSS&amp;severity=medium&amp;id=69307a4db129615efa16edbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-298-cross-site-request-forgery-csrf-fdea48ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFAQ%20%202.9.8%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=69307a4db129615efa16edba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-298-cross-site-request-forgerycsrf-b7584494</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFAQ%202.9.8%20-%20Cross-Site%20Request%20Forgery(CSRF)&amp;severity=medium&amp;id=69307a4db129615efa16edb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54326-na-82dc8755</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54326%3A%20n%2Fa&amp;severity=high&amp;id=6930731787f844e860805d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53965-na-481ff2f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53965%3A%20n%2Fa&amp;severity=medium&amp;id=6930731787f844e860805d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65842-na-26019e80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65842%3A%20n%2Fa&amp;severity=medium&amp;id=69306fa987f844e86079960f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65841-na-bc0143ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65841%3A%20n%2Fa&amp;severity=medium&amp;id=69306fa987f844e86079960a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65843-na-d65ec0bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65843%3A%20n%2Fa&amp;severity=high&amp;id=69306cb887f844e860730076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-298-cross-site-request-forgery-csrf-478a313a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFaq%202.9.8%20-%20Cross%20Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=69306c2987f844e860718477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62686-na-d5629c2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62686%3A%20n%2Fa&amp;severity=medium&amp;id=6930666887f844e8606805b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55076-na-e4a5c80a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55076%3A%20n%2Fa&amp;severity=medium&amp;id=6930666887f844e8606805b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65320-na-a5da9e94</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65320%3A%20n%2Fa&amp;severity=high&amp;id=69306429ca1782a906c01f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57202-na-d2573b7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57202%3A%20n%2Fa&amp;severity=medium&amp;id=693060a5ca1782a906b8901c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57199-na-4d6145c3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57199%3A%20n%2Fa&amp;severity=high&amp;id=69305d3dca1782a906b23322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57201-na-1bffe90d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57201%3A%20n%2Fa&amp;severity=high&amp;id=6930599dca1782a906ae61c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57198-na-050b7acc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57198%3A%20n%2Fa&amp;severity=high&amp;id=6930599dca1782a906ae61bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57200-na-5b7e84ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57200%3A%20n%2Fa&amp;severity=medium&amp;id=693055f81f9e797ee2973435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65267-na-abf373e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65267%3A%20n%2Fa&amp;severity=critical&amp;id=693052741f9e797ee291ba0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53841-cwe-829-inclusion-of-functionality--f3f84827</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53841%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Akamai%20Guardicore%20Platform%20Agent&amp;severity=high&amp;id=69304fa91f9e797ee28efe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/opensis-community-edition-80-sql-injection-24a9359d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=openSIS%20Community%20Edition%208.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=6930038e7fb5593475c25d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pluckcms-4710-unrestricted-file-upload-3a229877</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PluckCMS%204.7.10%20-%20Unrestricted%20File%20Upload&amp;severity=medium&amp;id=6930038e7fb5593475c25d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rosariosis-672-cross-site-scripting-xss-f92c0fe8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RosarioSIS%206.7.2%20-%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=6930038e7fb5593475c25d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rosariosis-672-cross-site-scripting-xss-4d3614cb</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RosarioSIS%206.7.2%20-%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=6930038e7fb5593475c25d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyadmin-500-sql-injection-85bbe257</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyAdmin%205.0.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=6930038e7fb5593475c25cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openrepeater-21-os-command-injection-a7ec780c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenRepeater%202.1%20-%20OS%20Command%20Injection&amp;severity=medium&amp;id=6930038e7fb5593475c25cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpipam-14-sql-injection-cc8fc93d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpIPAM%201.4%20-%20SQL-Injection&amp;severity=medium&amp;id=6930038e7fb5593475c25cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobiledetect-2831-cross-site-scripting-xss-f5d2c590</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MobileDetect%202.8.31%20-%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=6930038e7fb5593475c25ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65955-4f13c19e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65955&amp;severity=null&amp;id=6933721cf88dbe026c2f889d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55181-excessive-iteration-cwe-834-in-face-8b81852c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55181%3A%20Excessive%20Iteration%20(CWE-834)%20in%20Facebook%20proxygen&amp;severity=medium&amp;id=692f6512ecdd9d4651b6b4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-npm-malware-attack-exposed-up-to-400-6efb9a71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%202.0%20NPM%20malware%20attack%20exposed%20up%20to%20400%2C000%20dev%20secrets&amp;severity=high&amp;id=692f5aa33b1ed793e3777f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-investment-platform-reputation-laundering-fel-2408de50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Investment%20Platform%20Reputation%20Laundering%3A%20Felix%20Markets&amp;severity=medium&amp;id=69301885e1f6412a905ea612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ipcola-a-tangled-mess-ade1e94f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IPCola%3A%20A%20Tangled%20Mess&amp;severity=medium&amp;id=69301885e1f6412a905ea5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salty2fa-tycoon2fa-hybrid-phishing-threat-59c5c85a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salty2FA%20%26%20Tycoon2FA%3A%20Hybrid%20Phishing%20Threat&amp;severity=medium&amp;id=69301bdbe1f6412a9062f6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62575-cwe-732-incorrect-permission-assign-f42fee2c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62575%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e7584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64778-cwe-798-use-of-hard-coded-credentia-aabd284f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64778%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e758d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-autonomously-finds-7-ffmpeg-vulnerabilities-e4767235</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Autonomously%20Finds%207%20FFmpeg%20Vulnerabilities&amp;severity=medium&amp;id=692f572f3b1ed793e36e769e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61940-cwe-603-in-mirion-medical-ec2-softw-5039d0fe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61940%3A%20CWE-603%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e7581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64298-cwe-732-incorrect-permission-assign-cfb58323</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64298%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e7587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64642-cwe-732-incorrect-permission-assign-634111cc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64642%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e758a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13658-cwe-94-improper-control-of-generati-128a847f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13658%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Industrial%20Video%20%26%20Control%20Longwatch&amp;severity=critical&amp;id=692f4367afa3b8e14e1402ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13510-cwe-306-missing-authentication-for--5529c5ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13510%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Iskra%20iHUB%20and%20iHUB%20Lite&amp;severity=critical&amp;id=692f3fe3afa3b8e14e0f8b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13542-cwe-269-improper-privilege-manageme-f7f7617b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13542%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20DesignThemes%20DesignThemes%20LMS&amp;severity=critical&amp;id=692f3fe3afa3b8e14e0f8b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13633-use-after-free-in-google-chrome-62a8e7d2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13633%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3c0ae0601f8fcd7fd7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13721-race-in-google-chrome-b3d1a5a2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13721%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=692f388ae0601f8fcd7a94f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13720-bad-cast-in-google-chrome-51116d11</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13720%3A%20Bad%20cast%20in%20Google%20Chrome&amp;severity=high&amp;id=692f388ae0601f8fcd7a94f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13640-inappropriate-implementation-in-goo-aec0d8fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13640%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=low&amp;id=692f3888e0601f8fcd7a94e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13639-inappropriate-implementation-in-goo-05006092</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13639%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3888e0601f8fcd7a94e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13638-use-after-free-in-google-chrome-be4f96c2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13638%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3888e0601f8fcd7a94de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13637-inappropriate-implementation-in-goo-506cdd51</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13637%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13636-inappropriate-implementation-in-goo-b9e1ebbd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13636%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13635-inappropriate-implementation-in-goo-2f08d906</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13635%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13634-inappropriate-implementation-in-goo-44eb0ccb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13634%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13632-inappropriate-implementation-in-goo-f4c332ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13632%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13631-inappropriate-implementation-in-goo-6b35b0c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13631%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3888e0601f8fcd7a94c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13630-type-confusion-in-google-chrome-6ca63907</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13630%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3888e0601f8fcd7a94c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61729-cwe-400-uncontrolled-resource-consu-cab160cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61729%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=692f388ae0601f8fcd7a9500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57850-incorrect-default-permissions-in-re-73698159</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57850%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Dev%20Spaces&amp;severity=medium&amp;id=692f388ae0601f8fcd7a94fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66468-cwe-79-improper-neutralization-of-i-c3881662</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66468%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aimeos%20ai-cms-grapesjs&amp;severity=high&amp;id=692f388ae0601f8fcd7a9506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34352-cwe-378-creation-of-temporary-file--0593710e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34352%3A%20CWE-378%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20JumpCloud%20Inc.%20Remote%20Assist&amp;severity=high&amp;id=692f3503e0601f8fcd752d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66454-cwe-321-use-of-hard-coded-cryptogra-a6049b44</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66454%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ArcadeAI%20arcade-mcp&amp;severity=medium&amp;id=692f3503e0601f8fcd752d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-claims-asus-breach-and-1tb-data-de1c2b86</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Claims%20ASUS%20Breach%20and%201TB%20Data%20Theft%20and%20Camera%20Source%20Code&amp;severity=high&amp;id=692f2e02e0601f8fcd6c881a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66416-cwe-1188-insecure-default-initializ-5b3049bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66416%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20modelcontextprotocol%20python-sdk&amp;severity=high&amp;id=692f388ae0601f8fcd7a9517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66414-cwe-1188-insecure-default-initializ-6f8d5c09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66414%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20modelcontextprotocol%20typescript-sdk&amp;severity=high&amp;id=692f388ae0601f8fcd7a9513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66409-cwe-125-out-of-bounds-read-in-espre-ad11dd44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66409%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20espressif%20esp-idf&amp;severity=low&amp;id=692f388ae0601f8fcd7a950a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52622-cwe-1188-initialization-of-a-resour-5281ccea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52622%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20HCL%20Software%20BigFix%20SaaS%20Remediate&amp;severity=medium&amp;id=692f2e1ae0601f8fcd6cf191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/india-orders-messaging-apps-to-work-only-with-acti-b8ec7336</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=India%20Orders%20Messaging%20Apps%20to%20Work%20Only%20With%20Active%20SIM%20Cards%20to%20Prevent%20Fraud%20and%20Misuse&amp;severity=medium&amp;id=692f364ce0601f8fcd788da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-calendly-invites-spoof-top-brands-to-hijack-a-f73337a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Calendly%20invites%20spoof%20top%20brands%20to%20hijack%20ad%20manager%20accounts&amp;severity=high&amp;id=692f23a13286267b25e22b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-capture-lazarus-apts-remote-worker-sch-57700cf7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Capture%20Lazarus%20APT&apos;s%20Remote-Worker%20Scheme%20Live%20on%20Camera&amp;severity=high&amp;id=692f23a13286267b25e22b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-strikes-israel-with-advanced-muddyviper-2334153d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20strikes%20Israel%20with%20advanced%20MuddyViper%20malware&amp;severity=medium&amp;id=692f23a13286267b25e22b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64750-cwe-61-unix-symbolic-link-symlink-f-68f3491c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64750%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20sylabs%20singularity&amp;severity=medium&amp;id=692f23d63286267b25e270f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-cheaters-use-rigged-deckmate-2-shuffling-machi-c7c59261</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20cheaters%20use%20rigged%20DeckMate%202%20shuffling%20machines%20in%20poker%20games%20%7C%20Kaspersky%20official%20blog&amp;severity=low&amp;id=692f1cc417aa519cfe209dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nk-hackers-push-200-malicious-npm-packages-with-ot-9aa70280</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NK%20Hackers%20Push%20200%20Malicious%20npm%20Packages%20with%20OtterCookie%20Malware&amp;severity=medium&amp;id=692f15ad17aa519cfe1668c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13877-use-of-hard-coded-cryptographic-key-7c398c0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13877%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20nocobase&amp;severity=medium&amp;id=692f0ffa16d939a309ce6a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12630-cwe-862-missing-authorization-in-up-c197e569</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12630%3A%20CWE-862%20Missing%20Authorization%20in%20Upload.am&amp;severity=medium&amp;id=692f0ffa16d939a309ce6a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58113-cwe-125-out-of-bounds-read-in-pdf-x-fa9855c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58113%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20Co.%20Ltd%20PDF-XChange%20Editor&amp;severity=medium&amp;id=692f093f16d939a309c3098d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64460-cwe-407-inefficient-algorithmic-com-67ad7ade</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64460%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=high&amp;id=692f093f16d939a309c309a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13372-cwe-89-improper-neutralization-of-s-aebb4096</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13372%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=medium&amp;id=692f093f16d939a309c3099b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13876-path-traversal-in-rareprob-hd-video-66867314</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13876%3A%20Path%20Traversal%20in%20Rareprob%20HD%20Video%20Player%20All%20Formats%20App&amp;severity=medium&amp;id=692f01f216d939a309b5f1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13875-path-traversal-in-yohann0617-oci-he-9fb91636</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13875%3A%20Path%20Traversal%20in%20Yohann0617%20oci-helper&amp;severity=medium&amp;id=692f01f216d939a309b5f1ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-capture-lazarus-apts-remote-worker-sch-089210a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Capture%20Lazarus%20APT&apos;s%20Remote-Worker%20Scheme%20Live%20on%20Camera&amp;severity=medium&amp;id=692f090716d939a309c2cf91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-returns-with-24-malicious-extensions-imp-4df0adc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20Returns%20with%2024%20Malicious%20Extensions%20Impersonating%20Popular%20Developer%20Tools&amp;severity=medium&amp;id=692f090716d939a309c2cf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-pennsylvania-confirms-new-data-breac-e921d302</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Pennsylvania%20confirms%20new%20data%20breach%20after%20Oracle%20hack&amp;severity=high&amp;id=692efea13a1612a93738ba41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snakes-by-the-riverbank-cfe5c4a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Snakes%20by%20the%20riverbank&amp;severity=medium&amp;id=69307ddeb129615efa1d7bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unraveling-water-sacis-new-multi-format-ai-enhance-47fb0232</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unraveling%20Water%20Saci&apos;s%20New%20Multi-Format%2C%20AI-Enhanced%20Attacks%20Propagated%20via%20WhatsApp&amp;severity=medium&amp;id=693076e4b129615efa107016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13505-cwe-79-improper-neutralization-of-i-08d63ef8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Datateam%20Information%20Technologies%20Inc.%20Datactive&amp;severity=medium&amp;id=692ef7463a1612a9372eef3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-package-uses-hidden-prompt-and-scrip-401387e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20Package%20Uses%20Hidden%20Prompt%20and%20Script%20to%20Evade%20AI%20Security%20Tools&amp;severity=medium&amp;id=692f090716d939a309c2cf97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41066-cwe-200-exposure-of-sensitive-infor-d3761bb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41066%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Horde%20Groupware&amp;severity=medium&amp;id=692ef3cb3a1612a937294c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13731-cwe-79-improper-neutralization-of-i-10f26bf0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13731%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20Nexter%20Extension%20%E2%80%93%20Security%2C%20Performance%2C%20Code%20Snippets%20%26%20Site%20Toolkit&amp;severity=medium&amp;id=692ef09b5ae7112264d5b08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-cops-are-using-flock-safetys-alpr-network-to-s-d43435cc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Cops%20Are%20Using%20Flock%20Safety&apos;s%20ALPR%20Network%20to%20Surveil%20Protesters%20and%20Activists&amp;severity=medium&amp;id=692ef0865ae7112264d5af97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-edge-extensions-caught-tracking-users-creat-e20163e4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%2C%20Edge%20Extensions%20Caught%20Tracking%20Users%2C%20Creating%20Backdoors&amp;severity=medium&amp;id=692ef06f5ae7112264d5ae48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13295-cwe-201-insertion-of-sensitive-info-0aead834</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13295%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Argus%20Technology%20Inc.%20BILGER&amp;severity=high&amp;id=692ef09b5ae7112264d5b09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-9m-yeth-exploit-how-16-wei-became-infinite-tok-7c241be6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20%249M%20yETH%20Exploit%3A%20How%2016%20Wei%20Became%20Infinite%20Tokens&amp;severity=critical&amp;id=692eecf55ae7112264d1dd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-hits-israeli-sectors-with-new--fea2a300</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Hit%20Israeli%20Sectors%20with%20New%20MuddyViper%20Backdoor%20in%20Targeted%20Attacks&amp;severity=medium&amp;id=692efe6f3a1612a93738610c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41086-cwe-639-authorization-bypass-throug-8f9fad01</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41086%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20AMS%20Development%20Corp.%20GAMS&amp;severity=medium&amp;id=692eecf35ae7112264d1dd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41015-cwe-200-exposure-of-sensitive-infor-f4771ec2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41015%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TCMAN%20GIM&amp;severity=medium&amp;id=692eecf35ae7112264d1dd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41014-cwe-200-exposure-of-sensitive-infor-aa49defe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41014%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TCMAN%20GIM&amp;severity=medium&amp;id=692eecf35ae7112264d1dd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41013-cwe-89-improper-neutralization-of-s-f1aeff9c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41013%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=high&amp;id=692eecf35ae7112264d1dd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41012-cwe-862-missing-authorization-in-tc-44d90a3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41012%3A%20CWE-862%20Missing%20Authorization%20in%20TCMAN%20GIM&amp;severity=high&amp;id=692ee9715ae7112264cd39c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40700-cwe-79-improper-neutralization-of-i-134adbb7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IDI%20Eikon%20Governalia&amp;severity=medium&amp;id=692ee9715ae7112264cd39c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11789-cwe-125-out-of-bounds-read-in-sge-p-f354691c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11789%3A%20CWE-125%20Out-of-bounds%20Read%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9715ae7112264cd39c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11788-cwe-122-heap-based-buffer-overflow--dc42eba6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11788%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9715ae7112264cd39bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11787-cwe-78-improper-neutralization-of-s-d52179af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11787%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd398e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11786-cwe-121-stack-based-buffer-overflow-5755912b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11786%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd398b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11785-cwe-121-stack-based-buffer-overflow-a0b7f11a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11785%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd3988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11784-cwe-121-stack-based-buffer-overflow-5033d87c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11784%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd3985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11783-cwe-121-stack-based-buffer-overflow-db329ef2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11783%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd3982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11782-cwe-121-stack-based-buffer-overflow-185fca02</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11782%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd397f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11781-cwe-321-use-of-hard-coded-cryptogra-35fce0bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11781%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd397c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11780-cwe-120-buffer-copy-without-checkin-92bbfbf9</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11780%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd3979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11779-cwe-121-stack-based-buffer-overflow-d7539e65</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11779%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=critical&amp;id=692ee9705ae7112264cd3976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11778-cwe-122-heap-based-buffer-overflow--acbe803a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11778%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=critical&amp;id=692ee9705ae7112264cd3973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13879-cwe-22-improper-limitation-of-a-pat-848a5ff8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13879%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SOLIDserver%20SOLIDserver%20IPAM&amp;severity=medium&amp;id=692edee35ae7112264c4ce02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12465-cwe-89-improper-neutralization-of-s-0c9c5a83</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12465%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=high&amp;id=692edb645ae7112264c240c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-openai-coding-agent-could-facilit-00a6797b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20OpenAI%20Coding%20Agent%20Could%20Facilitate%20Attacks%20on%20Developers&amp;severity=medium&amp;id=692ed7d35ae7112264c0ae64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proxyearth-tool-lets-anyone-trace-location-of-user-b0216d58</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Proxyearth%20Tool%20Lets%20Anyone%20Trace%20Location%20of%20Users%20in%20India%20with%20Just%20a%20Mobile%20Number&amp;severity=medium&amp;id=692ed4555ae7112264bed510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13090-cwe-89-improper-neutralization-of-s-1fee9c78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13090%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdirectorykit%20WP%20Directory%20Kit&amp;severity=medium&amp;id=692ed0d35ae7112264bc9d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-107-android-flaws-including-two-fra-75ab0a8c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20107%20Android%20Flaws%2C%20Including%20Two%20Framework%20Bugs%20Exploited%20in%20the%20Wild&amp;severity=high&amp;id=692ec9c95ae7112264b9022a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13353-cwe-330-use-of-insufficiently-rando-d49b9655</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13353%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Cloudflare%20gokey&amp;severity=high&amp;id=692ec9d25ae7112264b9032e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41742-cwe-1394-use-of-default-cryptograph-af68d0ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41742%3A%20CWE-1394%20Use%20of%20Default%20Cryptographic%20Key%20in%20Sprecher%20Automation%20SPRECON-E-C&amp;severity=critical&amp;id=692ef5303a1612a9372cbab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/personal-information-of-337-million-stolen-from-co-1c313a96</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Personal%20Information%20of%2033.7%20Million%20Stolen%20From%20Coupang&amp;severity=medium&amp;id=692ec2bb5ae7112264afaae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41743-cwe-326-inadequate-encryption-stren-0959ce89</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41743%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Sprecher%20Automation%20SPRECON-E-C&amp;severity=medium&amp;id=692ef5303a1612a9372cbab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41744-cwe-1394-use-of-default-cryptograph-b679cc53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41744%3A%20CWE-1394%20Use%20of%20Default%20Cryptographic%20Key%20in%20Sprecher%20Automation%20SPRECON-E-C&amp;severity=critical&amp;id=692ef5303a1612a9372cbab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/situsamc-cyberattack-exposes-client-data-third-par-fd1c6535</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22SitusAMC%20Cyberattack%20Exposes%20Client%20Data%3A%20Third-Party%20Risks%20%26%20AI%20Threats%20in%20Focus%22&amp;severity=medium&amp;id=692ebbb95ae7112264a68f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-hackers-use-npmscancom-to-hack-web-apps-nextjs-f3c31266</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Hackers%20Use%20NPMSCan.com%20to%20Hack%20Web%20Apps%20(Next.js%2C%20Nuxt.js%2C%20React%2C%20Bun)&amp;severity=high&amp;id=692ebbce5ae7112264a691db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13873-cwe-79-improper-neutralization-of-i-ad3a0937</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ObjectPlanet%20Opinio&amp;severity=medium&amp;id=692ebbcb5ae7112264a69121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13872-cwe-918-server-side-request-forgery-e9d4de2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13872%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ObjectPlanet%20Opinio&amp;severity=low&amp;id=692ebbcb5ae7112264a6911e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13871-cwe-352-cross-site-request-forgery--4adbe25f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13871%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ObjectPlanet%20Opinio&amp;severity=low&amp;id=692eb8375ae7112264a43086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/androids-december-2025-updates-patch-two-zero-days-78243fb8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Zero-Days%20Patched%20in%20December%202025%20Security%20Update&amp;severity=medium&amp;id=692eb4ab5ae7112264a2108b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13516-cwe-434-unrestricted-upload-of-file-a39e78b7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13516%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20brainstormforce%20SureMail%20%E2%80%93%20SMTP%20and%20Email%20Logs%20Plugin%20with%20Amazon%20SES%2C%20Postmark%2C%20and%20Other%20Providers&amp;severity=high&amp;id=692ef5303a1612a9372cbaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13724-cwe-89-improper-neutralization-of-s-af5f6c3d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13724%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20e4jvikwp%20VikRentCar%20Car%20Rental%20Management%20System&amp;severity=high&amp;id=692ef5303a1612a9372cbac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13534-cwe-269-improper-privilege-manageme-a9dce4b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13534%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=692ef5303a1612a9372cbac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10543-cwe-681-incorrect-conversion-betwee-902262b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10543%3A%20CWE-681%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Eclipse%20Foundation%20paho.mqtt.golang%20(Go%20MQTT%20v3.1%20library)&amp;severity=medium&amp;id=692ef09b5ae7112264d5b098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10971-cwe-922-insecure-storage-of-sensiti-7613a2bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10971%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20FERMAX%20ELECTR%C3%93NICA%20S.A.U%20MeetMe&amp;severity=high&amp;id=692e9c175ae7112264944d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11726-cwe-862-missing-authorization-in-be-0f3b40f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11726%3A%20CWE-862%20Missing%20Authorization%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=692e98935ae71122648fbfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13696-cwe-200-exposure-of-sensitive-infor-8cce1899</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13696%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20softdiscover%20Zigaform%20%E2%80%93%20Price%20Calculator%20%26%20Cost%20Estimation%20Form%20Builder%20Lite&amp;severity=medium&amp;id=692e98935ae71122648fbfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-107-android-flaws-including-two-fra-69b5356f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20107%20Android%20Flaws%2C%20Including%20Two%20Framework%20Bugs%20Exploited%20in%20the%20Wild&amp;severity=high&amp;id=692efe6f3a1612a937386112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12483-cwe-89-improper-neutralization-of-s-434bf61e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12483%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeisle%20Visualizer%3A%20Tables%20and%20Charts%20Manager%20for%20WordPress&amp;severity=medium&amp;id=692e8e125ae71122647f9683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13140-cwe-352-cross-site-request-forgery--64a8b2f4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13140%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=692e8e125ae71122647f9691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13685-cwe-352-cross-site-request-forgery--7fd5717c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13685%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Photo%20Gallery%20by%20Ays%20%E2%80%93%20Responsive%20Image%20Gallery&amp;severity=medium&amp;id=692e8e125ae71122647f9696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13007-cwe-79-improper-neutralization-of-i-eeed28e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13007%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adreastrian%20WP%20Social%20Ninja%20%E2%80%93%20Embed%20Social%20Feeds%2C%20User%20Reviews%20%26%20Chat%20Widgets&amp;severity=medium&amp;id=692e8e125ae71122647f9689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13001-cwe-89-sql-injection-in-donation-bc21badc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13001%3A%20CWE-89%20SQL%20Injection%20in%20donation&amp;severity=medium&amp;id=692e8375fdda6c2fef754182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13000-cwe-89-sql-injection-in-db-access-bbe27b8d</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13000%3A%20CWE-89%20SQL%20Injection%20in%20db-access&amp;severity=high&amp;id=692e8375fdda6c2fef75417e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13606-cwe-352-cross-site-request-forgery--3b3b15bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13606%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smackcoders%20Export%20All%20Posts%2C%20Products%2C%20Orders%2C%20Refunds%20%26%20Users&amp;severity=medium&amp;id=692e6edbf8429d84f3bf2bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13387-cwe-79-improper-neutralization-of-i-26c42757</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Kadence%20WooCommerce%20Email%20Designer&amp;severity=high&amp;id=692e6edbf8429d84f3bf2bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20789-cwe-201-information-exposure-throug-ae3c1cd0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20789%3A%20CWE-201%20Information%20Exposure%20Through%20Sent%20Data%20in%20MediaTek%2C%20Inc.%20MT6781%2C%20MT6833%2C%20MT6853%2C%20MT6877%2C%20MT6893%2C%20MT8196&amp;severity=medium&amp;id=692e57b3f2f793a7de7f602c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20788-cwe-1262-improper-access-control-fo-1c04acbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20788%3A%20CWE-1262%20Improper%20Access%20Control%20for%20Register%20Interface%20in%20MediaTek%2C%20Inc.%20MT6991%2C%20MT8196&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20777-cwe-787-out-of-bounds-write-in-medi-6bd6db28</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20777%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8188%2C%20MT8196%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8796%2C%20MT8798%2C%20MT8873%2C%20MT8883&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20776-cwe-125-out-of-bounds-read-in-media-eafc648d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20776%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8188%2C%20MT8196%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8796%2C%20MT8798%2C%20MT8873%2C%20MT8883&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20775-cwe-415-double-free-in-mediatek-inc-5c572c82</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20775%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8188%2C%20MT8196%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8796%2C%20MT8798%2C%20MT8873%2C%20MT8883&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20774-cwe-122-heap-overflow-in-mediatek-i-80054830</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20774%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=medium&amp;id=692e57b3f2f793a7de7f601d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20773-cwe-415-double-free-in-mediatek-inc-5da0d224</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20773%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=medium&amp;id=692e57b3f2f793a7de7f601a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20772-cwe-415-double-free-in-mediatek-inc-f6e6f2a8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20772%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8188%2C%20MT8196%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8796%2C%20MT8798%2C%20MT8873%2C%20MT8883&amp;severity=medium&amp;id=692e57b1f2f793a7de7f5f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20771-cwe-457-use-of-uninitialized-variab-fd9ecaec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20771%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=medium&amp;id=692e57b1f2f793a7de7f5f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20770-cwe-416-use-after-free-in-mediatek--dfa1302a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20770%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=medium&amp;id=692e57b1f2f793a7de7f5f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20769-cwe-121-stack-overflow-in-mediatek--366ff4de</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20769%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=low&amp;id=692e57b1f2f793a7de7f5f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20768-cwe-125-out-of-bounds-read-in-media-6973298f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20768%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20767-cwe-787-out-of-bounds-write-in-medi-f40a52d0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20767%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20766-cwe-457-use-of-uninitialized-variab-4d6ad914</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20766%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20765-cwe-415-double-free-in-mediatek-inc-fc58df29</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20765%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6980D%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8113%2C%20MT8115%2C%20MT8139%2C%20MT8163%2C%20MT8168%2C%20MT8169%2C%20MT8183%2C%20MT8186%2C%20MT8188%2C%20MT8512%2C%20MT8516%2C%20MT8518%2C%20MT8519%2C%20MT8532%2C%20MT8676%2C%20MT8678%2C%20MT8695%2C%20MT8696%2C%20MT8698&amp;severity=medium&amp;id=692e57b1f2f793a7de7f5f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20764-cwe-787-out-of-bounds-write-in-medi-5213981f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20764%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793%2C%20MT8796%2C%20MT8873%2C%20MT8893&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20763-cwe-787-out-of-bounds-write-in-medi-0073e8ce</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20763%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793%2C%20MT8796%2C%20MT8873%2C%20MT8893&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20750-cwe-476-null-pointer-dereference-in-111d2e82</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20750%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20751-cwe-787-out-of-bounds-write-in-medi-77ba213f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20751%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20791-cwe-617-reachable-assertion-in-medi-4554b767</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20791%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20752-cwe-617-reachable-assertion-in-medi-6a79c733</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20752%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8676%2C%20MT8791T&amp;severity=medium&amp;id=692e57aff2f793a7de7f5efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20756-cwe-1287-specified-type-in-mediatek-e71a999f</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20756%3A%20CWE-1287%20Specified%20Type%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20757-cwe-617-reachable-assertion-in-medi-520122b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20757%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20758-cwe-248-uncaught-exception-in-media-1425e72a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20758%3A%20CWE-248%20Uncaught%20Exception%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20759-cwe-125-out-of-bounds-read-in-media-504bed14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20759%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8673%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8893&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20790-cwe-476-null-pointer-dereference-in-a133528c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20790%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57b3f2f793a7de7f602f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20755-cwe-476-null-pointer-dereference-in-6fd41c4a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20755%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20754-cwe-248-uncaught-exception-in-media-09981611</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20754%3A%20CWE-248%20Uncaught%20Exception%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20753-cwe-248-uncaught-exception-in-media-4f0f0048</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20753%3A%20CWE-248%20Uncaught%20Exception%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20792-cwe-617-reachable-assertion-in-medi-4f615484</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20792%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8791T&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/need-guidance-where-to-take-report-on-15-potential-2c128138</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Need%20Guidance%3A%20Where%20to%20take%20report%20on%2015%20potential%20Linux%20Kernel%20%2F%20VFS%20Vulnerabilities%20(including%20LPE%20Race%20Condition%20fix)&amp;severity=critical&amp;id=692e50a8f2f793a7de7cda65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45675-cwe-309-use-of-password-system-for--17a54da6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45675%3A%20CWE-309%20Use%20of%20Password%20System%20for%20Primary%20Authentication%20in%20IBM%20Informix%20Dynamic%20Server&amp;severity=high&amp;id=692e50a4f2f793a7de7cda09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13697-cwe-79-improper-neutralization-of-i-a015aa89</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpblockart%20BlockArt%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20Blocks%20%2CWordPress%20Block%20Plugin%2C%20Sections%20%26%20Template%20Library&amp;severity=medium&amp;id=692e50a4f2f793a7de7cda11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12529-cwe-73-external-control-of-file-nam-e14e9285</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12529%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20stylemix%20Cost%20Calculator%20Builder&amp;severity=high&amp;id=692e50a4f2f793a7de7cda0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55129-vulnerability-in-revive-revive-adse-6a3ffc38</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55129%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=692e499df2f793a7de78511f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58488-cwe-940-improper-verification-of-so-b739ed9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58488%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Samsung%20Mobile%20SmartTouchCall&amp;severity=medium&amp;id=692e499ef2f793a7de785153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58487-cwe-285-improper-authorization-in-s-16ba15ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58487%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=medium&amp;id=692e499ef2f793a7de785150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58486-cwe-20-improper-input-validation-in-b2d5ff3b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58486%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=medium&amp;id=692e499ef2f793a7de78514d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58485-cwe-20-improper-input-validation-in-abf348ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58485%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Internet&amp;severity=medium&amp;id=692e499ef2f793a7de78514a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58484-cwe-276-incorrect-default-permissio-a2cf9060</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58484%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Samsung%20Mobile%20Samsung%20Cloud%20Assistant&amp;severity=medium&amp;id=692e499ef2f793a7de785147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58483-cwe-926-improper-export-of-android--77735cea</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58483%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Galaxy%20Store%20for%20Galaxy%20Watch&amp;severity=medium&amp;id=692e499ef2f793a7de785144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58482-cwe-284-improper-access-control-in--fdb0f591</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58482%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20MotionPhoto&amp;severity=high&amp;id=692e499ef2f793a7de785141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58481-cwe-284-improper-access-control-in--99bb086b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58481%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20MotionPhoto&amp;severity=high&amp;id=692e499df2f793a7de785134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58480-cwe-122-heap-based-buffer-overflow--cd04d6b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58480%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58479-cwe-125-out-of-bounds-read-in-samsu-4d5d215c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58479%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de78512e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58478-cwe-787-out-of-bounds-write-in-sams-3c904326</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58478%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de78512b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58477-cwe-787-out-of-bounds-write-in-sams-39144dd8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58477%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58476-cwe-125-out-of-bounds-read-in-samsu-145f9b6a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58476%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58475-cwe-20-improper-input-validation-in-6e0122f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58475%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21080-cwe-926-improper-export-of-android--144c456a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21080%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de78511c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21072-cwe-787-out-of-bounds-write-in-sams-6b26598c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21072%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-malware-returns-in-third-wave-of-malicio-1726810a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Glassworm%20malware%20returns%20in%20third%20wave%20of%20malicious%20VS%20Code%20packages&amp;severity=high&amp;id=692e3805f2f793a7de175e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-02-f9395fb4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-02&amp;severity=medium&amp;id=692f8089619fec35b42a60bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65657-na-8a528a6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65657%3A%20n%2Fa&amp;severity=medium&amp;id=692f54d5c92f9eed9394b385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65380-na-68be8bb4</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65380%3A%20n%2Fa&amp;severity=medium&amp;id=692f54d5c92f9eed9394b381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65379-na-fe06e323</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65379%3A%20n%2Fa&amp;severity=medium&amp;id=692f4a55c92f9eed9384ceea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65877-na-9d14b7ac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65877%3A%20n%2Fa&amp;severity=high&amp;id=692f4367afa3b8e14e1402b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60736-na-e7416105</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60736%3A%20n%2Fa&amp;severity=critical&amp;id=692f3dc6afa3b8e14e0c8d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65896-na-118d4658</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65896%3A%20n%2Fa&amp;severity=critical&amp;id=692f3503e0601f8fcd752d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58386-na-d356c279</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58386%3A%20n%2Fa&amp;severity=critical&amp;id=692f2e1ae0601f8fcd6cf194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65844-na-b6ac5ae3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65844%3A%20n%2Fa&amp;severity=high&amp;id=692f2aab3286267b25ed5c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65215-na-13df7342</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65215%3A%20n%2Fa&amp;severity=medium&amp;id=692f279a3286267b25e84bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65881-na-a05acd27</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65881%3A%20n%2Fa&amp;severity=medium&amp;id=692f279a3286267b25e84bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60854-na-5e201724</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60854%3A%20n%2Fa&amp;severity=critical&amp;id=692f279a3286267b25e84bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpipam-16-reflected-cross-site-scripting-xss-d11c911e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpIPAM%201.6%20-%20Reflected%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=692f27653286267b25e74000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpipam-16-reflected-cross-site-scripting-xss-d6e123a0</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpIPAM%201.6%20-%20Reflected-Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=692f27653286267b25e73ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/piwigo-1360-sql-injection-98ccb474</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Piwigo%2013.6.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=692f27653286267b25e73ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpipam-151-sql-injection-0fa2586a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpIPAM%201.5.1%20-%20SQL%20Injection&amp;severity=medium&amp;id=692f27653286267b25e73ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-317-reflected-cross-site-scripting-xss-301a3518</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFAQ%20%203.1.7%20-%20Reflected%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=692f27653286267b25e73fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yourls-182-cross-site-request-forgery-csrf-6a2d795f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YOURLS%201.8.2%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=692f27653286267b25e73fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64070-na-579bf546</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64070%3A%20n%2Fa&amp;severity=medium&amp;id=692f1cb917aa519cfe209c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65656-na-b5067d2e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65656%3A%20n%2Fa&amp;severity=critical&amp;id=692f193817aa519cfe1ae18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65358-na-5f9ee883</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65358%3A%20n%2Fa&amp;severity=critical&amp;id=692f15bf17aa519cfe1691ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65186-na-26103630</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65186%3A%20n%2Fa&amp;severity=medium&amp;id=692f11fa0eb63243a5f7cdc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65187-na-412c2a0e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65187%3A%20n%2Fa&amp;severity=medium&amp;id=692f0ffa16d939a309ce6a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63872-na-9944c6df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63872%3A%20n%2Fa&amp;severity=medium&amp;id=692f093f16d939a309c30998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59704-na-a43f8136</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59704%3A%20n%2Fa&amp;severity=high&amp;id=692f093f16d939a309c30994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59703-na-b58b08e5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59703%3A%20n%2Fa&amp;severity=critical&amp;id=692f093f16d939a309c30990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59698-na-bcdf4ccc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59698%3A%20n%2Fa&amp;severity=medium&amp;id=692efeb83a1612a93738c05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59697-na-c5de3a1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59697%3A%20n%2Fa&amp;severity=high&amp;id=692efeb83a1612a93738c05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59696-na-b428a79d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59696%3A%20n%2Fa&amp;severity=low&amp;id=692efeb83a1612a93738c057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59702-na-f2b622de</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59702%3A%20n%2Fa&amp;severity=high&amp;id=692efeb83a1612a93738c053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59701-na-130cae0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59701%3A%20n%2Fa&amp;severity=medium&amp;id=692efeb83a1612a93738c04f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59700-na-0d816107</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59700%3A%20n%2Fa&amp;severity=medium&amp;id=692efeb83a1612a93738c04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59699-na-1adaa270</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59699%3A%20n%2Fa&amp;severity=medium&amp;id=692efeb83a1612a93738c047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59705-na-50a8aa71</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59705%3A%20n%2Fa&amp;severity=medium&amp;id=692eface3a1612a93732ddee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59695-na-21b8a579</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59695%3A%20n%2Fa&amp;severity=critical&amp;id=692eface3a1612a93732ddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59694-na-90898d44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59694%3A%20n%2Fa&amp;severity=medium&amp;id=692eface3a1612a93732dde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59693-na-02d041fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59693%3A%20n%2Fa&amp;severity=critical&amp;id=692eface3a1612a93732dde2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65858-na-96a43481</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65858%3A%20n%2Fa&amp;severity=low&amp;id=692ef09b5ae7112264d5b095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-hunting-for-sharepoint-in-memory-f8d88bbf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads%2C%20(Tue%2C%20Dec%202nd)&amp;severity=medium&amp;id=692e26e43bec74f1ee0bf6ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66448-cwe-94-improper-control-of-generati-02908ecd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66448%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=692e1c816dbd3477d752f01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66401-cwe-78-improper-neutralization-of-s-6ace6b6d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66401%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kapilduraphe%20mcp-watch&amp;severity=critical&amp;id=692e1c816dbd3477d752f017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66415-cwe-441-unintended-proxy-or-interme-7fa1f179</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66415%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20fastify%20fastify-reply-from&amp;severity=medium&amp;id=692e1c816dbd3477d752f020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66410-cwe-22-improper-limitation-of-a-pat-667bc08e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66410%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flipped-aurora%20gin-vue-admin&amp;severity=high&amp;id=692e19186dbd3477d74d63d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66405-cwe-918-server-side-request-forgery-f0bcd980</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66405%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Portkey-AI%20gateway&amp;severity=medium&amp;id=692e19186dbd3477d74d63cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66403-cwe-79-improper-neutralization-of-i-474b9419</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66403%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20error311%20FileRise&amp;severity=medium&amp;id=692e15786dbd3477d748216e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66400-cwe-20-improper-input-validation-in-d862827f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66400%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20syntax-tree%20mdast-util-to-hast&amp;severity=medium&amp;id=692e15786dbd3477d7482169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66313-cwe-89-improper-neutralization-of-s-99cc37fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66313%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=692e15786dbd3477d7482165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66312-cwe-79-improper-neutralization-of-i-52d6d84c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66312%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e19186dbd3477d74d63e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66311-cwe-79-improper-neutralization-of-i-d58403cc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66311%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e19186dbd3477d74d63e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66310-cwe-79-improper-neutralization-of-i-6ec75368</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66310%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e19186dbd3477d74d63dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66309-cwe-79-improper-neutralization-of-i-d347b8ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66309%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e19186dbd3477d74d63d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66308-cwe-79-improper-neutralization-of-i-c716202d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66308%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e11fe6dbd3477d7432f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66307-cwe-204-observable-response-discrep-df950e09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66307%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e11fe6dbd3477d7432f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66306-cwe-639-authorization-bypass-throug-ecfb8a43</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66306%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0ef03937fa579fe46181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66305-cwe-248-uncaught-exception-in-getgr-63ff439d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66305%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0ef03937fa579fe4618a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66304-cwe-200-exposure-of-sensitive-infor-be139073</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66304%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0ef03937fa579fe46185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66303-cwe-400-uncontrolled-resource-consu-1165153b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66303%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0bb43937fa579fdf7d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66302-cwe-22-improper-limitation-of-a-pat-ad183ec0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66302%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0bb43937fa579fdf7d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66301-cwe-285-improper-authorization-in-g-76821d69</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66301%3A%20CWE-285%3A%20Improper%20Authorization%20in%20getgrav%20grav&amp;severity=high&amp;id=692e0bb43937fa579fdf7d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66300-cwe-22-improper-limitation-of-a-pat-3b3b1e15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66300%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getgrav%20grav&amp;severity=high&amp;id=692e07e33937fa579fd7fc6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66299-cwe-94-improper-control-of-generati-cff7c66d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66299%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20getgrav%20grav&amp;severity=high&amp;id=692e07e33937fa579fd7fc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66298-cwe-1336-improper-neutralization-of-b5584524</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66298%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20getgrav%20grav&amp;severity=high&amp;id=692e0bb43937fa579fdf7d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66297-cwe-1336-improper-neutralization-of-ca26f562</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66297%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20getgrav%20grav&amp;severity=high&amp;id=692e048c3937fa579fd2924c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66296-cwe-266-incorrect-privilege-assignm-c7ee3281</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66296%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20getgrav%20grav&amp;severity=high&amp;id=692e048c3937fa579fd29248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/retail-giant-coupang-data-breach-impacts-337-milli-757a5e1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Retail%20giant%20Coupang%20data%20breach%20impacts%2033.7%20million%20customers&amp;severity=high&amp;id=692e04673937fa579fd1ccd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadypanda-turns-popular-browser-extensions-with-4-ab37b14b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadyPanda%20Turns%20Popular%20Browser%20Extensions%20with%204.3%20Million%20Installs%20Into%20Spyware&amp;severity=high&amp;id=692e04673937fa579fd1ccdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66294-cwe-94-improper-control-of-generati-47fe02a3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66294%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20getgrav%20grav&amp;severity=high&amp;id=692e048c3937fa579fd29254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66295-cwe-22-improper-limitation-of-a-pat-5e7aa583</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66295%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getgrav%20grav&amp;severity=high&amp;id=692e0147821c4e4a8f8d8923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51999-cwe-915-improperly-controlled-modif-de89690f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51999&amp;severity=null&amp;id=692dfa38821c4e4a8f7fb95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55749-cwe-284-improper-access-control-in--b07fde79</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55749%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=692dfa38821c4e4a8f7fb963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arkanix-stealer-newly-discovered-short-term-profit-57314659</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arkanix%20Stealer%3A%20Newly%20discovered%20short%20term%20profit%20malware&amp;severity=medium&amp;id=692e048b3937fa579fd280c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11772-cwe-427-uncontrolled-search-path-el-55e3b0b7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11772%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Synaptics%20Synaptics%20Fingerprint%20Driver&amp;severity=medium&amp;id=692de5b91fcc71981e9338bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-data-breach-affects-all-337-million-south--a5486ab4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20Data%20Breach%20Affects%20All%2033.7%20Million%20South%20Korean%20Accounts&amp;severity=high&amp;id=692de2311fcc71981e8d6763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13837-vulnerability-in-python-software-fo-1d6cc1b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13837%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=692ddb371fcc71981e81acf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13836-vulnerability-in-python-software-fo-68751bab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13836%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=692ddb371fcc71981e81acee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13653-cwe-200-exposure-of-sensitive-infor-3e318179</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13653%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=692ddb371fcc71981e81acea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13835-cwe-79-improper-neutralization-of-i-c7e0abf6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13835%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=medium&amp;id=692dd814d2272025770082fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/india-orders-phone-makers-to-pre-install-sanchar-s-baaa0fbd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=India%20Orders%20Phone%20Makers%20to%20Pre-Install%20Government%20App%20to%20Tackle%20Telecom%20Fraud&amp;severity=low&amp;id=692de2321fcc71981e8d67c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadypanda-turns-popular-browser-extensions-with-4-c399d778</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadyPanda%20Turns%20Popular%20Browser%20Extensions%20with%204.3%20Million%20Installs%20Into%20Spyware&amp;severity=medium&amp;id=692de2321fcc71981e8d67c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-analysis-and-community-resources-0345aab9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai%20Hulud%202.0%3A%20Analysis%20and%20Community%20Resources&amp;severity=medium&amp;id=692dd10bd227202577f65ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kaspersky-embedded-systems-security-whats-new-a01c11ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kaspersky%20Embedded%20Systems%20Security%3A%20what%E2%80%99s%20new%3F&amp;severity=medium&amp;id=692dcd99d227202577f153ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7007-cwe-476-null-pointer-dereference-in--a49d01a3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7007%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Avast%20Antivirus&amp;severity=high&amp;id=692dc6d195b0bac45943a6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-seize-cryptomixer-domains-infrastructure-an-0bfa42e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20Seize%20Cryptomixer%20Domains%2C%20Infrastructure%20and%2028%20Million%20Dollars%20in%20Bitcoin&amp;severity=medium&amp;id=692dc34695b0bac4593f5e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3500-cwe-190-integer-overflow-or-wraparou-15cc1095</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3500%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Avast%20Antivirus&amp;severity=critical&amp;id=692dbfd095b0bac45939d90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64775-cwe-459-incomplete-cleanup-in-apach-b1583f8f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64775%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Apache%20Software%20Foundation%20Apache%20Struts&amp;severity=high&amp;id=692dbfd095b0bac45939d90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/facial-recognitions-trust-problem-4e753531</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Facial%20Recognition%E2%80%99s%20Trust%20Problem&amp;severity=medium&amp;id=692dbc8df910530b0eb7ec68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8351-cwe-122-heap-based-buffer-overflow-i-5f121e14</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8351%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Avast%20Antivirus&amp;severity=critical&amp;id=692dbca6f910530b0eb80df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13829-cwe-863-incorrect-authorization-in--d808720b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13829%3A%20CWE-863%20Incorrect%20Authorization%20in%20Data%20Illusion%20Zumbrunn%20NGSurvey&amp;severity=high&amp;id=692dbca6f910530b0eb80dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-audit-of-openexr-luma-39bc6d64</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Audit%20of%20OpenEXR%20%C2%B7%20Luma&amp;severity=medium&amp;id=692db92bf910530b0eb07489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/29-million-worth-of-bitcoin-seized-in-cryptomixer--f2d13741</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2429%20Million%20Worth%20of%20Bitcoin%20Seized%20in%20Cryptomixer%20Takedown&amp;severity=medium&amp;id=692db909f910530b0eb041f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10101-cwe-122-heap-based-buffer-overflow--b6644347</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10101%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Avast%20Antivirus&amp;severity=high&amp;id=692db924f910530b0eb071f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48894-cwe-319-cleartext-transmission-of-s-acb6698c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48894%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=medium&amp;id=692db924f910530b0eb071ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53684-cwe-352-cross-site-request-forgery--5fa517fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53684%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db924f910530b0eb071f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45370-cwe-302-authentication-bypass-by-as-cfcb00b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45370%3A%20CWE-302%3A%20Authentication%20Bypass%20by%20Assumed-Immutable%20Data%20in%20Socomec%20Easy%20Config%20System&amp;severity=high&amp;id=692db924f910530b0eb071e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49572-cwe-306-missing-authentication-for--b9b4b470</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49572%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db924f910530b0eb071ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48882-cwe-306-missing-authentication-for--762d1d21</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48882%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db924f910530b0eb071e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20085-cwe-306-missing-authentication-for--fdda7e86</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20085%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db924f910530b0eb071f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23417-cwe-306-missing-authentication-for--d7fcc15a</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23417%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db926f910530b0eb07232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26858-cwe-20-improper-input-validation-in-6b75cc84</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26858%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db926f910530b0eb07236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54851-cwe-306-missing-authentication-for--c55748de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54851%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb07243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54850-cwe-306-missing-authentication-for--0067071b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54850%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb07240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54849-cwe-306-missing-authentication-for--5f7458e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54849%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb0723d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54848-cwe-306-missing-authentication-for--e730799d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54848%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb0723a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55222-cwe-306-missing-authentication-for--a587d2b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55222%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb07249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55221-cwe-306-missing-authentication-for--2e378d65</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55221%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb07246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11699-cwe-613-insufficient-session-expira-8507906b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11699%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20nopSolutions%20nopCommerce&amp;severity=high&amp;id=692dbca6f910530b0eb80e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13129-cwe-841-improper-enforcement-of-beh-c1e3fbde</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13129%3A%20CWE-841%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Seneka%20Software%20Hardware%20Information%20Technology%20Trade%20Contracting%20and%20Industry%20Ltd.%20Co.%20Onaylar%C4%B1m&amp;severity=medium&amp;id=692da9695a8d386a3dbfed8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-albiriox-android-malware-developed-by-russian--de62543a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Albiriox%20Android%20Malware%20Developed%20by%20Russian%20Cybercriminals&amp;severity=medium&amp;id=692da9415a8d386a3dbf6d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gitlab-surpasses-bitbucket-in-leaked-secrets-micro-a2eab245</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitLab%20Surpasses%20Bitbucket%20in%20Leaked%20Secrets%2C%20Microsoft%20Introduces%20Copilot%20Studio%20Security%2C%20Amazon%20Enhances%20Global%20DNS&amp;severity=medium&amp;id=692da9585a8d386a3dbf9dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-deletes-x-post-after-getting-caught-using-a-0e585ce6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20deletes%20X%20post%20after%20getting%20caught%20using%20a%20%E2%80%98stolen%E2%80%99%20AI%20recipe%20infographic&amp;severity=high&amp;id=692da0ff17445d7f7a5a7ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-i-found-a-europaeu-compromise-6f3ee22f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20i%20found%20a%20europa.eu%20compromise&amp;severity=medium&amp;id=692da11017445d7f7a5a888b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evil-twin-wifi-hacker-jailed-for-7-years-after-ste-ea8242dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evil%20Twin%20Wi%E2%80%91Fi%20Hacker%20Jailed%20for%207%20Years%20After%20Stealing%20Data%20Mid%E2%80%91Flight&amp;severity=medium&amp;id=692d9a06038b4a5c0ddaa39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61260-openai-codex-cli-command-injection--ad7df2f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61260%20%E2%80%94%20OpenAI%20Codex%20CLI%3A%20Command%20Injection%20via%20Project-Local%20Configuration&amp;severity=low&amp;id=692d9685038b4a5c0dd28ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-hot-cves-npm-worm-returns-firefox-rce-db11a4e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Hot%20CVEs%2C%20npm%20Worm%20Returns%2C%20Firefox%20RCE%2C%20M365%20Email%20Raid%20%26%20More&amp;severity=medium&amp;id=692d965a038b4a5c0dd2435c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bind-link-edr-tampering-18e69f87</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bind%20Link%20%E2%80%93%20EDR%20Tampering&amp;severity=medium&amp;id=692d8f86038b4a5c0dc8f34c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-the-agentic-trojan-horse-why-the-new-ai-br-06d8bd6a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20The%20%22Agentic%22%20Trojan%20Horse%3A%20Why%20the%20New%20AI%20Browsers%20War%20is%20a%20Nightmare%20for%20Security%20Teams&amp;severity=medium&amp;id=692d8554110e7c684f803955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13296-cwe-352-cross-site-request-forgery--16c6c40c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13296%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tekrom%20Technology%20Inc.%20T-Soft%20E-Commerce&amp;severity=medium&amp;id=692d821d110e7c684f7933a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-an-openplc-scadabr-flaw-to-its-known--10a9bb2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20an%20OpenPLC%20ScadaBR%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=692d81e0110e7c684f77d0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-takes-down-cryptomixer-cryptocurrency-mixin-312e3713</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20takes%20down%20Cryptomixer%20cryptocurrency%20mixing%20service&amp;severity=high&amp;id=692d81e0110e7c684f77d0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/royal-borough-of-kensington-and-chelsea-reveals-da-2fa26a5e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Royal%20Borough%20of%20Kensington%20and%20Chelsea%20Reveals%20Data%20Breach&amp;severity=high&amp;id=692d81e0110e7c684f77d0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australian-man-gets-seven-years-for-running-evil-t-eddb5f05</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australian%20Man%20Gets%20Seven%20Years%20for%20Running%20%E2%80%9CEvil%20Twin%E2%80%9D%20Wi-Fi&amp;severity=high&amp;id=692d81e0110e7c684f77d0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58408-cwe-cwe-416-use-after-free-418-in-i-bac39c4b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58408%3A%20CWE%20-%20CWE-416%3A%20Use%20After%20Free%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=692d7afd8a708c3c5e993c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-scadabr-vulnerability-after-hacktivi-45b8de12</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20ScadaBR%20Vulnerability%20After%20Hacktivist%20ICS%20Attack&amp;severity=medium&amp;id=692d775b8a708c3c5e9240b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41070-cwe-79-in-sanoma-clickedu-afaaec6d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41070%3A%20CWE-79%20in%20Sanoma%20Clickedu&amp;severity=medium&amp;id=692d73e38a708c3c5e8abc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6349-cwe-416-use-after-free-in-arm-ltd-va-89c57b6b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6349%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=medium&amp;id=692d70a066fdaac170278280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8045-cwe-416-use-after-free-in-arm-ltd-va-21d9991b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8045%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=medium&amp;id=692d70a066fdaac170278283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2879-cwe-200-exposure-of-sensitive-inform-8f0e2f6c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2879%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=medium&amp;id=692d70a066fdaac17027827a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59789-cwe-674-uncontrolled-recursion-in-a-fc911356</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59789%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Apache%20Software%20Foundation%20Apache%20bRPC&amp;severity=high&amp;id=692d70a066fdaac17027827d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tomiris-shifts-to-public-service-implants-for-stea-c648eac8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tomiris%20Shifts%20to%20Public-Service%20Implants%20for%20Stealthier%20C2%20in%20Attacks%20on%20Government%20Targets&amp;severity=high&amp;id=692d6d1a66fdaac1701f1e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41700-cwe-502-deserialization-of-untruste-712ed6fe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41700%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20CODESYS%20CODESYS%20Development%20System&amp;severity=high&amp;id=692d6d2e66fdaac1701f50ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41738-cwe-843-access-of-resource-using-in-469b4e19</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41738%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20CODESYS%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=692d6d2e66fdaac1701f50ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41739-cwe-125-out-of-bounds-read-in-codes-9f22099f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41739%3A%20CWE-125%20Out-of-bounds%20Read%20in%20CODESYS%20CODESYS%20PLCHandler&amp;severity=medium&amp;id=692d6d2e66fdaac1701f50f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13819-cwe-601-url-redirection-to-untruste-10088214</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13819%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20MiR%20Robot&amp;severity=medium&amp;id=692d652686d7d117cd35a8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1st-december-threat-intelligence-report-2784e45b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1st%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=692d5ab286d7d117cd190a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australian-man-sentenced-to-prison-for-wi-fi-attac-b633146f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australian%20Man%20Sentenced%20to%20Prison%20for%20Wi-Fi%20Attacks%20at%20Airports%20and%20on%20Flights&amp;severity=medium&amp;id=692d5a9986d7d117cd189a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-albiriox-maas-malware-targets-400-apps-for-on--26330253</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Albiriox%20MaaS%20Malware%20Targets%20400%2B%20Apps%20for%20On-Device%20Fraud%20and%20Screen%20Control&amp;severity=medium&amp;id=692d6cd466fdaac1701e59ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13816-path-traversal-in-moxi159753-mogu-b-dd3b4f1a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13816%3A%20Path%20Traversal%20in%20moxi159753%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=692d572086d7d117cd0ea3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13815-unrestricted-upload-in-moxi159753-m-f8926766</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13815%3A%20Unrestricted%20Upload%20in%20moxi159753%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=692d5052e7f98a81a70becdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61610-cwe-20-improper-input-validation-in-8e20d7e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61610%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa788c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61609-cwe-20-improper-input-validation-in-c12fa7ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61609%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61608-cwe-20-improper-input-validation-in-0e8e7d77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61608%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61607-cwe-20-improper-input-validation-in-0441335e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61607%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61619-cwe-20-improper-input-validation-in-6fb7ec77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61619%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4909e7f98a81a7fa78f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61618-cwe-20-improper-input-validation-in-3dcb0cac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61618%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61617-cwe-20-improper-input-validation-in-2bf264db</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61617%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa788f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3012-cwe-125-out-of-bounds-read-in-unisoc-5f15ed7b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3012%3A%20cwe-125%20Out-of-bounds%20Read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11133-cwe-20-improper-input-validation-in-45c6154d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11133%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa787d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11132-cwe-20-improper-input-validation-in-ac87b460</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11132%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa787a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11131-cwe-20-improper-input-validation-in-0fc8fd71</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11131%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13814-server-side-request-forgery-in-moxi-835230a8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13814%3A%20Server-Side%20Request%20Forgery%20in%20moxi159753%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=692d458c0729cca2074a0c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13813-missing-authorization-in-moxi159753-c6fb9b2b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13813%3A%20Missing%20Authorization%20in%20moxi159753%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=692d42240729cca207418fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13811-sql-injection-in-jsnjfz-webstack-gu-89bb44a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13811%3A%20SQL%20Injection%20in%20jsnjfz%20WebStack-Guns&amp;severity=medium&amp;id=692d3b0e0729cca2073502d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13810-path-traversal-in-jsnjfz-webstack-g-afb11172</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13810%3A%20Path%20Traversal%20in%20jsnjfz%20WebStack-Guns&amp;severity=medium&amp;id=692d3498a9f72c8cb92b0ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13809-server-side-request-forgery-in-orio-708d56f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13809%3A%20Server-Side%20Request%20Forgery%20in%20orionsec%20orion-ops&amp;severity=medium&amp;id=692d2adeda1a649aa335076c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tomiris-shifts-to-public-service-implants-for-stea-b3901418</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tomiris%20Shifts%20to%20Public-Service%20Implants%20for%20Stealthier%20C2%20in%20Attacks%20on%20Government%20Targets&amp;severity=high&amp;id=692d3462a9f72c8cb92a5ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13808-improper-authorization-in-orionsec--8c4c4e01</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13808%3A%20Improper%20Authorization%20in%20orionsec%20orion-ops&amp;severity=medium&amp;id=692d23d5da1a649aa3258a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13807-improper-authorization-in-orionsec--d343a0c1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13807%3A%20Improper%20Authorization%20in%20orionsec%20orion-ops&amp;severity=medium&amp;id=692d205cda1a649aa31ec292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13806-improper-authorization-in-nutzam-nu-37d1e542</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13806%3A%20Improper%20Authorization%20in%20nutzam%20NutzBoot&amp;severity=medium&amp;id=692d19cffcc4df0b65192240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13805-deserialization-in-nutzam-nutzboot-34c3a164</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13805%3A%20Deserialization%20in%20nutzam%20NutzBoot&amp;severity=medium&amp;id=692d142cfcc4df0b650cf5b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13804-information-disclosure-in-nutzam-nu-499ce105</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13804%3A%20Information%20Disclosure%20in%20nutzam%20NutzBoot&amp;severity=medium&amp;id=692d0b4da0d303b752f438e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13803-improper-neutralization-of-http-hea-0a82351b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13803%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20MediaCrush&amp;severity=medium&amp;id=692d00c1a0d303b752e79ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13802-cross-site-scripting-in-jairiidriss-e4c1d826</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13802%3A%20Cross%20Site%20Scripting%20in%20jairiidriss%20RestaurantWebsite&amp;severity=medium&amp;id=692d00c1a0d303b752e79abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13800-command-injection-in-adslr-nbr1005g-f8520544</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13800%3A%20Command%20Injection%20in%20ADSLR%20NBR1005GPEV2&amp;severity=medium&amp;id=692d142cfcc4df0b650cf5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13799-command-injection-in-adslr-nbr1005g-24c665f0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13799%3A%20Command%20Injection%20in%20ADSLR%20NBR1005GPEV2&amp;severity=medium&amp;id=692cebc9a0d303b752b9851e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13798-command-injection-in-adslr-nbr1005g-14264e60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13798%3A%20Command%20Injection%20in%20ADSLR%20NBR1005GPEV2&amp;severity=medium&amp;id=692ce4c3a0d303b752af5f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64772-uncontrolled-search-path-element-in-9a6721ce</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64772%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Sony%20Corporation%20INZONE%20Hub&amp;severity=high&amp;id=692ce4c3a0d303b752af5f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13797-command-injection-in-adslr-b-qe2w40-0cd980a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13797%3A%20Command%20Injection%20in%20ADSLR%20B-QE2W401&amp;severity=medium&amp;id=692ce4c3a0d303b752af5f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-01-863ff896</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-01&amp;severity=medium&amp;id=692e30f3f2f793a7dee80360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65622-na-684f92f8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65622%3A%20n%2Fa&amp;severity=medium&amp;id=692e0bb43937fa579fdf7d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65621-na-64722c3e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65621%3A%20n%2Fa&amp;severity=medium&amp;id=692e048c3937fa579fd29250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65840-na-668e8e4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65840%3A%20n%2Fa&amp;severity=high&amp;id=692e0147821c4e4a8f8d8927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65838-na-18568c3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65838%3A%20n%2Fa&amp;severity=high&amp;id=692df6be821c4e4a8f796b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65836-na-a3462f91</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65836%3A%20n%2Fa&amp;severity=critical&amp;id=692df37565b70a5c71304505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63317-na-ba1b179c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63317%3A%20n%2Fa&amp;severity=medium&amp;id=692df37565b70a5c71304502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51683-na-99da478d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51683%3A%20n%2Fa&amp;severity=critical&amp;id=692deff365b70a5c712a42a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51682-na-08f33e0d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51682%3A%20n%2Fa&amp;severity=critical&amp;id=692deff365b70a5c712a429f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65407-na-15f7f6a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65407%3A%20n%2Fa&amp;severity=medium&amp;id=692ddeb01fcc71981e87429d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63365-na-11087d68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63365%3A%20n%2Fa&amp;severity=high&amp;id=692ddeb01fcc71981e874299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65406-na-a2e7eb18</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65406%3A%20n%2Fa&amp;severity=medium&amp;id=692dca5195b0bac459490639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65408-na-e0724807</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65408%3A%20n%2Fa&amp;severity=medium&amp;id=692dca5195b0bac459490635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65405-na-62d6fe71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65405%3A%20n%2Fa&amp;severity=medium&amp;id=692dbfd095b0bac45939d919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65404-na-a010ce37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65404%3A%20n%2Fa&amp;severity=medium&amp;id=692dbfd095b0bac45939d915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65403-na-e30f7141</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65403%3A%20n%2Fa&amp;severity=medium&amp;id=692dbfd095b0bac45939d911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63535-na-115cdd1c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63535%3A%20n%2Fa&amp;severity=critical&amp;id=692dbca6f910530b0eb80e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63534-na-d0d3eae8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63534%3A%20n%2Fa&amp;severity=high&amp;id=692dbca6f910530b0eb80e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63533-na-18802aa8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63533%3A%20n%2Fa&amp;severity=high&amp;id=692dbca6f910530b0eb80e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63532-na-53d7bd51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63532%3A%20n%2Fa&amp;severity=critical&amp;id=692dbca6f910530b0eb80e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63095-na-cc5dd34c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63095%3A%20n%2Fa&amp;severity=medium&amp;id=692dbca6f910530b0eb80e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61229-na-bb15ef03</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61229%3A%20n%2Fa&amp;severity=high&amp;id=692dbca6f910530b0eb80dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61228-na-0a743fe0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61228%3A%20n%2Fa&amp;severity=high&amp;id=692db927f910530b0eb07251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57489-na-b2d88c7e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57489%3A%20n%2Fa&amp;severity=high&amp;id=692db927f910530b0eb0724c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32388-na-530730b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32388%3A%20n%2Fa&amp;severity=medium&amp;id=692db924f910530b0eb071de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39148-na-3ecdbd4c</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39148%3A%20n%2Fa&amp;severity=high&amp;id=692db924f910530b0eb071da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32384-na-ab0e8f0e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32384%3A%20n%2Fa&amp;severity=medium&amp;id=692db924f910530b0eb071d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63531-na-e9583c69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63531%3A%20n%2Fa&amp;severity=critical&amp;id=692db372f910530b0ea42beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63529-na-3b40de4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63529%3A%20n%2Fa&amp;severity=medium&amp;id=692db372f910530b0ea42be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63528-na-747148c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63528%3A%20n%2Fa&amp;severity=high&amp;id=692db372f910530b0ea42be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63527-na-a50bb73c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63527%3A%20n%2Fa&amp;severity=high&amp;id=692db372f910530b0ea42bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63526-na-add4c57d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63526%3A%20n%2Fa&amp;severity=high&amp;id=692db372f910530b0ea42bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63525-na-9c0dc096</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63525%3A%20n%2Fa&amp;severity=critical&amp;id=692db372f910530b0ea42bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63523-na-ef962f1f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63523%3A%20n%2Fa&amp;severity=medium&amp;id=692db01b5d7189e19832fc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63522-na-cc86a529</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63522%3A%20n%2Fa&amp;severity=medium&amp;id=692db01b5d7189e19832fc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63520-na-ffcdb15a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63520%3A%20n%2Fa&amp;severity=medium&amp;id=692db01b5d7189e19832fc05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64030-na-bfb364a1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64030%3A%20n%2Fa&amp;severity=medium&amp;id=692dacd15a8d386a3dc7783e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56089-na-1e567b84</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56089%3A%20n%2Fa&amp;severity=high&amp;id=692da9695a8d386a3dbfed88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13796-server-side-request-forgery-in-deco-846e4819</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13796%3A%20Server-Side%20Request%20Forgery%20in%20deco-cx%20apps&amp;severity=medium&amp;id=692cd729c368b5914d210412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13795-cross-site-scripting-in-codingwithe-18d89f69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13795%3A%20Cross%20Site%20Scripting%20in%20codingWithElias%20School%20Management%20System&amp;severity=medium&amp;id=692cd072a283b5b3e9fecc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-2000-fake-shopping-sites-spotted-before-cyber-9abcac02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%202%2C000%20Fake%20Shopping%20Sites%20Spotted%20Before%20Cyber%20Monday&amp;severity=medium&amp;id=692cc966a283b5b3e9f242d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35028-cwe-78-improper-neutralization-of-s-2af51158</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35028%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%200x4m4%20HexStrike%20AI&amp;severity=critical&amp;id=692cba459b44bc92c28db476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13793-cross-site-scripting-in-winston-dso-7dc87a72</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13793%3A%20Cross%20Site%20Scripting%20in%20winston-dsouza%20Ecommerce-Website&amp;severity=medium&amp;id=692c7b0378578326fc873245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13792-code-injection-in-qualitor-4749467e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13792%3A%20Code%20Injection%20in%20Qualitor&amp;severity=medium&amp;id=692c6db6979ac8a99b76f716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13791-path-traversal-in-scada-lts-5e427368</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13791%3A%20Path%20Traversal%20in%20Scada-LTS&amp;severity=medium&amp;id=692c6a32979ac8a99b70b707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13790-cross-site-request-forgery-in-scada-f87d91dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13790%3A%20Cross-Site%20Request%20Forgery%20in%20Scada-LTS&amp;severity=medium&amp;id=692c5d1e0c99497f3fe5ed70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13789-server-side-request-forgery-in-zent-13a43243</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13789%3A%20Server-Side%20Request%20Forgery%20in%20ZenTao&amp;severity=medium&amp;id=692c516b90ddf300dc641733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13788-sql-injection-in-chanjet-crm-a9ca18f0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13788%3A%20SQL%20Injection%20in%20Chanjet%20CRM&amp;severity=medium&amp;id=692c3f82c10e5a11c9bde77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13787-improper-privilege-management-in-ze-0d39d9cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13787%3A%20Improper%20Privilege%20Management%20in%20ZenTao&amp;severity=medium&amp;id=692c1e20395d5becff8a1cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13786-code-injection-in-taosir-wtcms-ce32bc49</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13786%3A%20Code%20Injection%20in%20taosir%20WTCMS&amp;severity=medium&amp;id=692c0aa1a4ca46306ac5b99a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13785-information-disclosure-in-yungifez--1730f27a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13785%3A%20Information%20Disclosure%20in%20yungifez%20Skuul%20School%20Management%20System&amp;severity=medium&amp;id=692bf7b982f933c5fe612651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13784-cross-site-scripting-in-yungifez-sk-076b65a5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13784%3A%20Cross%20Site%20Scripting%20in%20yungifez%20Skuul%20School%20Management%20System&amp;severity=medium&amp;id=692befdd450a33c8c67db72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13783-sql-injection-in-taosir-wtcms-905c531c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13783%3A%20SQL%20Injection%20in%20taosir%20WTCMS&amp;severity=medium&amp;id=692be26fb017dbc398eab769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13782-sql-injection-in-taosir-wtcms-d24634f7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13782%3A%20SQL%20Injection%20in%20taosir%20WTCMS&amp;severity=medium&amp;id=692bb8adb00568eef0ca8d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13615-cwe-639-authorization-bypass-throug-06fc0649</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13615%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20phpface%20StreamTube%20Core&amp;severity=critical&amp;id=692ba718b00568eef09a0bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-30-e65b8263</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-30&amp;severity=medium&amp;id=692cdd3bc368b5914d2dc59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66433-na-b8b3153e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66433%3A%20CWE-863%20Incorrect%20Authorization%20in%20wisc%20HTCondor&amp;severity=medium&amp;id=692bcbdbd16937600915085f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66432-cwe-420-unprotected-alternate-chann-f1b4f789</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66432%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Oxide%20Omicron&amp;severity=medium&amp;id=692bcbdad169376009150859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66424-cwe-863-incorrect-authorization-in--40b2985b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66424%3A%20CWE-863%20Incorrect%20Authorization%20in%20Tryton%20trytond&amp;severity=medium&amp;id=692bb1a5b00568eef0c40044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66423-cwe-863-incorrect-authorization-in--5b710efe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66423%3A%20CWE-863%20Incorrect%20Authorization%20in%20Tryton%20trytond&amp;severity=high&amp;id=692bb1a5b00568eef0c40040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66422-cwe-402-transmission-of-private-res-a7619db8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66422%3A%20CWE-402%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)%20in%20Tryton%20trytond&amp;severity=medium&amp;id=692bb1a5b00568eef0c4003c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66421-cwe-79-improper-neutralization-of-i-2fab24a6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66421%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tryton%20sao&amp;severity=medium&amp;id=692bb1a5b00568eef0c40038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66420-cwe-79-improper-neutralization-of-i-645204a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tryton%20sao&amp;severity=medium&amp;id=692bb1a5b00568eef0c40034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/japanese-beer-giant-asahi-says-data-breach-hit-15--dd1187eb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Japanese%20beer%20giant%20Asahi%20says%20data%20breach%20hit%201.5%20million%20people&amp;severity=high&amp;id=692b680900da60bff9a0c902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simulating-a-water-control-system-in-my-home-offic-f5abb7bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Simulating%20a%20Water%20Control%20System%20in%20my%20Home%20Office&amp;severity=medium&amp;id=692b29d7c0587105f6e364d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hashjack-attack-uses-url-to-control-ai-browser-beh-4c459c5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HashJack%20Attack%20Uses%20URL%20%E2%80%98%23%E2%80%99%20to%20Control%20AI%20Browser%20Behavior&amp;severity=medium&amp;id=692b020992c70cc0395cf6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-8-foundational-cache-poisoning-attacks-840e396a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%208%20Foundational%20Cache%20Poisoning%20Attacks%20(HackerOne%2C%20GitHub%2C%20Shopify)%20-%20Part%201&amp;severity=medium&amp;id=692af12898abb602783e1f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6666-use-of-hard-coded-cryptographic-key--bb4a6dc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6666%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20motogadget%20mo.lock%20Ignition%20Lock&amp;severity=low&amp;id=692aba9af06c0845ceb4025c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66221-cwe-67-improper-handling-of-windows-867d4fea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66221%3A%20CWE-67%3A%20Improper%20Handling%20of%20Windows%20Device%20Names%20in%20pallets%20werkzeug&amp;severity=medium&amp;id=692a637a2a13ea799fe08f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53939-cwe-20-improper-input-validation-in-01cf8267</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53939%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=692a637a2a13ea799fe08f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53900-cwe-267-privilege-defined-with-unsa-5e7c7ac6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53900%3A%20CWE-267%3A%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=692a637a2a13ea799fe08f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53899-cwe-941-incorrectly-specified-desti-f31f732d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53899%3A%20CWE-941%3A%20Incorrectly%20Specified%20Destination%20in%20a%20Communication%20Channel%20in%20kiteworks%20security-advisories&amp;severity=high&amp;id=692a637a2a13ea799fe08f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53897-cwe-352-cross-site-request-forgery--5e69dbc3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53897%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=692a5c732a13ea799fd8c851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53896-cwe-613-insufficient-session-expira-eda8e740</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53896%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20kiteworks%20security-advisories&amp;severity=high&amp;id=692a5c732a13ea799fd8c84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58436-cwe-400-uncontrolled-resource-consu-98ee79b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58436%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=692a5c732a13ea799fd8c854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61915-cwe-129-improper-validation-of-arra-80ae1c75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61915%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=692a5c732a13ea799fd8c859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66216-cwe-131-incorrect-calculation-of-bu-3c4fa0e3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66216%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20jvde-github%20AIS-catcher&amp;severity=critical&amp;id=692a5c732a13ea799fd8c85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66217-cwe-122-heap-based-buffer-overflow--af131106</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66217%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20jvde-github%20AIS-catcher&amp;severity=high&amp;id=692a5c732a13ea799fd8c862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66219-cwe-77-improper-neutralization-of-s-0fbda680</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66219%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20shama%20willitmerge&amp;severity=medium&amp;id=692a51f32a13ea799fcc56d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66201-cwe-20-improper-input-validation-in-a3d24953</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66201%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=692a51f32a13ea799fcc56d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66036-cwe-79-improper-neutralization-of-i-6cf236f2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66036%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anjaliavv51%20Retro&amp;severity=medium&amp;id=692a51f32a13ea799fcc56d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66027-cwe-200-exposure-of-sensitive-infor-1a05c92c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66027%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20lukevella%20rallly&amp;severity=high&amp;id=692a4ade2a13ea799f617d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65112-cwe-862-missing-authorization-in-ri-9362452e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65112%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ricardoboss%20PubNet&amp;severity=critical&amp;id=692a43d62a13ea799f1dc479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65113-cwe-770-allocation-of-resources-wit-71649b63</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65113%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=692a43d62a13ea799f1dc47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-29-01219cc0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-29&amp;severity=medium&amp;id=692b8ba76c75fe45dc732858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65892-na-0e21071f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65892%3A%20n%2Fa&amp;severity=medium&amp;id=692a6e062a13ea799fea6fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65540-na-95fcfa46</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65540%3A%20n%2Fa&amp;severity=medium&amp;id=692a6e062a13ea799fea6fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ctf-challenge-malware-busters-c75ff592</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CTF%20challenge%20Malware%20Busters&amp;severity=medium&amp;id=692a19f54121026312cc0fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-sensitive-secrets-published-on-jsonfo-e653ed90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20sensitive%20secrets%20published%20on%20JSONFormatter%20and%20CodeBeautify&amp;severity=medium&amp;id=692a12e74121026312ca6fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-football-federation-discloses-data-breach-a-88a35f0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Football%20Federation%20discloses%20data%20breach%20after%20cyberattack&amp;severity=high&amp;id=692a12e74121026312ca6fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-deploy-197-npm-packages-to-sp-0425e4ed</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Deploy%20197%20npm%20Packages%20to%20Spread%20Updated%20OtterCookie%20Malware&amp;severity=high&amp;id=692a12e74121026312ca6fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/legacy-python-bootstrap-scripts-create-domain-take-958f5068</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Legacy%20Python%20Bootstrap%20Scripts%20Create%20Domain-Takeover%20Risk%20in%20Multiple%20PyPI%20Packages&amp;severity=high&amp;id=692a12e74121026312ca6fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/public-gitlab-repositories-exposed-more-than-17000-96480a7d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Public%20GitLab%20repositories%20exposed%20more%20than%2017%2C000%20secrets&amp;severity=high&amp;id=692a12e74121026312ca6fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-856be041</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Man%20behind%20in-flight%20Evil%20Twin%20WiFi%20attacks%20gets%207%20years%20in%20prison&amp;severity=high&amp;id=692a0f614121026312c91890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13683-cwe-200-exposure-of-sensitive-infor-2906ec91</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13683%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=medium&amp;id=6929d7244121026312b92a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/legacy-python-bootstrap-scripts-create-domain-take-631a88f3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Legacy%20Python%20Bootstrap%20Scripts%20Create%20Domain-Takeover%20Risk%20in%20Multiple%20PyPI%20Packages&amp;severity=medium&amp;id=692a29aa4c03a75d3ff23714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12183-cwe-125-out-of-bounds-read-b6983615</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12183%3A%20CWE-125%20Out-of-bounds%20Read&amp;severity=high&amp;id=6929c9154121026312b544be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58360-geoserver-xxe-vulnerability-analysi-5d5a526d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58360%3A%20GeoServer%20XXE%20Vulnerability%20Analysis&amp;severity=high&amp;id=6929b7954121026312ae528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-soccer-federation-hit-by-cyberattack-member-1ce3eda9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Soccer%20Federation%20Hit%20by%20Cyberattack%2C%20Member%20Data%20Stolen&amp;severity=medium&amp;id=6929b7784121026312ae222e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11156-cwe-476-null-pointer-dereference-in-4bb6501e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11156%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Netskope%20Netskope%20Client&amp;severity=medium&amp;id=6929b3fd4121026312a8f975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59792-reveals-plaintext-credentials-in-th-e4903382</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59792%3A%20Reveals%20plaintext%20credentials%20in%20the%20MONITOR%20command%20in%20Apache%20Software%20Foundation%20Apache%20Kvrocks&amp;severity=medium&amp;id=6929b3fd4121026312a8f981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59790-cwe-269-improper-privilege-manageme-945d166a</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59790%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20Kvrocks&amp;severity=medium&amp;id=6929b3fd4121026312a8f97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anonymized-case-study-autonomous-security-assessme-7f63d24c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anonymized%20case%20study%3A%20autonomous%20security%20assessment%20of%20a%20500-AMR%20fleet%20using%20AI%20%2B%20MCP&amp;severity=medium&amp;id=6929b07c4121026312a55e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-the-supply-chain-attack-that-learned-5c852516</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%202.0%3A%20the%20supply%20chain%20attack%20that%20learned&amp;severity=medium&amp;id=6929acf84121026312a3e051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-hanoi-thief-vietnam-apt-96bfacaf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Hanoi%20Thief%3A%20Vietnam%20APT&amp;severity=medium&amp;id=6929efc34121026312bf9b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12638-cwe-22-improper-limitation-of-a-pat-1648d2c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12638%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20keras-team%20keras-team%2Fkeras&amp;severity=high&amp;id=6929b0784121026312a55d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12143-cwe-121-stack-based-buffer-overflow-c1f654ab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12143%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ABB%20Terra%20AC%20wallbox&amp;severity=medium&amp;id=6929945b41210263129c4da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-organizations-are-turning-to-rpam-d4109f95</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Organizations%20Are%20Turning%20to%20RPAM&amp;severity=critical&amp;id=692a29aa4c03a75d3ff2371a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-block-unauthorized-scripts-in-entra-i-ac077420</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Block%20Unauthorized%20Scripts%20in%20Entra%20ID%20Logins%20with%202026%20CSP%20Update&amp;severity=high&amp;id=692982c7412102631296bd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-warns-of-hackers-hijacking-radio-equipment-for-734ac78b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Warns%20of%20Hackers%20Hijacking%20Radio%20Equipment%20For%20False%20Alerts&amp;severity=high&amp;id=692982c7412102631296be39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bloody-wolf-expands-java-based-netsupport-rat-atta-d8545856</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bloody%20Wolf%20Expands%20Java-based%20NetSupport%20RAT%20Attacks%20in%20Kyrgyzstan%20and%20Uzbekistan&amp;severity=high&amp;id=692982c7412102631296be3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asahi-says-crooks-stole-data-of-approximately-2m-c-25e265e0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asahi%20says%20crooks%20stole%20data%20of%20approximately%202M%20customers%20and%20employees&amp;severity=high&amp;id=692982c7412102631296be45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ms-teams-guest-access-can-remove-defender-protecti-b06f384b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MS%20Teams%20Guest%20Access%20Can%20Remove%20Defender%20Protection%20When%20Users%20Join%20External%20Tenants&amp;severity=high&amp;id=692982c7412102631296be41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-hashjack-ai-browser-attack-charming--d3146348</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20HashJack%20AI%20Browser%20Attack%2C%20Charming%20Kitten%20Leak%2C%20Hacker%20Unmasked&amp;severity=medium&amp;id=69297bb7412102631289558a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-anatomy-of-a-bulletproof-hoster-a-data-driven--93279e44</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Anatomy%20of%20a%20Bulletproof%20Hoster%3A%20A%20Data-Driven%20Reconstruction%20of%20Media%20Land&amp;severity=medium&amp;id=692969ab5ab17d2ce149f3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ms-teams-guest-access-can-remove-defender-protecti-70143e9e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MS%20Teams%20Guest%20Access%20Can%20Remove%20Defender%20Protection%20When%20Users%20Join%20External%20Tenants&amp;severity=low&amp;id=69296fac5ab17d2ce1532843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tomiris-tools-and-techniques-multiple-reverse--0bea187c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Tomiris%20tools%20and%20techniques%3A%20multiple%20reverse%20shells%2C%20Havoc%2C%20AdaptixC2&amp;severity=medium&amp;id=6929601cbc8dfaadef995ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13771-cwe-23-relative-path-traversal-in-u-c33e17b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13771%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Uniong%20WebITR&amp;severity=high&amp;id=692956f0c500e1d7cafe8eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13770-cwe-89-improper-neutralization-of-s-946f39a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13770%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Uniong%20WebITR&amp;severity=high&amp;id=69295336c500e1d7caf90db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13769-cwe-89-improper-neutralization-of-s-01a3e986</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13769%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Uniong%20WebITR&amp;severity=high&amp;id=69295336c500e1d7caf90db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13768-cwe-639-authorization-bypass-throug-0fb8386f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13768%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Uniong%20WebITR&amp;severity=high&amp;id=69295336c500e1d7caf90dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13737-cwe-352-cross-site-request-forgery--29da6bbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13737%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nextendweb%20Nextend%20Social%20Login%20and%20Register&amp;severity=medium&amp;id=692919d1a7cba954100dd851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64312-cwe-200-exposure-of-sensitive-infor-c44f7481</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64312%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692917bace4290e3e3b61b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58311-cwe-416-use-after-free-in-huawei-ha-34cfef14</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58311%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692917bace4290e3e3b61b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58308-cwe-358-improperly-implemented-secu-281d6016</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58308%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692917bace4290e3e3b61b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58305-cwe-200-exposure-of-sensitive-infor-4a6a6ccc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58305%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692917bace4290e3e3b61b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58304-cwe-199-information-management-erro-bc2c6c1f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58304%3A%20CWE-199%20Information%20Management%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692917bace4290e3e3b61b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58302-cwe-264-permissions-privileges-and--7634fe98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58302%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692917bace4290e3e3b61b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58294-cwe-264-permissions-privileges-and--1db5e7eb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58294%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64313-cwe-362-concurrent-execution-using--64d05fa1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64313%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b5ce4290e3e3b49073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64311-cwe-200-exposure-of-sensitive-infor-fb01ff46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64311%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b4904b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58315-cwe-264-permissions-privileges-and--fa1f7fd4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58315%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58314-cwe-125-out-of-bounds-read-in-huawe-272b5cd9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58314%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58312-cwe-264-permissions-privileges-and--515b1b0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58312%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b4903f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58310-cwe-843-access-of-resource-using-in-fb95d159</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58310%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692910b4ce4290e3e3b4903c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58309-cwe-264-permissions-privileges-and--f6e7ff22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58309%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58307-cwe-416-use-after-free-in-huawei-ha-a02a4269</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58307%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58316-cwe-362-concurrent-execution-using--fe7c0559</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58316%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692910b4ce4290e3e3b49048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58303-cwe-362-concurrent-execution-using--5d178b7e</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58303%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692910b4ce4290e3e3b49033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64315-cwe-264-permissions-privileges-and--304046a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64315%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b5ce4290e3e3b49079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64314-cwe-843-access-of-resource-using-in-e6e520d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64314%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=692910b5ce4290e3e3b49076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/write-path-traversal-to-a-rce-art-department-f881e664</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Write%20Path%20Traversal%20to%20a%20RCE%20Art%20Department&amp;severity=medium&amp;id=6928f819ce4290e3e38bcce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-28-f11bce42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-28&amp;severity=medium&amp;id=692a3a7eb7a5e2eddeb4ce26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51734-na-0332e4f7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51734%3A%20n%2Fa&amp;severity=medium&amp;id=6929b3fd4121026312a8f97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51733-na-765d452b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51733%3A%20n%2Fa&amp;severity=medium&amp;id=6929b3fd4121026312a8f978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51736-na-da2d10de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51736%3A%20n%2Fa&amp;severity=medium&amp;id=6929b3fd4121026312a8f972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51735-na-dbd30761</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51735%3A%20n%2Fa&amp;severity=high&amp;id=6929b3fd4121026312a8f96f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66386-na-6a2f7f6a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66386%3A%20n%2Fa&amp;severity=medium&amp;id=69294930842b163e002c8eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66385-cwe-472-external-control-of-assumed-6cd61d91</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66385%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20cerebrate-project%20Cerebrate&amp;severity=critical&amp;id=69294930842b163e002c8ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66382-cwe-407-inefficient-algorithmic-com-2b279580</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66382%3A%20CWE-407%20Inefficient%20Algorithmic%20Complexity%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=69293eaf842b163e001fac42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66372-cwe-611-improper-restriction-of-xml-cc19678d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66372%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20mustangproject%20Mustang&amp;severity=low&amp;id=692919d1a7cba954100dd85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66371-cwe-611-improper-restriction-of-xml-d8b13d5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66371%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Iteras%20Peppol-py&amp;severity=medium&amp;id=692919d1a7cba954100dd856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-2000-holiday-themed-fake-stores-detected-expl-a853a732</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%202%2C000%20Holiday-Themed%20Fake%20Stores%20Detected%20Exploiting%20Black%20Friday%20and%20Festive%20Sales&amp;severity=medium&amp;id=692963a0bc8dfaadef9e1242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-lumma-infostealer-e5da70e2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20the%20Lumma%20infostealer&amp;severity=medium&amp;id=6928a076fbb391e68ec3ea65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/striking-panda-attacks-apt31-today-f48fd7d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Striking%20Panda%20Attacks%3A%20APT31%20Today&amp;severity=medium&amp;id=6928a076fbb391e68ec3ea74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-minefield-between-syntaxes-exploiting-syntax-c-30e96f3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20minefield%20between%20syntaxes%3A%20exploiting%20syntax%20confusions%20in%20the%20wild&amp;severity=medium&amp;id=69289ac3b57256b0ceacb0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-google-play-adware-drains-devices-and-disru-32f3ee1e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20Google%20Play%20Adware%20Drains%20Devices%20and%20Disrupts%20Millions%20of%20Users&amp;severity=medium&amp;id=6928a076fbb391e68ec3ea85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bloody-wolf-expands-java-based-netsupport-rat-atta-abc9a98f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bloody%20Wolf%20Expands%20Java-based%20NetSupport%20RAT%20Attacks%20in%20Kyrgyzstan%20and%20Uzbekistan&amp;severity=medium&amp;id=6928a707fbb391e68ecd6349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3261-d09052f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3261&amp;severity=null&amp;id=69413e06b7167ed5be6e7a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/report-names-teen-leader-in-scattered-lapsus-hunte-623e9256</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Report%20Names%20Teen%20Leader%20in%20Scattered%20LAPSUS%24%20Hunters%2C%20Group%20Denies&amp;severity=medium&amp;id=692889c8d91ec0679dc7afb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-your-dashcam-can-be-hacked-and-how-to-protect--1b4bd895</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20your%20dashcam%20can%20be%20hacked%2C%20and%20how%20to%20protect%20yourself%20from%20the%20attack%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69288043d78caf05d336200b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asahi-data-breach-impacts-2-million-individuals-a7c325a2</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asahi%20Data%20Breach%20Impacts%202%20Million%20Individuals&amp;severity=medium&amp;id=6928742ba95a569c55df0a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-block-unauthorized-scripts-in-entra-i-f0c0afec</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Block%20Unauthorized%20Scripts%20in%20Entra%20ID%20Logins%20with%202026%20CSP%20Update&amp;severity=medium&amp;id=69287307a95a569c55dd0617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13758-cwe-200-exposure-of-sensitive-infor-e714e54c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13758%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=low&amp;id=69287327a95a569c55dd13ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13757-cwe-89-improper-neutralization-of-s-8330a6fe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13757%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Devolutions%20Server&amp;severity=high&amp;id=69287327a95a569c55dd13ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13765-cwe-200-exposure-of-sensitive-infor-cc4237c2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13765%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69287327a95a569c55dd13f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-learn-to-spot-risks-and-patch-safely-with--2fee78ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20Learn%20to%20Spot%20Risks%20and%20Patch%20Safely%20with%20Community-Maintained%20Tools&amp;severity=medium&amp;id=6926ecac61dc91128fa49d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-campaign-targets-cloud-and-developer-5f484eef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-hulud%202.0%20Campaign%20Targets%20Cloud%20and%20Developer%20Ecosystems&amp;severity=medium&amp;id=692896ecb57256b0cea75afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defending-against-sha1-hulud-the-second-coming-138ea839</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Defending%20Against%20Sha1-Hulud%3A%20The%20Second%20Coming&amp;severity=medium&amp;id=69289abfb57256b0ceacaf2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-lapsus-hunters-take-aim-at-zendesk-users-4b334816</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Lapsus%24%20Hunters%20Take%20Aim%20At%20Zendesk%20Users&amp;severity=medium&amp;id=69289abfb57256b0ceacaf2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12140-cwe-95-improper-neutralization-of-d-9f4885f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12140%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Simple%20SA%20Wirtualna%20Uczelnia&amp;severity=critical&amp;id=69285b2504903f3285f53283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13692-cwe-79-improper-neutralization-of-i-3aee33f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13692%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20for%20Elementor%20(Premium)&amp;severity=high&amp;id=69285b2504903f3285f53286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8890-cwe-78-improper-neutralization-of-sp-8ed5a589</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8890%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SDMC%20NE6037&amp;severity=critical&amp;id=6928580d8c27b4da49ad4164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12971-cwe-863-incorrect-authorization-in--8159a52a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12971%3A%20CWE-863%20Incorrect%20Authorization%20in%20premio%20Folders%20%E2%80%93%20Unlimited%20Folders%20to%20Organize%20Media%20Library%20Folder%2C%20Pages%2C%20Posts%2C%20File%20Manager&amp;severity=medium&amp;id=692846e93362f74ea5ac7bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-api-user-data-exposed-in-mixpanel-breach-ch-be101941</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20API%20User%20Data%20Exposed%20in%20Mixpanel%20Breach%2C%20ChatGPT%20Unaffected&amp;severity=high&amp;id=6928435b3362f74ea5a84fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-user-data-exposed-in-mixpanel-hack-9500f574</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20User%20Data%20Exposed%20in%20Mixpanel%20Hack&amp;severity=medium&amp;id=69283fd73362f74ea5a3c3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54057-cwe-80-improper-neutralization-of-s-4c986984</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54057%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Apache%20Software%20Foundation%20Apache%20SkyWalking&amp;severity=medium&amp;id=69283d66e4a84287b53ab814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59302-cwe-94-improper-control-of-generati-e3d69fd6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59302%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=medium&amp;id=69283d66e4a84287b53ab817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59454-cwe-200-exposure-of-sensitive-infor-ca53fcba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59454%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=medium&amp;id=69283990e4a84287b535af7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10476-cwe-862-missing-authorization-in-em-4d5a9e25</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10476%3A%20CWE-862%20Missing%20Authorization%20in%20emrevona%20WP%20Fastest%20Cache%20%E2%80%93%20WordPress%20Cache%20Plugin&amp;severity=medium&amp;id=692830538da2ca36c17c097d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shadowv2-botnet-malware-used-aws-outage-as-a-t-23d42e6f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ShadowV2%20botnet%20malware%20used%20AWS%20outage%20as%20a%20test%20opportunity&amp;severity=high&amp;id=692830138da2ca36c17ac485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gainsight-expands-impacted-customer-list-following-e2e01d8b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gainsight%20Expands%20Impacted%20Customer%20List%20Following%20Salesforce%20Security%20Alert&amp;severity=high&amp;id=692830138da2ca36c17ac47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-asus-firmware-patches-critical-aicloud-vulnera-cb199cbb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ASUS%20firmware%20patches%20critical%20AiCloud%20vulnerability&amp;severity=critical&amp;id=692830138da2ca36c17ac495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59890-cwe-22-improper-limitation-of-a-pat-88960ab6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59890%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Eaton%20Eaton%20Galileo%20Software&amp;severity=high&amp;id=692830538da2ca36c17c0982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-malware-voice-bot-flaws-cry-3d473ab6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Malware%2C%20Voice%20Bot%20Flaws%2C%20Crypto%20Laundering%2C%20IoT%20Attacks%20%E2%80%94%20and%2020%20More%20Stories&amp;severity=medium&amp;id=69282ff98da2ca36c17aa522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13381-cwe-862-missing-authorization-in-ay-b9d40858</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13381%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=6928251f23c3d7b26904cfc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12584-cwe-200-exposure-of-sensitive-infor-601896ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12584%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20shapedplugin%20Quick%20View%20for%20WooCommerce&amp;severity=medium&amp;id=6928251f23c3d7b26904cfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13378-cwe-918-server-side-request-forgery-a74da752</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13378%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ays-pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=6928251f23c3d7b26904cfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59026-improper-neutralization-of-input-du-c10b944c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59026%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=6928251f23c3d7b26904cfd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59025-improper-neutralization-of-input-du-4ac474c2</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=6928251f23c3d7b26904cfd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30190-improper-neutralization-of-input-du-aa9e66c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30190%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=6928251f23c3d7b26904cfd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30186-improper-neutralization-of-input-du-7a642821</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30186%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=6928251f23c3d7b26904cfce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13536-cwe-434-unrestricted-upload-of-file-7c738957</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13536%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blubrry%20PowerPress%20Podcasting%20plugin%20by%20Blubrry&amp;severity=high&amp;id=69280bc90a6cf06979bbe46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gainsight-expands-impacted-customer-list-following-dd52ef0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gainsight%20Expands%20Impacted%20Customer%20List%20Following%20Salesforce%20Security%20Alert&amp;severity=low&amp;id=6928158e0a6cf06979c7df35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13157-cwe-639-authorization-bypass-throug-6a374371</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13157%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20qodeinteractive%20QODE%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=6927f676e2794b4b765ba39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13441-cwe-862-missing-authorization-in-th-5792aedb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13441%3A%20CWE-862%20Missing%20Authorization%20in%20themesupport%20Hide%20Category%20by%20User%20Role%20for%20WooCommerce&amp;severity=medium&amp;id=6927f676e2794b4b765ba3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13143-cwe-352-cross-site-request-forgery--69e8fcd6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13143%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20assafp%20Quiz%2C%20Poll%20%26%20Survey%20Maker%20by%20Opinion%20Stage&amp;severity=medium&amp;id=6927e4dfbdf69728cfe5941f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13525-cwe-79-improper-neutralization-of-i-0faf5d90</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13525%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdirectorykit%20WP%20Directory%20Kit&amp;severity=medium&amp;id=6927e4dfbdf69728cfe59424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12123-cwe-79-improper-neutralization-of-i-73b7032f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12123%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Customer%20Reviews%20Collector%20for%20WooCommerce&amp;severity=medium&amp;id=6927e15abdf69728cfdf7dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12185-cwe-79-improper-neutralization-of-i-e9613167</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12185%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20era404%20StaffList&amp;severity=medium&amp;id=6927e15abdf69728cfdf7df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12758-incomplete-filtering-of-one-or-more-f9d94ef8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12758%3A%20Incomplete%20Filtering%20of%20One%20or%20More%20Instances%20of%20Special%20Elements%20in%20validator&amp;severity=high&amp;id=6927e863bdf69728cfecb8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13539-cwe-288-authentication-bypass-using-44fd7030</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13539%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Elated%20Themes%20FindAll%20Membership&amp;severity=critical&amp;id=6927d764d4a4bdffcb26cfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13540-cwe-269-improper-privilege-manageme-f3141125</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13540%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Qode%20Interactive%20Tiare%20Membership&amp;severity=critical&amp;id=6927d764d4a4bdffcb26cfdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13680-cwe-269-improper-privilege-manageme-0f199875</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13680%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20DirectoryThemes%20Tiger&amp;severity=high&amp;id=6927d764d4a4bdffcb26cfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12151-cwe-79-improper-neutralization-of-i-ee87367f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12151%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20presstigers%20Simple%20Folio&amp;severity=medium&amp;id=6927d764d4a4bdffcb26cfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13675-cwe-269-improper-privilege-manageme-85b1b12c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13675%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20DirectoryThemes%20Tiger&amp;severity=critical&amp;id=6927d764d4a4bdffcb26cfe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7820-cwe-602-client-side-enforcement-of-s-0b0e758f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7820%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20sonalsinha21%20SKT%20PayPal%20for%20WooCommerce&amp;severity=high&amp;id=6927d764d4a4bdffcb26cfef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13538-cwe-269-improper-privilege-manageme-2da30aa5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13538%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Elated%20Themes%20FindAll%20Listing&amp;severity=critical&amp;id=6927d764d4a4bdffcb26cfd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3784-cwe-312-cleartext-storage-of-sensiti-7fd774ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3784%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works2&amp;severity=medium&amp;id=6927d764d4a4bdffcb26cfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-aggressive-automated-one-of-fastest--07e41a5d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%202.0%3A%20Aggressive%20%26%20Automated%2C%20One%20Of%20Fastest%20Spreading%20NPM%20Supply%20Chain%20Attacks%20Ever%20Observed&amp;severity=medium&amp;id=692811bf0a6cf06979c24620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13762-cwe-20-improper-input-validation-in-ce05c470</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13762%3A%20CWE-20%20Improper%20Input%20Validation%20in%20CyberArk%20CyberArk%20Secure%20Web%20Sessions%20Extension&amp;severity=medium&amp;id=6927bf816cbf1e727e3d95b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34351-cwe-1188-insecure-default-initializ-f281119f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34351&amp;severity=null&amp;id=6927bf816cbf1e727e3d95b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12713-cwe-79-improper-neutralization-of-i-1718eaa9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12713%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpoets%20Soundslides&amp;severity=medium&amp;id=6927bf816cbf1e727e3d95ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12670-cwe-79-improper-neutralization-of-i-de942f80</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realin%20wp-twitpic&amp;severity=medium&amp;id=6927bf816cbf1e727e3d95a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12649-cwe-79-improper-neutralization-of-i-43125712</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sscovil%20SortTable%20Post&amp;severity=medium&amp;id=6927bf816cbf1e727e3d9599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12579-cwe-862-missing-authorization-in-rn-c5d3a5b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12579%3A%20CWE-862%20Missing%20Authorization%20in%20rnags%20Reuters%20Direct&amp;severity=medium&amp;id=6927bf816cbf1e727e3d9595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12712-cwe-79-improper-neutralization-of-i-49f652f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12712%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gungorbudak%20Shouty&amp;severity=medium&amp;id=6927bf816cbf1e727e3d95a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12666-cwe-79-improper-neutralization-of-i-6459155c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oscaruh%20Google%20Drive%20upload%20and%20download%20link&amp;severity=medium&amp;id=6927bf816cbf1e727e3d959d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12578-cwe-352-cross-site-request-forgery--f2ee19d0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12578%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rnags%20Reuters%20Direct&amp;severity=medium&amp;id=6927bf816cbf1e727e3d9591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66314-cwe-269-improper-privilege-manageme-beee8dfb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66314%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ZTE%20ElasticNet%20UME%20R32&amp;severity=high&amp;id=6927c23b485554d54fc0aeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5540-cwe-79-improper-neutralization-of-in-0faf2177</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Automated%20Logic%20WebCTRL&amp;severity=medium&amp;id=6927a51dd322a87b22026c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5539-cwe-863-incorrect-authorization-in-a-7bbf2753</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5539%3A%20CWE-863%20Incorrect%20Authorization%20in%20Automated%20Logic%20WebCTRL&amp;severity=critical&amp;id=6927a51dd322a87b22026c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0657-cwe-129-improper-validation-of-array-7ab615cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0657%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Automated%20Logic%20WebCtrl&amp;severity=high&amp;id=6927a51dd322a87b22026c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0658-cwe-20-improper-input-validation-in--8332e6f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0658%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Automated%20Logic%20Zone%20Controllers&amp;severity=high&amp;id=6927a51dd322a87b22026c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/taking-down-nextjs-servers-for-00001-cents-a-pop-db11161b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Taking%20down%20Next.js%20servers%20for%200.0001%20cents%20a%20pop&amp;severity=medium&amp;id=6927a526d322a87b22027793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-27-3147ae7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-27&amp;severity=medium&amp;id=6928e9f7ce4290e3e3801337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66359-cwe-79-improper-neutralization-of-i-bce74ed4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66359%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Logpoint%20SIEM&amp;severity=high&amp;id=6928e52bb0d67dda9e89c4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66361-cwe-1336-improper-neutralization-of-b4988fc5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66361%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Logpoint%20SIEM&amp;severity=medium&amp;id=6928e1a8b0d67dda9e866c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66360-na-f39aee65</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66360%3A%20CWE-863%20Incorrect%20Authorization%20in%20Logpoint%20SIEM&amp;severity=medium&amp;id=6928e1a8b0d67dda9e866c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66040-cwe-79-improper-neutralization-of-i-feae1efd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66040%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spotipy-dev%20spotipy&amp;severity=low&amp;id=69278c4fd322a87b22e753d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64344-cwe-121-stack-based-buffer-overflow-7b45fa15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64344%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64330-cwe-122-heap-based-buffer-overflow--03ddec2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64330%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64331-cwe-121-stack-based-buffer-overflow-cc09d2c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64331%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64332-cwe-121-stack-based-buffer-overflow-008e619e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64332%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64333-cwe-121-stack-based-buffer-overflow-f4c8e327</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64333%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64335-cwe-476-null-pointer-dereference-in-7e4440db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64335%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20OISF%20suricata&amp;severity=high&amp;id=69278547d322a87b22e58f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64334-cwe-770-allocation-of-resources-wit-1573ef25</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64334%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20OISF%20suricata&amp;severity=high&amp;id=69278547d322a87b22e58f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40934-cwe-347-improper-verification-of-cr-41470759</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40934%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20TIMLEGGE%20XML%3A%3ASig&amp;severity=critical&amp;id=69278547d322a87b22e58f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62593-cwe-94-improper-control-of-generati-15eefc0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62593%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ray-project%20ray&amp;severity=critical&amp;id=692781c3d322a87b22e508d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66030-cwe-190-integer-overflow-or-wraparo-3fa7f465</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66030%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20digitalbazaar%20forge&amp;severity=medium&amp;id=692781c3d322a87b22e508d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66031-cwe-674-uncontrolled-recursion-in-d-86f64623</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66031%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=692781c3d322a87b22e508d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prepared-statements-prepared-to-be-vulnerable-c5843ca0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prepared%20Statements%3F%20Prepared%20to%20Be%20Vulnerable.&amp;severity=medium&amp;id=6927773bd322a87b22e1900c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-v2-campaign-spreads-from-npm-to-maven-e-e43b1915</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20v2%20Campaign%20Spreads%20From%20npm%20to%20Maven%2C%20Exposing%20Thousands%20of%20Secrets&amp;severity=high&amp;id=69277031d322a87b22d93289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/comcast-to-pay-15m-fine-for-vendor-breach-affectin-15e2b2fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Comcast%20to%20pay%20%241.5M%20fine%20for%20vendor%20breach%20affecting%20270K%20customers&amp;severity=high&amp;id=69277031d322a87b22d93275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-exchange-on-premises-hardening-recommend-05d003bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Exchange%20on-premises%20hardening%20recommendations&amp;severity=medium&amp;id=692761520192bc7fb417f8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-v2-campaign-spreads-from-npm-to-maven-e-fa4ca7d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20v2%20Spreads%20From%20npm%20to%20Maven%2C%20as%20Campaign%20Exposes%20Thousands%20of%20Secrets&amp;severity=medium&amp;id=692742820de433ec09574d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multiple-london-councils-it-systems-disrupted-by-c-1d0bc672</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multiple%20London%20councils&apos;%20IT%20systems%20disrupted%20by%20cyberattack&amp;severity=high&amp;id=692740b70de433ec0954ddaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20373-information-written-to-log-files-ca-9bcabc97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20373%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Add-on%20for%20Palo%20Alto%20Networks&amp;severity=low&amp;id=692740e20de433ec09559d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meet-rey-the-admin-of-scattered-lapsus-hunters-2cbca93a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meet%20Rey%2C%20the%20Admin%20of%20%E2%80%98Scattered%20Lapsus%24%20Hunters%E2%80%99&amp;severity=high&amp;id=692740b70de433ec0954ddae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64130-cwe-79-in-zenitel-tciv-3-929b32fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64130%3A%20CWE-79%20in%20Zenitel%20TCIV-3%2B&amp;severity=critical&amp;id=692740e20de433ec09559d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64129-cwe-787-in-zenitel-tciv-3-0105844f</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64129%3A%20CWE-787%20in%20Zenitel%20TCIV-3%2B&amp;severity=high&amp;id=692740e20de433ec09559d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64128-cwe-78-in-zenitel-tciv-3-0d3761ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64128%3A%20CWE-78%20in%20Zenitel%20TCIV-3%2B&amp;severity=critical&amp;id=692740e20de433ec09559d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64127-cwe-78-in-zenitel-tciv-3-84453c4a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64127%3A%20CWE-78%20in%20Zenitel%20TCIV-3%2B&amp;severity=critical&amp;id=692740e20de433ec09559d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64126-cwe-78-in-zenitel-tciv-3-b8427054</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64126%3A%20CWE-78%20in%20Zenitel%20TCIV-3%2B&amp;severity=critical&amp;id=69273d3b0de433ec0950b8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11461-cwe-89-improper-neutralization-of-s-54232b2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11461%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Frappe%20Frappe%20CRM&amp;severity=high&amp;id=69273d3b0de433ec0950b8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13084-cwe-1230-in-opto-22-groov-view-serv-2f8b3269</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13084%3A%20CWE-1230%20in%20Opto%2022%20groov%20View%20Server&amp;severity=high&amp;id=69273d3b0de433ec0950b8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2486-cwe-489-active-debug-code-in-ubuntu--23368ecd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2486%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20Ubuntu%20edk2&amp;severity=low&amp;id=69273d3b0de433ec0950b8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-teams-flaw-in-guest-chat-exposes-users-t-3aef71f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Teams%20Flaw%20in%20Guest%20Chat%20Exposes%20Users%20to%20Malware%20Attacks&amp;severity=medium&amp;id=6927292a6d0980878b38f69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13601-integer-overflow-or-wraparound-in-r-d06b12db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13601%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=high&amp;id=6927165b55a49d3da8582be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-turns-south-korean-msp-breach-int-f8b9a17d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Turns%20South%20Korean%20MSP%20Breach%20Into%2028-Victim%20&apos;Korean%20Leaks&apos;%20Data%20Heist&amp;severity=medium&amp;id=69272577b6bca73b242a39a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/account-takeover-fraud-caused-262-million-in-losse-14aa653e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Account%20Takeover%20Fraud%20Caused%20%24262%20Million%20in%20Losses%20in%202025%3A%20FBI&amp;severity=medium&amp;id=69270231b9c2c409f8ba71ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-extension-caught-injecting-hidden-solana-tr-d47d585b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Extension%20Caught%20Injecting%20Hidden%20Solana%20Transfer%20Fees%20Into%20Raydium%20Swaps&amp;severity=high&amp;id=6926fec1b9c2c409f8b5f62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emergency-alerts-go-dark-after-cyberattack-on-onso-c32fe61f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emergency%20alerts%20go%20dark%20after%20cyberattack%20on%20OnSolve%20CodeRED&amp;severity=critical&amp;id=6926fec1b9c2c409f8b5f62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asus-warns-of-new-critical-auth-bypass-flaw-in-aic-fad848af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASUS%20warns%20of%20new%20critical%20auth%20bypass%20flaw%20in%20AiCloud%20routers&amp;severity=critical&amp;id=6926fec1b9c2c409f8b5f617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/huawei-and-chinese-surveillance-schneier-on-securi-cfffc460</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Huawei%20and%20Chinese%20Surveillance%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6926fec1b9c2c409f8b5f637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/samourai-wallet-founders-jailed-in-237m-crypto-lau-e7b2dd89</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Samourai%20Wallet%20Founders%20Jailed%20in%20%24237M%20Crypto%20Laundering%20Case&amp;severity=medium&amp;id=6926fec1b9c2c409f8b5f633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-secrets-leaked-on-code-formatting-pla-8e6126c8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20Secrets%20Leaked%20on%20Code%20Formatting%20Platforms&amp;severity=medium&amp;id=6926fbd76359f79d717e3c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9163-cwe-79-improper-neutralization-of-in-f51dd7cf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9163%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez&amp;severity=medium&amp;id=6926f4dc6359f79d7175be7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9191-cwe-502-deserialization-of-untrusted-b006c9a3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9191%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20favethemes%20Houzez&amp;severity=medium&amp;id=6926f4dc6359f79d7175be81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-2m-security-detection-fails-can-your-soc-3811423b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Your%20%242M%20Security%20Detection%20Fails%3A%20Can%20your%20SOC%20Save%20You%3F&amp;severity=medium&amp;id=6926fd0d6359f79d7180ab34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attack-disrupts-local-emergency-alert-s-b751d60a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Attack%20Disrupts%20Local%20Emergency%20Alert%20System%20Across%20US&amp;severity=medium&amp;id=6926e7de61dc91128fa26c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13674-cwe-824-access-of-uninitialized-poi-b421819d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13674%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6926e80361dc91128fa27e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-battlefield-6-downloads-are-spreading-malware-8d167e86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Battlefield%206%20Downloads%20Are%20Spreading%20Malware%2C%20Stealing%20Player%20Data&amp;severity=medium&amp;id=6926e46361dc91128f9eb0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-extension-caught-injecting-hidden-solana-tr-8ad50597</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Extension%20Caught%20Injecting%20Hidden%20Solana%20Transfer%20Fees%20Into%20Raydium%20Swaps&amp;severity=medium&amp;id=6926ecac61dc91128fa49d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-dprks-fake-job-platform-targeting-us-ai-tal-2a631b5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20DPRK&apos;s%20Fake%20Job%20Platform%20Targeting%20U.S.%20AI%20Talent&amp;severity=medium&amp;id=6926d42e63e47a62eb4f31d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-bear-attacks-what-we-learned-about-the-phishin-38596e7a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20&apos;Bear&apos;%20attacks%3A%20what%20we%20learned%20about%20the%20phishing%20campaign%20targeting%20Russian%20organizations&amp;severity=medium&amp;id=6926ceff91609981b6f87aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59390-cwe-338-use-of-cryptographically-we-fab80e5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59390%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Apache%20Software%20Foundation%20Apache%20Druid&amp;severity=critical&amp;id=6926c34b1118926627ff927f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62728-cwe-89-improper-neutralization-of-s-63531780</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62728%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Hive&amp;severity=medium&amp;id=6926bfc71118926627fad662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romcom-uses-socgholish-fake-update-attacks-to-deli-3b7e2b90</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RomCom%20Uses%20SocGholish%20Fake%20Update%20Attacks%20to%20Deliver%20Mythic%20Agent%20Malware&amp;severity=high&amp;id=6926d02d91609981b6fb17d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dartmouth-college-confirms-data-theft-in-oracle-ha-7d4b6406</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dartmouth%20College%20Confirms%20Data%20Theft%20in%20Oracle%20Hack&amp;severity=medium&amp;id=6926b9bda99853a7c84011a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-malware-deploys-in-fake-job-scams-02afef83</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS%20Malware%20Deploys%20in%20Fake%20Job%20Scams&amp;severity=medium&amp;id=6926d198986a99cf1699507a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13735-cwe-125-out-of-bounds-read-in-asr-l-b8cf832b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13735%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ASR%20Lapwing_Linux&amp;severity=high&amp;id=69269d33e3ad539e3a6f9c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12061-cwe-862-missing-authorization-in-ta-a0548111</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12061%3A%20CWE-862%20Missing%20Authorization%20in%20TAX%20SERVICE%20Electronic%20HDM&amp;severity=high&amp;id=692699b0e3ad539e3a6b2fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9557-buffer-copy-without-checking-size-of-89d49424</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9557%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=6926a089ecc6d4a57428146b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9558-buffer-copy-without-checking-size-of-92e9b220</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9558%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=6926a089ecc6d4a57428146e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64983-active-debug-code-in-switchbot-smar-354c7303</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64983%3A%20Active%20debug%20code%20in%20SwitchBot%20Smart%20Video%20Doorbell&amp;severity=high&amp;id=692685df1243ed466a4a3826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-reports-262m-in-ato-fraud-as-researchers-cite--76989253</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Reports%20%24262M%20in%20ATO%20Fraud%20as%20Researchers%20Cite%20Growing%20AI%20Phishing%20and%20Holiday%20Scams&amp;severity=medium&amp;id=692687361243ed466a4d4606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66022-cwe-829-inclusion-of-functionality--623a9be1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66022%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20factionsecurity%20faction&amp;severity=critical&amp;id=692669caca41832e1e64f236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66021-cwe-79-improper-neutralization-of-i-7d7cb5f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66021%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OWASP%20java-html-sanitizer&amp;severity=high&amp;id=69265f3eca41832e1e61653e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66020-cwe-1333-inefficient-regular-expres-926f4261</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66020%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20open-circle%20valibot&amp;severity=high&amp;id=69265f3eca41832e1e61653a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66269-cwe-428-unquoted-search-path-or-ele-5703f7c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66269%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20MegaTec%20Taiwan%20UPSilon2000V6.0&amp;severity=high&amp;id=69265f3eca41832e1e616544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66266-cwe-269-improper-privilege-manageme-76992282</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66266%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20MegaTec%20Taiwan%20UPSilon2000V6.0&amp;severity=critical&amp;id=69265f3eca41832e1e616541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66265-cwe-269-improper-privilege-manageme-b38de6bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66265%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20MegaTec%20Taiwan%20ClientMate&amp;severity=medium&amp;id=692654b3ca41832e1e5d9fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66264-cwe-428-unquoted-search-path-or-ele-074b793e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66264%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20MegaTec%20Taiwan%20ClientMate&amp;severity=high&amp;id=692654b3ca41832e1e5d9fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66263-cwe-158-unauthenticated-arbitrary-f-a58d8583</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66263%3A%20CWE-158%20Unauthenticated%20Arbitrary%20File%20Read%20via%20Null%20Byte%20Injection%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=692654b3ca41832e1e5d9fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66262-cwe-22-arbitrary-file-overwrite-via-a79c9cf2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66262%3A%20CWE-22%20Arbitrary%20File%20Overwrite%20via%20Tar%20Extraction%20Path%20Traversal%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=692654b3ca41832e1e5d9fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66261-cwe-78-unauthenticated-os-command-i-e3fa977a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66261%3A%20CWE-78%20Unauthenticated%20OS%20Command%20Injection%20(restore_settings.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=692654b3ca41832e1e5d9fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66260-cwe-89-postgresql-sql-injection-sta-d7104582</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66260%3A%20CWE-89%20PostgreSQL%20SQL%20Injection%20(status_sql.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=692654b3ca41832e1e5d9fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66259-cwe-20-improper-input-validation-in-9a138e69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66259%3A%20CWE-20%20Improper%20Input%20Validation%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=692654b3ca41832e1e5d9fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66258-cwe-79-stored-cross-site-scripting--3eccfa79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66258%3A%20CWE-79%20Stored%20Cross-Site%20Scripting%20via%20XML%20Injection%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=692654b3ca41832e1e5d9faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66257-cwe-73-unauthenticated-arbitrary-fi-71769393</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66257%3A%20CWE-73%20Unauthenticated%20Arbitrary%20File%20Deletion%20(patch_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66256-cwe-434-unauthenticated-arbitrary-f-2dcb4ccf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66256%3A%20CWE-434%20Unauthenticated%20Arbitrary%20File%20Upload%20(patch_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66255-cwe-345-unauthenticated-arbitrary-f-93802dee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66255%3A%20CWE-345%20Unauthenticated%20Arbitrary%20File%20Upload%20(upgrade_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66254-cwe-73-unauthenticated-arbitrary-fi-f3c91cb8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66254%3A%20CWE-73%20Unauthenticated%20Arbitrary%20File%20Deletion%20(upgrade_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=69265837ca41832e1e5f38f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66253-cwe-78-unauthenticated-os-command-i-fb13e787</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66253%3A%20CWE-78%20Unauthenticated%20OS%20Command%20Injection%20(start_upgrade.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66252-cwe-835-infinite-loop-denial-of-ser-fec7f0b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66252%3A%20CWE-835%20Infinite%20Loop%20Denial%20of%20Service%20via%20Failed%20File%20Deletion%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=69265837ca41832e1e5f38f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66251-cwe-22-unauthenticated-path-travers-5efd3afd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66251%3A%20CWE-22%20Unauthenticated%20Path%20Traversal%20with%20Arbitrary%20File%20Deletion%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=69265837ca41832e1e5f38ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66250-cwe-434-unauthenticated-arbitrary-f-5729bc0c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66250%3A%20CWE-434%20Unauthenticated%20Arbitrary%20File%20Upload%20(status_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-target-us-engineering-firm-because-46b2dde5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Target%20US%20Engineering%20Firm%20Because%20of%20Work%20Done%20for%20Ukrainian%20Sister%20City&amp;severity=medium&amp;id=69264a35ca41832e1e4a7332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64657-cwe-121-stack-based-buffer-overflow-b2c66871</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64657%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Microsoft%20Azure%20App%20Gateway&amp;severity=critical&amp;id=69264a57ca41832e1e4ac27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64656-cwe-125-out-of-bounds-read-in-micro-1400505a</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64656%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Azure%20App%20Gateway&amp;severity=critical&amp;id=69264a57ca41832e1e4ac279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sha1-hulud-november-2025-ef47d469</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sha1-Hulud%20-%20November%202025&amp;severity=medium&amp;id=692aac9afd873eca28420b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-gainsight-security-advisory-nov-2025-a3c77be3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Gainsight%20Security%20Advisory%20-%20Nov%202025&amp;severity=medium&amp;id=692aac9afd873eca28420b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-26-7e304bfd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-26&amp;severity=medium&amp;id=692796c5d322a87b22e9fdb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65202-na-fd92ebc5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65202%3A%20n%2Fa&amp;severity=high&amp;id=69276a3ac7c0a5a0bac75a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65670-na-2d1ed691</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65670%3A%20n%2Fa&amp;severity=medium&amp;id=69275cdeea1ddeeb60e50d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50433-na-afb79f46</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50433%3A%20n%2Fa&amp;severity=critical&amp;id=69275cdeea1ddeeb60e50d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65278-na-a2e04951</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65278%3A%20n%2Fa&amp;severity=high&amp;id=6927595aea1ddeeb60e12f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65276-na-2020b873</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65276%3A%20n%2Fa&amp;severity=critical&amp;id=6927595aea1ddeeb60e12f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65669-na-a0b4ef9b</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65669%3A%20n%2Fa&amp;severity=critical&amp;id=6927505dbd9e0dd06440c115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65676-na-e5efbf4f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65676%3A%20n%2Fa&amp;severity=medium&amp;id=69274dc48e37a182565e4564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65681-na-6c4d9912</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65681%3A%20n%2Fa&amp;severity=low&amp;id=69274dc48e37a182565e455f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65675-na-3b152de7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65675%3A%20n%2Fa&amp;severity=medium&amp;id=69274a408e37a182565a4464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65672-na-bb986b43</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65672%3A%20n%2Fa&amp;severity=high&amp;id=69274a408e37a182565a445f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26155-na-be652fc3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26155%3A%20n%2Fa&amp;severity=critical&amp;id=692746bc8e37a182565603e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55471-na-a54153ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55471%3A%20n%2Fa&amp;severity=high&amp;id=692743458e37a1825651967d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55469-na-bcd4665a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55469%3A%20n%2Fa&amp;severity=critical&amp;id=692740e20de433ec09559d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65237-na-d15c28a7</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65237%3A%20n%2Fa&amp;severity=medium&amp;id=692733b56d0980878b469f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65235-na-98e99aa1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65235%3A%20n%2Fa&amp;severity=critical&amp;id=692733b56d0980878b469f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65236-na-13518308</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65236%3A%20n%2Fa&amp;severity=critical&amp;id=692733b56d0980878b469f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65238-na-dc948eb8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65238%3A%20n%2Fa&amp;severity=medium&amp;id=69272cad6d0980878b3dd34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65239-na-834ea9f0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65239%3A%20n%2Fa&amp;severity=medium&amp;id=6927289df2ee3b97400f2f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63938-na-8fc327f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63938%3A%20n%2Fa&amp;severity=medium&amp;id=6927289df2ee3b97400f2f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46175-na-95c4841f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46175%3A%20n%2Fa&amp;severity=high&amp;id=6927289df2ee3b97400f2f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46174-na-3144f751</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46174%3A%20n%2Fa&amp;severity=high&amp;id=692726ab522797cb4ab1a601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50399-na-abe5ecbe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50399%3A%20n%2Fa&amp;severity=critical&amp;id=692723bab6bca73b24276606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45311-na-f8479b24</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45311%3A%20n%2Fa&amp;severity=high&amp;id=692723bab6bca73b24276602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50402-na-44c40abd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50402%3A%20n%2Fa&amp;severity=critical&amp;id=692723bab6bca73b242765fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56396-na-0c5d1b49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56396%3A%20n%2Fa&amp;severity=high&amp;id=692723bab6bca73b242765f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59820-cwe-1284-improper-validation-of-spe-846057d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59820%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20KDE%20Krita&amp;severity=medium&amp;id=692699b0e3ad539e3a6b2fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55174-cwe-684-incorrect-provision-of-spec-64441b28</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55174%3A%20CWE-684%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20KDE%20Skanpage&amp;severity=low&amp;id=692692b1e3ad539e3a636d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65963-cwe-284-improper-access-control-in--e8879ef2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65963%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20humhub%20cfiles&amp;severity=medium&amp;id=69263fd05765e822eef9c741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66019-cwe-400-uncontrolled-resource-consu-a37fade8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66019%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69263fd05765e822eef9c745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65957-cwe-200-exposure-of-sensitive-infor-a7002cff</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65957%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Intercore-Productions%20Core-Bot&amp;severity=high&amp;id=69264a57ca41832e1e4ac27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65956-cwe-79-improper-neutralization-of-i-3135a111</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65956%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getformwork%20formwork&amp;severity=medium&amp;id=69263c525765e822eef59465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65952-cwe-22-improper-limitation-of-a-pat-3ffa6097</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65952%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iiDk-the-actual%20Console&amp;severity=high&amp;id=69263566acb2eea424e18f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13597-cwe-434-unrestricted-upload-of-file-188b0f58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13597%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20soportecibeles%20AI%20Feeds&amp;severity=critical&amp;id=692631dfacb2eea424dd30df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13595-cwe-434-unrestricted-upload-of-file-82ab0c8d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13595%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20soportecibeles%20CIBELES%20AI&amp;severity=critical&amp;id=692631dfacb2eea424dd30d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64713-cwe-119-improper-restriction-of-ope-b512b911</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64713%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20bytecodealliance%20wasm-micro-runtime&amp;severity=medium&amp;id=69262ac94ed5c2dbbb0fc281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64704-cwe-754-improper-check-for-unusual--cc35e8b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64704%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20bytecodealliance%20wasm-micro-runtime&amp;severity=medium&amp;id=69262ac94ed5c2dbbb0fc27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62703-cwe-502-deserialization-of-untruste-cb47f5a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62703%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20fugue-project%20fugue&amp;severity=high&amp;id=692621d54ed5c2dbbb064b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66017-cwe-327-use-of-a-broken-or-risky-cr-5a8408ed</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66017%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20LFDT-Lockness%20cggmp21&amp;severity=high&amp;id=69260c0cffc41f183f7e2ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66016-cwe-345-insufficient-verification-o-5b8661a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66016%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20LFDT-Lockness%20cggmp21&amp;severity=critical&amp;id=69260c0cffc41f183f7e2cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65965-cwe-212-improper-removal-of-sensiti-56118a5a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65965%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20anchore%20grype&amp;severity=high&amp;id=69260888ffc41f183f790649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12816-cwe-436-interpretation-conflict-in--05c57b02</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12816%3A%20CWE-436%20Interpretation%20Conflict%20in%20Digital%20Bazaar%20node-forge&amp;severity=high&amp;id=692601e4ffc41f183f725864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34350-cwe-22-improper-limitation-of-a-pat-eb9ec087</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34350%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synergetic%20Data%20Systems%2C%20Inc.%20UnForm%20Server&amp;severity=high&amp;id=692601e4ffc41f183f725869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-spyware-targeting-messaging-app-user-565179a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Spyware%20Targeting%20Messaging%20App%20Users&amp;severity=high&amp;id=6925f3c2ea01c5f8b82fc012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33203-cwe-918-server-side-request-forgery-9bd8bb1f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33203%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20NVIDIA%20NeMo%20Agent%20ToolKit&amp;severity=high&amp;id=6925f3dfea01c5f8b8301208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33205-cwe-829-inclusion-of-functionality--bd2e791e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33205%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6925f3dfea01c5f8b8301212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33204-cwe-94-improper-control-of-generati-30e73709</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33204%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6925f3dfea01c5f8b830120d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33200-cwe-226-sensitive-information-in-re-1a0b095e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33200%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20NVIDIA%20DGX%20Spark&amp;severity=low&amp;id=6925f3dfea01c5f8b8301203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33199-cwe-670-always-incorrect-control-fl-2646cf85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33199%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20NVIDIA%20DGX%20Spark&amp;severity=low&amp;id=6925f3dfea01c5f8b83011fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33198-cwe-226-sensitive-information-in-re-310c4117</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33198%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20NVIDIA%20DGX%20Spark&amp;severity=low&amp;id=6925f3dfea01c5f8b83011f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33197-cwe-476-null-pointer-dereference-in-282c354f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33197%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f3dfea01c5f8b83011f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33196-cwe-226-sensitive-information-in-re-a432024d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33196%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33195-cwe-119-improper-restriction-of-ope-f16f3515</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33195%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33194-cwe-180-incorrect-behavior-order-va-34fc6673</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33194%3A%20CWE-180%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33193-cwe-354-improper-validation-of-inte-bcacddd2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33193%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33192-cwe-690-unchecked-return-value-to-n-4a43c480</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33192%3A%20CWE-690%20Unchecked%20Return%20Value%20to%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33191-cwe-20-improper-input-validation-in-fbda1b94</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33191%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33190-cwe-787-out-of-bounds-write-in-nvid-6b5512fd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33190%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33189-cwe-787-out-of-bounds-write-in-nvid-5d6ef151</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33189%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20DGX%20Spark&amp;severity=high&amp;id=6925f0bc94b153c6e1167e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33188-cwe-269-improper-privilege-manageme-f3a612ca</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33188%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NVIDIA%20DGX%20Spark&amp;severity=high&amp;id=6925f0bc94b153c6e1167e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33187-cwe-269-improper-privilege-manageme-7ed57606</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33187%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NVIDIA%20DGX%20Spark&amp;severity=critical&amp;id=6925f0bc94b153c6e1167e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65085-cwe-122-heap-based-buffer-overflow--854f1342</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65085%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=6925f0be94b153c6e11684f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65084-cwe-787-out-of-bounds-write-in-ashl-89b31184</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65084%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=6925f0be94b153c6e11684f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13483-cwe-306-missing-authentication-for--4e67c2d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13483%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SiRcom%20SMART%20Alert%20(SiSA&amp;severity=high&amp;id=6925ed1794b153c6e111ebeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-claims-breach-at-spains-nationa-52d01432</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20ransomware%20claims%20breach%20at%20Spain%E2%80%99s%20national%20airline%20Iberia%20with%20596%20GB%20data%20theft&amp;severity=high&amp;id=6925e61794b153c6e10ae0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/years-of-jsonformatter-and-codebeautify-leaks-expo-93607956</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Years%20of%20JSONFormatter%20and%20CodeBeautify%20Leaks%20Expose%20Thousands%20of%20Passwords%20and%20API%20Keys&amp;severity=critical&amp;id=6925e565174e41d3fb49883b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13467-deserialization-of-untrusted-data-i-33bdd2d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13467%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=6925d6df159f97fbc0f9aed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toddycats-new-hacking-tools-steal-outlook-emails-a-05acb965</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ToddyCat&apos;s%20New%20Hacking%20Tools%20Steal%20Outlook%20Emails%20and%20Microsoft%20365%20Access%20Tokens&amp;severity=high&amp;id=6925d349159f97fbc0f5138c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-beautifiers-expose-credentials-from-banks-gov-050af2c0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Code%20beautifiers%20expose%20credentials%20from%20banks%2C%20govt%2C%20tech%20orgs&amp;severity=high&amp;id=6925d34a159f97fbc0f51390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40890-cwe-79-improper-neutralization-of-i-3fd36a23</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=6925cfc8159f97fbc0f17f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0248-cwe-20-improper-input-validation-in--8289b1d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0248%3A%20CWE-20%20Improper%20Input%20Validation%20in%20HCL%20Software%20iNotes&amp;severity=high&amp;id=6925cc51159f97fbc0ed83f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36134-cwe-1275-in-ibm-sterling-b2b-integr-551a678b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36134%3A%20CWE-1275%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=low&amp;id=6925c2045b1d823317eed0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jackfix-uses-fake-windows-update-pop-ups-on-adult--3785608d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JackFix%20Uses%20Fake%20Windows%20Update%20Pop-Ups%20on%20Adult%20Sites%20to%20Deliver%20Multiple%20Stealers&amp;severity=critical&amp;id=6925cb495b1d823317fa685d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alumni-student-and-staff-information-stolen-from-h-0a78d7e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alumni%2C%20Student%2C%20and%20Staff%20Information%20Stolen%20From%20Harvard%20University&amp;severity=medium&amp;id=6925bb0e6dc31f06e917db71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scam-phone-numbers-how-to-spot-them-avoid-fraud-an-05dc5cab</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scam%20Phone%20Numbers%3A%20How%20to%20Spot%20Them%2C%20Avoid%20Fraud%2C%20and%20Protect%20Yourself&amp;severity=medium&amp;id=6925bb286dc31f06e917e35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fluent-bit-vulnerabilities-expose-cloud-services-t-ff848435</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fluent%20Bit%20Vulnerabilities%20Expose%20Cloud%20Services%20to%20Takeover&amp;severity=critical&amp;id=6925b4096dc31f06e90fa535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jack-of-all-trades-shaihulud-malware-steals-secret-0c76b81a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jack%20of%20all%20trades%3A%20Shai%E2%80%91Hulud%20malware%20steals%20secrets%2C%20AIPAC%20data%20breach%20uncovered&amp;severity=high&amp;id=6925b42f6dc31f06e90fb859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wormgpt-4-and-kawaiigpt-new-dark-llms-boost-cyberc-5fa51279</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WormGPT%204%20and%20KawaiiGPT%3A%20New%20Dark%20LLMs%20Boost%20Cybercrime%20Automation&amp;severity=medium&amp;id=6925b4096dc31f06e90fa539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hide-the-threat-gpo-lateral-movement-f9b4425f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hide%20the%20threat%20-%20GPO%20lateral%20movement&amp;severity=medium&amp;id=6925b0996dc31f06e90b300e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-us-banks-impacted-by-situsamc-hack-172600ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20US%20Banks%20Impacted%20by%20SitusAMC%20Hack&amp;severity=medium&amp;id=69259e98a8d212b82783c007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dartmouth-college-confirms-data-breach-after-clop--ac1fae10</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dartmouth%20College%20confirms%20data%20breach%20after%20Clop%20extortion%20attack&amp;severity=high&amp;id=692598bfa8d212b8277bf437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-spyware-campaigns-hijacking-h-d353fdb0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Spyware%20Campaigns%20Hijacking%20High-Value%20Signal%20and%20WhatsApp%20Users&amp;severity=high&amp;id=692598bfa8d212b8277bf43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/situsamc-confirms-data-breach-affecting-customer-i-d262e57c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SitusAMC%20confirms%20data%20breach%20affecting%20customer%20information&amp;severity=high&amp;id=692598bfa8d212b8277bf440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toddycats-new-hacking-tools-steal-outlook-emails-a-567fbe39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ToddyCat%E2%80%99s%20New%20Hacking%20Tools%20Steal%20Outlook%20Emails%20and%20Microsoft%20365%20Access%20Tokens&amp;severity=low&amp;id=6925ac106d2b27733e2f3516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-hijack-blender-3d-assets-to-deploy-stealc--37734e13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Hijack%20Blender%203D%20Assets%20to%20Deploy%20StealC%20V2%20Data-Stealing%20Malware&amp;severity=medium&amp;id=69259532a8d212b827789180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/640-npm-packages-infected-in-new-shai-hulud-supply-e7405928</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=640%20NPM%20Packages%20Infected%20in%20New%20%E2%80%98Shai-Hulud%E2%80%99%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69258aa57fd7dcae45bdde11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13502-integer-overflow-or-wraparound-in-r-0f720288</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13502%3A%20Out-of-bounds%20Read%20in%20The%20WebKitGTK%20Team%20webkitgtk&amp;severity=high&amp;id=69256893690aeb35a2ca49fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59372-cwe-22-improper-limitation-of-a-pat-a6cd8f62</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59372%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ASUS%20Router&amp;severity=medium&amp;id=69255e2a292ce6fc00be0660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59371-cwe-330-use-of-insufficiently-rando-7f7b84a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59371%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20ASUS%20Router&amp;severity=high&amp;id=69255e2a292ce6fc00be065d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59370-cwe-78-improper-neutralization-of-s-c25430c4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59370%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ASUS%20Router&amp;severity=high&amp;id=69255e2a292ce6fc00be065a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59369-cwe-89-improper-neutralization-of-s-7e846994</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59369%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQLCommand%20(&apos;SQL%20Injection&apos;)%20in%20ASUS%20Router&amp;severity=medium&amp;id=69255e2a292ce6fc00be0657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59368-cwe-191-integer-underflow-in-asus-r-cda50801</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59368%3A%20CWE-191%3A%20Integer%20Underflow%20in%20ASUS%20Router&amp;severity=medium&amp;id=69255e2a292ce6fc00be0654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12003-cwe-306-missing-authentication-for--acd4d286</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12003%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ASUS%20Router&amp;severity=high&amp;id=69255e27292ce6fc00be05bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12587-cwe-352-cross-site-request-forgery--049a0147</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12587%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webgarh%20Peer%20Publish&amp;severity=medium&amp;id=69255e27292ce6fc00be05d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13385-cwe-89-improper-neutralization-of-s-02a6d761</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13385%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bylancer%20Bookme%20%E2%80%93%20Free%20Online%20Appointment%20Booking%20and%20Scheduling%20Plugin&amp;severity=medium&amp;id=69255e28292ce6fc00be0616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12634-cwe-862-missing-authorization-in-su-c51157ee</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12634%3A%20CWE-862%20Missing%20Authorization%20in%20sunarc%20Refund%20Request%20for%20WooCommerce&amp;severity=medium&amp;id=69255e27292ce6fc00be05de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13370-cwe-89-improper-neutralization-of-s-6f487c24</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13370%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ov3rkll%20ProjectList&amp;severity=medium&amp;id=69255e28292ce6fc00be05f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13311-cwe-79-improper-neutralization-of-i-98da3bd8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13311%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sigalitam%20Just%20Highlight&amp;severity=medium&amp;id=69255e28292ce6fc00be05f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12645-cwe-79-improper-neutralization-of-i-12636017</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12645%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karthiksg%20Inline%20frame%20%E2%80%93%20Iframe&amp;severity=medium&amp;id=69255e27292ce6fc00be05e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13405-cwe-862-missing-authorization-in-bu-eddace4a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13405%3A%20CWE-862%20Missing%20Authorization%20in%20buywptemplates%20Ace%20Post%20Type%20Builder&amp;severity=medium&amp;id=69255e2a292ce6fc00be063d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13380-cwe-73-external-control-of-file-nam-d175a848</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13380%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20liquidthemes%20AI%20Engine%20for%20WordPress%3A%20ChatGPT%2C%20GPT%20Content%20Generator&amp;severity=medium&amp;id=69255e28292ce6fc00be0603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13382-cwe-639-authorization-bypass-throug-7f50fbd0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13382%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nmedia%20Frontend%20File%20Manager%20Plugin&amp;severity=medium&amp;id=69255e28292ce6fc00be060b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13404-cwe-862-missing-authorization-in-do-86d5286a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13404%3A%20CWE-862%20Missing%20Authorization%20in%20docjojo%20atec%20Duplicate%20Page%20%26%20Post&amp;severity=medium&amp;id=69255e28292ce6fc00be0625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12025-cwe-79-improper-neutralization-of-i-be8c2bc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12025%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mahabubs%20YouTube%20Subscribe&amp;severity=medium&amp;id=69255e27292ce6fc00be05bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13386-cwe-862-missing-authorization-in-ly-52791f46</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13386%3A%20CWE-862%20Missing%20Authorization%20in%20lyrathemes%20Social%20Images%20Widget&amp;severity=medium&amp;id=69255e28292ce6fc00be061b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12525-cwe-200-exposure-of-sensitive-infor-a713e520</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12525%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20appglut%20Locker%20Content&amp;severity=medium&amp;id=69255e27292ce6fc00be05d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13389-cwe-639-authorization-bypass-throug-7263e877</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13389%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nmedia%20Admin%20and%20Customer%20Messages%20After%20Order%20for%20WooCommerce%3A%20OrderConvo&amp;severity=medium&amp;id=69255e28292ce6fc00be0620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13376-cwe-434-unrestricted-upload-of-file-d330b753</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13376%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ov3rkll%20ProjectList&amp;severity=high&amp;id=69255e28292ce6fc00be05fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12040-cwe-639-authorization-bypass-throug-a8fe76e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12040%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themehunk%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=69255e27292ce6fc00be05c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12586-cwe-352-cross-site-request-forgery--9f1d1728</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12586%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20evolurise%20Conditionnal%20Maintenance%20Mode%20for%20WordPress&amp;severity=medium&amp;id=69255e27292ce6fc00be05d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13452-cwe-639-authorization-bypass-throug-3e0abe10</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13452%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nmedia%20Admin%20and%20Customer%20Messages%20After%20Order%20for%20WooCommerce%3A%20OrderConvo&amp;severity=medium&amp;id=69255e2a292ce6fc00be0647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12032-cwe-79-improper-neutralization-of-i-2483c388</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vithanhlam%20Zweb%20Social%20Mobile%20%E2%80%93%20%E1%BB%A8ng%20D%E1%BB%A5ng%20N%C3%BAt%20G%E1%BB%8Di%20Mobile&amp;severity=medium&amp;id=69255e27292ce6fc00be05c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13383-cwe-79-improper-neutralization-of-i-7315652b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestweblayout%20Job%20Board%20by%20BestWebSoft&amp;severity=medium&amp;id=69255e28292ce6fc00be0610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13414-cwe-862-missing-authorization-in-gw-4c6e772c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13414%3A%20CWE-862%20Missing%20Authorization%20in%20gwendydd%20Chamber%20Dashboard%20Business%20Directory&amp;severity=medium&amp;id=69255e2a292ce6fc00be0642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12043-cwe-862-missing-authorization-in-au-ca88d6b7</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12043%3A%20CWE-862%20Missing%20Authorization%20in%20autochat%20Autochat%20Automatic%20Conversation&amp;severity=medium&amp;id=69255e27292ce6fc00be05cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59365-cwe-121-stack-based-buffer-overflow-68efcc7a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59365%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ASUS%20Router&amp;severity=medium&amp;id=69255e2a292ce6fc00be064e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59366-cwe-22-path-traversal-in-asus-route-0b36589e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59366%3A%20CWE-22%3A%20Path%20Traversal%20in%20ASUS%20Router&amp;severity=critical&amp;id=69255e2a292ce6fc00be0651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canon-says-subsidiary-impacted-by-oracle-ebs-hack-96f930c4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canon%20Says%20Subsidiary%20Impacted%20by%20Oracle%20EBS%20Hack&amp;severity=medium&amp;id=69255a9b292ce6fc00b9519c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64693-heap-based-buffer-overflow-in-inter-ce979d27</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64693%3A%20Heap-based%20buffer%20overflow%20in%20Intercom%2C%20Inc.%20Security%20Point%20(Windows)%20of%20MaLion&amp;severity=critical&amp;id=69255ab1292ce6fc00b965af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62691-stack-based-buffer-overflow-in-inte-93f6b262</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62691%3A%20Stack-based%20buffer%20overflow%20in%20Intercom%2C%20Inc.%20Security%20Point%20(Windows)%20of%20MaLion&amp;severity=critical&amp;id=69255ab1292ce6fc00b965ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59485-incorrect-default-permissions-in-in-f1a03053</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59485%3A%20Incorrect%20default%20permissions%20in%20Intercom%2C%20Inc.%20Security%20Point%20(Windows)%20of%20MaLion&amp;severity=low&amp;id=69255ab1292ce6fc00b965a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-spyware-campaigns-hijacking-h-4ec962b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Spyware%20Campaigns%20Hijacking%20High-Value%20Signal%20and%20WhatsApp%20Users&amp;severity=high&amp;id=692553225d11bc51878e9805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12742-cwe-78-improper-neutralization-of-s-ec748b90</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12742%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=6925421a441560fe7ee98db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13644-cwe-617-reachable-assertion-in-mong-7ed62f1d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13644%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=medium&amp;id=6925421a441560fe7ee98db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13643-cwe-862-missing-authorization-in-mo-c81940c8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13643%3A%20CWE-862%3A%20Missing%20Authorization%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=low&amp;id=69253e96441560fe7ee5716c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12893-cwe-295-improper-certificate-valida-da0f54ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12893%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=medium&amp;id=69253b14441560fe7ee1e752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13507-cwe-1284-improper-validation-of-spe-921c93f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13507%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=high&amp;id=6925392a441560fe7ee067dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13068-cwe-79-improper-neutralization-of-i-c380ee1e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13068%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milmor%20Telegram%20Bot%20%26%20Channel&amp;severity=high&amp;id=6925392a441560fe7ee067df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13559-cwe-269-improper-privilege-manageme-9ab9ee47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13559%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20venusweb%20EduKart%20Pro&amp;severity=critical&amp;id=6925392a441560fe7ee067e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13558-cwe-862-missing-authorization-in-pr-b4c47034</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13558%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=6925392a441560fe7ee067e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64730-cross-site-scripting-xss-in-sony-co-a4302e20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64730%3A%20Cross-site%20scripting%20(XSS)%20in%20Sony%20Corporation%20SNC-CX600W&amp;severity=medium&amp;id=6925392a441560fe7ee067f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62497-cross-site-request-forgery-csrf-in--371b7d7e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62497%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20Sony%20Corporation%20SNC-CX600W&amp;severity=low&amp;id=6925392a441560fe7ee067ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64304-use-of-hard-coded-cryptographic-key-55b49f41</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64304%3A%20Use%20of%20hard-coded%20cryptographic%20key%20in%20Fuji%20Television%20Network%2C%20Inc.%20%22FOD%22%20App%20for%20Android&amp;severity=medium&amp;id=692534a1f17e04acaf6c88e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10646-cwe-862-missing-authorization-in-qu-89108b3d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10646%3A%20CWE-862%20Missing%20Authorization%20in%20quadlayers%20Search%20Exclude&amp;severity=medium&amp;id=692527c82a08b12b0e80cc0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6389-cwe-94-improper-control-of-generatio-740e50f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6389%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Sneeit%20Sneeit%20Framework&amp;severity=critical&amp;id=692519cd2a08b12b0e7e45f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59373-cwe-732-incorrect-permission-assign-a59b9646</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59373%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ASUS%20MyASUS&amp;severity=high&amp;id=692512aa2a08b12b0e7cf688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65951-cwe-200-exposure-of-sensitive-infor-42a10bc6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65951%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mescuwa%20entropy-derby&amp;severity=high&amp;id=6924fa182a08b12b0e784280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65944-cwe-201-insertion-of-sensitive-info-ba27e5db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65944%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20getsentry%20sentry-javascript&amp;severity=medium&amp;id=6924fa182a08b12b0e78427a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9803-cwe-287-improper-authentication-in-l-b3eaaf9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9803%3A%20CWE-287%20Improper%20Authentication%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=6924fa182a08b12b0e784284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-25-3f99b78d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-25&amp;severity=medium&amp;id=692646c25765e822ee01c625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63735-na-78b6b7c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63735%3A%20n%2Fa&amp;severity=medium&amp;id=692621d54ed5c2dbbb064b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51746-na-5ea9b0cf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51746%3A%20n%2Fa&amp;severity=critical&amp;id=69261d1814e694ef3cf57cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51745-na-1c52bc21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51745%3A%20n%2Fa&amp;severity=critical&amp;id=69261d1814e694ef3cf57cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51744-na-de3d72e9</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51744%3A%20n%2Fa&amp;severity=critical&amp;id=69261d1814e694ef3cf57cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51743-na-324a7de8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51743%3A%20n%2Fa&amp;severity=critical&amp;id=69261d1814e694ef3cf57caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51741-na-9fbfea92</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51741%3A%20n%2Fa&amp;severity=high&amp;id=69261d1814e694ef3cf57caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51742-na-02a07797</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51742%3A%20n%2Fa&amp;severity=critical&amp;id=69260c0cffc41f183f7e2ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65647-na-c0e92f18</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65647%3A%20n%2Fa&amp;severity=medium&amp;id=69260888ffc41f183f790645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64067-na-95375f19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64067%3A%20n%2Fa&amp;severity=medium&amp;id=6925faccea01c5f8b8382a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61168-na-19f86d63</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61168%3A%20n%2Fa&amp;severity=critical&amp;id=6925faccea01c5f8b8382a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61167-na-7a610355</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61167%3A%20n%2Fa&amp;severity=medium&amp;id=6925faccea01c5f8b8382a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64065-na-e65ecfee</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64065%3A%20n%2Fa&amp;severity=high&amp;id=6925f747ea01c5f8b834af02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64064-na-ecb52644</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64064%3A%20n%2Fa&amp;severity=high&amp;id=6925f747ea01c5f8b834aefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64063-na-e7b0f7ca</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64063%3A%20n%2Fa&amp;severity=critical&amp;id=6925f747ea01c5f8b834aefa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64062-na-f25178cd</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64062%3A%20n%2Fa&amp;severity=high&amp;id=6925f3dfea01c5f8b8301218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64066-na-f625abf4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64066%3A%20n%2Fa&amp;severity=high&amp;id=6925f0be94b153c6e11684f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64061-na-d00e0823</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64061%3A%20n%2Fa&amp;severity=medium&amp;id=6925e2cb174e41d3fb46673b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63729-na-89f1140c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63729%3A%20n%2Fa&amp;severity=critical&amp;id=6925dbc3174e41d3fb3e2416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60739-na-1e4371c2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60739%3A%20n%2Fa&amp;severity=critical&amp;id=6925d6df159f97fbc0f9aed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64050-na-40aaec94</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64050%3A%20n%2Fa&amp;severity=high&amp;id=6925d374159f97fbc0f524dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64049-na-324f5566</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64049%3A%20n%2Fa&amp;severity=medium&amp;id=6925d374159f97fbc0f524d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62155-cwe-918-server-side-request-forgery-16942ca8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62155%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=6924f361c5f5f1e21b6201dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65018-cwe-787-out-of-bounds-write-in-pngg-00219fbb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65018%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20pnggroup%20libpng&amp;severity=high&amp;id=6924f361c5f5f1e21b6201df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64720-cwe-125-out-of-bounds-read-in-pnggr-8ffd8af9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64720%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=high&amp;id=6924efddc5f5f1e21b5dde43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64506-cwe-125-out-of-bounds-read-in-pnggr-c548bb38</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64506%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=6924efddc5f5f1e21b5dde4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64505-cwe-125-out-of-bounds-read-in-pnggr-cc20cedc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64505%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=6924efddc5f5f1e21b5dde49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/split-second-side-doors-how-bot-delegated-toctou-b-185f1568</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Split-Second%20Side%20Doors%3A%20How%20Bot-Delegated%20TOCTOU%20Breaks%20The%20CI%2FCD%20Threat%20Model&amp;severity=medium&amp;id=6924e5dc8d8147e8943bc1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10144-cwe-89-improper-neutralization-of-s-ca69e924</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10144%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quadlayers%20Perfect%20Brands%20for%20WooCommerce&amp;severity=medium&amp;id=6924dcee8d8147e89432b4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stories-from-the-soc-mystery-of-the-postponed-prox-ff0ee2de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stories%20from%20the%20SOC%3A%20Mystery%20of%20the%20postponed%20proxyware%20install&amp;severity=medium&amp;id=6925732e7e8c0fda07ba767b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-gets-creative-malware-buried-in-images-d646caab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Gets%20Creative%3A%20Malware%20Buried%20in%20Images&amp;severity=medium&amp;id=6925732e7e8c0fda07ba7658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29933-cwe-787-out-of-bounds-write-in-amd--285cbf25</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29933%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=medium&amp;id=6924ccc0338d19296f824bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48511-cwe-1285-improper-validation-of-spe-1c7ed30b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48511%3A%20CWE-1285%20%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=medium&amp;id=6924c9b1e1f3fb2621007d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48510-cwe-394-unexpected-status-code-or-r-a158c006</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48510%3A%20CWE-394%20%20Unexpected%20Status%20Code%20or%20Return%20Value%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=high&amp;id=6924c9b1e1f3fb2621007d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52538-cwe-190-integer-overflow-or-wraparo-233f7a71</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52538%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=high&amp;id=6924c62de1f3fb2621fbb452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0003-cwe-413-improper-resource-locking-in-00499a06</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0003%3A%20CWE-413%20%20Improper%20Resource%20Locking%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=high&amp;id=6924c2e2e1f3fb2621f8d20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0007-cwe-710-improper-adherence-to-coding-869874f4</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0007%3A%20CWE-710%20%20Improper%20Adherence%20to%20Coding%20Standards%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=medium&amp;id=6924c2e2e1f3fb2621f8d211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7330-cwe-434-unrestricted-upload-of-file--ff7a18c9</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7330%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Beijing%20Star-Net%20Ruijie%20Network%20Technology%20Co.%2C%20Ltd.%20NBR%20Series%20Routers&amp;severity=critical&amp;id=6924c2e2e1f3fb2621f8d201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14007-cwe-306-missing-authentication-for--5b150429</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14007%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Shenzhen%20TVT%20Digital%20Technology%20Co.%2C%20Ltd.%20NVMS-9000&amp;severity=high&amp;id=6924c2e2e1f3fb2621f8d208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36150-cwe-327-use-of-a-broken-or-risky-cr-6e8abf6a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36150%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert&amp;severity=medium&amp;id=6924c2e2e1f3fb2621f8d214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-systemic-flaw-in-binances-ip-whitelisting-model--7be62523</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20systemic%20flaw%20in%20Binance%E2%80%99s%20IP%20Whitelisting%20model%3A%20listenKeys%20bypass%20the%20protection%20entirely&amp;severity=medium&amp;id=6924ba58228e5e387419b415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0005-cwe-190-integer-overflow-or-wraparou-e45ff811</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0005%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=high&amp;id=6924ba55228e5e387419b3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52539-cwe-121-stack-based-buffer-overflow-4c6a03dc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52539%3A%20CWE-121%20%20Stack-based%20Buffer%20Overflow%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=high&amp;id=6924b6d1228e5e38741697d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/real-estate-finance-services-giant-situsamc-breach-f74a100d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Real-estate%20finance%20services%20giant%20SitusAMC%20breach%20exposes%20client%20data&amp;severity=high&amp;id=6924a5b565c0297328aa8965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36112-cwe-497-in-ibm-sterling-b2b-integra-d8aeffcc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36112%3A%20CWE-497%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=6924acb465c0297328b2f7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13609-use-of-multiple-resources-with-dupl-dda2b4b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13609%3A%20Use%20of%20Multiple%20Resources%20with%20Duplicate%20Identifier%20in%20Keylime%20Project%20keylime&amp;severity=high&amp;id=6924a2b20ea9183d5bf9f772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-linked-malware-campaign-hides-in-blender-3-4d76750e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian-linked%20Malware%20Campaign%20Hides%20in%20Blender%203D%20Files&amp;severity=high&amp;id=69249ba70ea9183d5bf293cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvard-university-discloses-data-breach-affecting-062bc1e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvard%20University%20discloses%20data%20breach%20affecting%20alumni%2C%20donors&amp;severity=high&amp;id=69249ba70ea9183d5bf293cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/delta-dental-of-virginia-data-breach-impacts-14591-54f810ac</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Delta%20Dental%20of%20Virginia%20data%20breach%20impacts%20145%2C918%20customers&amp;severity=high&amp;id=69249ba70ea9183d5bf293d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fluent-bit-flaws-expose-cloud-to-rce-and-steal-2225d104</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Fluent%20Bit%20Flaws%20Expose%20Cloud%20to%20RCE%20and%20Stealthy%20Infrastructure%20Intrusions&amp;severity=high&amp;id=69249ba70ea9183d5bf293d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/conflicts-between-url-mapping-and-url-based-access-588cec79</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control.%2C%20(Mon%2C%20Nov%2024th)&amp;severity=high&amp;id=69248e03ac857ca3cacf22fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-npm-worm-impacts-26000-repos-in-supply--63b4f678</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai%20Hulud%20npm%20Worm%20Impacts%2026%2C000%2B%20Repos%20in%20Supply%20Chain%20Attack%20Including%20Zapier%2C%20ENS%20and%20Postman&amp;severity=medium&amp;id=692483fbd5a1e53350b382d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-confirms-exploitation-of-recent-oracle-identi-41db2283</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Confirms%20Exploitation%20of%20Recent%20Oracle%20Identity%20Manager%20Vulnerability&amp;severity=medium&amp;id=69247c8eefc7406fa6689474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-npm-worm-infects-19000-packages-in-majo-344c0cf9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai%20Hulud%20npm%20Worm%20Infects%2019%2C000%20Packages%20in%20Major%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69247ca7efc7406fa6689bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10555-cwe-79-improper-neutralization-of-i-c2af2f74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10555%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Service%20Process%20Engineer&amp;severity=high&amp;id=69247cb8efc7406fa668b295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10554-cwe-79-improper-neutralization-of-i-f7c27a88</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Product%20Manager&amp;severity=high&amp;id=69247cb8efc7406fa668b292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crowdstrike-insider-helped-hackers-falsely-claim-s-d3990b33</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrowdStrike%20Insider%20Helped%20Hackers%20Falsely%20Claim%20System%20Breach&amp;severity=medium&amp;id=69247919efc7406fa6647da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44018-cwe-295-improper-certificate-valida-526e2dab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44018%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20GL-Inet%20GL-AXT1800&amp;severity=high&amp;id=6924792eefc7406fa6649b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12978-cwe-187-partial-string-comparison-i-c36d99b9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12978%3A%20CWE-187%3A%20Partial%20String%20Comparison%20in%20FluentBit%20Fluent%20Bit&amp;severity=medium&amp;id=6929e1b04121026312bb42fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12969-cwe-306-missing-authentication-for--c628dba8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12969%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FluentBit%20Fluent%20Bit&amp;severity=medium&amp;id=6929e1b04121026312bb42f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12972-cwe-35-path-traversal-in-fluentbit--62953ec5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12972%3A%20CWE-35%3A%20Path%20Traversal%20in%20FluentBit%20Fluent%20Bit&amp;severity=medium&amp;id=6929e1b04121026312bb4304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12977-cwe-187-partial-string-comparison-i-afafdf0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12977%3A%20CWE-187%3A%20Partial%20String%20Comparison%20in%20FluentBit%20Fluent%20Bit&amp;severity=critical&amp;id=6929e1b04121026312bb4308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12970-cwe-121-stack-based-buffer-overflow-a82b41c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12970%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20FluentBit%20Fluent%20Bit&amp;severity=high&amp;id=6929e1b04121026312bb4300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11921-cwe-732-incorrect-permission-assign-588b2598</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11921%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Bjango%20iStats&amp;severity=high&amp;id=69246d8d7150efb62b9155c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-deepseek-r1-ai-generates-insecure-code-whe-9109e2ab</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20DeepSeek-R1%20AI%20Generates%20Insecure%20Code%20When%20Prompts%20Mention%20Tibet%20or%20Uyghurs&amp;severity=high&amp;id=692467c7ff33e781bff0cd6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/second-sha1-hulud-wave-affects-25000-repositories--f517574d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Second%20Sha1-Hulud%20Wave%20Affects%2025%2C000%2B%20Repositories%20via%20npm%20Preinstall%20Credential%20Theft&amp;severity=high&amp;id=692467c7ff33e781bff0cd73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65998-cwe-321-use-of-hard-coded-cryptogra-147361a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65998%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Apache%20Software%20Foundation%20Apache%20Syncope&amp;severity=high&amp;id=69246443ff33e781bfec6d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-highlights-security-risks-introduced-by--4103237d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Highlights%20Security%20Risks%20Introduced%20by%20New%20Agentic%20AI%20Feature&amp;severity=high&amp;id=692460bcff33e781bfe93e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/second-sha1-hulud-wave-affects-25000-repositories--e120fa20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Second%20Sha1-Hulud%20Wave%20Affects%2025%2C000%2B%20Repositories%20via%20npm%20Preinstall%20Credential%20Theft&amp;severity=medium&amp;id=69246a5eff33e781bff46df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12628-cwe-331-insufficient-entropyy-in-wp-ac8173b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12628%3A%20CWE-331%20Insufficient%20Entropyy%20in%20WP%202FA&amp;severity=medium&amp;id=69245c1900c839aeb21861fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/live-updates-shai1-hulud-the-second-coming-hundred-6cc04660</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Live%20Updates%3A%20Shai1-Hulud%2C%20The%20Second%20Coming%20-%20Hundreds%20of%20NPM%20Packages%20Compromised&amp;severity=medium&amp;id=6924554600c839aeb20fcf6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-prettier-extension-on-vscode-marketplace-drop-d7b5d185</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Prettier%20Extension%20on%20VSCode%20Marketplace%20Dropped%20Anivia%20Stealer&amp;severity=medium&amp;id=6924552400c839aeb20f9bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mazda-says-no-data-leakage-or-operational-impact-f-29da8d3e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mazda%20Says%20No%20Data%20Leakage%20or%20Operational%20Impact%20From%20Oracle%20Hack&amp;severity=medium&amp;id=6924550e00c839aeb20f2584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-hidden-threats-protect-your-online-store-ecomme-f8523cc3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20Hidden%20Threats%20Protect%20Your%20Online%20Store%3A%20Ecommerce%20Cybsersecurity&amp;severity=medium&amp;id=6924552400c839aeb20f9bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-fortinet-exploit-chrome-0-day-badiis--f0daf758</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Fortinet%20Exploit%2C%20Chrome%200-Day%2C%20BadIIS%20Malware%2C%20Record%20DDoS%2C%20SaaS%20Breach%20%26%20More&amp;severity=medium&amp;id=69246a5eff33e781bff46dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41017-cwe-862-missing-authorization-in-da-a946c1ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41017%3A%20CWE-862%20Missing%20Authorization%20in%20Davantis%20DFUSION&amp;severity=medium&amp;id=6924518b00c839aeb20c718d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41016-cwe-862-missing-authorization-in-da-0564a689</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41016%3A%20CWE-862%20Missing%20Authorization%20in%20Davantis%20DFUSION&amp;severity=high&amp;id=6924518b00c839aeb20c718a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spanish-airline-iberia-notifies-customers-of-data--a567c4a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spanish%20Airline%20Iberia%20Notifies%20Customers%20of%20Data%20Breach&amp;severity=medium&amp;id=69244d6d911d225366050680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brazilian-campaign-spreading-the-malware-via-whats-1922fc4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brazilian%20Campaign%3A%20Spreading%20the%20Malware%20via%20WhatsApp&amp;severity=medium&amp;id=69244dd3911d225366056a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsukys-ongoing-evolution-of-kimjongrat-and-expan-f6206769</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky&apos;s%20Ongoing%20Evolution%20of%20KimJongRAT%20and%20Expanding%20Threats&amp;severity=medium&amp;id=69244e1100c839aeb2084876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-radzarat-spyware-poses-as-file-manager-to-hija-2fab30d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20RadzaRat%20Spyware%20Poses%20as%20File%20Manager%20to%20Hijack%20Android%20Devices%2C%20Evades%20All%2066%20Antivirus%20on%20VirusTotal&amp;severity=medium&amp;id=692446d8911d225366fbe14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/146000-impacted-by-delta-dental-of-virginia-data-b-4a9c49c2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=146%2C000%20Impacted%20by%20Delta%20Dental%20of%20Virginia%20Data%20Breach&amp;severity=medium&amp;id=692446c5911d225366fbd883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12741-cwe-20-improper-input-validation-in-c20badd7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12741%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=69244dd2911d225366056a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12740-cwe-20-improper-input-validation-in-fdb6d825</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12740%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=69244dd2911d225366056a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41087-cwe-79-improper-neutralization-of-i-242cbdfd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41087%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Taclia%20Taclia&apos;s%20web%20application&amp;severity=medium&amp;id=69244343911d225366f85a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41729-cwe-1287-improper-validation-of-spe-060e9a1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41729%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Janitza%20UMG%2096-PA&amp;severity=high&amp;id=69244343911d225366f85a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-deepseek-r1-ai-generates-insecure-code-whe-93576b9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20DeepSeek-R1%20AI%20Generates%20Insecure%20Code%20When%20Prompts%20Mention%20Tibet%20or%20Uyghurs&amp;severity=medium&amp;id=69244d03911d22536604edf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cox-confirms-oracle-ebs-hack-as-cybercriminals-nam-c5bb7076</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cox%20Confirms%20Oracle%20EBS%20Hack%20as%20Cybercriminals%20Name%20100%20Alleged%20Victims&amp;severity=medium&amp;id=6924390e296ff79352ebf870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/24th-november-threat-intelligence-report-d9ab7894</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=24th%20November%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69243921296ff79352ebfa49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowpad-malware-actively-exploits-wsus-vulnerabi-669b068b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowPad%20Malware%20Actively%20Exploits%20WSUS%20Vulnerability%20for%20Full%20System%20Access&amp;severity=high&amp;id=69243211296ff79352e3abc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-returns-over-300-npm-packages-and-21k-g-470c136c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20Returns%3A%20Over%20300%20NPM%20Packages%20and%2021K%20Github%20Repos%20infected%20via%20Fake%20Bun%20Runtime%20Within%20Hours&amp;severity=medium&amp;id=69242f333dd5bbb718bbeab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12739-cwe-79-improper-neutralization-of-i-b025b75c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=69242f303dd5bbb718bbea47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13596-cwe-209-generation-of-error-message-0b27d9e3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13596%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20ATISoluciones%20CIGES&amp;severity=low&amp;id=69240ce6272f5312cdbb624a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowpad-malware-actively-exploits-wsus-vulnerabi-9be01087</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowPad%20Malware%20Actively%20Exploits%20WSUS%20Vulnerability%20for%20Full%20System%20Access&amp;severity=medium&amp;id=692420aa3a0ff800317c82bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13588-server-side-request-forgery-in-lkin-7be263b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13588%3A%20Server-Side%20Request%20Forgery%20in%20lKinderBueno%20Streamity%20Xtream%20IPTV%20Player&amp;severity=medium&amp;id=69240640272f5312cdb48a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13586-sql-injection-in-sourcecodester-onl-445082c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13586%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=6923f9c2011871acbdf06d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12629-cwe-79-cross-site-scripting-xss-in--f82a86b7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12629%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Broken%20Link%20Manager&amp;severity=high&amp;id=6923f52e8313f4d201985fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12569-cwe-601-url-redirection-to-untruste-c21e20ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12569%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Guest%20posting%20%2F%20Frontend%20Posting%20%2F%20Front%20Editor&amp;severity=medium&amp;id=6923f52e8313f4d201985f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12394-cwe-200-information-exposure-in-bac-ee2a85e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12394%3A%20CWE-200%20Information%20Exposure%20in%20Backup%20Migration&amp;severity=medium&amp;id=6923f52e8313f4d201985f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14015-cwe-79-cross-site-scripting-xss-in--c5238676</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14015%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WordPress%20eCommerce%20Plugin&amp;severity=high&amp;id=6923f52e8313f4d201985f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13585-sql-injection-in-code-projects-covi-4b465460</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13585%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=6923f820011871acbdece00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13584-cross-site-scripting-in-eigenfocus-d268de6f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13584%3A%20Cross%20Site%20Scripting%20in%20Eigenfocus&amp;severity=medium&amp;id=6923e9501e6a877a1a5be181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7402-cwe-89-improper-neutralization-of-sp-c1c197c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7402%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6923e5eb1e6a877a1a57700d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13583-sql-injection-in-code-projects-ques-3a58c829</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13583%3A%20SQL%20Injection%20in%20code-projects%20Question%20Paper%20Generator&amp;severity=medium&amp;id=6923e2d64350076d0de522b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13582-sql-injection-in-code-projects-jonn-8c647ee0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13582%3A%20SQL%20Injection%20in%20code-projects%20Jonnys%20Liquor&amp;severity=medium&amp;id=6923e5eb1e6a877a1a577011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13581-sql-injection-in-itsourcecode-stude-6893678e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13581%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=6923d671a532ea377e9087ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13589-cwe-79-improper-neutralization-of-i-0d2e1dde</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Otsuka%20Information%20Technology%20FMS&amp;severity=medium&amp;id=6923d671a532ea377e9087f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13580-sql-injection-in-code-projects-libr-2fb4d90e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13580%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=6923cf69a532ea377e8d8efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13579-sql-injection-in-code-projects-libr-86b8f488</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13579%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=6923cf69a532ea377e8d8ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13578-sql-injection-in-code-projects-libr-e79a5b93</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13578%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=6923c4dda532ea377e83711d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13577-cross-site-scripting-in-phpgurukul--53fcf512</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13577%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Hostel%20Management%20System&amp;severity=medium&amp;id=6923ba52a532ea377e78c9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13576-improper-authorization-in-code-proj-da2c9881</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13576%3A%20Improper%20Authorization%20in%20code-projects%20Blog%20Site&amp;severity=medium&amp;id=6923d9fd4350076d0dda999c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13575-sql-injection-in-code-projects-blog-3724ca20</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13575%3A%20SQL%20Injection%20in%20code-projects%20Blog%20Site&amp;severity=medium&amp;id=6923ac41a532ea377e68fa0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13574-unrestricted-upload-in-code-project-a361421c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13574%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=6923a272a532ea377e5f0ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-24-fd6f33e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-24&amp;severity=medium&amp;id=6924f356c5f5f1e21b61f348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47856-na-301a6340</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47856%3A%20n%2Fa&amp;severity=critical&amp;id=6924d3bc338d19296f897f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54347-na-477a6049</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54347%3A%20n%2Fa&amp;severity=critical&amp;id=6924d037338d19296f865e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63674-na-21bd9cbe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63674%3A%20n%2Fa&amp;severity=medium&amp;id=6924d037338d19296f865e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54563-na-a560e07c</loc>
    <lastmod>2026-04-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54563%3A%20n%2Fa&amp;severity=high&amp;id=6924d037338d19296f865e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54341-na-3f00375f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54341%3A%20n%2Fa&amp;severity=medium&amp;id=6924d037338d19296f865e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54338-na-27c07b09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54338%3A%20n%2Fa&amp;severity=high&amp;id=6924d037338d19296f865e0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63498-na-ae437c3d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63498%3A%20n%2Fa&amp;severity=medium&amp;id=6924c2e2e1f3fb2621f8d217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56400-na-2286e4eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56400%3A%20n%2Fa&amp;severity=high&amp;id=6924bdd9228e5e38741e15f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64048-na-1b11167f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64048%3A%20n%2Fa&amp;severity=medium&amp;id=6924ba55228e5e387419b3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64047-na-accc8e20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64047%3A%20n%2Fa&amp;severity=medium&amp;id=6924b35c228e5e3874124c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63914-na-58084588</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63914%3A%20n%2Fa&amp;severity=medium&amp;id=6924b03965c0297328b78395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63435-na-ec78ca0b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63435%3A%20n%2Fa&amp;severity=medium&amp;id=6924918bac857ca3cad235c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63434-na-f1fdf6ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63434%3A%20n%2Fa&amp;severity=high&amp;id=6924918bac857ca3cad235c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63433-na-a9d56e95</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63433%3A%20n%2Fa&amp;severity=medium&amp;id=69248e18ac857ca3cacf2914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63432-na-548a2853</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63432%3A%20n%2Fa&amp;severity=medium&amp;id=69248e18ac857ca3cacf2910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63958-na-f46fb463</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63958%3A%20n%2Fa&amp;severity=critical&amp;id=69248c2fac857ca3cacc8733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63953-na-abb21f5f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63953%3A%20n%2Fa&amp;severity=medium&amp;id=69248a62ea0759ac8b7c828f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63952-na-2523f49c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63952%3A%20n%2Fa&amp;severity=medium&amp;id=69248a62ea0759ac8b7c828b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60638-na-50e3a94b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60638%3A%20n%2Fa&amp;severity=high&amp;id=6924840cd5a1e53350b3a58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60917-na-1b0a537f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60917%3A%20n%2Fa&amp;severity=medium&amp;id=69248078d5a1e53350b077a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60633-na-4bc761c0</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60633%3A%20n%2Fa&amp;severity=medium&amp;id=69248078d5a1e53350b0779c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60632-na-0f70d6ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60632%3A%20n%2Fa&amp;severity=medium&amp;id=69248078d5a1e53350b07798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60916-na-3db96d69</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60916%3A%20n%2Fa&amp;severity=medium&amp;id=69247cb8efc7406fa668b29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60915-na-00d03424</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60915%3A%20n%2Fa&amp;severity=high&amp;id=69247cb8efc7406fa668b298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60914-na-dbfc256f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60914%3A%20n%2Fa&amp;severity=medium&amp;id=6924792eefc7406fa6649b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56423-na-fffd75a5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56423%3A%20n%2Fa&amp;severity=medium&amp;id=6924792eefc7406fa6649b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56401-na-0054ae22</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56401%3A%20n%2Fa&amp;severity=high&amp;id=6924792eefc7406fa6649b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65503-na-8747f859</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65503%3A%20n%2Fa&amp;severity=high&amp;id=692467edff33e781bff0ea6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65502-na-90f2fb34</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65502%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65501-na-ceedd044</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65501%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65500-na-2eab75bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65500%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65499-na-97c0a8e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65499%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65498-na-61bed763</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65498%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65497-na-43a5fa5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65497%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65496-na-ca961f86</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65496%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65495-na-13986d9f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65495%3A%20n%2Fa&amp;severity=high&amp;id=692467ebff33e781bff0e366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65494-na-e3232ed5</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65494%3A%20n%2Fa&amp;severity=high&amp;id=692467ebff33e781bff0e362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65493-na-ee53f652</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65493%3A%20n%2Fa&amp;severity=high&amp;id=692467ebff33e781bff0e35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13573-unrestricted-upload-in-projectworld-9c4347ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13573%3A%20Unrestricted%20Upload%20in%20projectworlds%20can%20pass%20malicious%20payloads&amp;severity=medium&amp;id=69239b6adfa0c74de8802fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13572-sql-injection-in-projectworlds-adva-6e1fc13f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13572%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=69239609dfa0c74de87abf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12800-cwe-918-server-side-request-forgery-d9c2a2ac</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12800%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69238d0dec5d308f09cb6a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13571-sql-injection-in-code-projects-simp-3f0692a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13571%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=692388afec5d308f09c843f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13570-sql-injection-in-itsourcecode-covid-a4464fb3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13570%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=69238059f1913078bbfcf627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13569-sql-injection-in-itsourcecode-covid-a101d4a3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13569%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=69237977f1913078bbf586a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13568-sql-injection-in-itsourcecode-covid-e742d0a4</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13568%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=692372e6962646bb5af86ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13567-sql-injection-in-itsourcecode-covid-30fe99eb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13567%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=69236ac46d4acfe6c0ac2364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13566-double-free-in-jarun-nnn-3660b685</loc>
    <lastmod>2026-04-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13566%3A%20Double%20Free%20in%20jarun%20nnn&amp;severity=medium&amp;id=6923643de9cdbb117d0d9be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13565-weak-password-recovery-in-sourcecod-76c59514</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13565%3A%20Weak%20Password%20Recovery%20in%20SourceCodester%20Inventory%20Management%20System&amp;severity=medium&amp;id=69235d40e9cdbb117d05e3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13564-denial-of-service-in-sourcecodester-71b01ff8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13564%3A%20Denial%20of%20Service%20in%20SourceCodester%20Pre-School%20Management%20System&amp;severity=medium&amp;id=69235870aa55e2112d7fa2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13562-command-injection-in-d-link-dir-852-d81b2b6b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13562%3A%20Command%20Injection%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=69234d6ea8cb427b79f42970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13561-sql-injection-in-sourcecodester-com-16a52f71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13561%3A%20SQL%20Injection%20in%20SourceCodester%20Company%20Website%20CMS&amp;severity=medium&amp;id=692349eba8cb427b79efb919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54515-cwe-1284-improper-validation-of-spe-aa977176</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54515%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20Versal%E2%84%A2%20Adaptive%20SoC%20Devices&amp;severity=low&amp;id=69234496a8cb427b79e9d239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48507-cwe-1284-improper-validation-of-spe-d9783ee6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48507%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20Kria%E2%84%A2%20SOM&amp;severity=high&amp;id=692342efa8cb427b79e69085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13560-sql-injection-in-sourcecodester-com-7660d362</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13560%3A%20SQL%20Injection%20in%20SourceCodester%20Company%20Website%20CMS&amp;severity=medium&amp;id=69233fd377ebf6e86e532d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13557-sql-injection-in-campcodes-online-p-debde1a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13557%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Polling%20System&amp;severity=medium&amp;id=692338cc77ebf6e86e4a9392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21923-cwe-426-untrusted-search-path-in-am-7f12f0a5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21923%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20AMD%20AMD%20StoreMI%E2%84%A2&amp;severity=high&amp;id=692338cc77ebf6e86e4a938f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21922-cwe-426-untrusted-search-path-in-am-33b665c9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21922%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20AMD%20AMD%20StoreMI%E2%84%A2&amp;severity=high&amp;id=692338cc77ebf6e86e4a938c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13556-sql-injection-in-campcodes-online-p-d425454f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13556%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Polling%20System&amp;severity=medium&amp;id=692336f877ebf6e86e4931d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13555-sql-injection-in-campcodes-school-f-3e1650f9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13555%3A%20SQL%20Injection%20in%20Campcodes%20School%20File%20Management%20System&amp;severity=medium&amp;id=69232a874f4cb01c4da9aee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13554-sql-injection-in-campcodes-supplier-6cf20fdd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13554%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=692330ff650f1bc966f5721e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13553-buffer-overflow-in-d-link-dwr-m920-19b8e301</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13553%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=69231653c2ed1a32d9e8f9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-first-autonomous-ai-cyberattack-why-saas-secur-c5bf2f7f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20First%20Autonomous%20AI%20Cyberattack%3A%20Why%20SaaS%20Security%20Must%20Change&amp;severity=medium&amp;id=69230fc9237b8255a0386f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13552-buffer-overflow-in-d-link-dir-822k-4ad6c40a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13552%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=69230fc6237b8255a0386f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13551-buffer-overflow-in-d-link-dir-822k-fa75096a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13551%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=69230a5f237b8255a033933a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-7-zip-vulnerability-with-public-exploit-r-52105bbd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%207%20Zip%20Vulnerability%20With%20Public%20Exploit%20Requires%20Manual%20Update&amp;severity=critical&amp;id=6923053df051329c1a1f466f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13550-buffer-overflow-in-d-link-dir-822k-bf09d948</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13550%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=6923054af051329c1a1f7d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13549-buffer-overflow-in-d-link-dir-822k-63c160aa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13549%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=6922fabcf051329c1a12556a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13548-buffer-overflow-in-d-link-dir-822k-a1baf005</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13548%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=6922f42ae2031d6840968b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13547-memory-corruption-in-d-link-dir-822-525229cf</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13547%3A%20Memory%20Corruption%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=6922eec9e2031d684090bbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yara-x-1100-release-fix-warnings-sun-nov-23rd-b06c4153</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YARA-X%201.10.0%20Release%3A%20Fix%20Warnings%2C%20(Sun%2C%20Nov%2023rd)&amp;severity=medium&amp;id=6922e728bbe41230bc1301a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-441-released-sun-nov-23rd-e2aebe1d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.4.1%20Released%2C%20(Sun%2C%20Nov%2023rd)&amp;severity=medium&amp;id=6922e728bbe41230bc1301a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13546-sql-injection-in-ashraf-kabir-trave-c023f406</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13546%3A%20SQL%20Injection%20in%20ashraf-kabir%20travel-agency&amp;severity=medium&amp;id=6922e3a8bbe41230bc0bab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-analysed-over-3-million-exposed-databases-using--0d31ed0c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20Analysed%20Over%203%20Million%20Exposed%20Databases%20Using%20Netlas&amp;severity=medium&amp;id=6922e029bbe41230bc056cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13545-sql-injection-in-ashraf-kabir-trave-e5099c7a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13545%3A%20SQL%20Injection%20in%20ashraf-kabir%20travel-agency&amp;severity=medium&amp;id=6922dcc7bbe41230bcffa4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13544-unrestricted-upload-in-ashraf-kabir-9cfb676e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13544%3A%20Unrestricted%20Upload%20in%20ashraf-kabir%20travel-agency&amp;severity=medium&amp;id=6922d024ff9e296518d8d20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-23-0f27826d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-23&amp;severity=medium&amp;id=6923a0dadfa0c74de886e41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/piecing-together-the-puzzle-a-qilin-ransomware-inv-a53b5462</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Piecing%20Together%20the%20Puzzle%3A%20A%20Qilin%20Ransomware%20Investigation&amp;severity=high&amp;id=6922409cc6e51a12697d89bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cox-enterprises-discloses-oracle-e-business-suite--bf811ba0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cox%20Enterprises%20discloses%20Oracle%20E-Business%20Suite%20data%20breach&amp;severity=high&amp;id=6922409cc6e51a12697d89b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt31-launches-stealthy-cyberattacks--77e7ae00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT31%20Launches%20Stealthy%20Cyberattacks%20on%20Russian%20IT%20Using%20Cloud%20Services&amp;severity=high&amp;id=6922409cc6e51a12697d89b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crowdstrike-fires-worker-over-insider-leak-to-scat-e93f5eb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrowdStrike%20Fires%20Worker%20Over%20Insider%20Leak%20to%20Scattered%20Lapsus%20Hunters&amp;severity=medium&amp;id=6921e21f6499b98ae6c2e321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt31-launches-stealthy-cyberattacks--744c9ac0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT31%20Launches%20Stealthy%20Cyberattacks%20on%20Russian%20IT%20Using%20Cloud%20Services&amp;severity=medium&amp;id=6921f3b332b9fb10dcdbb5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13526-cwe-200-exposure-of-sensitive-infor-c69efaff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13526%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20walterpinem%20OneClick%20Chat%20to%20Order&amp;severity=high&amp;id=69219bd9de5ac9d38c932d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nvidia-confirms-october-windows-updates-cause-gami-1f3b9082</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nvidia%20confirms%20October%20Windows%20updates%20cause%20gaming%20issues&amp;severity=high&amp;id=69218aa02d0b68805e12c79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-actively-exploited-critical-oracle-i-0e583bed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Actively%20Exploited%20Critical%20Oracle%20Identity%20Manager%20Zero-Day%20Vulnerability&amp;severity=critical&amp;id=69218aa02d0b68805e12c797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/matrix-push-c2-uses-browser-notifications-for-file-af10dc24</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Matrix%20Push%20C2%20Uses%20Browser%20Notifications%20for%20Fileless%2C%20Cross-Platform%20Phishing%20Attacks&amp;severity=high&amp;id=69218aa02d0b68805e12c79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13318-cwe-862-missing-authorization-in-co-b89f94b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13318%3A%20CWE-862%20Missing%20Authorization%20in%20codepeople%20Booking%20Calendar%20Contact%20Form&amp;severity=medium&amp;id=692176e04ffda11ec247b4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13136-cwe-862-missing-authorization-in-we-c2151b1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13136%3A%20CWE-862%20Missing%20Authorization%20in%20westerndeal%20GSheetConnector%20For%20Ninja%20Forms&amp;severity=medium&amp;id=692176e04ffda11ec247b4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12877-cwe-862-missing-authorization-in-th-b5113971</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12877%3A%20CWE-862%20Missing%20Authorization%20in%20faysal61%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=medium&amp;id=69216996633f6b6b24ab4788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12752-cwe-345-insufficient-verification-o-f97548b6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12752%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20scottpaterson%20Subscriptions%20%26%20Memberships%20for%20PayPal&amp;severity=medium&amp;id=69216996633f6b6b24ab4783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13384-cwe-862-missing-authorization-in-co-a8aeb71d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13384%3A%20CWE-862%20Missing%20Authorization%20in%20codepeople%20CP%20Contact%20Form%20with%20PayPal&amp;severity=high&amp;id=69216996633f6b6b24ab4794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13317-cwe-862-missing-authorization-in-co-feb88ec8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13317%3A%20CWE-862%20Missing%20Authorization%20in%20codepeople%20Appointment%20Booking%20Calendar&amp;severity=medium&amp;id=69216996633f6b6b24ab478d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-actively-exploited-critical-oracle-i-f247f1c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Actively%20Exploited%20Critical%20Oracle%20Identity%20Manager%20Zero-Day%20Vulnerability&amp;severity=critical&amp;id=692197f8f26e99e45525990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11186-cwe-79-improper-neutralization-of-i-3017599a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11186%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20humanityco%20Cookie%20Notice%20%26%20Compliance%20for%20GDPR%20%2F%20CCPA&amp;severity=medium&amp;id=692146e5c842cd8eff6ede85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-22-8690a755</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-22&amp;severity=medium&amp;id=692251b6e19ebcc2d2e1e346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11933-cwe-20-improper-input-validation-in-3e97d985</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11933%3A%20CWE-20%20Improper%20Input%20Validation%20in%20wofSSL%20wolfSSL&amp;severity=low&amp;id=6920e83b27835fd566e7934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65947-cwe-400-uncontrolled-resource-consu-202f86ad</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65947%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20jzeuzs%20thread-amount&amp;severity=high&amp;id=6920e83b27835fd566e7935a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-apt-c-26-lazarus-groups-attack-campaig-6e35fbec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20APT-C-26%20(Lazarus)%20Group&apos;s%20Attack%20Campaign%20Using%20Remote%20IT%20Disguise%20to%20Deploy%20Monitoring%20Software&amp;severity=medium&amp;id=6920e4b627835fd566e3a2ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65946-cwe-77-improper-neutralization-of-s-2fc11be1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65946%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=6920e83b27835fd566e79355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65111-cwe-277-insecure-inherited-permissi-f28bfb4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65111%3A%20CWE-277%3A%20Insecure%20Inherited%20Permissions%20in%20authzed%20spicedb&amp;severity=low&amp;id=6920e4b727835fd566e3a362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65109-cwe-830-inclusion-of-web-functional-19ee3a38</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65109%3A%20CWE-830%3A%20Inclusion%20of%20Web%20Functionality%20from%20an%20Untrusted%20Source%20in%20mindersec%20minder&amp;severity=high&amp;id=6920e16727835fd566e05955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65108-cwe-94-improper-control-of-generati-dced66f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65108%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20simonhaenisch%20md-to-pdf&amp;severity=critical&amp;id=6920e16727835fd566e0595a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65106-cwe-1336-improper-neutralization-of-60d52be5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65106%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20langchain-ai%20langchain&amp;severity=high&amp;id=6920de31ac1487f7bb25177e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65102-cwe-120-buffer-copy-without-checkin-d902ded3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65102%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pjsip%20pjproject&amp;severity=high&amp;id=6920de31ac1487f7bb251783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65092-cwe-125-out-of-bounds-read-in-espre-d1916e34</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65092%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=6920de31ac1487f7bb25178a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0504-cwe-266-incorrect-privilege-assignme-514293b3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0504%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Black%20Duck%20Black%20Duck%20SCA&amp;severity=medium&amp;id=6920de31ac1487f7bb251787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31216-an-attacker-with-physical-access-to-4be80ab9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31216%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20override%20managed%20Wi-Fi%20profiles%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=6920daacac1487f7bb20ab51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31266-a-website-may-be-able-to-spoof-the--b1d348fe</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31266%3A%20A%20website%20may%20be%20able%20to%20spoof%20the%20domain%20name%20in%20the%20title%20of%20a%20pop-up%20window%20in%20Apple%20Safari&amp;severity=medium&amp;id=6920daacac1487f7bb20ab5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43374-an-attacker-in-physical-proximity-m-cc0b4834</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43374%3A%20An%20attacker%20in%20physical%20proximity%20may%20be%20able%20to%20cause%20an%20out-of-bounds%20read%20in%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6920daacac1487f7bb20ab5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31248-an-app-may-be-able-to-access-sensit-a6c285d1</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31248%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=6920daacac1487f7bb20ab55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11087-cwe-352-cross-site-request-forgery--a2745dcc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11087%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zozothemes%20Zegen%20Core&amp;severity=high&amp;id=6920cd59d9b84775478ce89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13524-cwe-404-improper-resource-shutdown--f8c020d4</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13524%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20AWS%20Wickr&amp;severity=medium&amp;id=6920c6d9d9b8477547869881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36149-cwe-1021-improper-restriction-of-re-46ffb35f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36149%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20IBM%20IBM%20Concert%20Software&amp;severity=medium&amp;id=6920c3c04429ea99a572eb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48502-cwe-1285-improper-validation-of-spe-7eb8426f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48502%3A%20CWE-1285%20%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=medium&amp;id=6920b9ca4429ea99a5688864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62609-cwe-476-null-pointer-dereference-in-f877e22b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62609%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ml-explore%20mlx&amp;severity=medium&amp;id=6920b9ca4429ea99a5688867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62608-cwe-122-heap-based-buffer-overflow--01465f49</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62608%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ml-explore%20mlx&amp;severity=medium&amp;id=6920b9ca4429ea99a568886a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62626-cwe-333-improper-handling-of-insuff-2503f37c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62626%3A%20CWE-333%20%20Improper%20Handling%20of%20Insufficient%20Entropy%20in%20TRNG%20in%20AMD%20AMD%20Ryzen%E2%84%A2%209000HX%20Series%20Processors&amp;severity=high&amp;id=6920b65f6ec873750a9f2a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64767-cwe-323-reusing-a-nonce-key-pair-in-186c6bb0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64767%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20dajiaji%20hpke-js&amp;severity=critical&amp;id=6920b65f6ec873750a9f2a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29934-cwe-459-incomplete-cleanup-in-amd-a-dd91a08d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29934%3A%20CWE-459%20%20Incomplete%20Cleanup%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=6920b65f6ec873750a9f2a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grafana-patches-cvss-100-scim-flaw-enabling-impers-8f83a03b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grafana%20Patches%20CVSS%2010.0%20SCIM%20Flaw%20Enabling%20Impersonation%20and%20Privilege%20Escalation&amp;severity=high&amp;id=6920a91de2e82c33851a87fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-rolls-back-cybersecurity-rules-for-telcos-desp-fc26eddd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20rolls%20back%20cybersecurity%20rules%20for%20telcos%2C%20despite%20state-hacking%20risks&amp;severity=medium&amp;id=6920a91ee2e82c33851a8802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crowdstrike-catches-insider-feeding-information-to-97861b31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrowdStrike%20catches%20insider%20feeding%20information%20to%20hackers&amp;severity=high&amp;id=6920a91de2e82c33851a87fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13132-cwe-1021-improper-restriction-of-re-36428c02</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13132%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20The%20Browser%20Company%20of%20New%20York%20Dia&amp;severity=high&amp;id=6920a952e2e82c33851aa18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64483-cwe-284-improper-access-control-in--c348a962</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64483%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20wazuh%20wazuh-dashboard-plugins&amp;severity=medium&amp;id=6920a952e2e82c33851aa18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13470-cwe-330-use-of-insufficiently-rando-68969447</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13470%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Ribose%20RNP&amp;severity=high&amp;id=6920a035e2e82c338511ca88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/syncro-lovable-rat-delivery-via-ai-generated-websi-5440c7b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Syncro%20%2B%20Lovable%3A%20RAT%20delivery%20via%20AI-generated%20websites%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69209d99d229a3709c4237c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sturnus-android-malware-reads-whatsapp-telegra-1240df11</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Sturnus%20Android%20Malware%20Reads%20WhatsApp%2C%20Telegram%2C%20Signal%20Chats%20via%20Accessibility%20Abuse&amp;severity=medium&amp;id=69209a19d229a3709c3e2b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12973-cwe-434-unrestricted-upload-of-file-da6451f3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12973%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20oc3dots%20S2B%20AI%20Assistant%20%E2%80%93%20ChatBot%2C%20AI%20Agents%2C%20ChatGPT%20API%2C%20Image%20Generator&amp;severity=high&amp;id=6920a035e2e82c338511ca92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-atm-jackpotting-whatsapp-nso-lawsuit-51951431</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20ATM%20Jackpotting%2C%20WhatsApp-NSO%20Lawsuit%20Continues%2C%20CISA%20Hiring&amp;severity=medium&amp;id=692088af0f995c4f64f0f590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-breach-gainsight-apps-on-salesforce-c-6f24af47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20Breach%20Gainsight%20Apps%20on%20Salesforce%2C%20Claim%20Data%20from%20Top%201000%20Firms&amp;severity=high&amp;id=692085360f995c4f64ece0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13357-cwe-1188-initialization-of-a-resour-82aa5381</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13357%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20HashiCorp%20Tooling&amp;severity=high&amp;id=6920823c0f995c4f64ea2855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tools-and-techniques-of-toddycat-apt-7ccd3269</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Tools%20and%20Techniques%20of%20ToddyCat%20APT&amp;severity=medium&amp;id=6920e4b627835fd566e3a2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41115-vulnerability-in-grafana-grafana-en-a6c59db4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41115%3A%20Vulnerability%20in%20Grafana%20Grafana%20Enterprise&amp;severity=critical&amp;id=6920778b69daa88a9a1ad75d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13432-cwe-863-incorrect-authorization-in--9497e98e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13432%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20HashiCorp%20Terraform%20Enterprise&amp;severity=medium&amp;id=6920778b69daa88a9a1ad75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-oracle-identity-manager-flaw-possibly-exp-230f24ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Oracle%20Identity%20Manager%20Flaw%20Possibly%20Exploited%20as%20Zero-Day&amp;severity=critical&amp;id=69206eca40c35a606131d6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11127-cwe-639-authorization-bypass-throug-fc25013c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11127%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mstoreapp%20Mobile%20App&amp;severity=critical&amp;id=69206ee440c35a606131e66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sliver-c2-vulnerability-enables-attack-on-c2-opera-a2756876</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sliver%20C2%20vulnerability%20enables%20attack%20on%20C2%20operators%20through%20insecure%20Wireguard%20network&amp;severity=medium&amp;id=692067d040c35a60612a111d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-brings-airdrop-compatibility-to-androids-qu-34cc82be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Brings%20AirDrop%20Compatibility%20to%20Android%E2%80%99s%20Quick%20Share%20Using%20Rust-Hardened%20Security&amp;severity=low&amp;id=6920e0aaac1487f7bb280f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66115-improper-control-of-filename-for-in-8db6ce53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66115%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20MatrixAddons%20Easy%20Invoice&amp;severity=medium&amp;id=69205c34c36be036e6ff2a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66114-missing-authorization-in-theme-fund-83ea93dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66114%3A%20Missing%20Authorization%20in%20theme%20funda%20Show%20Variations%20as%20Single%20Products%20Woocommerce&amp;severity=medium&amp;id=69205c33c36be036e6ff27c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66113-missing-authorization-in-themeateli-9ed7407e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66113%3A%20Missing%20Authorization%20in%20ThemeAtelier%20Better%20Chat%20Support%20for%20Messenger&amp;severity=medium&amp;id=69205c33c36be036e6ff27c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66112-missing-authorization-in-webtoffee--8fdac7a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66112%3A%20Missing%20Authorization%20in%20WebToffee%20Accessibility%20Toolkit%20by%20WebYes&amp;severity=medium&amp;id=69205c33c36be036e6ff27c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66111-improper-neutralization-of-input-du-dc8d328e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66111%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nelio%20Software%20Nelio%20Popups&amp;severity=medium&amp;id=69205c33c36be036e6ff27bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66110-missing-authorization-in-bplugins-t-bc59da05</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66110%3A%20Missing%20Authorization%20in%20bPlugins%20Tiktok%20Feed&amp;severity=medium&amp;id=69205c33c36be036e6ff27ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66109-missing-authorization-in-octolize-c-bd300288</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66109%3A%20Missing%20Authorization%20in%20Octolize%20Shipping%20Plugins%20Cart%20Weight%20for%20WooCommerce&amp;severity=medium&amp;id=69205c33c36be036e6ff27b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66108-missing-authorization-in-merlot-dig-6d78b761</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66108%3A%20Missing%20Authorization%20in%20Merlot%20Digital%20(by%20TNC)%20TNC%20Toolbox%3A%20Web%20Performance&amp;severity=medium&amp;id=69205c33c36be036e6ff27b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66107-missing-authorization-in-scott-pate-990b8a9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66107%3A%20Missing%20Authorization%20in%20Scott%20Paterson%20Subscriptions%20%26%20Memberships%20for%20PayPal&amp;severity=medium&amp;id=69205c33c36be036e6ff27b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66106-missing-authorization-in-essential--46a7d63f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66106%3A%20Missing%20Authorization%20in%20Essential%20Plugin%20Featured%20Post%20Creative&amp;severity=medium&amp;id=69205c33c36be036e6ff27ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66101-missing-authorization-in-sabuj-kund-2e9fe0ba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66101%3A%20Missing%20Authorization%20in%20Sabuj%20Kundu%20CBX%20Bookmark%20%26%20Favorite&amp;severity=medium&amp;id=69205c33c36be036e6ff27ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66099-missing-authorization-in-themeateli-0357207f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66099%3A%20Missing%20Authorization%20in%20ThemeAtelier%20Chat%20Help&amp;severity=medium&amp;id=69205c31c36be036e6ff2770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66098-improper-neutralization-of-input-du-254f8772</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66098%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Camille%20V%20Travelers&apos;%20Map&amp;severity=medium&amp;id=69205c31c36be036e6ff276d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66097-cross-site-request-forgery-csrf-in--f3d2fb93</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66097%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Igor%20Jerosimi%C4%87%20I%20Order%20Terms&amp;severity=medium&amp;id=69205c31c36be036e6ff276a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66096-missing-authorization-in-imtiaz-ray-3d1e4901</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66096%3A%20Missing%20Authorization%20in%20Imtiaz%20Rayhan%20Table%20Block%20by%20Tableberg&amp;severity=medium&amp;id=69205c31c36be036e6ff2767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66095-improper-neutralization-of-special--3bc15538</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66095%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Iqonic%20Design%20KiviCare&amp;severity=high&amp;id=69205c31c36be036e6ff2764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66093-improper-neutralization-of-input-du-0b9e6f44</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66093%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20Extensions%20for%20Leaflet%20Map&amp;severity=medium&amp;id=69205c31c36be036e6ff2761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66092-improper-neutralization-of-input-du-4e40bb13</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bqworks%20Accordion%20Slider&amp;severity=medium&amp;id=69205c31c36be036e6ff275e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66091-improper-neutralization-of-input-du-a7736fcf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66091%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Design%20Stylish%20Cost%20Calculator&amp;severity=medium&amp;id=69205c31c36be036e6ff275b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66090-improper-neutralization-of-input-du-9d4c6df5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66090%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Skill%20Bar&amp;severity=medium&amp;id=69205c31c36be036e6ff2758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66089-missing-authorization-in-webtoffee--d8a32048</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66089%3A%20Missing%20Authorization%20in%20WebToffee%20Product%20Feed%20for%20WooCommerce&amp;severity=medium&amp;id=69205c31c36be036e6ff2755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66087-missing-authorization-in-property-h-de64c116</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66087%3A%20Missing%20Authorization%20in%20Property%20Hive%20PropertyHive&amp;severity=medium&amp;id=69205c30c36be036e6ff273f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66086-missing-authorization-in-cozy-visio-c54fe459</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66086%3A%20Missing%20Authorization%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=medium&amp;id=69205c30c36be036e6ff273c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66085-missing-authorization-in-tychesoftw-51770505</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66085%3A%20Missing%20Authorization%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=medium&amp;id=69205c30c36be036e6ff2739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66084-missing-authorization-in-shahjahan--7c1015fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66084%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20FluentCommunity&amp;severity=medium&amp;id=69205c30c36be036e6ff2736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66083-missing-authorization-in-magepeople-c91a254d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66083%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69205c30c36be036e6ff2733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66082-missing-authorization-in-magepeople-5b92adfa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66082%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69205c30c36be036e6ff2730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66081-improper-neutralization-of-input-du-a12af44c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66081%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeff%20Starr%20Head%20Meta%20Data&amp;severity=medium&amp;id=69205c30c36be036e6ff272d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66079-missing-authorization-in-jegstudio--a0dba2dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66079%3A%20Missing%20Authorization%20in%20Jegstudio%20Gutenverse%20Form&amp;severity=medium&amp;id=69205c30c36be036e6ff272a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66077-missing-authorization-in-wpwax-lega-820db950</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66077%3A%20Missing%20Authorization%20in%20wpWax%20Legal%20Pages&amp;severity=medium&amp;id=69205c30c36be036e6ff2727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66075-missing-authorization-in-wp-legal-p-561babd1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66075%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WP%20Cookie%20Notice%20for%20GDPR%2C%20CCPA%20%26%20ePrivacy%20Consent&amp;severity=medium&amp;id=69205c30c36be036e6ff2724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66073-deserialization-of-untrusted-data-i-43a58f67</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66073%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cozmoslabs%20WP%20Webhooks&amp;severity=high&amp;id=69205c2fc36be036e6ff270e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66072-missing-authorization-in-stiofan-us-eae83e9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66072%3A%20Missing%20Authorization%20in%20Stiofan%20UsersWP&amp;severity=medium&amp;id=69205c2fc36be036e6ff270b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66071-missing-authorization-in-tychesoftw-4fc0ab35</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66071%3A%20Missing%20Authorization%20in%20tychesoftwares%20Custom%20Order%20Numbers%20for%20WooCommerce&amp;severity=medium&amp;id=69205c2fc36be036e6ff2708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66069-missing-authorization-in-themeisle--ce99c8fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66069%3A%20Missing%20Authorization%20in%20Themeisle%20PPOM%20for%20WooCommerce&amp;severity=medium&amp;id=69205c2ec36be036e6ff2705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66067-improper-neutralization-of-input-du-215807dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66067%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aman%20Funnel%20Builder%20by%20FunnelKit&amp;severity=medium&amp;id=69205c2ec36be036e6ff2702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66066-improper-neutralization-of-input-du-66cbe8a1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66066%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EnvoThemes%20Envo%20Extra&amp;severity=medium&amp;id=69205c2ec36be036e6ff26ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66065-missing-authorization-in-jegstudio--6cfef704</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66065%3A%20Missing%20Authorization%20in%20Jegstudio%20Gutenverse&amp;severity=medium&amp;id=69205c2ec36be036e6ff26fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66064-cross-site-request-forgery-csrf-in--a229181d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66064%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Syed%20Balkhi%20Giveaways%20and%20Contests%20by%20RafflePress&amp;severity=medium&amp;id=69205c2ec36be036e6ff26f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66063-missing-authorization-in-jgwhite33--0d43e325</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66063%3A%20Missing%20Authorization%20in%20jgwhite33%20WP%20Google%20Review%20Slider&amp;severity=medium&amp;id=69205c2ec36be036e6ff26f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66062-url-redirection-to-untrusted-site-o-a1f1394e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66062%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Frank%20Goossens%20WP%20YouTube%20Lyte&amp;severity=low&amp;id=69205c2ec36be036e6ff26f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66061-cross-site-request-forgery-csrf-in--452dd78d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66061%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69205c2dc36be036e6ff26dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66060-missing-authorization-in-craig-hewi-d67dd67f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66060%3A%20Missing%20Authorization%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69205c2dc36be036e6ff26da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66059-exposure-of-sensitive-system-inform-6395ecac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66059%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69205c2dc36be036e6ff26d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66057-improper-neutralization-of-input-du-7d6057af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=69205c2dc36be036e6ff26d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66056-exposure-of-sensitive-system-inform-2fb45be5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66056%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Uncanny%20Owl%20Uncanny%20Automator&amp;severity=medium&amp;id=69205c2dc36be036e6ff26d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66055-deserialization-of-untrusted-data-i-59d5ebe4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66055%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Icegram%20Email%20Subscribers%20%26%20Newsletters&amp;severity=high&amp;id=69205c2dc36be036e6ff26ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66053-improper-neutralization-of-input-du-4c15e8bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66053%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kriesi%20Enfold&amp;severity=medium&amp;id=69205c2dc36be036e6ff26cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10039-cwe-639-authorization-bypass-throug-84c10025</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10039%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=69205c2dc36be036e6ff26bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12935-cwe-79-improper-neutralization-of-i-847bccf5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12935%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20FluentCRM%20%E2%80%93%20Email%20Newsletter%2C%20Automation%2C%20Email%20Marketing%2C%20Email%20Campaigns%2C%20Optins%2C%20Leads%2C%20and%20CRM%20Solution&amp;severity=medium&amp;id=69205c2dc36be036e6ff26c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10054-cwe-862-missing-authorization-in-el-b3f23475</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10054%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=69205c2dc36be036e6ff26c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-patches-high-severity-flaws-in-firewalls-aeda4c7c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Patches%20High-Severity%20Flaws%20in%20Firewalls%2C%20Email%20Security%20Appliance&amp;severity=high&amp;id=69205c10c36be036e6ff0e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-cyberspies-deploy-badaudio-malware-via-sup-4f8a0874</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Cyberspies%20Deploy%20%E2%80%98BadAudio%E2%80%99%20Malware%20via%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=692051051a6f98a3eddd2992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/squarex-and-perplexity-quarrel-over-alleged-comet--87b376dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SquareX%20and%20Perplexity%20Quarrel%20Over%20Alleged%20Comet%20Browser%20Vulnerability&amp;severity=medium&amp;id=69204a061a6f98a3edd419e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt24-deploys-badaudio-in-years-long-espionage-hit-e8f1feb7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT24%20Deploys%20BADAUDIO%20in%20Years-Long%20Espionage%20Hitting%20Taiwan%20and%201%2C000%2B%20Domains&amp;severity=medium&amp;id=6920e0aaac1487f7bb280f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/use-of-css-stuffing-as-an-obfuscation-techniquex3f-ee608ee6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%26%23x3f%3B%2C%20(Fri%2C%20Nov%2021st)&amp;severity=medium&amp;id=69203653b6fc887540a4b876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-instances-hacked-via-gainsight-integrat-e4ef3f90</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Instances%20Hacked%20via%20Gainsight%20Integrations&amp;severity=medium&amp;id=69203643b6fc887540a4a8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12750-cwe-89-improper-neutralization-of-s-f4dd2363</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12750%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20trainingbusinesspros%20Groundhogg%20%E2%80%94%20CRM%2C%20Newsletters%2C%20and%20Marketing%20Automation&amp;severity=medium&amp;id=692032ceb6fc887540a02d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12160-cwe-79-improper-neutralization-of-i-d593386d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12160%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nmedia%20Simple%20User%20Registration&amp;severity=high&amp;id=692032ceb6fc887540a02d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12066-cwe-79-improper-neutralization-of-i-084c93a9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12066%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20etruel%20WP%20Delete%20Post%20Copies&amp;severity=medium&amp;id=692032ceb6fc887540a02d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12964-cwe-79-improper-neutralization-of-i-7e9b5e87</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12964%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nalam-1%20Magical%20Shop%20Builder%20%E2%80%93%20WooCommerce%20Template%20Builder%20for%20Elementor%20%7C%20Shop%2C%20Cart%2C%20Checkout%20%26%20Product%20Page%20Builder&amp;severity=medium&amp;id=692032ceb6fc887540a02d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13138-cwe-89-improper-neutralization-of-s-1166d4c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13138%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdirectorykit%20WP%20Directory%20Kit&amp;severity=high&amp;id=692032ceb6fc887540a02d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13156-cwe-434-unrestricted-upload-of-file-9f39b926</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13156%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20appsbd%20Vitepos%20%E2%80%93%20Point%20of%20Sale%20(POS)%20for%20WooCommerce&amp;severity=high&amp;id=69202539cf2d47c3899a7b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11808-cwe-79-improper-neutralization-of-i-c839f951</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antiochinteractive%20Shortcode%20for%20Google%20Street%20View&amp;severity=medium&amp;id=69202539cf2d47c3899a7b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13141-cwe-79-improper-neutralization-of-i-33e6250d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13141%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Widgets%20%26%20Template%20Builder&amp;severity=medium&amp;id=69202539cf2d47c3899a7b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13149-cwe-862-missing-authorization-in-pu-36d21510</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13149%3A%20CWE-862%20Missing%20Authorization%20in%20publishpress%20Schedule%20Post%20Changes%20With%20PublishPress%20Future%3A%20Unpublish%2C%20Delete%2C%20Change%20Status%2C%20Trash%2C%20Change%20Categories&amp;severity=medium&amp;id=69202539cf2d47c3899a7b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11826-cwe-79-improper-neutralization-of-i-30c4f59f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdeleasa%20WP%20Company%20Info&amp;severity=medium&amp;id=69202539cf2d47c3899a7b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11973-cwe-73-external-control-of-file-nam-4f7c3166</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11973%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path&amp;severity=medium&amp;id=69202539cf2d47c3899a7b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12039-cwe-200-exposure-of-sensitive-infor-0c5b085f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12039%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20devsmip%20BigBuy%20Dropshipping%20Connector%20for%20WooCommerce&amp;severity=medium&amp;id=69202539cf2d47c3899a7b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11803-cwe-79-improper-neutralization-of-i-e1ddfab2</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11803%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpfanyi%20WPSite%20Shortcode&amp;severity=medium&amp;id=69202539cf2d47c3899a7b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sec-drops-solarwinds-case-after-years-of-high-stak-d3107cc7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEC%20Drops%20SolarWinds%20Case%20After%20Years%20of%20High-Stakes%20Cybersecurity%20Scrutiny&amp;severity=high&amp;id=69201f0fdd76cb6d6068c37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11800-cwe-79-improper-neutralization-of-i-c58ea578</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surbma%20Surbma%20%7C%20MiniCRM%20Shortcode&amp;severity=medium&amp;id=69202359cf2d47c38997b487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11985-cwe-862-missing-authorization-in-no-920ac29d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11985%3A%20CWE-862%20Missing%20Authorization%20in%20nootheme%20Realty%20Portal&amp;severity=high&amp;id=69202359cf2d47c38997b49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11802-cwe-79-improper-neutralization-of-i-c1c6185e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bartboy011%20Bulma%20Shortcodes&amp;severity=medium&amp;id=69202359cf2d47c38997b48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11773-cwe-862-missing-authorization-in-be-9b3a3559</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11773%3A%20CWE-862%20Missing%20Authorization%20in%20beycanpress%20Cryptocurrency%20(Token)%2C%20Launchpad%20(Presale)%2C%20ICO%20%26%20IDO%2C%20Airdrop%20by%20TokenICO&amp;severity=medium&amp;id=69202359cf2d47c38997b47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11763-cwe-79-improper-neutralization-of-i-54900776</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11763%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustybadrobot%20Display%20Pages%20Shortcode&amp;severity=medium&amp;id=69202359cf2d47c38997b3c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13135-cwe-79-improper-neutralization-of-i-0ddcdf2e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20integrationshotelrunner%20HotelRunner%20Booking%20Widget&amp;severity=medium&amp;id=6920235bcf2d47c38997b54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11764-cwe-79-improper-neutralization-of-i-bcba4791</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11764%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fastmover%20Shortcodes%20Bootstrap&amp;severity=medium&amp;id=69202359cf2d47c38997b3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10938-cwe-862-missing-authorization-in-ad-8a296093</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10938%3A%20CWE-862%20Missing%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69202359cf2d47c38997b37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11771-cwe-306-missing-authentication-for--d1b76c82</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11771%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20beycanpress%20Cryptocurrency%20(Token)%2C%20Launchpad%20(Presale)%2C%20ICO%20%26%20IDO%2C%20Airdrop%20by%20TokenICO&amp;severity=medium&amp;id=69202359cf2d47c38997b415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11003-cwe-862-missing-authorization-in-ad-7ef4beb8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11003%3A%20CWE-862%20Missing%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69202359cf2d47c38997b394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11799-cwe-79-improper-neutralization-of-i-19d2ff0d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Affiliate%20AI%20Lite&amp;severity=medium&amp;id=69202359cf2d47c38997b482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11456-cwe-434-unrestricted-upload-of-file-923ed709</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11456%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=critical&amp;id=69202359cf2d47c38997b3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12881-cwe-639-authorization-bypass-throug-9d9ee48c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12881%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpswings%20Return%20Refund%20and%20Exchange%20For%20WooCommerce&amp;severity=medium&amp;id=6920235bcf2d47c38997b542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11815-cwe-285-improper-authorization-in-a-9e096e51</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11815%3A%20CWE-285%20Improper%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69202359cf2d47c38997b493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13159-cwe-79-improper-neutralization-of-i-5ba765cb</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13159%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flothemesplugins%20Flo%20Forms%20%E2%80%93%20Easy%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=high&amp;id=6920235bcf2d47c38997b556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13134-cwe-352-cross-site-request-forgery--11ecc19e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13134%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20powerblogservice%20AuthorSure&amp;severity=medium&amp;id=6920235bcf2d47c38997b54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12135-cwe-79-improper-neutralization-of-i-6092e1b1</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20WPBookit&amp;severity=high&amp;id=69202359cf2d47c38997b4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11885-cwe-79-improper-neutralization-of-i-7a152037</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itvn9online%20EchBay%20Admin%20Security&amp;severity=medium&amp;id=69202359cf2d47c38997b498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13142-cwe-352-cross-site-request-forgery--521d21e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13142%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20farvehandleren%20Custom%20Post%20Type&amp;severity=medium&amp;id=6920235bcf2d47c38997b552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11768-cwe-79-improper-neutralization-of-i-442d6787</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11768%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20darto%20Islamic%20Phrases&amp;severity=medium&amp;id=69202359cf2d47c38997b3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11770-cwe-79-improper-neutralization-of-i-c3cf1952</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20billybigpotatoes%20BrightTALK%20WordPress%20Shortcode&amp;severity=medium&amp;id=69202359cf2d47c38997b3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11767-cwe-79-improper-neutralization-of-i-53a51c1a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11767%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fpcorso%20Tips%20Shortcode&amp;severity=medium&amp;id=69202359cf2d47c38997b3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12894-cwe-552-files-or-directories-access-407703ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12894%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20jcollings%20Import%20WP%20%E2%80%93%20Export%20and%20Import%20CSV%20and%20XML%20files%20to%20WordPress&amp;severity=medium&amp;id=6920235bcf2d47c38997b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11801-cwe-79-improper-neutralization-of-i-d3a7ab57</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidangel%20AudioTube&amp;severity=medium&amp;id=69202359cf2d47c38997b48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12138-cwe-434-unrestricted-upload-of-file-e6be311b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12138%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bww%20URL%20Image%20Importer&amp;severity=high&amp;id=6920235bcf2d47c38997b52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11765-cwe-79-improper-neutralization-of-i-bbab4592</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11765%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20developdaly%20Stock%20Tools&amp;severity=medium&amp;id=69202359cf2d47c38997b3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12170-cwe-862-missing-authorization-in-ba-650de3bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12170%3A%20CWE-862%20Missing%20Authorization%20in%20bandido%20Checkbox&amp;severity=medium&amp;id=6920235bcf2d47c38997b534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12086-cwe-639-authorization-bypass-throug-dc0de6dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12086%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpswings%20Return%20Refund%20and%20Exchange%20For%20WooCommerce&amp;severity=medium&amp;id=69202359cf2d47c38997b4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12661-cwe-79-improper-neutralization-of-i-4a6b7d30</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12661%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qzzr%20Pollcaster%20Shortcode%20Plugin&amp;severity=medium&amp;id=6920235bcf2d47c38997b53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13322-cwe-73-external-control-of-file-nam-7fd7d276</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13322%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20husainali52%20WP%20AUDIO%20GALLERY&amp;severity=high&amp;id=6920235bcf2d47c38997b878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12660-cwe-79-improper-neutralization-of-i-270ea890</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12660%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coffeebite%20Padlet%20Shortcode&amp;severity=medium&amp;id=6920235bcf2d47c38997b538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64695-uncontrolled-search-path-element-in-70cf3f5c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64695%3A%20Uncontrolled%20Search%20Path%20Element%20in%20LogStare%20Inc.%20Installer%20of%20LogStare%20Collector%20(for%20Windows)&amp;severity=high&amp;id=6920092a04dd2c5f9994c018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64299-insertion-of-sensitive-information--87b3d590</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64299%3A%20Insertion%20of%20sensitive%20information%20into%20sent%20data%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62687-cross-site-request-forgery-csrf-in--30ce278f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62687%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62189-incorrect-authorization-in-logstare-250232df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62189%3A%20Incorrect%20authorization%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61949-cross-site-scripting-xss-in-logstar-a04b6441</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61949%3A%20Cross-site%20scripting%20(XSS)%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58097-incorrect-default-permissions-in-lo-cad12027</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58097%3A%20Incorrect%20default%20permissions%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13499-cwe-824-access-of-uninitialized-poi-dde9f5a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13499%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=692005a604dd2c5f9990df0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12169-cwe-862-missing-authorization-in-el-034b949f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12169%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=691ffc17a535ade79490ffc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12022-cwe-862-missing-authorization-in-el-342a8da7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12022%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=691ffc17a535ade79490ffb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12085-cwe-862-missing-authorization-in-el-ee14e70f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12085%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=691ffc17a535ade79490ffbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12023-cwe-862-missing-authorization-in-el-d20d54a8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12023%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=691ffc17a535ade79490ffbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11368-cwe-200-exposure-of-sensitive-infor-313b2bf8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11368%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=691ffc17a535ade79490ffb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-flags-unauthorized-data-access-via-gain-38c13911</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Flags%20Unauthorized%20Data%20Access%20via%20Gainsight-Linked%20OAuth%20Activity&amp;severity=medium&amp;id=69200b7904dd2c5f999794b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reoccurring-use-of-highly-suspicious-pdf-editors-t-c6459ebc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reoccurring%20Use%20of%20Highly%20Suspicious%20PDF%20Editors%20to%20Infiltrate%20Environments&amp;severity=medium&amp;id=692032cfb6fc887540a02d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64310-improper-restriction-of-excessive-a-919b7551</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64310%3A%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20SEIKO%20EPSON%20CORPORATION%20EPSON%20WebConfig%20for%20SEIKO%20EPSON%20Projector%20Products&amp;severity=critical&amp;id=691fd59470da09562fab65e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/its-not-personal-its-just-business-fa23a3e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=It&apos;s%20not%20personal%2C%20it&apos;s%20just%20business&amp;severity=medium&amp;id=692032cfb6fc887540a02d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64762-cwe-524-use-of-cache-containing-sen-e4c820e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64762%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20workos%20authkit-nextjs&amp;severity=high&amp;id=691fc3ff70da09562fa7fca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62372-cwe-129-improper-validation-of-arra-e03484d6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62372%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20vllm-project%20vllm&amp;severity=high&amp;id=691fc3ff70da09562fa7fc94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62426-cwe-770-allocation-of-resources-wit-efc9cb1e</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62426%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=691fc3ff70da09562fa7fc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62164-cwe-20-improper-input-validation-in-b2b9032c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62164%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vllm-project%20vllm&amp;severity=high&amp;id=691fc3ff70da09562fa7fc8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64755-cwe-78-improper-neutralization-of-s-ff3ccb17</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64755%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=691fc3ff70da09562fa7fca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/4-people-indicted-in-alleged-conspiracy-to-smuggle-cc35ec9d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=4%20People%20Indicted%20in%20Alleged%20Conspiracy%20to%20Smuggle%20Supercomputers%20and%20Nvidia%20Chips%20to%20China&amp;severity=high&amp;id=691fb5f870da09562f99df09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/esbuild-xss-bug-that-survived-5b-downloads-and-byp-7278ec6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Esbuild%20XSS%20Bug%20That%20Survived%205B%20Downloads%20and%20Bypassed%20HTML%20Sanitization&amp;severity=medium&amp;id=691fac729bfed6bde22cd559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13485-sql-injection-in-itsourcecode-onlin-7a44a97d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13485%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20File%20Management%20System&amp;severity=medium&amp;id=691fac6e9bfed6bde22c976d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-21-9c6abe4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-21&amp;severity=medium&amp;id=6920fe842cd4adea235208d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13484-cross-site-scripting-in-campcodes-c-9da2aea1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13484%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=691f98772b54a79d3490b338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62459-cwe-79-improper-neutralization-of-i-206ca234</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62459%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20365%20Defender%20Portal&amp;severity=high&amp;id=691f98772b54a79d3490b348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64660-cwe-284-improper-access-control-in--7ee6959a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64660%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=high&amp;id=691f98772b54a79d3490b34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62207-cwe-918-server-side-request-forgery-eddd1b15</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62207%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Monitor%20Control%20Service&amp;severity=high&amp;id=691f98772b54a79d3490b345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49752-cwe-294-authentication-bypass-by-ca-8a434aea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49752%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Microsoft%20Azure%20Bastion%20Developer&amp;severity=critical&amp;id=691f98772b54a79d3490b33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59245-cwe-502-deserialization-of-untruste-ba16b807</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59245%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Online&amp;severity=critical&amp;id=691f98772b54a79d3490b342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64655-cwe-285-improper-authorization-in-m-10e45e90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64655%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Dynamics%20OmniChannel%20SDK%20Storage%20Containers&amp;severity=high&amp;id=691f98772b54a79d3490b34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hacking-suspect-wanted-by-the-fbi-arrested-4c63be64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hacking%20Suspect%20Wanted%20by%20the%20FBI%20Arrested%20on%20Thai%20Resort%20Island&amp;severity=medium&amp;id=691f94ed2b54a79d348a2980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-tsundere-botnet-uses-the-ethereum-blockchain-t-aff761df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Tsundere%20botnet%20uses%20the%20Ethereum%20blockchain%20to%20infect%20its%20targets&amp;severity=medium&amp;id=692032cfb6fc887540a02d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36072-cwe-502-deserialization-of-untruste-75722675</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36072%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20webMethods%20Integration&amp;severity=high&amp;id=691f95052b54a79d348a4b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-claims-to-steal-23tb-data-from-italian-rail-dd707b7d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20claims%20to%20steal%202.3TB%20data%20from%20Italian%20rail%20group%2C%20Almavia&amp;severity=high&amp;id=691f8f07b342c1dca41c2e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13087-cwe-78-improper-neutralization-of-s-1349e98f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13087%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Opto22%20GRV-EPIC-PR1&amp;severity=high&amp;id=691f8b86b342c1dca4180130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36153-cwe-79-improper-neutralization-of-i-bfa12b3a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36153%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f880cb342c1dca413b0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36158-cwe-674-uncontrolled-recursion-in-i-9f563568</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36158%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f880cb342c1dca413b0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36159-cwe-117-improper-output-neutralizat-cae66a92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36159%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f880cb342c1dca413b0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36160-cwe-497-exposure-of-sensitive-syste-c6a0b0b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36160%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f85874f1c50aa2eb92647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62674-cwe-306-in-icam365-p201-9230f076</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62674%3A%20CWE-306%20in%20iCam365%20P201&amp;severity=high&amp;id=691f7e7c4f1c50aa2eb161a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-investigates-customer-data-theft-via-ga-e918966a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20investigates%20customer%20data%20theft%20via%20Gainsight%20breach&amp;severity=high&amp;id=691f7b004f1c50aa2eacb308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tsundere-botnet-expands-using-game-lures-and-ether-418d1a6a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tsundere%20Botnet%20Expands%20Using%20Game%20Lures%20and%20Ethereum-Based%20C2%20on%20Windows&amp;severity=high&amp;id=691f7b004f1c50aa2eacb30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowray-20-exploits-unpatched-ray-flaw-to-build--c863b3a1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowRay%202.0%20Exploits%20Unpatched%20Ray%20Flaw%20to%20Build%20Self-Spreading%20GPU%20Cryptomining%20Botnet&amp;severity=high&amp;id=691f7a1328b41f27b440ffba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64770-cwe-306-in-icam365-p201-290be593</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64770%3A%20CWE-306%20in%20iCam365%20P201&amp;severity=high&amp;id=691f7c954f1c50aa2eb03748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unquoted-paths-the-decades-old-windows-flaw-still--cac45693</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unquoted%20Paths%3A%20The%20Decades-Old%20Windows%20Flaw%20Still%20Enabling%20Hidden%20Code%20Execution&amp;severity=medium&amp;id=691f731228b41f27b438ba43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivot-to-multi-vector-attacks-d8f8f213</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT24%20%20Pivot%20to%20Multi-Vector%20Attacks&amp;severity=medium&amp;id=691f8f1ab342c1dca41c3372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-banking-malware-bypassing-whatsapp-telegram-26d7c0ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20Banking%20Malware%20bypassing%20WhatsApp%2C%20Telegram%20and%20Signal%20Encryption&amp;severity=medium&amp;id=691f8f1ab342c1dca41c339a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-compromise-leads-to-astaroth-deployment-c169a524</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20compromise%20leads%20to%20Astaroth%20deployment&amp;severity=medium&amp;id=691f9295b342c1dca420b6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35029-cwe-79-improper-neutralization-of-i-f94da58c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35029%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=low&amp;id=691f6f9228b41f27b434758d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52668-vulnerability-in-revive-revive-adse-9f5231f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52668%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=691f6d0640b920e270875290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48986-vulnerability-in-revive-revive-adse-4091652c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48986%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=691f6d0640b920e270875284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48987-vulnerability-in-revive-revive-adse-4dcfc783</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48987%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f6d0640b920e270875287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55123-vulnerability-in-revive-revive-adse-567d7ded</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55123%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=low&amp;id=691f6d0640b920e27087529c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52671-vulnerability-in-revive-revive-adse-b47f1c79</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52671%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f6d0640b920e270875299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52666-vulnerability-in-revive-revive-adse-730a1f46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52666%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=low&amp;id=691f6d0640b920e27087528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52669-vulnerability-in-revive-revive-adse-0a553568</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52669%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f6d0640b920e270875293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55124-vulnerability-in-revive-revive-adse-af3710ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55124%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f6d0840b920e2708759af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52670-vulnerability-in-revive-revive-adse-40057dbb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52670%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=691f6d0640b920e270875296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52667-vulnerability-in-revive-revive-adse-191b55af</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52667%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=low&amp;id=691f6d0640b920e27087528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55126-vulnerability-in-revive-revive-adse-ba3497a8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55126%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f698540b920e2708380dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55127-vulnerability-in-revive-revive-adse-b99c2e3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55127%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f698540b920e2708380e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55128-vulnerability-in-revive-revive-adse-53c4fddf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55128%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f698540b920e2708380e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10571-cwe-288-authentication-bypass-using-44a6782d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10571%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ABB%20ABB%20Ability%20Edgenius&amp;severity=critical&amp;id=691f5c4ce672cd9080e8d38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64524-cwe-122-heap-based-buffer-overflow--fbfe4378</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64524%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20OpenPrinting%20cups-filters&amp;severity=low&amp;id=691f58cde672cd9080e446f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-says-it-breached-brazilian-ener-ae22f401</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Says%20It%20Breached%20Brazilian%20Energy%20Giant%20Petrobras&amp;severity=high&amp;id=691f58bee672cd9080e41a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tv-streaming-piracy-service-with-26m-yearly-visits-fe8c606f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TV%20streaming%20piracy%20service%20with%2026M%20yearly%20visits%20shut%20down&amp;severity=high&amp;id=691f515438b88f02b51b9979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-the-watering-hole-apt24s-pivot-to-multi-vec-43e857b7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20the%20Watering%20Hole%3A%20APT24&apos;s%20Pivot%20to%20Multi-Vector%20Attacks&amp;severity=medium&amp;id=691f515438b88f02b51b9981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/d-link-warns-of-new-rce-flaws-in-end-of-life-dir-8-62328988</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=D-Link%20warns%20of%20new%20RCE%20flaws%20in%20end-of-life%20DIR-878%20routers&amp;severity=high&amp;id=691f515438b88f02b51b9975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowray-20-exploits-unpatched-ray-flaw-to-build--0d0ab054</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowRay%202.0%20Exploits%20Unpatched%20Ray%20Flaw%20to%20Build%20Self-Spreading%20GPU%20Cryptomining%20Botnet&amp;severity=medium&amp;id=691fbbd770da09562fa00949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-bc3b45df</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20SonicWall%20SonicOS%20flaw%20allows%20hackers%20to%20crash%20firewalls&amp;severity=high&amp;id=691f515438b88f02b51b997d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64185-cwe-277-insecure-inherited-permissi-14dc3335</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64185%3A%20CWE-277%3A%20Insecure%20Inherited%20Permissions%20in%20OSC%20ondemand&amp;severity=medium&amp;id=691f4b4ed2e902043d281088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tsundere-botnet-expands-using-game-lures-and-ether-79375339</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tsundere%20Botnet%20Expands%20Using%20Game%20Lures%20and%20Ethereum-Based%20C2%20on%20Windows&amp;severity=medium&amp;id=691fbbd770da09562fa0094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62724-cwe-61-unix-symbolic-link-symlink-f-b6e40ee0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62724%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20OSC%20ondemand&amp;severity=medium&amp;id=691f4e5838b88f02b5191673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-identity-manager-exploit-observation-from-s-9db45a40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Identity%20Manager%20Exploit%20Observation%20from%20September%20(CVE-2025-61757)%2C%20(Thu%2C%20Nov%2020th)&amp;severity=critical&amp;id=691fbca370da09562fa0bb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62709-cwe-640-weak-password-recovery-mech-2d2a4583</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62709%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=691f4e5838b88f02b519166f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13437-cwe-706-use-of-incorrectly-resolved-26af9fe3</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13437%3A%20CWE-706%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Google%20zx&amp;severity=medium&amp;id=691f4446d2e902043d1f9194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62875-cwe-754-improper-check-for-unusual--80a44513</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62875%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20SUSE%20openSUSE%20Tumbleweed&amp;severity=medium&amp;id=691f3e06b661599aeb29272e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sturnus-banking-trojan-targets-whatsapp-telegr-6eb390b8</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Sturnus%20Banking%20Trojan%20Targets%20WhatsApp%2C%20Telegram%2C%20Signal%20Messages&amp;severity=medium&amp;id=691f36f1b661599aeb20cba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34320-cwe-22-improper-limitation-of-a-pat-c6ebdee7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34320%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BASIS%20International%20Ltd.%20BASIS%20BBj&amp;severity=critical&amp;id=691f3714b661599aeb20f31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13425-cwe-476-null-pointer-dereference-in-331e34da</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13425%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Google%20OSV-SCALIBR&amp;severity=low&amp;id=691f3714b661599aeb20f317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36161-cwe-327-use-of-a-broken-or-risky-cr-dd3da164</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36161%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f3714b661599aeb20f31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nknshell-malware-distributed-via-vpn-website-d695fc0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NKNShell%20Malware%20Distributed%20via%20VPN%20Website&amp;severity=medium&amp;id=691f9295b342c1dca420b6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/october-2025-infostealer-trend-report-4ba60ee9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=October%202025%20Infostealer%20Trend%20Report&amp;severity=medium&amp;id=691f9295b342c1dca420b68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/october-2025-trends-report-on-phishing-emails-40cb846e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=October%202025%20Trends%20Report%20on%20Phishing%20Emails&amp;severity=medium&amp;id=691f9295b342c1dca420b6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-eternidade-stealer-spreads-via-whatsapp-to-ste-01415930</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Eternidade%20Stealer%20Spreads%20Via%20WhatsApp%20to%20Steal%20Banking%20and%20Crypto%20Data&amp;severity=medium&amp;id=691f1dd53e6177767e7f4ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0645-cwe-434-unrestricted-upload-of-file--48528534</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0645%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Narkom%20Communication%20and%20Software%20Technologies%20Trade%20Ltd.%20Co.%20Pyxis%20Signage&amp;severity=high&amp;id=691f1de63e6177767e7f6c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13469-cross-site-scripting-in-public-know-6dca8e08</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13469%3A%20Cross%20Site%20Scripting%20in%20Public%20Knowledge%20Project%20omp&amp;severity=medium&amp;id=691f1de63e6177767e7f6c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13468-missing-authorization-in-sourcecode-93a30d17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13468%3A%20Missing%20Authorization%20in%20SourceCodester%20Alumni%20Management%20System&amp;severity=medium&amp;id=691f1a653e6177767e7adff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-50000-asus-routers-hacked-in-operation-wrthug-06ea9abd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2050%2C000%20Asus%20Routers%20Hacked%20in%20%E2%80%98Operation%20WrtHug%E2%80%99&amp;severity=medium&amp;id=691f1a473e6177767e7ac56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0643-cwe-79-improper-neutralization-of-in-05f21db9</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Narkom%20Communication%20and%20Software%20Technologies%20Trade%20Ltd.%20Co.%20Pyxis%20Signage&amp;severity=high&amp;id=691f1a653e6177767e7adfee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-and-allies-sanction-russian-bulletproof-hosting-02a9a3a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20and%20Allies%20Sanction%20Russian%20Bulletproof%20Hosting%20Service%20Providers&amp;severity=medium&amp;id=691f0ff063b28c178c82ff31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/comet-browser-flaw-lets-hidden-api-run-commands-on-6917801c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Comet%20Browser%20Flaw%20Lets%20Hidden%20API%20Run%20Commands%20on%20Users%E2%80%99%20Devices&amp;severity=medium&amp;id=691f0c7663b28c178c7eba58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-0-days-linkedin-spies-crypto-c-dea83a3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%200-Days%2C%20LinkedIn%20Spies%2C%20Crypto%20Crimes%2C%20IoT%20Flaws%20and%20New%20Malware%20Waves&amp;severity=medium&amp;id=691f158663b28c178c8a2615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40601-cwe-121-stack-based-buffer-overflow-6e3b704d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40601%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=691f0c8663b28c178c7ec081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40605-cwe-23-relative-path-traversal-in-s-8c5366d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40605%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20SonicWall%20Email%20Security&amp;severity=medium&amp;id=691f097d63b28c178c7c152c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40604-cwe-494-download-of-code-without-in-08dc3a3f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40604%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20SonicWall%20Email%20Security&amp;severity=medium&amp;id=691f097d63b28c178c7c1528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eternidade-stealer-whatsapp-hijacking-for-banking--06dbe44a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eternidade%20Stealer%3A%20WhatsApp%20Hijacking%20for%20Banking%20Fraud&amp;severity=medium&amp;id=691f04a4d820e5151fbc3c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-allowed-scraping-of-35-billion-whats-58b86501</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20Allowed%20Scraping%20of%203.5%20Billion%20WhatsApp%20Accounts&amp;severity=low&amp;id=691f0488d820e5151fbc22be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ctm360-exposes-a-global-whatsapp-hijacking-campaig-8ef1b943</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CTM360%20Exposes%20a%20Global%20WhatsApp%20Hijacking%20Campaign%3A%20HackOnChat&amp;severity=medium&amp;id=691f158663b28c178c8a2618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sturnus-android-trojan-quietly-captures-encryp-4fcb76b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Sturnus%20Android%20Trojan%20Quietly%20Captures%20Encrypted%20Chats%20and%20Hijacks%20Devices&amp;severity=medium&amp;id=691f158663b28c178c8a261b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-7-zip-vulnerability-exploited-in-attacks-0c66f025</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%207-Zip%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=691ef3b4961e3d19a6b1a017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12414-cwe-290-authentication-bypass-by-sp-bce1904b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12414%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Google%20Cloud%20Looker&amp;severity=critical&amp;id=691ef03b961e3d19a6aa6309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tamperedchef-malware-spreads-via-fake-software-ins-70f04923</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TamperedChef%20Malware%20Spreads%20via%20Fake%20Software%20Installers%20in%20Ongoing%20Global%20Campaign&amp;severity=high&amp;id=691eea8e6e8172836e888023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-mapped-ship-ais-data-days-befo-da81040c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Mapped%20Ship%20AIS%20Data%20Days%20Before%20Real-World%20Missile%20Strike%20Attempt&amp;severity=high&amp;id=691eea8e6e8172836e888027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cooking-up-trouble-how-tamperedchef-uses-signed-ap-137b3209</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cooking%20up%20trouble%3A%20How%20TamperedChef%20uses%20signed%20apps%20to%20deliver%20stealthy%20payloads&amp;severity=medium&amp;id=691ee3886e8172836e79b641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11676-cwe-20-improper-input-validation-in-3eefe3e0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11676%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20System%20Inc.%20TL-WR940N%20V6&amp;severity=high&amp;id=691ed086337afffbc004aae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62346-cwe-352-cross-site-request-forgery--37fa3373</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62346%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20HCL%20Software%20Glovius%20Cloud&amp;severity=medium&amp;id=691ed086337afffbc004aae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/third-party-failures-are-becoming-the-real-threat--64d0a3c6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Third-party%20failures%20are%20becoming%20the%20real%20threat%20to%20your%20security&amp;severity=medium&amp;id=691ec98e337afffbc0fb8c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-mapped-ship-ais-data-days-befo-963436b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Mapped%20Ship%20AIS%20Data%20Days%20Before%20Real-World%20Missile%20Strike%20Attempt&amp;severity=medium&amp;id=691f158663b28c178c8a261e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-patches-three-critical-serv-u-vulnerabi-bf5bd40d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Patches%20Three%20Critical%20Serv-U%20Vulnerabilities&amp;severity=critical&amp;id=691ec34f9f5a9374a9d0e191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-updates-backfire-rce-in-windows-update-health-7faa95b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Updates%20Backfire%3A%20RCE%20in%20Windows%20Update%20Health%20Tools&amp;severity=medium&amp;id=691ec3799f5a9374a9d1171f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64984-cwe-79-improper-neutralization-of-i-6905466f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64984%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kaspersky%20Kaspersky%20Endpoint%20Security&amp;severity=medium&amp;id=691ebfd49f5a9374a9cb4412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5092-cwe-79-improper-neutralization-of-in-2442521d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5092%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lightgalleryteam%20LightGallery%20WP&amp;severity=medium&amp;id=691eb8d39f5a9374a9bdd7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12502-cwe-89-sql-injection-in-attention-b-60a07d7b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12502%3A%20CWE-89%20SQL%20Injection%20in%20attention-bar&amp;severity=medium&amp;id=691eaf76c29bdb682bd1c59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12778-cwe-862-missing-authorization-in-us-a8812238</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12778%3A%20CWE-862%20Missing%20Authorization%20in%20userelements%20Ultimate%20Member%20Widgets%20for%20Elementor%20%E2%80%93%20WordPress%20User%20Directory&amp;severity=medium&amp;id=691e9cde6a37eb355c413d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/helixguard-uncovers-malicious-spellchecker-package-f6c98000</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HelixGuard%20uncovers%20malicious%20%22spellchecker%22%20packages%20on%20PyPI%20using%20multi-layer%20encryption%20to%20steal%20crypto%20wallets.&amp;severity=medium&amp;id=691e901a1af65083e688d8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13451-sql-injection-in-sourcecodester-onl-44a74aad</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13451%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Shop%20Project&amp;severity=medium&amp;id=691e890f1af65083e684c093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13450-cross-site-scripting-in-sourcecodes-b420f123</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13450%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Shop%20Project&amp;severity=medium&amp;id=691e890f1af65083e684c08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13449-sql-injection-in-code-projects-onli-2241845a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13449%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shop%20Project&amp;severity=medium&amp;id=691e858b1af65083e68334ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13446-stack-based-buffer-overflow-in-tend-955c8679</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13446%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=691e858b1af65083e68334a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13445-stack-based-buffer-overflow-in-tend-2d090035</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13445%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=691e7b7b1af65083e67f4584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13443-improper-access-controls-in-macrozh-b53a5c6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13443%3A%20Improper%20Access%20Controls%20in%20macrozheng%20mall&amp;severity=medium&amp;id=691e7b7b1af65083e67f457e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13442-command-injection-in-utt-750w-0d3f1567</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13442%3A%20Command%20Injection%20in%20UTT%20%E8%BF%9B%E5%8F%96%20750W&amp;severity=medium&amp;id=691e73fd1af65083e67a8485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13435-path-traversal-in-dreampie-resty-c53579e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13435%3A%20Path%20Traversal%20in%20Dreampie%20Resty&amp;severity=medium&amp;id=691e73fd1af65083e67a847f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13434-improper-neutralization-of-http-hea-f7d7045b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13434%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20jameschz%20Hush%20Framework&amp;severity=medium&amp;id=691e696b1af65083e66d8f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13433-unquoted-search-path-in-muse-group--3c22ea80</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13433%3A%20Unquoted%20Search%20Path%20in%20Muse%20Group%20MuseHub&amp;severity=high&amp;id=691e65e61af65083e66926d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13424-sql-injection-in-campcodes-supplier-583dc519</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13424%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=691e5c8df78d7eef03ef72ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-20-554a5ed3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-20&amp;severity=medium&amp;id=691fae469bfed6bde22f2b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61138-na-975e9156</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61138%3A%20n%2Fa&amp;severity=high&amp;id=691f880cb342c1dca413b0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25613-na-10b73eeb</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25613%3A%20n%2Fa&amp;severity=high&amp;id=691f82044f1c50aa2eb5aeea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63685-na-1dbcd6cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63685%3A%20n%2Fa&amp;severity=critical&amp;id=691f82024f1c50aa2eb5ae8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63807-na-82b5b42b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63807%3A%20n%2Fa&amp;severity=critical&amp;id=691f7e7c4f1c50aa2eb161ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63700-na-4cbc8dfc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63700&amp;severity=null&amp;id=691f628a40b920e2707a8c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63888-na-25ec4281</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63888%3A%20n%2Fa&amp;severity=critical&amp;id=691f58cde672cd9080e446fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63889-na-b9ed9834</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63889%3A%20n%2Fa&amp;severity=high&amp;id=691f553ce672cd9080df8ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63848-na-e685503a</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63848%3A%20n%2Fa&amp;severity=medium&amp;id=691f4b4ed2e902043d281084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64027-na-03759e74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64027%3A%20n%2Fa&amp;severity=medium&amp;id=691f47cad2e902043d2402e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52410-na-99640c1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52410%3A%20n%2Fa&amp;severity=critical&amp;id=691f4446d2e902043d1f9197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60737-na-8b9924af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60737%3A%20n%2Fa&amp;severity=medium&amp;id=691f3714b661599aeb20f321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60738-na-c0d732ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60738%3A%20n%2Fa&amp;severity=critical&amp;id=691f3400b661599aeb1e39a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65226-na-9b94106a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65226%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac4562527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60794-na-0dda3562</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60794%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac4562522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65220-na-313874e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65220%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac456251f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60799-na-ed47d199</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60799%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac456251b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60798-na-54f57fa2</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60798%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac4562516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65223-na-399d4943</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65223%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65222-na-7486c305</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65222%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65221-na-44f29dce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65221%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60797-na-3421a26f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60797%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60796-na-959bd500</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60796%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13423-unrestricted-upload-in-campcodes-re-8fdd6dc8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13423%3A%20Unrestricted%20Upload%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=691e5586f78d7eef03e60e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13422-sql-injection-in-freeprojectscodes--cb3a4430</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13422%3A%20SQL%20Injection%20in%20freeprojectscodes%20Sports%20Club%20Management%20System&amp;severity=medium&amp;id=691e5586f78d7eef03e60e2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13421-sql-injection-in-itsourcecode-human-6949e510</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13421%3A%20SQL%20Injection%20in%20itsourcecode%20Human%20Resource%20Management%20System&amp;severity=medium&amp;id=691e51178e880a653f859b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lite-xl-rce-cve-2025-12121-656c948a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LITE%20XL%20RCE%20(CVE-2025-12121)&amp;severity=medium&amp;id=691e49ef8e880a653f7b7f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13420-sql-injection-in-itsourcecode-human-a7fb6624</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13420%3A%20SQL%20Injection%20in%20itsourcecode%20Human%20Resource%20Management%20System&amp;severity=medium&amp;id=691e46748e880a653f7616ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneaky2fa-phaas-kit-now-uses-redteamers-browser-in-dbe41d96</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneaky2FA%20PhaaS%20kit%20now%20uses%20redteamers&apos;%20Browser-in-the-Browser%20attack&amp;severity=high&amp;id=691e450d7eddc5e77790088b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13415-cross-site-scripting-in-icret-easyi-2e913485</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13415%3A%20Cross%20Site%20Scripting%20in%20icret%20EasyImages&amp;severity=medium&amp;id=691e3faf6a7f50ea54b7fb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11884-cwe-79-improper-neutralization-of-i-c8a5a8e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11884%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%E2%84%A2%20uCMDB&amp;severity=low&amp;id=691e365f4e81ab18fb53789d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/network-devices-compromised-for-adversary-in-the-m-0ac252b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlushDaemon%20compromises%20network%20devices%20for%20adversary-in-the-middle%20attacks&amp;severity=medium&amp;id=691ee3886e8172836e79b611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13412-cross-site-scripting-in-campcodes-r-2721a28f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13412%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=691e32d34e81ab18fb4e5e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13147-cwe-918-server-side-request-forgery-babcce70</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13147%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Progress%20MOVEit%20Transfer&amp;severity=medium&amp;id=691e2f504e81ab18fb499ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47914-cwe-237-in-golangorgxcrypto-golango-f5a02464</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47914%3A%20CWE-237%20in%20golang.org%2Fx%2Fcrypto%20golang.org%2Fx%2Fcrypto%2Fssh%2Fagent&amp;severity=medium&amp;id=691e2bd54e81ab18fb452bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58181-cwe-1284-in-golangorgxcrypto-golang-3473129b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58181%3A%20CWE-1284%20in%20golang.org%2Fx%2Fcrypto%20golang.org%2Fx%2Fcrypto%2Fssh&amp;severity=medium&amp;id=691e2bd54e81ab18fb452bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13411-unrestricted-upload-in-campcodes-re-fce26ed0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13411%3A%20Unrestricted%20Upload%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=691e29f04d0ffcb40bb6a60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13410-sql-injection-in-campcodes-retro-ba-715291c4</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13410%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=691e29f04d0ffcb40bb6a604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-via-a-malicious-svg-in-mpdf-73bd7b2e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20via%20a%20malicious%20SVG%20in%20mPDF&amp;severity=medium&amp;id=691e92636a37eb355c323aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36371-cwe-598-use-of-get-request-method-w-450ad9eb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36371%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings&amp;severity=medium&amp;id=691e248d4d0ffcb40bb0867b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65103-cwe-89-improper-neutralization-of-s-6fd11025</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65103%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=691e18af49ba98bd8186a296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65094-cwe-266-incorrect-privilege-assignm-62848762</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65094%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20WBCE%20WBCE_CMS&amp;severity=high&amp;id=691e248d4d0ffcb40bb0868e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-exposes-bulletproof-hosting-operator-linked-to--796ce78b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Exposes%20Bulletproof%20Hosting%20Operator%20Linked%20to%20BlackBasta%2C%20Evil%20Corp%20and%20LockBit%20Ransomware&amp;severity=medium&amp;id=691e153049ba98bd8181cfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/python-based-whatsapp-worm-spreads-eternidade-stea-64313459</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Python-Based%20WhatsApp%20Worm%20Spreads%20Eternidade%20Stealer%20Across%20Brazilian%20Devices&amp;severity=high&amp;id=691e12c2e0559f5704617ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65100-cwe-693-protection-mechanism-failur-c62ed801</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65100%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20ilbers%20isar&amp;severity=medium&amp;id=691e12eee0559f5704623244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-actively-exploiting-7-zip-symbolic-linkbas-a3ed7028</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Actively%20Exploiting%207-Zip%20Symbolic%20Link%E2%80%93Based%20RCE%20Vulnerability%20(CVE-2025-11001)&amp;severity=high&amp;id=691e12c2e0559f5704617ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64759-cwe-20-improper-input-validation-in-dcc518e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64759%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20homarr-labs%20homarr&amp;severity=high&amp;id=691e12eee0559f5704623249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-details-irans-cyber-enabled-kinetic-attacks-0eef9793</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Details%20Iran%E2%80%99s%20Cyber-Enabled%20Kinetic%20Attacks%20Linking%20Digital%20Spying%20to%20Physical%20Strikes&amp;severity=medium&amp;id=691e0bb0e0559f570458859d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13316-cwe-321-use-of-hard-coded-cryptogra-12776ddb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13316%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Lynxtechnology%20Twonky%20Server&amp;severity=high&amp;id=691e09e0e0559f57045745b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13315-cwe-420-unprotected-alternate-chann-f279de98</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13315%3A%20CWE-420%3A%20Unprotected%20Alternate%20Channel%20in%20Lynxtechnology%20Twonky%20Server&amp;severity=critical&amp;id=691e09e0e0559f57045745ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65089-cwe-862-missing-authorization-in-xw-df21fcec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65089%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwikisas%20xwiki-pro-macros&amp;severity=medium&amp;id=691e09e0e0559f57045745bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65099-cwe-94-improper-control-of-generati-47f2c548</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65099%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=691e026693c808727dc91d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65026-cwe-94-improper-control-of-generati-935434d0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65026%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20esm-dev%20esm.sh&amp;severity=medium&amp;id=691e026693c808727dc91d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65025-cwe-22-improper-limitation-of-a-pat-ddafd98a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65025%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=691e026693c808727dc91d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65034-cwe-639-authorization-bypass-throug-7d192086</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65034%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lukevella%20rallly&amp;severity=high&amp;id=691e026793c808727dc91d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65033-cwe-285-improper-authorization-in-l-60e747fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65033%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=high&amp;id=691e026793c808727dc91d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65032-cwe-639-authorization-bypass-throug-d19dbfa3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65032%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lukevella%20rallly&amp;severity=medium&amp;id=691e026793c808727dc91d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65031-cwe-285-improper-authorization-in-l-1d97cd52</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65031%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=medium&amp;id=691e026793c808727dc91d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65030-cwe-285-improper-authorization-in-l-7320d1dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65030%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=high&amp;id=691e026793c808727dc91d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65029-cwe-285-improper-authorization-in-l-3e4af100</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65029%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=high&amp;id=691e026793c808727dc91d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65021-cwe-285-improper-authorization-in-l-d9b86aa6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65021%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=critical&amp;id=691e026693c808727dc91d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65020-cwe-285-improper-authorization-in-l-a5ca4882</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65020%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=medium&amp;id=691e026693c808727dc91d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65028-cwe-285-improper-authorization-in-l-54713461</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65028%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=medium&amp;id=691e026693c808727dc91d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-whatsapp-flaw-leaks-phone-numbers-for-over-cc5f8049</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20WhatsApp%20flaw%20leaks%20phone%20numbers%20for%20over%203.5B%20users.&amp;severity=high&amp;id=691dfb6593c808727dbff02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64708-cwe-613-insufficient-session-expira-ec5ea700</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64708%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20goauthentik%20authentik&amp;severity=medium&amp;id=691dfb7693c808727dc04388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64521-cwe-289-authentication-bypass-by-al-2b5b0b85</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64521%3A%20CWE-289%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20goauthentik%20authentik&amp;severity=medium&amp;id=691dfb7693c808727dc04384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13400-buffer-overflow-in-tenda-ch22-098b1390</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13400%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=691dfb7693c808727dc0437d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-selling-alleged-samsung-medison-healthcare--583b48bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Selling%20Alleged%20Samsung%20Medison%20Healthcare%20Data%20Stolen%20In%203rd%20Party%20Breach&amp;severity=high&amp;id=691df93ccb9b476b7d5bec2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12743-cwe-89-improper-neutralization-of-s-6af430ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=medium&amp;id=691df5b8cb9b476b7d56e485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64765-cwe-22-improper-limitation-of-a-pat-e99d26ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64765%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=691df5b8cb9b476b7d56e491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64764-cwe-80-improper-neutralization-of-s-afdf0627</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64764%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20withastro%20astro&amp;severity=high&amp;id=691df5b8cb9b476b7d56e48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65019-cwe-79-improper-neutralization-of-i-c93269f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65019%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=691df5b8cb9b476b7d56e495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64757-cwe-22-improper-limitation-of-a-pat-04b40712</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64757%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20withastro%20astro&amp;severity=low&amp;id=691df5b8cb9b476b7d56e489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-actively-exploiting-7-zip-symbolic-linkbas-fef89429</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NHS%20Warns%20of%20PoC%20Exploit%20for%207-Zip%20Symbolic%20Link%E2%80%93Based%20RCE%20Vulnerability&amp;severity=low&amp;id=691df220cb9b476b7d51d960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34335-cwe-78-improper-neutralization-of-s-2ccf7582</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34335%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34334-cwe-78-improper-neutralization-of-s-5b18a611</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34334%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34332-cwe-276-incorrect-default-permissio-8f40942f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34332%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34329-cwe-434-unrestricted-upload-of-file-6805136f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34329%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=critical&amp;id=691df24bcb9b476b7d51eaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34331-cwe-306-missing-authentication-for--5219f7db</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34331%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34328-cwe-434-unrestricted-upload-of-file-a923c7e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34328%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=critical&amp;id=691df24bcb9b476b7d51eae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34330-cwe-434-unrestricted-upload-of-file-4be33253</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34330%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=medium&amp;id=691df24bcb9b476b7d51eaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34333-cwe-276-incorrect-default-permissio-3f3a598d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34333%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12766-cwe-639-authorization-bypass-throug-dadccd45</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12766%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20BlackBerry%20BlackBerry%C2%AE%20AtHoc%C2%AE%20(OnPrem)&amp;severity=medium&amp;id=691deebacb9b476b7d4d1fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65022-cwe-89-improper-neutralization-of-s-e58ebe1a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65022%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20portabilis%20i-educar&amp;severity=high&amp;id=691dec83964c14ffeeaeeaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65023-cwe-89-improper-neutralization-of-s-462dd1e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65023%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20portabilis%20i-educar&amp;severity=high&amp;id=691dec83964c14ffeeaeeaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65024-cwe-89-improper-neutralization-of-s-e866ec3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65024%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20portabilis%20i-educar&amp;severity=high&amp;id=691dec83964c14ffeeaeeafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unicode-it-is-more-than-funny-domain-names-wed-nov-7eccdf33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names.%2C%20(Wed%2C%20Nov%2012th)&amp;severity=high&amp;id=691dec62964c14ffeeae536b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10703-cwe-94-improper-control-of-generati-1cca29eb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10703%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Progress%20DataDirect%20Connect%20for%20JDBC%20for%20Amazon%20Redshift&amp;severity=high&amp;id=691de8ff964c14ffeea99620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10702-cwe-94-improper-control-of-generati-cfbe7bd2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10702%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Progress%20DataDirect%20Connect%20for%20JDBC%20for%20Amazon%20Redshift&amp;severity=high&amp;id=691de8ff964c14ffeea9961d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-blames-outage-on-internal-configuration-c4a25b7a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Blames%20Outage%20on%20Internal%20Configuration%20Error&amp;severity=medium&amp;id=691de8dd964c14ffeea97bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/california-man-admits-to-laundering-crypto-stolen--26f23f22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=California%20man%20admits%20to%20laundering%20crypto%20stolen%20in%20%24230M%20heist&amp;severity=high&amp;id=691de568964c14ffeea48423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13397-null-pointer-dereference-in-mrubyc-ca0aea54</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13397%3A%20NULL%20Pointer%20Dereference%20in%20mrubyc&amp;severity=medium&amp;id=691de57d964c14ffeea48e3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13396-sql-injection-in-code-projects-cour-1ceb2f09</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13396%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=691de57d964c14ffeea48e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fixed-2-critical-zero-day-vulnerabilities-fd0f239a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Fixed%202%20Critical%20Zero-Day%20Vulnerabilities%20in%20FortiWeb&amp;severity=critical&amp;id=691dd2c8338171324080af84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11963-cwe-79-improper-neutralization-of-i-7b41c278</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11963%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Saysis%20Computer%20Systems%20Trade%20Ltd.%20Co.%20StarCities&amp;severity=medium&amp;id=691dd2e93381713240811e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-railway-braking-systems-open-to-tampering-35fd7d1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Railway%20Braking%20Systems%20Open%20to%20Tampering&amp;severity=critical&amp;id=691dcf3833817132407c1066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0421-cwe-1021-improper-restriction-of-ren-90bf7f61</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0421%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Shopside%20Software%20Technologies%20Inc.%20Shopside&amp;severity=medium&amp;id=691dc9e6338171324075e919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-year-old-ray-ai-framework-flaw-exploited-in-on-18133971</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two-Year-Old%20Ray%20AI%20Framework%20Flaw%20Exploited%20in%20Ongoing%20Campaign&amp;severity=medium&amp;id=691dc7ce0d9a5150f8cf793c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8528-cwe-79-improper-neutralization-of-in-4593920c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8528%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Automated%20Logic%20WebCtrl&amp;severity=medium&amp;id=691dc7eb0d9a5150f8cfb1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8527-cwe-601-url-redirection-to-untrusted-fd0dfc1a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8527%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Automated%20Logic%20WebCtrl&amp;severity=high&amp;id=691dc7eb0d9a5150f8cfb1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-black-friday-using-llms-to-save-on-the-sal-b2eddb90</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20Black%20Friday%3A%20using%20LLMs%20to%20save%20on%20the%20%E2%80%9Csale%20of%20the%20year%E2%80%9D%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=691dc0e50d9a5150f8c7142d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wrthug-exploits-six-asus-wrt-flaws-to-hijack-tens--a19440f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WrtHug%20Exploits%20Six%20ASUS%20WRT%20Flaws%20to%20Hijack%20Tens%20of%20Thousands%20of%20EoL%20Routers%20Worldwide&amp;severity=medium&amp;id=691e7bc51af65083e67f6131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12592-cwe-1392-cwe-1392-use-of-default-cr-f7eb4745</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12592%3A%20CWE-1392%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Vivotek%20Affected%20device%20model%20numbers%20are%20FD7131-VVTK%2CFD7131-VVTK%2CFD7131-VVTK%2CFD7141-VVTK%2CIP7131-VVTK%2CIP7133-VVTK%2CIP7133-VVTK%2CIP7133-VVTK%2CIP7134-VVTK%2CIP7135-VVTK%2CIP7135-VVTK%2CIP7135-VVTK%2CIP7135-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7138-VVTK%2CIP7142-VVTK%2CIP7142-VVTK%2CIP7151-VVTK%2CIP7152-VVTK%2CIP7153-VVTK%2CIP7153-VVTK%2CIP7154-VVTK%2CIP7330-VVTK%2CIP7330-VVTK%2CIP7330-VVTK%2CIP8131-VVTK%2CIP8131-VVTK%2CIP8131-VVTK%2CIP8131W-VVTK%2CPT7135-VVTK%2CPT7137-TCON%2CPT7137-VVTK%2CPT7137-VVTK%2CPT7137-VVTK%2CPT7137-VVTK%2CPZ7131-VVTK%2CPZ7131-VVTK%2CPZ71X1-VVTK%2CPZ71X1-VVTK%2CPZ71X2-VVTK%2CSD73X3-VVTK%2CSD73X3-VVTK%2CSD73X3-VVTK%2CTC5330-VVTK%2CTC5332-TCVV%2CTC5333-TCVV%2CTC5633-TCVV%2CTC5633-VVTK%2CVS7100-VVTK%2CVS7100-VVTK%2CVS7100-VVTK&amp;severity=critical&amp;id=691dbe8df37b5c9bf1714e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cline-bot-ai-agent-for-coding-vulnerable-to-data-t-23c82fef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cline%20Bot%20AI%20Agent%20for%20Coding%20Vulnerable%20to%20Data%20Theft%20and%20Code%20Execution&amp;severity=medium&amp;id=691db403f37b5c9bf1636867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-is-supercharging-phishing-heres-how-to-fight-ba-c7716430</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Is%20Supercharging%20Phishing%3A%20Here%E2%80%99s%20How%20to%20Fight%20Back&amp;severity=medium&amp;id=691e7c6d1af65083e67fe617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/application-containment-how-to-use-ringfencing-to--1f653049</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Application%20Containment%3A%20How%20to%20Use%20Ringfencing%20to%20Prevent%20the%20Weaponization%20of%20Trusted%20Software&amp;severity=medium&amp;id=691e7bc51af65083e67f6134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10437-cwe-89-improper-neutralization-of-s-a1c76425</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10437%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Eksagate%20Electronic%20Engineering%20and%20Computer%20Industry%20Trade%20Inc.%20Webpack%20Management%20System&amp;severity=critical&amp;id=691dae1b258ca46eb4871df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/largest-azure-ddos-attack-powered-by-aisuru-botnet-b97c6ed7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Largest%20Azure%20DDoS%20Attack%20Powered%20by%20Aisuru%20Botnet&amp;severity=medium&amp;id=691da712258ca46eb47db42e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eurofiber-confirms-november-13-hack-data-theft-and-d7aa2ebe</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eurofiber%20confirms%20November%2013%20hack%2C%20data%20theft%2C%20and%20extortion%20attempt&amp;severity=high&amp;id=691da72c258ca46eb47e1524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edgestepper-implant-reroutes-dns-queries-to-deploy-59c3c03e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EdgeStepper%20Implant%20Reroutes%20DNS%20Queries%20to%20Deploy%20Malware%20via%20Hijacked%20Software%20Updates&amp;severity=high&amp;id=691da48da788429a71e88406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/plushdaemon-hackers-hijack-software-updates-in-sup-c375edd0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98PlushDaemon%E2%80%99%20hackers%20hijack%20software%20updates%20in%20supply-chain%20attacks&amp;severity=high&amp;id=691da48da788429a71e8840a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-operation-wrthug-hijacks-thousands-of-7c3af5f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Operation%20%E2%80%9CWrtHug%E2%80%9D%20Hijacks%20Thousands%20of%20ASUS%20Routers&amp;severity=high&amp;id=691da48da788429a71e8840e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13395-sql-injection-in-codehub666-94list-2f5b1313</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13395%3A%20SQL%20Injection%20in%20codehub666%2094list&amp;severity=medium&amp;id=691da73c258ca46eb47e777a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64408-cwe-502-deserialization-of-untruste-2c84b4b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64408%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Causeway&amp;severity=medium&amp;id=691da109a788429a71e487c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12472-cwe-362-concurrent-execution-using--2d410649</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12472%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=691da109a788429a71e487c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/servicenow-ai-agents-can-be-tricked-into-acting-ag-7a7b8e8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ServiceNow%20AI%20Agents%20Can%20Be%20Tricked%20Into%20Acting%20Against%20Each%20Other%20via%20Second-Order%20Prompts&amp;severity=medium&amp;id=691e7bc51af65083e67f613a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58412-execute-unauthorized-code-or-comman-00f3c2a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58412%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiADC&amp;severity=medium&amp;id=691d946612537358e42c14bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-discloses-second-exploited-fortiweb-zero--2cc1aab1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Discloses%20Second%20Exploited%20FortiWeb%20Zero-Day%20in%20a%20Week&amp;severity=low&amp;id=691d944712537358e42be659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11230-cwe-407-inefficient-algorithmic-com-994b4ebb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11230%3A%20CWE-407%20Inefficient%20Algorithmic%20Complexity%20in%20HAProxy%20Technologies%20HAProxy%20Community%20Edition&amp;severity=high&amp;id=691d90cc12537358e424faf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webjack-evolving-iis-hijacking-campaign-abuses-seo-ab34b9b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WEBJACK%3A%20Evolving%20IIS%20Hijacking%20Campaign%20Abuses%20SEO%20for%20Fraud%20and%20Monetization&amp;severity=medium&amp;id=691d8b10ce29a4e4be9cd827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gpt-trade-fake-google-play-store-drops-btmob-spywa-ca6fb560</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GPT%20Trade%3A%20Fake%20Google%20Play%20Store%20drops%20BTMob%20Spyware%20and%20UASecurity%20Miner%20on%20Android%20Devices&amp;severity=medium&amp;id=691d8b10ce29a4e4be9cd817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/roningloader-dragonbreaths-new-path-to-ppl-abuse-14b37752</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RONINGLOADER%3A%20DragonBreath&apos;s%20New%20Path%20to%20PPL%20Abuse&amp;severity=medium&amp;id=691d8b10ce29a4e4be9cd7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11446-cwe-532-insertion-of-sensitive-info-34cb8f44</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11446%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20upKeeper%20Solutions%20upKeeper%20Manager&amp;severity=high&amp;id=691d8797ce29a4e4be976738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-tuoni-c2-attack-on-us-real-estate-fi-85ae45b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20Tuoni%20C2%20Attack%20on%20U.S.%20Real%20Estate%20Firm%20Thwarted&amp;severity=medium&amp;id=691d8b10ce29a4e4be9cd7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/license-to-encrypt-make-their-move-35fc53e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=License%20to%20Encrypt%3A%20Make%20Their%20Move&amp;severity=medium&amp;id=691d90c112537358e424f598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13035-cwe-94-improper-control-of-generati-5296eda6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13035%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20codesnippetspro%20Code%20Snippets&amp;severity=high&amp;id=691d774cfcf6450804cbcaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13206-cwe-79-improper-neutralization-of-i-8a48be31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13206%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=high&amp;id=691d774cfcf6450804cbcaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12484-cwe-79-improper-neutralization-of-i-d6f326dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12484%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Giveaways%20and%20Contests%20by%20RafflePress%20%E2%80%93%20Get%20More%20Website%20Traffic%2C%20Email%20Subscribers%2C%20and%20Social%20Followers&amp;severity=high&amp;id=691d774bfcf6450804cbcae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11243-cwe-770-allocation-of-resources-wit-07445dd8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11243%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Shelly%20Pro%204PM&amp;severity=high&amp;id=691d6a73a27e6d5e91bd838d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12056-cwe-125-out-of-bounds-read-in-shell-1e6ca5a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12056%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Shelly%20Pro%203EM&amp;severity=high&amp;id=691d6a73a27e6d5e91bd8391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12535-cwe-352-cross-site-request-forgery--8fcf301f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12535%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=medium&amp;id=691d6a73a27e6d5e91bd8394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13085-cwe-285-improper-authorization-in-s-121b85ac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13085%3A%20CWE-285%20Improper%20Authorization%20in%20softaculous%20SiteSEO%20%E2%80%93%20SEO%20Simplified&amp;severity=medium&amp;id=691d6a73a27e6d5e91bd839a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12057-cwe-434-unrestricted-upload-of-file-32d029b6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12057%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WavePlayer&amp;severity=critical&amp;id=691d5dd0b5b376a4835ad660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12814-cwe-285-improper-authorization-in-s-7477a3ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12814%3A%20CWE-285%20Improper%20Authorization%20in%20softaculous%20SiteSEO%20%E2%80%93%20SEO%20Simplified&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12822-cwe-862-missing-authorization-in-cy-8533f080</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12822%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20WP%20Login%20and%20Register%20using%20JWT&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12359-cwe-918-server-side-request-forgery-fbf6ec04</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12359%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dfactory%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12174-cwe-862-missing-authorization-in-wp-22290457</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12174%3A%20CWE-862%20Missing%20Authorization%20in%20wpwax%20Directorist%3A%20AI-Powered%20Business%20Directory%2C%20Listings%20%26%20Classified%20Ads&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12878-cwe-79-improper-neutralization-of-i-08b81964</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amans2k%20FunnelKit%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20Checkout&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13145-cwe-502-deserialization-of-untruste-08158add</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13145%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=high&amp;id=691d6898a27e6d5e91bc24d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12646-cwe-89-improper-neutralization-of-s-fc01026e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12646%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=high&amp;id=691d6897a27e6d5e91bc16c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13054-cwe-79-improper-neutralization-of-i-89fcb2cd</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12710-cwe-79-improper-neutralization-of-i-d8d8342f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12710%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kwmanagement%20Pet-Manager%20%E2%80%93%20Petfinder&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12751-cwe-862-missing-authorization-in-el-9e5026bc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12751%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20WSChat%20%E2%80%93%20WordPress%20Live%20Chat&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12842-cwe-20-improper-input-validation-in-6817e8c7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12842%3A%20CWE-20%20Improper%20Input%20Validation%20in%20timeslotplugins%20Time%20Slot%20%E2%80%93%20Booking%20and%20Appointment%20System&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12426-cwe-200-exposure-of-sensitive-infor-86f1392c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12426%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ays-pro%20Quiz%20Maker&amp;severity=medium&amp;id=691d4b629140b486bbdab6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12349-cwe-306-missing-authentication-for--ad0d6d83</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12349%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20icegram%20Email%20Subscribers%20%26%20Newsletters%20%E2%80%93%20Email%20Marketing%2C%20Post%20Notifications%20%26%20Newsletter%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=691d4b629140b486bbdab6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowray-20-active-global-campaign-hijacks-ray-ai-c7b6a9bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowRay%202.0%3A%20Active%20Global%20Campaign%20Hijacks%20Ray%20AI%20Infrastructure%20Into%20Self-Propagating%20Botnet&amp;severity=medium&amp;id=691d8407ce29a4e4be9214c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-new-fortiweb-cve-2025-58034-vuln-3e41771d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Warns%20of%20New%20FortiWeb%20CVE-2025-58034%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=low&amp;id=691e7bc51af65083e67f613d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12427-cwe-639-authorization-bypass-throug-0aad03ee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12427%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20yithemes%20YITH%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=691d3cbbc00dea8b9c9becb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6251-cwe-79-improper-neutralization-of-in-6f4fb4ec</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6251%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=691d3cbbc00dea8b9c9becc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12770-cwe-200-exposure-of-sensitive-infor-b03b1919</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12770%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20saadiqbal%20New%20User%20Approve&amp;severity=medium&amp;id=691d3cbbc00dea8b9c9becbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12777-cwe-285-improper-authorization-in-y-117c42fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12777%3A%20CWE-285%20Improper%20Authorization%20in%20yithemes%20YITH%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=691d3cbbc00dea8b9c9becc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13051-cwe-427-uncontrolled-search-path-el-9b7b1033</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13051%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20ASUSTOR%20ABP%20and%20AES&amp;severity=critical&amp;id=691d3937c00dea8b9c9a69ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supapwn-hacking-our-way-into-lovables-office-and-h-cf201feb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SupaPwn%3A%20Hacking%20Our%20Way%20into%20Lovable&apos;s%20Office%20and%20Helping%20Secure%20Supabase&amp;severity=medium&amp;id=691d3233c00dea8b9c96f862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13225-vulnerability-in-tanium-tanos-25a8217c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13225%3A%20Vulnerability%20in%20Tanium%20TanOS&amp;severity=medium&amp;id=691d3230c00dea8b9c96f7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/request-suggestions-to-detect-bgp-hijack-events-29043d82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=request%20suggestions%20to%20detect%20bgp%20hijack%20events&amp;severity=medium&amp;id=691d2eafc00dea8b9c958bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shadowray-attacks-convert-ray-clusters-into-cr-e655a4b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ShadowRay%20attacks%20convert%20Ray%20clusters%20into%20crypto%20miners&amp;severity=high&amp;id=691d241dc00dea8b9c90b742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anatomy-of-an-akira-ransomware-attack-when-a-fake--1b9b949c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anatomy%20of%20an%20Akira%20Ransomware%20Attack%3A%20When%20a%20Fake%20CAPTCHA%20Led%20to%2042%20Days%20of%20Compromise&amp;severity=medium&amp;id=691d2099c00dea8b9c8fb1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12852-cwe-427-uncontrolled-search-path-el-4d3fe5a1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12852%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20NEC%20Corporation%20RakurakuMusen%20Start%20EX&amp;severity=high&amp;id=691d1e32c00dea8b9c8d38b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-analyzed-python-packages-that-can-be-abused-to-b-d744a144</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20analyzed%20Python%20packages%20that%20can%20be%20abused%20to%20build%20surveillance%20tools%20%E2%80%94%20here%E2%80%99s%20what%20I%20found&amp;severity=medium&amp;id=691d0f29c00dea8b9c7c7245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-19-606c9bd2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-19&amp;severity=medium&amp;id=691e5c7df78d7eef03ef1825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63719-na-9bd2d219</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63719%3A%20n%2Fa&amp;severity=high&amp;id=691e32d34e81ab18fb4e5e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63371-na-08da67ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63371%3A%20n%2Fa&amp;severity=high&amp;id=691e2f504e81ab18fb499ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63932-na-77fbdbb5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63932%3A%20n%2Fa&amp;severity=high&amp;id=691e266e4d0ffcb40bb1dd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63214-na-2c86b8ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63214%3A%20n%2Fa&amp;severity=medium&amp;id=691e248d4d0ffcb40bb0868a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51663-na-9bc8d406</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51663%3A%20n%2Fa&amp;severity=high&amp;id=691e248d4d0ffcb40bb08686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51662-na-ba93e796</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51662%3A%20n%2Fa&amp;severity=medium&amp;id=691e248d4d0ffcb40bb08682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51661-na-1ea646be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51661%3A%20n%2Fa&amp;severity=high&amp;id=691e248d4d0ffcb40bb0867e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63213-na-8d5dcc4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63213%3A%20n%2Fa&amp;severity=critical&amp;id=691e1fb449ba98bd818e9a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63212-na-e1760616</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63212%3A%20n%2Fa&amp;severity=medium&amp;id=691e1fb449ba98bd818e9a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63211-na-8334dcef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63211%3A%20n%2Fa&amp;severity=medium&amp;id=691e0bcde0559f5704589585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63209-na-2883e050</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63209%3A%20n%2Fa&amp;severity=high&amp;id=691e026693c808727dc91d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63208-na-26d15f3a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63208%3A%20n%2Fa&amp;severity=high&amp;id=691e026693c808727dc91d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63207-na-9a83d4eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63207%3A%20n%2Fa&amp;severity=critical&amp;id=691e026693c808727dc91d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63210-na-54eda0ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63210%3A%20n%2Fa&amp;severity=critical&amp;id=691e026693c808727dc91d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63206-na-4d497d2e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63206%3A%20n%2Fa&amp;severity=critical&amp;id=691dfee093c808727dc4717e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63205-na-6f49544f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63205%3A%20n%2Fa&amp;severity=high&amp;id=691dfee093c808727dc4717a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63879-na-143d2ffa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63879%3A%20n%2Fa&amp;severity=medium&amp;id=691df058cb9b476b7d50830c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63224-na-707ca38a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63224%3A%20n%2Fa&amp;severity=critical&amp;id=691dec83964c14ffeeaeeaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63223-na-0940d10a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63223%3A%20n%2Fa&amp;severity=critical&amp;id=691dec83964c14ffeeaeeaec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63220-na-9afbd3b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63220%3A%20n%2Fa&amp;severity=high&amp;id=691de8ff964c14ffeea99627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63221-na-2229629d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63221%3A%20n%2Fa&amp;severity=critical&amp;id=691de8ff964c14ffeea99623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63878-na-b2cd9384</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63878%3A%20n%2Fa&amp;severity=medium&amp;id=691de57d964c14ffeea48e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63219-na-55ff3193</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63219%3A%20n%2Fa&amp;severity=high&amp;id=691ddf9152987e43f7248323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63218-na-730a36e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63218%3A%20n%2Fa&amp;severity=critical&amp;id=691ddc1352987e43f71fbd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63243-na-3cd6a8a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63243%3A%20n%2Fa&amp;severity=medium&amp;id=691dd2e93381713240811e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65015-cwe-770-allocation-of-resources-wit-940d1ee8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65015%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20authlib%20joserfc&amp;severity=critical&amp;id=691d040cb61595322dd84bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65012-cwe-79-improper-neutralization-of-i-cdb26557</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65012%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getkirby%20kirby&amp;severity=medium&amp;id=691cf9367ccfba78bc94ec8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64515-cwe-20-improper-input-validation-in-b28efedf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64515%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20open-formulieren%20open-forms&amp;severity=medium&amp;id=691d040cb61595322dd84bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64325-cwe-79-improper-neutralization-of-i-b9dba396</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64325%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EmbySupport%20Emby.Security&amp;severity=high&amp;id=691cf5c07ccfba78bc8d7b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54990-cwe-276-incorrect-default-permissio-4e3c38a9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54990%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20xwikisas%20application-admintools&amp;severity=medium&amp;id=691cf3d4be2811888e545747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-detail-tuoni-c2s-role-in-an-attempted--eb0e3cc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Detail%20Tuoni%20C2&apos;s%20Role%20in%20an%20Attempted%202025%20Real-Estate%20Cyber%20Intrusion&amp;severity=high&amp;id=691cecc9be2811888e450e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-new-fortiweb-zero-day-exploited--19828267</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20warns%20of%20new%20FortiWeb%20zero-day%20exploited%20in%20attacks&amp;severity=critical&amp;id=691cecc9be2811888e450e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/330-custom-email-domains-and-what-this-tells-us-ab-d8379c87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=330%20custom%20email%20domains%2C%20and%20what%20this%20tells%20us%20about%20how%20attackers%20build%20infrastructure%20for%20fake%20account%20creation&amp;severity=medium&amp;id=691cecc0be2811888e44fead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloud-break-iot-devices-open-to-silent-takeover-vi-04020f80</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloud%20Break%3A%20IoT%20Devices%20Open%20to%20Silent%20Takeover%20Via%20Firewalls&amp;severity=medium&amp;id=691d1dbec00dea8b9c8c94cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/can-a-global-decentralized-system-save-cve-data-9680efeb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can%20a%20Global%2C%20Decentralized%20System%20Save%20CVE%20Data%3F&amp;severity=medium&amp;id=691cdf8890fff14d7013a216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-nexus-threat-actor-unc1549-takes-aim-at-aeros-ddebf1d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Nexus%20Threat%20Actor%20UNC1549%20Takes%20Aim%20at%20Aerospace&amp;severity=medium&amp;id=691d1dbec00dea8b9c8c94ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12119-cwe-825-expired-pointer-dereference-18cc6e5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12119%3A%20CWE-825%20Expired%20Pointer%20Dereference%20in%20MongoDB%20C%20Driver&amp;severity=medium&amp;id=691ceaedbe2811888e43645d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37162-vulnerability-in-hewlett-packard-en-a7b64784</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37162%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20100%20Series%20Cellular%20Bridge&amp;severity=medium&amp;id=691ccaa45990fe54bdf5a3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37161-vulnerability-in-hewlett-packard-en-750c00fb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37161%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20100%20Series%20Cellular%20Bridge&amp;severity=high&amp;id=691ccaa45990fe54bdf5a3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37163-vulnerability-in-hewlett-packard-en-b2309533</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37163%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Management%20Software%20(Airwave)&amp;severity=high&amp;id=691cd1d3b044fc99aa3c771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52639-cwe-201-insertion-of-sensitive-info-90a24080</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52639%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20HCL%20Software%20Connections&amp;severity=low&amp;id=691cc3a85990fe54bdeb5a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37160-vulnerability-in-hewlett-packard-en-8cb835ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37160%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=medium&amp;id=691cc3a85990fe54bdeb5a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37159-vulnerability-in-hewlett-packard-en-9a5fdd48</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37159%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37158-vulnerability-in-hewlett-packard-en-3997fe9d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37158%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37157-vulnerability-in-hewlett-packard-en-cd06eca5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37157%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networkign%20AOS-CX&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37156-vulnerability-in-hewlett-packard-en-b0bc9d81</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37156%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37155-vulnerability-in-hewlett-packard-en-4b91167e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37155%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=high&amp;id=691cc1a4fcab56a016e27ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneaky-2fa-phishing-kit-adds-bitb-pop-ups-designed-de3bced3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneaky%202FA%20Phishing%20Kit%20Adds%20BitB%20Pop-ups%20Designed%20to%20Mimic%20the%20Browser%20Address%20Bar&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54770-expired-pointer-dereference-in-red--301b7a95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54770%3A%20Expired%20Pointer%20Dereference%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cc1a4fcab56a016e27ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61664-expired-pointer-dereference-in-red--b909d86d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61664%3A%20Expired%20Pointer%20Dereference%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cbabbfcab56a016d7f80d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61663-expired-pointer-dereference-in-red--3349e2bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61663%3A%20Expired%20Pointer%20Dereference%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cbabbfcab56a016d7f809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61662-vulnerability-in-red-hat-red-hat-en-a3cf946a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61662%3A%20Vulnerability%20in%20GNU%20grub2&amp;severity=high&amp;id=691cbabbfcab56a016d7f805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61661-incorrect-calculation-of-buffer-siz-5e5161a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61661%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cbabbfcab56a016d7f801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54771-expired-pointer-dereference-in-red--f830c704</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54771%3A%20Expired%20Pointer%20Dereference%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cbabbfcab56a016d7f7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-hit-by-outage-affecting-global-network--b25c06d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20hit%20by%20outage%20affecting%20global%20network%20services&amp;severity=high&amp;id=691cba99fcab56a016d7e1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-tycoon-2fa-phishing-platform-and-the-collapse--47b6e8c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Tycoon%202FA%20Phishing%20Platform%20and%20the%20Collapse%20of%20Legacy%20MFA&amp;severity=high&amp;id=691cba99fcab56a016d7e1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-says-highly-disruptive-outage-not-cause-9708af39</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Outage%20Not%20Caused%20by%20Cyberattack&amp;severity=high&amp;id=691cb71bfcab56a016d30b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lsass-dump-windows-error-reporting-50208113</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LSASS%20Dump%20%E2%80%93%20Windows%20Error%20Reporting&amp;severity=medium&amp;id=691caa8431331b1c39300c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-888-claims-lg-electronics-data-breach-93a33f72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20%22888%22%20Claims%20LG%20Electronics%20Data%20Breach%20-%20Source%20Code%20and%20Hardcoded%20Credentials%20Allegedly%20Leaked%20%5BUnconfirmed%5D&amp;severity=high&amp;id=691caa8431331b1c39300c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53843-execute-unauthorized-code-or-comman-2a4dc3ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53843%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=691ca897209f2030fa016955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48839-execute-unauthorized-code-or-comman-cb1dc19d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48839%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiADC&amp;severity=medium&amp;id=691ca897209f2030fa016952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54821-escalation-of-privilege-in-fortinet-994a3842</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54821%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiProxy&amp;severity=low&amp;id=691ca897209f2030fa01695b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58413-execute-unauthorized-code-or-comman-14642e2b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58413%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=691ca897209f2030fa016967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46215-execute-unauthorized-code-or-comman-165afa16</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46215%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=691ca896209f2030fa0168ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59669-improper-access-control-in-fortinet-4e883c21</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59669%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=691ca899209f2030fa016985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54660-information-disclosure-in-fortinet--f5ea3114</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54660%3A%20Information%20disclosure%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=691ca897209f2030fa016958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61713-information-disclosure-in-fortinet--57bf6412</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61713%3A%20Information%20disclosure%20in%20Fortinet%20FortiPAM&amp;severity=low&amp;id=691ca899209f2030fa016988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46776-escalation-of-privilege-in-fortinet-9c4f3ec0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46776%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiExtender&amp;severity=medium&amp;id=691ca896209f2030fa0168f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46775-information-disclosure-in-fortinet--82d9c3f4</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46775%3A%20Information%20disclosure%20in%20Fortinet%20FortiExtender&amp;severity=medium&amp;id=691ca896209f2030fa0168f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54971-information-disclosure-in-fortinet--071776c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54971%3A%20Information%20disclosure%20in%20Fortinet%20FortiADC&amp;severity=low&amp;id=691ca897209f2030fa01695e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54972-information-disclosure-in-fortinet--53df4449</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54972%3A%20Information%20disclosure%20in%20Fortinet%20FortiMail&amp;severity=low&amp;id=691ca897209f2030fa016961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46373-execute-unauthorized-code-or-comman-ac3a622a</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46373%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientWindows&amp;severity=high&amp;id=691ca896209f2030fa0168ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58692-execute-unauthorized-code-or-comman-057086a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58692%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiVoice&amp;severity=high&amp;id=691ca897209f2030fa01696a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58034-execute-unauthorized-code-or-comman-b8a9c4f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58034%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=691ca897209f2030fa016964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47761-execute-unauthorized-code-or-comman-72d786c6</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47761%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientWindows&amp;severity=high&amp;id=691ca897209f2030fa01694f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-securely-vet-browser-extensions-across-your-0e156888</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20securely%20vet%20browser%20extensions%20across%20your%20organization&amp;severity=medium&amp;id=691ca8a0209f2030fa016a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33184-cwe-94-improper-control-of-generati-fdf76b5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33184%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20Isaac-GR00T%20N1.5&amp;severity=high&amp;id=691ca896209f2030fa0168e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33183-cwe-94-improper-control-of-generati-4681f9cc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33183%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20Isaac-GR00T%20N1.5&amp;severity=high&amp;id=691ca896209f2030fa0168e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12761-cwe-79-improper-neutralization-of-i-3545fa16</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12761%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Simple%20multi%20step%20form&amp;severity=low&amp;id=691ca896209f2030fa0168d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12760-cwe-288-authentication-bypass-using-c443eed1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12760%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Email%20TFA&amp;severity=medium&amp;id=691ca896209f2030fa0168d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13083-cwe-525-use-of-web-browser-cache-co-47eb802f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13083%3A%20CWE-525%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20Drupal%20Drupal%20core&amp;severity=low&amp;id=691ca896209f2030fa0168df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13082-cwe-451-user-interface-ui-misrepres-4eba2431</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13082%3A%20CWE-451%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=691ca896209f2030fa0168dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13081-cwe-915-improperly-controlled-modif-6963c670</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13081%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=691ca514209f2030fafbb901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13080-cwe-754-improper-check-for-unusual--68a40648</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13080%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=691ca514209f2030fafbb8fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-abuse-adspect-cloaking-in-c-d565d946</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Npm%20Packages%20Abuse%20Adspect%20Cloaking%20in%20Crypto%20Scam&amp;severity=medium&amp;id=691cdf8890fff14d7013a219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bug-bounty-programs-rise-as-key-strategic-security-4197ef43</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bug%20Bounty%20Programs%20Rise%20as%20Key%20Strategic%20Security%20Solutions&amp;severity=medium&amp;id=691cdf8890fff14d7013a21c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34324-cwe-347-improper-verification-of-cr-579620c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34324%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Tinexta%20InfoCert%20S.p.A.%20GoSign%20Desktop&amp;severity=high&amp;id=691ca514209f2030fafbb90d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mi5-warns-lawmakers-that-chinese-spies-are-trying--93ad46a0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MI5%20Warns%20Lawmakers%20That%20Chinese%20Spies%20Are%20Trying%20to%20Reach%20Them%20via%20LinkedIn&amp;severity=medium&amp;id=691c9e0f209f2030faf12e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53360-cwe-284-improper-access-control-in--fb3b122c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53360%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20pluginsGLPI%20databaseinventory&amp;severity=medium&amp;id=691c9c349b9483ee9a797597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meta-expands-whatsapp-security-research-with-new-p-7b4ea7a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meta%20Expands%20WhatsApp%20Security%20Research%20with%20New%20Proxy%20Tool%20and%20%244M%20in%20Bounties%20This%20Year&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9977-cwe-89-improper-neutralization-of-sp-342d88a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9977%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Times%20Software%20E-Payroll&amp;severity=medium&amp;id=691c98b19b9483ee9a7411a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowray-20-active-global-campaign-hijacks-ray-ai-a9a97f49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowRay%202.0%3A%20Active%20Global%20Campaign%20Hijacks%20Ray%20AI%20Infrastructure%20Into%20Self-Propagating%20Botnet%20%7C%20Oligo%20Security&amp;severity=medium&amp;id=691c91b99b9483ee9a696167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12383-cwe-362-concurrent-execution-using--237b881a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12383%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Eclipse%20Foundation%20Jersey&amp;severity=critical&amp;id=691c901eb718280d68a97e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58121-cwe-280-improper-handling-of-insuff-de021ad1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58121%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=691c901eb718280d68a97e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58122-cwe-280-improper-handling-of-insuff-1c3831be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58122%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=691c901eb718280d68a97e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64996-cwe-732-incorrect-permission-assign-db7a37f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64996%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=691c901eb718280d68a97e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13349-cross-site-scripting-in-sourcecodes-7c14eddb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13349%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Grades%20Management%20System&amp;severity=medium&amp;id=691c7ff93fd37bbc395da093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-detail-tuoni-c2s-role-in-an-attempted--72ee2b25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Detail%20Tuoni%20C2&apos;s%20Role%20in%20an%20Attempted%202025%20Real-Estate%20Cyber%20Intrusion&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55179-incorrect-authorization-cwe-863-in--77d597b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55179%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Facebook%20WhatsApp%20Business%20for%20iOS&amp;severity=medium&amp;id=691c7c583fd37bbc3957664a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12545-cwe-200-exposure-of-sensitive-infor-c2c5cd40</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12545%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20alekv%20Pixel%20Manager%20for%20WooCommerce%20%E2%80%93%20Conversion%20Tracking%2C%20Google%20Ads%2C%20GA4%2C%20TikTok%2C%20Dynamic%20Remarketing&amp;severity=medium&amp;id=691c7c583fd37bbc39576645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12376-cwe-918-server-side-request-forgery-c19876e2</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12376%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20Icon%20List%20Block%20%E2%80%93%20Add%20Icon-Based%20Lists%20with%20Custom%20Styles&amp;severity=medium&amp;id=691c7c583fd37bbc39576641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59116-cwe-204-observable-response-discrep-4375b645</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59116%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59111-cwe-863-incorrect-authorization-in--2b38eb75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59111%3A%20CWE-863%20Incorrect%20Authorization%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59117-cwe-79-improper-neutralization-of-i-00016b2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59115-cwe-79-improper-neutralization-of-i-1ac64c1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59115%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59114-cwe-352-cross-site-request-forgery--92a2c942</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59114%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59113-cwe-307-improper-restriction-of-exc-8e5c76cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59113%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59112-cwe-352-cross-site-request-forgery--05e1e30f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59112%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59110-cwe-352-cross-site-request-forgery--c8c5192f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59110%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pennsylvania-attorney-general-confirms-data-breach-678947eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pennsylvania%20Attorney%20General%20Confirms%20Data%20Breach%20After%20Ransomware%20Attack&amp;severity=medium&amp;id=691c834c3fd37bbc3964247a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13347-sql-injection-in-sourcecodester-tra-66e07fc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13347%3A%20SQL%20Injection%20in%20SourceCodester%20Train%20Station%20Ticketing%20System&amp;severity=medium&amp;id=691c7a583fd37bbc3955e44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/princeton-university-data-breach-impacts-alumni-st-4cd0892c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Princeton%20University%20Data%20Breach%20Impacts%20Alumni%2C%20Students%2C%20Employees&amp;severity=medium&amp;id=691c834c3fd37bbc3964247d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-use-deeproot-and-twostroke-malware-d9f488f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Use%20DEEPROOT%20and%20TWOSTROKE%20Malware%20in%20Aerospace%20and%20Defense%20Attacks&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13346-sql-injection-in-sourcecodester-tra-7c598414</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13346%3A%20SQL%20Injection%20in%20SourceCodester%20Train%20Station%20Ticketing%20System&amp;severity=medium&amp;id=691c6c69c50334694ab71ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8084-cwe-918-server-side-request-forgery--f88329cf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8084%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=medium&amp;id=691c6dffc50334694aba91b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-stolen-in-eurofiber-france-hack-054dd329</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Stolen%20in%20Eurofiber%20France%20Hack&amp;severity=medium&amp;id=691c673ae9a43f0a37c3800a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9312-cwe-306-missing-authentication-for-c-96f55cb6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9312%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=691c6c69c50334694ab71cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13345-sql-injection-in-sourcecodester-tra-609081c7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13345%3A%20SQL%20Injection%20in%20SourceCodester%20Train%20Station%20Ticketing%20System&amp;severity=medium&amp;id=691c6dffc50334694aba91c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13344-sql-injection-in-sourcecodester-tra-fc9bfea8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13344%3A%20SQL%20Injection%20in%20SourceCodester%20Train%20Station%20Ticketing%20System&amp;severity=medium&amp;id=691c6dffc50334694aba91bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13343-cross-site-scripting-in-sourcecodes-16bde475</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13343%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Interview%20Management%20System&amp;severity=medium&amp;id=691c5b0103ddb54749becbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6670-cwe-352-cross-site-request-forgery-c-69f552ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6670%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WSO2%20WSO2%20Open%20Banking%20AM&amp;severity=high&amp;id=691c5b0103ddb54749becbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41350-cwe-79-improper-neutralization-of-i-d9392634</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=medium&amp;id=691c5b0103ddb54749becbfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41349-cwe-79-improper-neutralization-of-i-b57b43c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=medium&amp;id=691c5b0103ddb54749becbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41348-cwe-89-improper-neutralization-of-s-f6696c80</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41348%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=high&amp;id=691c5b0103ddb54749becbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41347-cwe-434-unrestricted-upload-of-file-3899941b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41347%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=high&amp;id=691c544503ddb54749b63b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11427-cwe-918-server-side-request-forgery-3853f00f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11427%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpengine%20WP%20Migrate%20Lite%20%E2%80%93%20Migration%20Made%20Easy&amp;severity=medium&amp;id=691c544503ddb54749b63b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-iam-silos-why-the-identity-security-fabric--84aad751</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20IAM%20Silos%3A%20Why%20the%20Identity%20Security%20Fabric%20is%20Essential%20for%20Securing%20AI%20and%20Non-Human%20Identities&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/seven-npm-packages-use-adspect-cloaking-to-trick-v-c22cdb1b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Seven%20npm%20Packages%20Use%20Adspect%20Cloaking%20to%20Trick%20Victims%20Into%20Crypto%20Scam%20Pages&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41737-cwe-284-improper-access-control-in--058e1afd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41737%3A%20CWE-284%20Improper%20Access%20Control%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=high&amp;id=691c4a8a8ab8e3b581406714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41736-cwe-35-path-traversal-in-metz-conne-557cac52</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41736%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=high&amp;id=691c4a8a8ab8e3b581406711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41735-cwe-434-unrestricted-upload-of-file-29f17bfd</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41735%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=high&amp;id=691c4a8a8ab8e3b58140670e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41734-cwe-98-improper-control-of-filename-025d6355</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41734%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=critical&amp;id=691c4a8a8ab8e3b58140670b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41733-cwe-305-authentication-bypass-by-pr-ec381b17</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41733%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=critical&amp;id=691c4a8a8ab8e3b581406708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gotchas-in-email-parsing-lessons-from-jakarta-mail-3dab4f31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gotchas%20in%20Email%20Parsing%20-%20Lessons%20from%20Jakarta%20Mail&amp;severity=medium&amp;id=691c453aa312a743bb5b935e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41346-cwe-863-incorrect-authorization-in--3f733ec7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41346%3A%20CWE-863%20Incorrect%20Authorization%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=critical&amp;id=691c47108ab8e3b5813b58ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12391-cwe-862-missing-authorization-in-se-8ba827c1</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12391%3A%20CWE-862%20Missing%20Authorization%20in%20seventhqueen%20Restrictions%20for%20BuddyPress&amp;severity=medium&amp;id=691c3e32a312a743bb510b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12457-cwe-79-improper-neutralization-of-i-4463363d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideastocode%20Enable%20SVG%2C%20WebP%2C%20and%20ICO%20Upload&amp;severity=medium&amp;id=691c3e32a312a743bb510b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12691-cwe-79-improper-neutralization-of-i-16de36de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12691%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sayontan%20Photonic%20Gallery%20%26%20Lightbox%20for%20Flickr%2C%20SmugMug%20%26%20Others&amp;severity=medium&amp;id=691c3e32a312a743bb510b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12639-cwe-862-missing-authorization-in-su-9bc93b58</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12639%3A%20CWE-862%20Missing%20Authorization%20in%20sundayfanz%20wModes%20%E2%80%93%20Catalog%20Mode%2C%20Product%20Pricing%2C%20Enquiry%20Forms%20%26%20Promotions%20%7C%20for%20WooCommerce&amp;severity=medium&amp;id=691c3e32a312a743bb510b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12392-cwe-862-missing-authorization-in-tr-3c10d0b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12392%3A%20CWE-862%20Missing%20Authorization%20in%20tripleatechnology%20Cryptocurrency%20Payment%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=691c3e32a312a743bb510b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12088-cwe-79-improper-neutralization-of-i-045c8891</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bhargavbhandari90%20Meta%20Display%20Block&amp;severity=medium&amp;id=691c3e32a312a743bb510b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12481-cwe-862-missing-authorization-in-ni-3a509485</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12481%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20WP%20Duplicate%20Page&amp;severity=medium&amp;id=691c3e32a312a743bb510b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13069-cwe-434-unrestricted-upload-of-file-26d6e7dc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13069%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ideastocode%20Enable%20SVG%2C%20WebP%2C%20and%20ICO%20Upload&amp;severity=high&amp;id=691c3e34a312a743bb510bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12079-cwe-79-improper-neutralization-of-i-ea21a2a3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12079%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20WP%20Twitter%20Auto%20Publish&amp;severity=medium&amp;id=691c3e32a312a743bb510b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13133-cwe-1236-improper-neutralization-of-1c8cfc8a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13133%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20vaniivan%20Simple%20User%20Import%20Export&amp;severity=medium&amp;id=691c3e34a312a743bb510bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12955-cwe-862-missing-authorization-in-ra-31d848a4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12955%3A%20CWE-862%20Missing%20Authorization%20in%20rajeshsingh520%20PiWeb%20Live%20sales%20notification%20for%20WooCommerce&amp;severity=high&amp;id=691c3e32a312a743bb510ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13196-cwe-79-improper-neutralization-of-i-ae77b586</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13196%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=691c3e34a312a743bb510bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4212-cwe-79-improper-neutralization-of-in-0d5aebb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpwham%20Checkout%20Files%20Upload%20for%20WooCommerce&amp;severity=high&amp;id=691c3e34a312a743bb510bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11734-cwe-862-missing-authorization-in-ai-d8f24edf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11734%3A%20CWE-862%20Missing%20Authorization%20in%20aioseo%20Broken%20Link%20Checker%20by%20AIOSEO%20%E2%80%93%20Easily%20Fix%2FMonitor%20Internal%20and%20External%20links&amp;severity=medium&amp;id=691c3e32a312a743bb510b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-issues-security-fix-for-actively-exploited--d9373f77</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Issues%20Security%20Fix%20for%20Actively%20Exploited%20Chrome%20V8%20Zero-Day%20Vulnerability&amp;severity=critical&amp;id=691c3b3ea312a743bb4e5eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-azure-blocks-massive-1572-tbps-of-ddos-a-ddbae2b5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Azure%20Blocks%20Massive%2015.72%20Tbps%20of%20DDoS%20Attack%20Powered%20by%20Aisuru%20Botnet&amp;severity=medium&amp;id=691c375e35a0ab0a562ec2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40545-cwe-601-url-redirection-to-untruste-20b70efb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40545%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=691c376d35a0ab0a562ec558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26391-cwe-79-improper-neutralization-of-i-97db1cc0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26391%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=691c376d35a0ab0a562ec55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40549-cwe-22-improper-limitation-of-a-pat-162a86bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40549%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=691c33dd35a0ab0a5629b608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40548-cwe-269-improper-privilege-manageme-667468e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40548%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=691c33dd35a0ab0a5629b604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40547-cwe-116-improper-encoding-or-escapi-2ab7750f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40547%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=691c33dd35a0ab0a5629b600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11868-cwe-79-improper-neutralization-of-i-aef13502</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20everviz%20everviz%20%E2%80%93%20Charts%2C%20Maps%20and%20Tables%20%E2%80%93%20Interactive%20and%20responsive&amp;severity=medium&amp;id=691c305835a0ab0a56270fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12078-cwe-79-improper-neutralization-of-i-8dcc648d</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12078%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artibot%20ArtiBot%20Free%20Chat%20Bot%20for%20WebSites&amp;severity=medium&amp;id=691c305835a0ab0a56270fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12406-cwe-352-cross-site-request-forgery--5d46eccc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12406%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20awensley%20Project%20Honey%20Pot%20Spam%20Trap&amp;severity=medium&amp;id=691c305835a0ab0a56270fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12961-cwe-862-missing-authorization-in-ar-2ff6009c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12961%3A%20CWE-862%20Missing%20Authorization%20in%20arkadiykilesso%20Download%20Panel%20(Biggiko%20Team)&amp;severity=medium&amp;id=691c305a35a0ab0a56271071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13088-cwe-98-improper-control-of-filename-cc2aec51</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13088%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ikhodal%20Category%20and%20Product%20Woocommerce%20Tabs&amp;severity=high&amp;id=691c305b35a0ab0a5627107b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12372-cwe-862-missing-authorization-in-lu-5f94947c</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12372%3A%20CWE-862%20Missing%20Authorization%20in%20_luigi%20The%20Permalinks%20Cascade&amp;severity=medium&amp;id=691c305835a0ab0a56270ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12775-cwe-434-unrestricted-upload-of-file-eb28307e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12775%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20nazsabuz%20WP%20Dropzone&amp;severity=high&amp;id=691c305935a0ab0a56271010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8609-cwe-79-improper-neutralization-of-in-85c4bb7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rometheme%20RTMKit&amp;severity=medium&amp;id=691c305b35a0ab0a56271083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12173-cwe-352-cross-site-request-forgery--7e2d8b6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12173%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20winkm89%20WP%20Admin%20Microblog&amp;severity=medium&amp;id=691c305835a0ab0a56270ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12937-cwe-862-missing-authorization-in-va-18ae7e0d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12937%3A%20CWE-862%20Missing%20Authorization%20in%20valentinpellegrin%20ACF%20Flexible%20Layouts%20Manager&amp;severity=medium&amp;id=691c305a35a0ab0a5627106d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8605-cwe-79-improper-neutralization-of-in-d7d2323d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8605%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeyatri%20Gutenify%20%E2%80%93%20Visual%20Site%20Builder%20Blocks%20%26%20Site%20Templates.&amp;severity=medium&amp;id=691c305b35a0ab0a5627107f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12827-cwe-352-cross-site-request-forgery--18ac1df3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12827%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20denishua%20Top%20Friends&amp;severity=medium&amp;id=691c305a35a0ab0a56271069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12962-cwe-918-server-side-request-forgery-4a630d20</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12962%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20willbontrager%20Local%20Syndication&amp;severity=medium&amp;id=691c305a35a0ab0a56271076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12404-cwe-352-cross-site-request-forgery--c417926d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12404%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nikolayyordanov%20Like-it&amp;severity=medium&amp;id=691c305835a0ab0a56270ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12823-cwe-79-improper-neutralization-of-i-ffc6b076</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sscovil%20CSV%20to%20SortTable&amp;severity=medium&amp;id=691c305a35a0ab0a56271065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9625-cwe-352-cross-site-request-forgery-c-4aa09df1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9625%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20interledger%20Coil%20Web%20Monetization&amp;severity=medium&amp;id=691c305b35a0ab0a56271088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12528-cwe-434-unrestricted-upload-of-file-f7196f0e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12528%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20genetechproducts%20Pie%20Forms%20%E2%80%94%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=high&amp;id=691c305935a0ab0a5627100a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11620-cwe-862-missing-authorization-in-je-f10fda1e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11620%3A%20CWE-862%20Missing%20Authorization%20in%20jemoreto%20Multiple%20Roles%20per%20User&amp;severity=high&amp;id=691c305835a0ab0a56270fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12411-cwe-89-improper-neutralization-of-s-7a2902ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12411%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20premmerce%20Premmerce%20Wholesale%20Pricing%20for%20WooCommerce&amp;severity=high&amp;id=691c305835a0ab0a56271005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-mitigates-record-572-tbps-ddos-attack-dr-43f827b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Mitigates%20Record%2015.72%20Tbps%20DDoS%20Attack%20Driven%20by%20AISURU%20Botnet&amp;severity=medium&amp;id=691c3a1b35a0ab0a56323a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8727-cwe-121-stack-based-buffer-overflow--04a7fbdb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8727%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20X13SEDW-F&amp;severity=high&amp;id=691c27b723be15589aef5883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8404-cwe-121-stack-based-buffer-overflow--e59980a8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8404%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20MBD-X13SEDW-F&amp;severity=medium&amp;id=691c2e7635a0ab0a5625e9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10089-cwe-427-uncontrolled-search-path-el-6c060c4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10089%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Mitsubishi%20Electric%20Corporation%20MILCO.S%20Setting%20Application&amp;severity=high&amp;id=691c2e7635a0ab0a5625e9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11265-cwe-80-improper-neutralization-of-s-42af464f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11265%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kurudrive%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=691c2e7635a0ab0a5625e9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11267-cwe-80-improper-neutralization-of-s-e8a232cf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11267%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kurudrive%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=691c2e7635a0ab0a5625e9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-142-update-patches-exploited-zero-day-0c3916ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20142%20Update%20Patches%20Exploited%20Zero-Day&amp;severity=medium&amp;id=691c1ef891aee3c1015f016e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8076-cwe-121-stack-based-buffer-overflow--3b3fb5c3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8076%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20MBD-X13SEDW-F&amp;severity=high&amp;id=691c1f0d91aee3c1015f038e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kongtuke-activity-tue-nov-18th-2127cdf6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KongTuke%20activity%2C%20(Tue%2C%20Nov%2018th)&amp;severity=medium&amp;id=691c1ef791aee3c1015f015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7623-cwe-121-stack-based-buffer-overflow--c2265807</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7623%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20MBD-X13SEDW-F&amp;severity=medium&amp;id=691c1f0d91aee3c1015f0391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12524-cwe-639-authorization-bypass-throug-67dd1610</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12524%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20johnjamesjacoby%20Post%20Type%20Switcher&amp;severity=medium&amp;id=691c17f491aee3c10155a86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48593-remote-code-execution-in-google-and-3ca254ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48593%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=691c09b712fe1630eb814e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-issues-security-fix-for-actively-exploited--5cac9701</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Issues%20Security%20Fix%20for%20Actively%20Exploited%20Chrome%20V8%20Zero-Day%20Vulnerability&amp;severity=medium&amp;id=691c3a1b35a0ab0a56323a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64734-cwe-772-missing-release-of-resource-555248bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64734%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Gallagher%20T21%20Reader&amp;severity=low&amp;id=691bed9bd4c3ef3c7a628533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52578-cwe-335-incorrect-usage-of-seeds-in-0a270115</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52578%3A%20CWE-335%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Gallagher%20High%20Sec%20End%20of%20Line%20Module&amp;severity=medium&amp;id=691bed9bd4c3ef3c7a62852e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52457-cwe-208-observable-timing-discrepan-f85f0568</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52457%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Gallagher%20HBUS%20Devices&amp;severity=medium&amp;id=691bed9bd4c3ef3c7a628529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frontline-intelligence-analysis-of-unc1549-ttps-cu-39f95a39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frontline%20Intelligence%3A%20Analysis%20of%20UNC1549%20TTPs%2C%20Custom%20Tools%2C%20and%20Malware%20Targeting%20the%20Aerospace%20and%20Defense%20Ecosystem&amp;severity=medium&amp;id=691bd87cd4c3ef3c7a5e99bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8693-cwe-78-improper-neutralization-of-sp-9e514a8a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8693%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20DX3300-T0%20firmware&amp;severity=high&amp;id=691bd17ad4c3ef3c7a5d6d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6599-cwe-400-uncontrolled-resource-consum-cdfea7ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6599%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Zyxel%20DX3301-T0%20firmware&amp;severity=medium&amp;id=691bd17ad4c3ef3c7a5d6d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13325-sql-injection-in-itsourcecode-stude-74fb4f8b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13325%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=691bb966d4c3ef3c7a51160c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13323-sql-injection-in-code-projects-simp-e2a18356</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13323%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=691bb966d4c3ef3c7a511605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-18-9c04fbd2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-18&amp;severity=medium&amp;id=691d0cedb61595322de4c34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63229-na-501f48ba</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63229%3A%20n%2Fa&amp;severity=medium&amp;id=691ceaeebe2811888e436478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63217-na-a766bede</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63217%3A%20n%2Fa&amp;severity=critical&amp;id=691ceaeebe2811888e436474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63216-na-1be25468</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63216%3A%20n%2Fa&amp;severity=critical&amp;id=691ceaedbe2811888e43646f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63215-na-eeb49ca4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63215%3A%20n%2Fa&amp;severity=high&amp;id=691ceaedbe2811888e436468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63228-na-100e34e0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63228%3A%20n%2Fa&amp;severity=critical&amp;id=691cd3b5b044fc99aa3e1008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63225-na-2b318b8c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63225%3A%20n%2Fa&amp;severity=critical&amp;id=691cd1d3b044fc99aa3c771d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63227-na-dc4d6627</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63227%3A%20n%2Fa&amp;severity=high&amp;id=691ccaa45990fe54bdf5a3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63226-na-a392e3b7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63226%3A%20n%2Fa&amp;severity=medium&amp;id=691cc7215990fe54bdf056a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63994-na-bc7f8126</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63994%3A%20n%2Fa&amp;severity=critical&amp;id=691cc5445990fe54bdeeceda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63695-na-55b6320d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63695%3A%20n%2Fa&amp;severity=critical&amp;id=691cc5445990fe54bdeeced6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63955-na-29b549c0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63955%3A%20n%2Fa&amp;severity=high&amp;id=691cc1a5fcab56a016e2a048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63749-na-61333b1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63749%3A%20n%2Fa&amp;severity=medium&amp;id=691cc1a5fcab56a016e2a045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60455-na-e975b468</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60455%3A%20n%2Fa&amp;severity=high&amp;id=691cc1a4fcab56a016e27ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54321-na-0086e060</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54321%3A%20n%2Fa&amp;severity=critical&amp;id=691cc1a4fcab56a016e27ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56499-na-01ab51de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56499%3A%20n%2Fa&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54320-na-9511da1b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54320%3A%20n%2Fa&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63693-na-b311c0cb</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63693%3A%20n%2Fa&amp;severity=medium&amp;id=691cbabbfcab56a016d7f811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63828-na-242fa359</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63828%3A%20n%2Fa&amp;severity=medium&amp;id=691cb8bafcab56a016d65d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63514-na-e473f872</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63514%3A%20n%2Fa&amp;severity=medium&amp;id=691cb8bafcab56a016d65d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56643-na-b06a6f14</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56643%3A%20n%2Fa&amp;severity=critical&amp;id=691cb50331331b1c393fbbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64076-na-bc19dbc4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64076%3A%20n%2Fa&amp;severity=high&amp;id=691cb50331331b1c393fbbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63694-na-ab81bdaf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63694%3A%20n%2Fa&amp;severity=critical&amp;id=691cb50331331b1c393fbbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63829-na-b9a83567</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63829%3A%20n%2Fa&amp;severity=medium&amp;id=691cac1d31331b1c39338b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55796-na-dc886065</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55796%3A%20n%2Fa&amp;severity=high&amp;id=691cac1d31331b1c39338b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63513-na-283103e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63513%3A%20n%2Fa&amp;severity=medium&amp;id=691ca514209f2030fafbb909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63258-na-2297ba71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63258%3A%20n%2Fa&amp;severity=medium&amp;id=691ca514209f2030fafbb904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63800-na-5deddf99</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63800%3A%20n%2Fa&amp;severity=high&amp;id=691c9c359b9483ee9a7975ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63512-na-be7bfb92</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63512%3A%20n%2Fa&amp;severity=medium&amp;id=691c9c359b9483ee9a7975aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56527-na-72934aa4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56527%3A%20n%2Fa&amp;severity=high&amp;id=691c9c359b9483ee9a7975a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56526-na-19a56d47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56526%3A%20n%2Fa&amp;severity=medium&amp;id=691c9c359b9483ee9a79759e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63604-na-7268a54e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63604%3A%20n%2Fa&amp;severity=medium&amp;id=691c98b19b9483ee9a7411a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63603-na-88b7067e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63603%3A%20n%2Fa&amp;severity=medium&amp;id=691c98b19b9483ee9a7411a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63602-na-60fdeb21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63602%3A%20n%2Fa&amp;severity=high&amp;id=691c93529b9483ee9a6cccdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63408-na-bd4f5fa2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63408%3A%20n%2Fa&amp;severity=medium&amp;id=691c901eb718280d68a97e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63892-na-376ed066</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63892%3A%20n%2Fa&amp;severity=medium&amp;id=691c88f8b718280d689a277a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63883-na-2dc6dc67</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63883%3A%20n%2Fa&amp;severity=medium&amp;id=691c88f8b718280d689a2777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xctdh-crypto-heist-part-3-yashraj-solanki-9f5f02bf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XCTDH%20Crypto%20Heist%20Part%203%20-%20Yashraj%20Solanki&amp;severity=medium&amp;id=691c8529b718280d689345ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-mitigated-the-largest-cloud-ddos-ever-re-307996c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20mitigated%20the%20largest%20cloud%20DDoS%20ever%20recorded%2C%2015.7%20Tbps&amp;severity=medium&amp;id=691bb70ca75c6bac5fb98316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-police-seizes-250-servers-used-by-bulletproo-8b0b4916</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20police%20seizes%20250%20servers%20used%20by%20%E2%80%9Cbulletproof%20hosting%E2%80%9D%20service&amp;severity=high&amp;id=691bb70ca75c6bac5fb98312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/princeton-university-discloses-data-breach-affecti-74e682ca</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Princeton%20University%20discloses%20data%20breach%20affecting%20donors%2C%20alumni&amp;severity=high&amp;id=691bb70ca75c6bac5fb9830e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eurofiber-france-warns-of-breach-after-hacker-trie-6c3849bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eurofiber%20France%20warns%20of%20breach%20after%20hacker%20tries%20to%20sell%20customer%20data&amp;severity=high&amp;id=691bb70ca75c6bac5fb9830a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13306-command-injection-in-d-link-dwr-m92-684b81c3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13306%3A%20Command%20Injection%20in%20D-Link%20DWR-M920&amp;severity=medium&amp;id=691bb389a75c6bac5fb415b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13230-type-confusion-in-google-chrome-6bb46a80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13230%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13229-type-confusion-in-google-chrome-4bf79d83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13229%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13228-type-confusion-in-google-chrome-b865d10a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13228%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13227-type-confusion-in-google-chrome-210ef1ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13227%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13226-type-confusion-in-google-chrome-c8165382</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13226%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13224-type-confusion-in-google-chrome-775058da</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13224%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bac8aa75c6bac5fab647d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13223-type-confusion-in-google-chrome-06120bf1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13223%3A%20Vulnerability%20in%20Google%20Chrome&amp;severity=high&amp;id=691bac8aa75c6bac5fab6479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13305-buffer-overflow-in-d-link-dwr-m920-37aeaa2a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13305%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=691bac8aa75c6bac5fab6481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31649-cwe-908-use-of-uninitialized-resour-cd9e5c59</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31649%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c9502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31361-cwe-908-use-of-uninitialized-resour-bae09bb3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31361%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c94fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36463-cwe-805-buffer-access-with-incorrec-e2354285</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36463%3A%20CWE-805%20-%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c950e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36462-cwe-805-buffer-access-with-incorrec-507cd900</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36462%3A%20CWE-805%20-%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c950a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36461-cwe-805-buffer-access-with-incorrec-95e6b3f0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36461%3A%20CWE-805%20-%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c9506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36460-cwe-805-buffer-access-with-incorrec-e65b38e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36460%3A%20CWE-805%20-%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691ba72ebb922d226277cd87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32089-cwe-120-buffer-copy-without-checkin-4b61881c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32089%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691ba3aabb922d226272e03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13304-buffer-overflow-in-d-link-dwr-m920-28cafbb3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13304%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=691ba3aabb922d226272e02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7711-cwe-94-improper-control-of-generatio-991747f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7711%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20AI-Powered%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=medium&amp;id=691ba3aabb922d226272e042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36553-cwe-120-buffer-copy-without-checkin-29f1dbf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36553%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691ba3aabb922d226272e03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13303-sql-injection-in-code-projects-cour-e88dba4c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13303%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=691ba1c4bb922d22627154ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64766-cwe-798-use-of-hard-coded-credentia-19e41cf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64766%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20NixOS%20nixpkgs&amp;severity=medium&amp;id=691b98f601a6b16707f49d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13302-sql-injection-in-code-projects-cour-9755ab2d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13302%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=691b98f601a6b16707f49d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-fortinet-fortiweb-waf-bug-exploited-in-th-0d45240c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Fortinet%20FortiWeb%20WAF%20Bug%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=691bc6a3d4c3ef3c7a5bc8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13301-sql-injection-in-itsourcecode-web-b-995d91be</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13301%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b957101a6b16707efdd0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-citizens-plead-guilty-to-aiding-north-korean-it-7f6562fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Citizens%20Plead%20Guilty%20to%20Aiding%20North%20Korean%20IT%20Worker%20Campaigns&amp;severity=medium&amp;id=691bc6a3d4c3ef3c7a5bc8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36118-cwe-244-improper-clearing-of-heap-m-b1a08026</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36118%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Storage%20Virtualize&amp;severity=high&amp;id=691b8c9b26779d9a5eb718c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13300-sql-injection-in-itsourcecode-web-b-e5cd5982</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13300%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b891926779d9a5eb241ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36299-cwe-540-in-ibm-ibm-planning-analyti-e452ad68</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36299%3A%20CWE-540%20in%20IBM%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=691b821c26779d9a5ea959fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36357-cwe-36-in-ibm-ibm-planning-analytic-2b1c2efd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36357%3A%20CWE-36%20in%20IBM%20IBM%20Planning%20Analytics%20Local&amp;severity=high&amp;id=691b821c26779d9a5ea959fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13299-sql-injection-in-itsourcecode-web-b-f1c6d198</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13299%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b800b6e6bf6953cd4fd33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13298-sql-injection-in-itsourcecode-web-b-ea95dff2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13298%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b7c896e6bf6953cd06d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n-able-n-central-from-n-days-to-0-days-36e1fdd7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=N-able%20N-central%3A%20From%20N-days%20to%200-days&amp;severity=medium&amp;id=691b6ff3f84694138de3dbd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cats-got-your-files-lynx-ransomware-45d707bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cat&apos;s%20Got%20Your%20Files%3A%20Lynx%20Ransomware&amp;severity=medium&amp;id=691bd87cd4c3ef3c7a5e99cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13297-sql-injection-in-itsourcecode-web-b-3717c6aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13297%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b66e9c08982598afd8f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dragon-breath-uses-roningloader-to-disable-securit-a50c2143</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dragon%20Breath%20Uses%20RONINGLOADER%20to%20Disable%20Security%20Tools%20and%20Deploy%20Gh0st%20RAT&amp;severity=high&amp;id=691b6369c08982598af82f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-confirms-major-disruption-and-19-6bdd0287</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20confirms%20major%20disruption%20and%20%C2%A3196M%20cost%20from%20September%20cyberattack&amp;severity=medium&amp;id=691b6369c08982598af82f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pennsylvania-ag-confirms-data-breach-after-inc-ran-9cb2fe24</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pennsylvania%20AG%20confirms%20data%20breach%20after%20INC%20Ransom%20attack&amp;severity=high&amp;id=691b6369c08982598af82f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34323-cwe-732-incorrect-permission-assign-1cc70422</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34323%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=691b639ec08982598af882b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34322-cwe-78-improper-neutralization-of-s-3c5dcdcc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34322%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=691b68f8f84694138ddb8361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55059-cwe-79-improper-neutralization-of-i-63fc8af8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55059%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5fe0c08982598af311d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55058-cwe-20-improper-input-validation-in-ef23a1a3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55058%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5fe0c08982598af311cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55057-multiple-cwe-352-cross-site-request-733d1102</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55057%3A%20Multiple%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5ce0c08982598af07849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64756-cwe-78-improper-neutralization-of-s-19997de1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64756%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20isaacs%20node-glob&amp;severity=high&amp;id=691b5ce0c08982598af07855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55056-multiple-cwe-79-improper-neutraliza-7d5336a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55056%3A%20Multiple%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5ce0c08982598af07846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55055-cwe-78-improper-neutralization-of-s-41c872e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55055%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5ce0c08982598af07843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64758-cwe-79-improper-neutralization-of-i-9d748d18</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64758%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DependencyTrack%20frontend&amp;severity=medium&amp;id=691b5ce0c08982598af07859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64342-cwe-754-improper-check-for-unusual--a47d3085</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64342%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=691b5ce0c08982598af0784c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58407-cwe-cwe-367-time-of-check-time-of-u-df862441</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58407%3A%20CWE%20-%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=691b5a78903b8a3ddb6f53a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13193-incorrect-default-permissions-in-re-3cbaa734</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13193%3A%20Incorrect%20Default%20Permissions&amp;severity=medium&amp;id=691b5a78903b8a3ddb6f53b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13291-sql-injection-in-campcodes-supplier-183047f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13291%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=691b5a78903b8a3ddb6f53b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58410-cwe-cwe-280-improper-handling-of-in-4dc99d04</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58410%3A%20CWE%20-%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=691b56f4903b8a3ddb69fcb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-evalusion-clickfix-campaign-delivers-amatera-s-b7fae61f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20EVALUSION%20ClickFix%20Campaign%20Delivers%20Amatera%20Stealer%20and%20NetSupport%20RAT&amp;severity=medium&amp;id=691bc610d4c3ef3c7a5b4586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62519-cwe-89-improper-neutralization-of-s-2c1edf22</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62519%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=691b5380903b8a3ddb64b9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-says-it-stole-data-of-millions--ba294bbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Says%20It%20Stole%20Data%20of%20Millions%20of%20Under%20Armour%20Customers%20and%20345GB%20of%20Internal%20Records&amp;severity=medium&amp;id=691b536d903b8a3ddb64b2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13319-cwe-20-improper-input-validation-in-6a8b1d67</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13319%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Nettec%20AS%20Digi%20On-Prem%20Manager&amp;severity=high&amp;id=691b5188903b8a3ddb62ff68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13290-sql-injection-in-code-projects-simp-45c18c8e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13290%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13289-sql-injection-in-1000projects-desig-c7ba0f94</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13289%3A%20SQL%20Injection%20in%201000projects%20Design%20%26%20Development%20of%20Student%20Database%20Management%20System&amp;severity=medium&amp;id=691b4a4dbf18c64a4b316bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cracker-barrel-vulnerability-5947abfe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Cracker%20Barrel%20vulnerability&amp;severity=medium&amp;id=691b4344bf18c64a4b25e07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cursor-issue-paves-way-for-credential-stealing-att-0217f173</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cursor%20Issue%20Paves%20Way%20for%20Credential-Stealing%20Attacks&amp;severity=low&amp;id=691bc6a3d4c3ef3c7a5bc8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13288-buffer-overflow-in-tenda-ch22-258d55c1</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13288%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=691b46c7bf18c64a4b2b8198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4321-cwe-240-improper-handling-of-inconsi-cf418d26</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4321%3A%20CWE-240%20Improper%20Handling%20of%20Inconsistent%20Structural%20Elements%20in%20silabs.com%20RS9116W&amp;severity=high&amp;id=691b3a49c14a66f6d6c9eb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13287-sql-injection-in-itsourcecode-onlin-6ca6ee03</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13287%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Voting%20System&amp;severity=medium&amp;id=691b33e6c14a66f6d6c06a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-target-defense-and-government-offi-ec571e6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Target%20Defense%20and%20Government%20Officials%20in%20Ongoing%20Campaign&amp;severity=medium&amp;id=691b33cac14a66f6d6c02cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13286-sql-injection-in-itsourcecode-onlin-8c10d189</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13286%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Voting%20System&amp;severity=medium&amp;id=691b2dc5884abd7c70dc0f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13285-sql-injection-in-itsourcecode-onlin-58493ec7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13285%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Voting%20System&amp;severity=medium&amp;id=691b26c7884abd7c70d2416e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/echogram-flaw-bypasses-guardrails-in-major-llms-705e0e83</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EchoGram%20Flaw%20Bypasses%20Guardrails%20in%20Major%20LLMs&amp;severity=medium&amp;id=691b24c1e3df22298b284cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13280-sql-injection-in-codeastro-simple-i-9afbf9bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13280%3A%20SQL%20Injection%20in%20CodeAstro%20Simple%20Inventory%20System&amp;severity=medium&amp;id=691b2143e3df22298b219e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doordash-says-personal-information-stolen-in-data--f50b034d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoorDash%20Says%20Personal%20Information%20Stolen%20in%20Data%20Breach&amp;severity=medium&amp;id=691b1db9e3df22298b1bd5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/5-plead-guilty-in-us-to-helping-north-korean-it-wo-90f53e55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=5%20Plead%20Guilty%20in%20US%20to%20Helping%20North%20Korean%20IT%20Workers&amp;severity=medium&amp;id=691b1a9fe3df22298b18666d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-fortinet-exploited-chinas-ai-hacks-ph-c4f4d2e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Fortinet%20Exploited%2C%20China&apos;s%20AI%20Hacks%2C%20PhaaS%20Empire%20Falls%20%26%20More&amp;severity=medium&amp;id=691b2660e3df22298b29a4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13279-sql-injection-in-code-projects-nero-ac54ed4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13279%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=691b1ab3e3df22298b18a286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13278-sql-injection-in-projectworlds-adva-4f807721</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13278%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691b14b667e4f3aad62a0225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/5-reasons-why-attackers-are-phishing-over-linkedin-2eeafac1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=5%20Reasons%20Why%20Attackers%20Are%20Phishing%20Over%20LinkedIn&amp;severity=medium&amp;id=691b2660e3df22298b29a4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40936-cwe-125-out-of-bounds-read-in-sieme-241e804e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40936%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20PS%2FIGES%20Parasolid%20Translator%20Component&amp;severity=high&amp;id=691b0bd1502dbbeec6e1cf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40834-cwe-79-improper-neutralization-of-i-0f2ab76b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40834%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Siemens%20Mendix%20RichText&amp;severity=medium&amp;id=691b0bd1502dbbeec6e1cf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13277-sql-injection-in-code-projects-nero-a150bb07</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13277%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=691b0bd1502dbbeec6e1cf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11681-cwe-400-uncontrolled-resource-consu-b54a5fa7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11681%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=high&amp;id=691b0bd1502dbbeec6e1cf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dragon-breath-uses-roningloader-to-disable-securit-294e54ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dragon%20Breath%20Uses%20RONINGLOADER%20to%20Disable%20Security%20Tools%20and%20Deploy%20Gh0st%20RAT&amp;severity=medium&amp;id=691b0d52502dbbeec6e296f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/logitech-confirms-data-breach-following-designatio-e264d6f2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Logitech%20Confirms%20Data%20Breach%20Following%20Designation%20as%20Oracle%20Hack%20Victim&amp;severity=low&amp;id=691b04c5502dbbeec6d6a1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/widespread-exploitation-of-xwiki-vulnerability-obs-f10fb388</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Widespread%20Exploitation%20of%20XWiki%20Vulnerability%20Observed&amp;severity=medium&amp;id=691b04c5502dbbeec6d6a1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/17th-november-threat-intelligence-report-6d2aa196</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=17th%20November%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=691b01b1502dbbeec6d34efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13276-sql-injection-in-g33kyrash-online-b-0c89b930</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13276%3A%20SQL%20Injection%20in%20g33kyrash%20Online-Banking-System&amp;severity=medium&amp;id=691b0db867e4f3aad6206f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13275-unrestricted-upload-in-iqbolshoh-ph-448444ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13275%3A%20Unrestricted%20Upload%20in%20Iqbolshoh%20php-business-website&amp;severity=medium&amp;id=691afbcd631894e18a64dcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rust-adoption-drives-android-memory-safety-bugs-be-c5fa767e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rust%20Adoption%20Drives%20Android%20Memory%20Safety%20Bugs%20Below%2020%25%20for%20First%20Time&amp;severity=high&amp;id=691af824631894e18a5ef98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13274-sql-injection-in-campcodes-school-f-268c6857</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13274%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691b01b0502dbbeec6d34d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13273-sql-injection-in-campcodes-school-f-0467b1ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13273%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691aef39a2e1787363359ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13272-sql-injection-in-campcodes-school-f-99bfccbf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13272%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691ae642a21117b502ed9957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13271-sql-injection-in-campcodes-school-f-6ef7343d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13271%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691adf3aa21117b502e22de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13270-sql-injection-in-campcodes-school-f-216add20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13270%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691ad9de77ef4e346a52dea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13269-sql-injection-in-campcodes-school-f-a85d80e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13269%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691ad0ec77ef4e346a4686cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/decoding-binary-numeric-expressions-mon-nov-17th-fe2233e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Decoding%20Binary%20Numeric%20Expressions%2C%20(Mon%2C%20Nov%2017th)&amp;severity=low&amp;id=691acd5a848ad39aa20de2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13268-injection-in-dromara-datacompare-0e9e163f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13268%3A%20Injection%20in%20Dromara%20dataCompare&amp;severity=medium&amp;id=691acd6f848ad39aa20e3f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13165-cwe-770-allocation-of-resources-wit-944a9dc8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13165%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Digiwin%20EasyFlow%20GP&amp;severity=high&amp;id=691ac658848ad39aa203c516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13267-sql-injection-in-sourcecodester-den-21f44f6a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13267%3A%20SQL%20Injection%20in%20SourceCodester%20Dental%20Clinic%20Appointment%20Reservation%20System&amp;severity=medium&amp;id=691ac658848ad39aa203c51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13164-cwe-522-insufficiently-protected-cr-33d570e0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13164%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Digiwin%20EasyFlow%20GP&amp;severity=medium&amp;id=691ac33f848ad39aa20115d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13163-cwe-522-insufficiently-protected-cr-965e214e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13163%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Digiwin%20EasyFlow%20GP&amp;severity=medium&amp;id=691ac33f848ad39aa20115d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13266-path-traversal-in-wwwlike-vlife-7e1577fa</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13266%3A%20Path%20Traversal%20in%20wwwlike%20vlife&amp;severity=medium&amp;id=691abd7c1ba1a3acd855a6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rust-adoption-drives-android-memory-safety-bugs-be-d85bd9a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rust%20Adoption%20Drives%20Android%20Memory%20Safety%20Bugs%20Below%2020%25%20for%20First%20Time&amp;severity=low&amp;id=691ae7b2a21117b502eef093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9501-cwe-78-os-command-injection-in-w3-to-58cc2bce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9501%3A%20CWE-78%20OS%20Command%20Injection%20in%20W3%20Total%20Cache&amp;severity=critical&amp;id=691abd7c1ba1a3acd855a6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60022-improper-certificate-validation-in--1e5631cd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60022%3A%20Improper%20certificate%20validation%20in%20KDDI%20CORPORATION%20&apos;%E3%83%87%E3%82%B8%E3%83%A9%E3%82%A2%E3%83%97%E3%83%AA&apos;%20App%20for%20iOS&amp;severity=medium&amp;id=691ab9fc1ba1a3acd84ff7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13265-path-traversal-in-lsfusion-platform-06acf530</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13265%3A%20Path%20Traversal%20in%20lsfusion%20platform&amp;severity=medium&amp;id=691ab4bd8eaa519f4313878d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13264-sql-injection-in-sourcecodester-onl-2ed07e64</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13264%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Magazine%20Management%20System&amp;severity=medium&amp;id=691aadb58eaa519f4308c9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13263-sql-injection-in-sourcecodester-onl-9b0763a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13263%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Magazine%20Management%20System&amp;severity=medium&amp;id=691aa8617644a7cc141f22d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13262-path-traversal-in-lsfusion-platform-e4d614d4</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13262%3A%20Path%20Traversal%20in%20lsfusion%20platform&amp;severity=medium&amp;id=691aaaae8eaa519f4305faf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13261-path-traversal-in-lsfusion-platform-0bd80ffb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13261%3A%20Path%20Traversal%20in%20lsfusion%20platform&amp;severity=medium&amp;id=691a9d62c118c0da2e5d7e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13283-cwe-352-cross-site-request-forgery--0bcb621a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13283%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chunghwa%20Telecom%20TenderDocTransfer&amp;severity=high&amp;id=691a9d62c118c0da2e5d7ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13282-cwe-352-cross-site-request-forgery--6b3e8d3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13282%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chunghwa%20Telecom%20TenderDocTransfer&amp;severity=high&amp;id=691a967cc118c0da2e5a3ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13260-sql-injection-in-campcodes-supplier-27b3f684</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13260%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=691a967cc118c0da2e5a3b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10460-cwe-20-improper-input-validation-in-45eca59b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10460%3A%20CWE-20%20Improper%20Input%20Validation%20in%20BEIMS%20Contractor%20Web&amp;severity=critical&amp;id=691a8f51c118c0da2e582c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13259-sql-injection-in-campcodes-supplier-21b0de01</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13259%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=691a8f51c118c0da2e582c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13258-buffer-overflow-in-tenda-ac20-f036b48b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13258%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=691a8851c118c0da2e55dfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13257-sql-injection-in-itsourcecode-inven-9b2345a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13257%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=691a8142c118c0da2e53955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aipac-says-hundreds-affected-in-data-breach-30582189</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AIPAC%20Says%20Hundreds%20Affected%20in%20Data%20Breach&amp;severity=high&amp;id=691a7dbac118c0da2e4bc9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13256-sql-injection-in-projectworlds-adva-e93f7815</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13256%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691a76b5c118c0da2e3dce34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13255-sql-injection-in-projectworlds-adva-fd882eac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13255%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691a6fd3c118c0da2e30eb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13254-sql-injection-in-projectworlds-adva-0c6bbd91</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13254%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691a6fd3c118c0da2e30eb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-17-7c533ee4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-17&amp;severity=medium&amp;id=691bb86aa75c6bac5fb9fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44664-na-41c1fd24</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44664%3A%20n%2Fa&amp;severity=medium&amp;id=691b800b6e6bf6953cd4fd3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44659-na-1e26051b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44659%3A%20n%2Fa&amp;severity=critical&amp;id=691b800b6e6bf6953cd4fd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44661-na-fe2a0902</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44661%3A%20n%2Fa&amp;severity=medium&amp;id=691b7c896e6bf6953cd06d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44662-na-f65a277d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44662%3A%20n%2Fa&amp;severity=medium&amp;id=691b7378f84694138de869a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44660-na-053b8e33</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44660%3A%20n%2Fa&amp;severity=medium&amp;id=691b7378f84694138de869a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44663-na-02be901c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44663%3A%20n%2Fa&amp;severity=medium&amp;id=691b6ff3f84694138de3dbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44658-na-3c5d3bcc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44658%3A%20n%2Fa&amp;severity=medium&amp;id=691b6ff3f84694138de3dbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46335-na-dffb3a48</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46335%3A%20n%2Fa&amp;severity=medium&amp;id=691b6c6ff84694138ddf7098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44651-na-9a6019d1</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44651%3A%20n%2Fa&amp;severity=medium&amp;id=691b68f8f84694138ddb835d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63292-na-fa91762f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63292%3A%20n%2Fa&amp;severity=low&amp;id=691b68f8f84694138ddb8359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44655-na-012e74d8</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44655%3A%20n%2Fa&amp;severity=medium&amp;id=691b68f8f84694138ddb8355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44654-na-89398cf3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44654%3A%20n%2Fa&amp;severity=medium&amp;id=691b68f8f84694138ddb8351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44657-na-f598d25a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44657%3A%20n%2Fa&amp;severity=medium&amp;id=691b66e9c08982598afd8f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44653-na-102b5c3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44653%3A%20n%2Fa&amp;severity=medium&amp;id=691b639ec08982598af882ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46336-na-105acde7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46336%3A%20n%2Fa&amp;severity=medium&amp;id=691b5a78903b8a3ddb6f53ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44652-na-6cc58d69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44652%3A%20n%2Fa&amp;severity=medium&amp;id=691b5a78903b8a3ddb6f53a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46334-na-7f89b4e4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46334%3A%20n%2Fa&amp;severity=medium&amp;id=691b5380903b8a3ddb64b9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44648-na-3b64b4ed</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44648%3A%20n%2Fa&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44647-na-767b1429</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44647%3A%20n%2Fa&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44644-na-3edff7d8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44644%3A%20n%2Fa&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44641-na-82751bf0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44641%3A%20n%2Fa&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63918-na-a9f9ac2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63918%3A%20n%2Fa&amp;severity=medium&amp;id=691b4e50b1dcb1316b016571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63917-na-ba45e176</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63917%3A%20n%2Fa&amp;severity=high&amp;id=691b4e4fb1dcb1316b01656b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63916-na-60e5aa6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63916%3A%20n%2Fa&amp;severity=high&amp;id=691b4a4dbf18c64a4b316bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63748-na-3aed058c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63748%3A%20n%2Fa&amp;severity=high&amp;id=691b4a4dbf18c64a4b316bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63747-na-080ae277</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63747%3A%20n%2Fa&amp;severity=critical&amp;id=691b4a4dbf18c64a4b316be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64046-na-73f2af6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64046%3A%20n%2Fa&amp;severity=medium&amp;id=691b46c6bf18c64a4b2b8194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65083-cwe-295-improper-certificate-valida-4e03f5db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65083%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Tinexta%20Infocert%20GoSign%20Desktop&amp;severity=low&amp;id=691b46c6bf18c64a4b2b8190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63708-na-898dc99f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63708%3A%20n%2Fa&amp;severity=medium&amp;id=691b46c6bf18c64a4b2b818c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65073-na-3fc701d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65073%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenStack%20Keystone&amp;severity=high&amp;id=691ad1de77ef4e346a475a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13253-sql-injection-in-projectworlds-adva-45b36b4c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13253%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691a6057bc1ae26b3e2e5df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13252-hard-coded-credentials-in-shsuishan-64031bd6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13252%3A%20Hard-coded%20Credentials%20in%20shsuishang%20ShopSuite%20ModulithShop&amp;severity=medium&amp;id=691a5aab40bd38dff3126b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reposecu-free-3-in-1-sast-scanner-for-github-semgr-18b8b86a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reposecu%3A%20Free%203-in-1%20SAST%20Scanner%20for%20GitHub%20(Semgrep%20%2B%20Trivy%20%2B%20Detect-Secrets)%20%E2%80%93%20Beta%20Feedback%20Welcome&amp;severity=medium&amp;id=691a21218a2260cc8e952608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13251-sql-injection-in-weiye-jing-datax-w-109f851e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13251%3A%20SQL%20Injection%20in%20WeiYe-Jing%20datax-web&amp;severity=medium&amp;id=6919ceee66db7136d9af53ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13250-improper-access-controls-in-weiye-j-95b6bf21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13250%3A%20Improper%20Access%20Controls%20in%20WeiYe-Jing%20datax-web&amp;severity=medium&amp;id=6919c1b3f176205dc4fad9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13249-unrestricted-upload-in-jiusi-oa-f3d4e085</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13249%3A%20Unrestricted%20Upload%20in%20Jiusi%20OA&amp;severity=medium&amp;id=6919b890ea52702b1491872e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13248-sql-injection-in-sourcecodester-pat-153faa2d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13248%3A%20SQL%20Injection%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=6919b363cd4374a700c8728d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-ai-ran-autonomous-espionage-operations-0f7ef30c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20AI%20ran%20autonomous%20espionage%20operations&amp;severity=medium&amp;id=6919afe3cd4374a700c3a5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13247-sql-injection-in-phpgurukul-tourism-7500ee86</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13247%3A%20SQL%20Injection%20in%20PHPGurukul%20Tourism%20Management%20System&amp;severity=medium&amp;id=6919ac5acd4374a700bea47b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13246-path-traversal-in-shsuishang-shopsu-46b60442</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13246%3A%20Path%20Traversal%20in%20shsuishang%20ShopSuite%20ModulithShop&amp;severity=medium&amp;id=6919aa6fcd4374a700bd6ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13245-cross-site-scripting-in-code-projec-7daf8f03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13245%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=69199619be70e745c858593a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13244-cross-site-scripting-in-code-projec-011444cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13244%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=69198d7a1be9ed16ddc78a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13243-sql-injection-in-code-projects-stud-e5f136cc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13243%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=691987a9349a492776909535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13242-sql-injection-in-code-projects-stud-53b30022</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13242%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=691980a1349a492776852116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fingerexe-x26-clickfix-sun-nov-16th-df340bd7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x26%3B%23xa%3BFinger.exe%20%26%23x26%3B%20ClickFix%2C%20(Sun%2C%20Nov%2016th)&amp;severity=medium&amp;id=69197d8c349a492776829d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13241-sql-injection-in-code-projects-stud-742f4732</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13241%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=69197b67f90981bc0ff20957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13240-sql-injection-in-code-projects-stud-04f4cbcf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13240%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=69197159f90981bc0fe630f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13239-enforcement-of-behavioral-workflow--a40ec0c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13239%3A%20Enforcement%20of%20Behavioral%20Workflow%20in%20Bdtask%20Isshue%20Multi%20Store%20eCommerce%20Shopping%20Cart%20Solution&amp;severity=medium&amp;id=69196bbd3a8d0e8ca2f8dfda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13238-unrestricted-upload-in-bdtask-fligh-2972affc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13238%3A%20Unrestricted%20Upload%20in%20Bdtask%20Flight%20Booking%20Software&amp;severity=medium&amp;id=69196324d6c6237fbda66dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13237-sql-injection-in-itsourcecode-inven-fd0d1eee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13237%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=69195fa0d6c6237fbda1960e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12482-cwe-89-improper-neutralization-of-s-530517f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12482%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=high&amp;id=6919535f826a51df38f44767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13236-sql-injection-in-itsourcecode-inven-372cae7a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13236%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=69195912d6c6237fbd9a14d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13235-sql-injection-in-itsourcecode-inven-a95719f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13235%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=691948fab279ec117793ceeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13234-sql-injection-in-itsourcecode-inven-230a0b88</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13234%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=691941f1b279ec117792a9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13233-sql-injection-in-itsourcecode-inven-cf1d5c47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13233%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=691941f1b279ec117792a9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13232-cross-site-scripting-in-projectsend-abd607e0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13232%3A%20Cross%20Site%20Scripting%20in%20projectsend&amp;severity=medium&amp;id=691925d1b279ec11778c28a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-16-026ecbe8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-16&amp;severity=medium&amp;id=691a6a54bc1ae26b3e3b67e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-exploits-unpatched-xwiki-servers-to-pull--f6506c38</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Exploits%20Unpatched%20XWiki%20Servers%20to%20Pull%20More%20Devices%20Into%20Its%20Botnet&amp;severity=high&amp;id=6919166609545414a9be6972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/decades-old-finger-protocol-abused-in-clickfix-mal-6e4a26f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Decades-old%20%E2%80%98Finger%E2%80%99%20protocol%20abused%20in%20ClickFix%20malware%20attacks&amp;severity=high&amp;id=6919166609545414a9be6977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multiple-vulnerabilities-in-gosign-desktop-lead-to-5f5b6dab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multiple%20Vulnerabilities%20in%20GoSign%20Desktop%20lead%20to%20Remote%20Code%20Execution&amp;severity=medium&amp;id=6919166609545414a9be697f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13221-unprotected-storage-of-credentials--1d294bd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13221%3A%20Unprotected%20Storage%20of%20Credentials%20in%20Intelbras%20UnniTI&amp;severity=medium&amp;id=6918d703cdb3e870ee55d48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13210-sql-injection-in-itsourcecode-inven-2ceb90c4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13210%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=6918d21a583c8b7d37900dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doordash-hit-by-new-data-breach-after-an-employee--116ee313</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoorDash%20hit%20by%20new%20data%20breach%20after%20an%20employee%20falls%20for%20social%20engineering%20scam&amp;severity=high&amp;id=6918cb0e583c8b7d3786ce3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13209-xml-external-entity-reference-in-be-372dc688</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13209%3A%20XML%20External%20Entity%20Reference%20in%20bestfeng%20oa_git_free&amp;severity=medium&amp;id=6918d42bcdb3e870ee534ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13208-sql-injection-in-fantasticlbp-hotel-eab451f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13208%3A%20SQL%20Injection%20in%20FantasticLBP%20Hotels%20Server&amp;severity=medium&amp;id=6918c2a66c45b14c393afde5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13203-sql-injection-in-code-projects-simp-036d531f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13203%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Cafe%20Ordering%20System&amp;severity=medium&amp;id=6918bc476c45b14c39340630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13202-cross-site-scripting-in-code-projec-19e4a0a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13202%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Cafe%20Ordering%20System&amp;severity=medium&amp;id=6918b301838c73fda942a5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-exploits-unpatched-xwiki-servers-to-pull--2bf18a2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Exploits%20Unpatched%20XWiki%20Servers%20to%20Pull%20More%20Devices%20Into%20Its%20Botnet&amp;severity=critical&amp;id=6918adf344c00f9fdd5f0721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberrecon-project-baddb41f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CyberRecon%20project&amp;severity=medium&amp;id=6918aa8544c00f9fdd5ab1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13201-sql-injection-in-code-projects-simp-efeafebd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13201%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Cafe%20Ordering%20System&amp;severity=medium&amp;id=6918b028838c73fda94019c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13200-exposure-of-information-through-dir-323502f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13200%3A%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20SourceCodester%20Farm%20Management%20System&amp;severity=medium&amp;id=6918a1f63494992e767dd3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/att-data-breach-settlement-deadline-nears-for-clai-c7e13e08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AT%26T%20Data%20Breach%20Settlement%20Deadline%20Nears%20for%20Claims%20Up%20to%20%247%2C500&amp;severity=high&amp;id=6918866ebddd42d2a8c78f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/logitech-confirms-data-breach-after-clop-extortion-f2a8999d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Logitech%20confirms%20data%20breach%20after%20Clop%20extortion%20attack&amp;severity=high&amp;id=691882e5bddd42d2a8c27d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/digital-doppelgangers-anatomy-of-evolving-imperson-46bd85e0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Digital%20Doppelgangers%3A%20Anatomy%20of%20Evolving%20Impersonation%20Campaigns%20Distributing%20Gh0st%20RAT&amp;severity=medium&amp;id=691882e5bddd42d2a8c27d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-plead-guilty-in-us-for-helping-north-korean-i-fe02968e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20Plead%20Guilty%20in%20U.S.%20for%20Helping%20North%20Korean%20IT%20Workers%20Infiltrate%20136%20Companies&amp;severity=high&amp;id=691882e5bddd42d2a8c27d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/face-scrapper-ai-like-faceseek-netsec-analysis-32081dd8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Face%20Scrapper%20Ai%20like%20faceSeek%20-netsec%20analysis&amp;severity=medium&amp;id=69187deee1cec89a0573d3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13199-path-traversal-filedir-in-code-proj-a9437a15</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13199%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20code-projects%20Email%20Logging%20Interface&amp;severity=medium&amp;id=69185a1a429a1e97bc072ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-plead-guilty-in-us-for-helping-north-korean-i-f91beefe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20Plead%20Guilty%20in%20U.S.%20for%20Helping%20North%20Korean%20IT%20Workers%20Infiltrate%20136%20Companies&amp;severity=low&amp;id=6919279ab279ec11778d97e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeypot-fortiweb-cve-2025-64446-exploits-sat-nov--4c79cbeb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Honeypot%3A%20FortiWeb%20CVE-2025-64446%20Exploits%2C%20(Sat%2C%20Nov%2015th)&amp;severity=medium&amp;id=69184e1c5aa1a593e1cc40bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13198-unrestricted-upload-in-douphp-14075958</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13198%3A%20Unrestricted%20Upload%20in%20DouPHP&amp;severity=medium&amp;id=691844485aa1a593e1c111b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13191-stack-based-buffer-overflow-in-d-li-be124aec</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13191%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816L&amp;severity=high&amp;id=69182a67b7cdcddb4cb0121f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12849-cwe-862-missing-authorization-in-co-0ac7e244</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12849%3A%20CWE-862%20Missing%20Authorization%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=medium&amp;id=69182360b7cdcddb4ca68f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13190-stack-based-buffer-overflow-in-d-li-386fd159</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13190%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816L&amp;severity=high&amp;id=69181fe6b7cdcddb4ca2270b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13189-stack-based-buffer-overflow-in-d-li-31fd3f4b</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13189%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816L&amp;severity=high&amp;id=69181a9193cc35e7aa416d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/digital-doppelgangers-anatomy-of-evolving-imperson-6d47f8ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Digital%20Doppelgangers%3A%20Anatomy%20of%20Evolving%20Impersonation%20Campaigns%20Distributing%20Gh0st%20RAT&amp;severity=medium&amp;id=691aebada2e17873632ea95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12494-cwe-285-improper-authorization-in-w-7eb45f23</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12494%3A%20CWE-285%20Improper%20Authorization%20in%20wpchill%20Modula%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=6918143b93cc35e7aa3af0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8994-cwe-89-improper-neutralization-of-sp-01e256ea</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8994%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20Project%20Manager%20%E2%80%93%20AI%20Powered%20Project%20Management%2C%20Task%20Management%2C%20Kanban%20Board%20%26%20Time%20Tracker&amp;severity=medium&amp;id=6918143b93cc35e7aa3af0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12847-cwe-862-missing-authorization-in-sm-ab2c82a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12847%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20All%20in%20One%20SEO%20%E2%80%93%20Powerful%20SEO%20Plugin%20to%20Boost%20SEO%20Rankings%20%26%20Increase%20Traffic&amp;severity=medium&amp;id=6918143b93cc35e7aa3af0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-closer-look-at-outlook-macros-and-more-09057529</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Closer%20Look%20at%20Outlook%20Macros%20and%20More&amp;severity=medium&amp;id=691aebada2e17873632ea951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-ai-is-fueling-a-new-wave-of-black-friday-scams-93c85b2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20AI%20Is%20Fueling%20a%20New%20Wave%20of%20Black%20Friday%20Scams&amp;severity=medium&amp;id=691aef31a2e178736335862b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12182-cwe-284-improper-access-control-in--8dc59ec4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12182%3A%20CWE-284%20Improper%20Access%20Control%20in%20qodeinteractive%20Qi%20Blocks&amp;severity=medium&amp;id=6917f71bb6d0b801e4d2e75f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-15-c5648ff5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-15&amp;severity=medium&amp;id=6919165309545414a9be561f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8386-cwe-80-in-aveva-application-server-a9f86cae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8386%3A%20CWE-80%20in%20AVEVA%20Application%20Server&amp;severity=medium&amp;id=6917c40aed594783724e114b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9317-cwe-327-in-aveva-edge-e409a7a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9317%3A%20CWE-327%20in%20AVEVA%20Edge&amp;severity=high&amp;id=6917c40aed594783724e1150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64309-cwe-523-in-brightpick-ai-brightpick-d41753a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64309%3A%20CWE-523%20in%20Brightpick%20AI%20Brightpick%20Mission%20Control%20%2F%20Internal%20Logic%20Control&amp;severity=high&amp;id=6917c086ed59478372495959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64308-cwe-523-in-brightpick-ai-brightpick-65756869</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64308%3A%20CWE-523%20in%20Brightpick%20AI%20Brightpick%20Mission%20Control%20%2F%20Internal%20Logic%20Control&amp;severity=high&amp;id=6917c086ed59478372495954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64307-cwe-306-in-brightpick-ai-brightpick-ae8adcf8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64307%3A%20CWE-306%20in%20Brightpick%20AI%20Brightpick%20Mission%20Control%20%2F%20Internal%20Logic%20Control&amp;severity=medium&amp;id=6917bd92ed59478372471172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62765-cwe-319-in-general-industrial-contr-068de6a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62765%3A%20CWE-319%20in%20General%20Industrial%20Controls%20Lynx%2B%20Gateway&amp;severity=high&amp;id=6917bd92ed59478372471183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59780-cwe-306-in-general-industrial-contr-57ea6207</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59780%3A%20CWE-306%20in%20General%20Industrial%20Controls%20Lynx%2B%20Gateway&amp;severity=high&amp;id=6917bd92ed5947837247117f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58083-cwe-306-in-general-industrial-contr-be7e139e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58083%3A%20CWE-306%20in%20General%20Industrial%20Controls%20Lynx%2B%20Gateway&amp;severity=critical&amp;id=6917bd92ed5947837247117b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55034-cwe-521-in-general-industrial-contr-fbd7ca64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55034%3A%20CWE-521%20in%20General%20Industrial%20Controls%20Lynx%2B%20Gateway&amp;severity=high&amp;id=6917bd92ed59478372471177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7328-cwe-306-missing-authentication-for-c-1c8b50d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7328%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=medium&amp;id=6917b3f1290dbf2fa84d9aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13188-stack-based-buffer-overflow-in-d-li-0c93ff6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13188%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816L&amp;severity=critical&amp;id=6917ae6b6c3a21c7a18a418f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13187-unprotected-storage-of-credentials--12815829</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13187%3A%20Unprotected%20Storage%20of%20Credentials%20in%20Intelbras%20ICIP&amp;severity=medium&amp;id=6917aae76c3a21c7a1852eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-raas-targets-nutanix-vms-threatens-critical--dcc4d0a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20RaaS%20Targets%20Nutanix%20VMs%2C%20Threatens%20Critical%20Orgs&amp;severity=critical&amp;id=6917d672b6d0b801e4cd1d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13186-cross-site-scripting-in-bdtask-issh-6a4bc9bc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13186%3A%20Cross%20Site%20Scripting%20in%20Bdtask%20Isshue%20Multi%20Store%20eCommerce%20Shopping%20Cart%20Solution&amp;severity=medium&amp;id=6917a20470bcf5e35c56472e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13185-unrestricted-upload-in-bdtask-news3-563af386</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13185%3A%20Unrestricted%20Upload%20in%20Bdtask%20News365&amp;severity=medium&amp;id=69179afc70bcf5e35c4ca9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-security-tools-target-growing-macos-threats-871e7dc3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Security%20Tools%20Target%20Growing%20macOS%20Threats&amp;severity=medium&amp;id=6917d672b6d0b801e4cd1d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13182-cross-site-scripting-in-pojoin-h3bl-b8f2eb23</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13182%3A%20Cross%20Site%20Scripting%20in%20pojoin%20h3blog&amp;severity=medium&amp;id=6917959ad767b187e9434e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hardened-containers-look-to-eliminate-common-sourc-bb50198a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hardened%20Containers%20Look%20to%20Eliminate%20Common%20Source%20of%20Vulnerabilities&amp;severity=medium&amp;id=69179208d767b187e93e2249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/150000-packages-flood-npm-registry-in-token-farmin-93d1007a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=150%2C000%20Packages%20Flood%20NPM%20Registry%20in%20Token%20Farming%20Campaign&amp;severity=medium&amp;id=6917d672b6d0b801e4cd1d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-confirms-active-exploitation-of-critical--b24a27c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Confirms%20Active%20Exploitation%20of%20Critical%20FortiWeb%20Vulnerability&amp;severity=critical&amp;id=69178e87d767b187e9397d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13181-cross-site-scripting-in-pojoin-h3bl-70b94899</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13181%3A%20Cross%20Site%20Scripting%20in%20pojoin%20h3blog&amp;severity=medium&amp;id=69178ea9d767b187e9398dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13033-interpretation-conflict-in-red-hat--57f98143</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13033%3A%20Interpretation%20Conflict%20in%20Red%20Hat%20Red%20Hat%20Advanced%20Cluster%20Management%20for%20Kubernetes%202&amp;severity=high&amp;id=691785a2901ba91f32301aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13180-basic-cross-site-scripting-in-bdtas-45f5fedf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13180%3A%20Basic%20Cross%20Site%20Scripting%20in%20Bdtask%20Wholesale%20Inventory%20Control%20and%20Inventory%20Management%20System&amp;severity=medium&amp;id=691785a2901ba91f32301afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13179-cross-site-request-forgery-in-bdtas-a0806b5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13179%3A%20Cross-Site%20Request%20Forgery%20in%20Bdtask%20Wholesale%20Inventory%20Control%20and%20Inventory%20Management%20System&amp;severity=medium&amp;id=691785a2901ba91f32301af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13178-basic-cross-site-scripting-in-bdtas-c86b933a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13178%3A%20Basic%20Cross%20Site%20Scripting%20in%20Bdtask%20SalesERP&amp;severity=medium&amp;id=69177ea4901ba91f3226fd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13177-cross-site-request-forgery-in-bdtas-66db0f7f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13177%3A%20Cross-Site%20Request%20Forgery%20in%20Bdtask%20SalesERP&amp;severity=medium&amp;id=69177ea4901ba91f3226fd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13174-server-side-request-forgery-in-rach-68148516</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13174%3A%20Server-Side%20Request%20Forgery%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=691779316b210bb35bbae6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-turn-json-services-into-cover-02ea040b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Turn%20JSON%20Services%20into%20Covert%20Malware%20Delivery%20Channels&amp;severity=medium&amp;id=6917bcfbed594783724528cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13172-sql-injection-in-codeastro-gym-mana-8e2e2dee</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13172%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=691772da6b210bb35bb4509b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4618-cwe-316-cleartext-storage-of-sensiti-a37766ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4618%3A%20CWE-316%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20Palo%20Alto%20Networks%20Prisma%20Browser&amp;severity=medium&amp;id=691772da6b210bb35bb450a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-attacks-on-cisco-asa-and-fire-1ebad68b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Attacks%20on%20Cisco%20ASA%20and%20Firepower%20Flaws&amp;severity=medium&amp;id=69176cb9db1bcd4e0c8a13c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4617-cwe-424-improper-protection-of-alter-7c47c766</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4617%3A%20CWE-424%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20Palo%20Alto%20Networks%20Prisma%20Browser&amp;severity=low&amp;id=691772da6b210bb35bb450a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-launch-spearspecter-spy-operation--30c837e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Launch%20%E2%80%98SpearSpecter%E2%80%99%20Spy%20Operation%20on%20Defense%20%26%20Government%20Targets&amp;severity=high&amp;id=69176cb9db1bcd4e0c8a13bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/millions-of-sites-at-risk-from-imunify360-critical-7df6edc7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Millions%20of%20sites%20at%20risk%20from%20Imunify360%20critical%20flaw%20exploit&amp;severity=critical&amp;id=69176cb9db1bcd4e0c8a13c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/checkoutcom-snubs-hackers-after-data-breach-to-don-eaa141e6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Checkout.com%20snubs%20hackers%20after%20data%20breach%2C%20to%20donate%20ransom%20instead&amp;severity=high&amp;id=69176cb9db1bcd4e0c8a13b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4616-cwe-354-improper-validation-of-integ-28294681</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4616%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Palo%20Alto%20Networks%20Prisma%20Browser&amp;severity=low&amp;id=69176937db1bcd4e0c85680b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13171-sql-injection-in-zzcms-26348ba4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13171%3A%20SQL%20Injection%20in%20ZZCMS&amp;severity=medium&amp;id=69176937db1bcd4e0c856804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13204-cwe-1321-improperly-controlled-modi-4f17de25</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13204%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20silentmatt%20expr-eval&amp;severity=high&amp;id=691763c61dec7bb205e65289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/identity-governance-and-administration-app-prolife-6e985ead</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Identity%20Governance%20and%20Administration%2C%20App%20Proliferation%2C%20and%20the%20App%20Integration%20Chasm&amp;severity=medium&amp;id=6917d672b6d0b801e4cd1d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-state-hackers-jailbroke-claude-ai-code-for-65ac7b9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20State%20Hackers%20Jailbroke%20Claude%20AI%20Code%20for%20Automated%20Breaches&amp;severity=medium&amp;id=691757407ba9501c4c9bf36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13170-sql-injection-in-code-projects-simp-89762270</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13170%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=691753bf7ba9501c4c978717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8870-cwe-248-in-arista-networks-eos-58a7bbba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8870%3A%20CWE-248%20in%20Arista%20Networks%20EOS&amp;severity=medium&amp;id=691753bf7ba9501c4c97871e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64446-escalation-of-privilege-in-fortinet-4a5fe3c4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64446%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiWeb&amp;severity=critical&amp;id=691753bf7ba9501c4c978725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13169-sql-injection-in-code-projects-simp-ff58b66a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13169%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69174cd17ba9501c4c8e3c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-deepwatch-layoffs-macos-vulnerabilit-6a5fdc62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Deepwatch%20Layoffs%2C%20macOS%20Vulnerability%2C%20Amazon%20AI%20Bug%20Bounty&amp;severity=medium&amp;id=69174cb67ba9501c4c8df1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-serious-ai-bugs-exposing-meta-nvi-0b2014b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20Serious%20AI%20Bugs%20Exposing%20Meta%2C%20Nvidia%2C%20and%20Microsoft%20Inference%20Frameworks&amp;severity=critical&amp;id=6917bcfbed594783724528cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13168-sql-injection-in-ury-erp-ury-2315c711</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13168%3A%20SQL%20Injection%20in%20ury-erp%20ury&amp;severity=medium&amp;id=69174732ec553ac0a0d74e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-tech-firm-leak-reportedly-exposes-state-li-9d049120</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Tech%20Firm%20Leak%20Reportedly%20Exposes%20State%20Linked%20Hacking%20Operations&amp;severity=medium&amp;id=691743acec553ac0a0d1e30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-launch-spearspecter-spy-operation--206abe6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Launch%20%E2%80%98SpearSpecter%E2%80%99%20Spy%20Operation%20on%20Defense%20%26%20Government%20Targets&amp;severity=medium&amp;id=6917bcfbed594783724528d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bsi-issues-guidelines-to-counter-evasion-attacks-t-97e5944b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BSI%20issues%20guidelines%20to%20counter%20evasion%20attacks%20targeting%20LLMs&amp;severity=medium&amp;id=691740d2ec553ac0a0ce3eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asus-warns-of-critical-auth-bypass-flaw-in-dsl-ser-54ca9afe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASUS%20warns%20of%20critical%20auth%20bypass%20flaw%20in%20DSL%20series%20routers&amp;severity=critical&amp;id=691740d2ec553ac0a0ce3ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-use-anthropics-ai-to-launch-automa-1718b9f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Use%20Anthropic&apos;s%20AI%20to%20Launch%20Automated%20Cyber%20Espionage%20Campaign&amp;severity=high&amp;id=691740d2ec553ac0a0ce3eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomwares-fragmentation-reaches-a-breaking-point-c863a7ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware&apos;s%20Fragmentation%20Reaches%20a%20Breaking%20Point%20While%20LockBit%20Returns&amp;severity=high&amp;id=691740d2ec553ac0a0ce3ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-the-impersonation-function-gets-used-to-imper-5795925d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20The%20Impersonation%20Function%20Gets%20Used%20To%20Impersonate%20Users%20(Fortinet%20FortiWeb%20(%3F%3F)%20Auth.%20Bypass)%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=69173e2b3d7715a824cb7e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21635-cwe-287-improper-authentication-in--3a61e067</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21635%3A%20CWE-287%3A%20Improper%20Authentication%20in%20usememos%20memos&amp;severity=high&amp;id=69173aa53d7715a824c558f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12149-cwe-200-exposure-of-sensitive-infor-8877c0ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12149%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=691737213d7715a824c0d570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-office-russian-dolls-fri-nov-14th-e1045b9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Office%20Russian%20Dolls%2C%20(Fri%2C%20Nov%2014th)&amp;severity=medium&amp;id=6917339f3d7715a824bc0f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11918-cwe-121-stack-based-buffer-overflow-a424016a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11918%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Rockwell%20Automation%20Arena%C2%AE%20Simulation&amp;severity=high&amp;id=69173170355db8f6997c8029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10018-cwe-79-improper-neutralization-of-i-0e75c6ed</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10018%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=69172e00355db8f699772cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9982-cwe-256-plaintext-storage-of-a-passw-56cd1fb3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9982%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=69172e00355db8f699772cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/checkoutcom-discloses-data-breach-after-extortion--836d4a63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Checkout.com%20Discloses%20Data%20Breach%20After%20Extortion%20Attempt&amp;severity=medium&amp;id=69172de3355db8f69977184d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/washington-post-says-nearly-10000-employees-impact-20f0b925</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Washington%20Post%20Says%20Nearly%2010%2C000%20Employees%20Impacted%20by%20Oracle%20Hack&amp;severity=medium&amp;id=6917249fdd0733879bf84c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8855-cwe-639-authorization-bypass-through-6426f978</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8855%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Optimus%20Software%20Brokerage%20Automation&amp;severity=high&amp;id=69172781355db8f6996ec1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-interview-actors-now-utilize-json-stora-34a54520</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Interview%20Actors%20Now%20Utilize%20JSON%20Storage%20Services%20for%20Malware%20Delivery&amp;severity=medium&amp;id=69172119dd0733879bf23f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-encryption-structure-of-yurei-ransomwa-e113e511</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20Encryption%20Structure%20of%20Yurei%20Ransomware%20Go-based%20Builder&amp;severity=medium&amp;id=69172119dd0733879bf23f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkcomet-rat-malware-hidden-inside-fake-bitcoin-t-6bb87cf7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkComet%20RAT%20Malware%20Hidden%20Inside%20Fake%20Bitcoin%20Tool&amp;severity=medium&amp;id=69172119dd0733879bf23f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/novastealer-apple-intelligence-is-leaving-a-plist--18ee82e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NovaStealer%20-%20Apple%20Intelligence%20is%20leaving%20a%20plist..%20it%20is%20legit%2C%20right%3F&amp;severity=medium&amp;id=69172119dd0733879bf23f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-group-made-244-million-in-ransom--e2870eeb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20Ransomware%20Group%20Made%20%24244%20Million%20in%20Ransom%20Proceeds&amp;severity=medium&amp;id=69171ac1dd0733879be8ef43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11981-cwe-89-improper-neutralization-of-s-39218ca2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11981%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=medium&amp;id=691714694632ec4a625824d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-detects-150000-npm-packages-in-worm-powered-d3402ad3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Detects%20150%2C000%20NPM%20Packages%20in%20Worm-Powered%20Campaign&amp;severity=medium&amp;id=69170798b0f7ea9b98308ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomwares-fragmentation-reaches-a-breaking-point-8b766e3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware&apos;s%20Fragmentation%20Reaches%20a%20Breaking%20Point%20While%20LockBit%20Returns&amp;severity=high&amp;id=6917bcfbed594783724528d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kraken-ransomware-benchmarks-systems-for-optimal-e-1833d32f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kraken%20ransomware%20benchmarks%20systems%20for%20optimal%20encryption%20choice&amp;severity=high&amp;id=6916fe7f9283ad5d6da7510a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doordash-hit-by-new-data-breach-in-october-exposin-d222738a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoorDash%20hit%20by%20new%20data%20breach%20in%20October%20exposing%20user%20information&amp;severity=high&amp;id=6916fe7f9283ad5d6da750fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-use-anthropics-ai-to-launch-automa-47bf4626</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Use%20Anthropic&apos;s%20AI%20to%20Launch%20Automated%20Cyber%20Espionage%20Campaign&amp;severity=high&amp;id=6917bcfbed594783724528d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/now-patched-fortinet-fortiweb-flaw-exploited-in-at-69bf889f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Now-Patched%20Fortinet%20FortiWeb%20Flaw%20Exploited%20in%20Attacks%20to%20Create%20Admin%20Accounts&amp;severity=high&amp;id=6916fe7f9283ad5d6da75102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/imunify360-vulnerability-could-expose-millions-of--b93736ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Imunify360%20Vulnerability%20Could%20Expose%20Millions%20of%20Sites%20to%20Hacking&amp;severity=medium&amp;id=6916faec9283ad5d6da1b866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/now-patched-fortinet-fortiweb-flaw-exploited-in-at-f98d4794</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Now-Patched%20Fortinet%20FortiWeb%20Flaw%20Exploited%20in%20Attacks%20to%20Create%20Admin%20Accounts&amp;severity=low&amp;id=6917bcfbed594783724528db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-says-claude-ai-powered-90-of-chinese-esp-6201508b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20Says%20Claude%20AI%20Powered%2090%25%20of%20Chinese%20Espionage%20Campaign&amp;severity=medium&amp;id=6916e72382a5a4c8fc237df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-ai-ecommerce-website-builder-works-073bf2cf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20AI%20Ecommerce%20Website%20Builder%20Works%3F&amp;severity=medium&amp;id=6916e4f9a17a058cf58eb513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-public-evidence-redtail-cryptominer-targets--1a0dfaae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%F0%9F%9A%A8%20FIRST%20PUBLIC%20EVIDENCE%3A%20RedTail%20Cryptominer%20Targets%20Docker%20APIs&amp;severity=medium&amp;id=6916e17aa17a058cf5884ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-says-chinese-lighthouse-phishing-kit-disrup-90b2896e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Says%20Chinese%20%E2%80%98Lighthouse%E2%80%99%20Phishing%20Kit%20Disrupted%20Following%20Lawsuit&amp;severity=low&amp;id=6916dde7a17a058cf5828861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10686-cwe-22-improper-limitation-of-a-pat-ee083f18</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10686%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Creta%20Testimonial%20Showcase&amp;severity=high&amp;id=6916cb5051947119364339be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64444-improper-neutralization-of-special--595d7110</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64444%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sony%20Network%20Communications%20Inc.%20NCP-HG100%2FCellular%20model&amp;severity=high&amp;id=6916bcd463774206fb66ba21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13161-cwe-23-relative-path-traversal-in-i-52498e53</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13161%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20IQ%20Service%20International%20IQ-Support&amp;severity=high&amp;id=6916a1fb6e2bdc534ef61d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13160-cwe-497-exposure-of-sensitive-syste-77a7b35c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13160%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IQ%20Service%20International%20IQ-Support&amp;severity=medium&amp;id=6916a1fb6e2bdc534ef61d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hurricane-melissa-relief-scams-how-criminals-explo-f9a72fbc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hurricane%20Melissa%20Relief%20Scams%3A%20How%20Criminals%20Exploit%20Disaster&amp;severity=medium&amp;id=6917145e4632ec4a62582224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/increase-in-lumma-stealer-activity-coincides-with--2a4ed981</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Increase%20in%20Lumma%20Stealer%20Activity%20Coincides%20with%20Use%20of%20Adaptive%20Browser%20Fingerprinting%20Tactics&amp;severity=medium&amp;id=691717e24632ec4a625e2df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13107-inappropriate-implementation-in-goo-e7ddbcf3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13107%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169be0b9f11918f9cf7257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7021-inappropriate-implementation-in-goog-9b95cdb0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7021%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf612f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13178-inappropriate-implementation-in-goo-9443559a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13178%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf6123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7017-inappropriate-implementation-in-goog-89356ed1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7017%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69169bdeb9f11918f9cf612b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9126-use-after-free-in-google-chrome-d926e0f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9126%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69169bdeb9f11918f9cf6133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13102-inappropriate-implementation-in-goo-4e8e6b28</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13102%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf613f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11919-inappropriate-implementation-in-goo-e8a7fa0a</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11919%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf611b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11920-inappropriate-implementation-in-goo-cfebc9ec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11920%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf611f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13983-inappropriate-implementation-in-goo-f17c1306</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13983%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf6127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9479-out-of-bounds-read-in-google-chrome-3ad5425c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9479%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169be0b9f11918f9cf725e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13097-inappropriate-implementation-in-goo-cf06fea1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13097%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf613b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12904-cwe-79-improper-neutralization-of-i-6488aea7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20otacke%20SNORDIAN&apos;s%20H5PxAPIkatchu&amp;severity=high&amp;id=69169bdeb9f11918f9cf6137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-friday-november-14th-2025-httpsi-f36ce8e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Friday%2C%20November%2014th%2C%202025%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9700%2C%20(Fri%2C%20Nov%2014th)&amp;severity=medium&amp;id=691683dd65beb25638350b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/washington-post-data-breach-impacts-nearly-10k-emp-e891caef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Washington%20Post%20data%20breach%20impacts%20nearly%2010K%20employees%2C%20contractors&amp;severity=high&amp;id=691673f17c4d52e6fb3dfc38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-14-bd1860ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-14&amp;severity=medium&amp;id=6917c3f5ed594783724dd8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63745-na-837b18b1</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63745%3A%20n%2Fa&amp;severity=medium&amp;id=6917984270bcf5e35c4ad930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64084-na-35b49a20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64084%3A%20n%2Fa&amp;severity=medium&amp;id=6917959ad767b187e9434ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63744-na-003892d7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63744%3A%20n%2Fa&amp;severity=medium&amp;id=6917959ad767b187e9434ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63891-na-09ad56f4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63891%3A%20n%2Fa&amp;severity=high&amp;id=69179229d767b187e93e4612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63701-na-ac6ef506</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63701%3A%20n%2Fa&amp;severity=medium&amp;id=69178bbdd767b187e9376a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63291-na-c5daa1a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63291%3A%20n%2Fa&amp;severity=medium&amp;id=69177ea4901ba91f3226fd5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63680-na-04a6fca8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63680%3A%20n%2Fa&amp;severity=high&amp;id=691779316b210bb35bbae6f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54560-na-b742bf7e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54560%3A%20n%2Fa&amp;severity=low&amp;id=691772da6b210bb35bb450af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54345-na-2325ec3d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54345%3A%20n%2Fa&amp;severity=high&amp;id=691772da6b210bb35bb450ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63724-na-25278036</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63724%3A%20n%2Fa&amp;severity=medium&amp;id=691772da6b210bb35bb450a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54562-na-fac47a04</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54562%3A%20n%2Fa&amp;severity=medium&amp;id=69176d03db1bcd4e0c8a81dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54561-na-fe77c7c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54561%3A%20n%2Fa&amp;severity=medium&amp;id=69176d03db1bcd4e0c8a81d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54348-na-43e5506c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54348%3A%20n%2Fa&amp;severity=medium&amp;id=69176d03db1bcd4e0c8a81d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63725-na-b0756138</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63725%3A%20n%2Fa&amp;severity=medium&amp;id=69176d03db1bcd4e0c8a81d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54559-na-62a69509</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54559%3A%20n%2Fa&amp;severity=low&amp;id=69176d03db1bcd4e0c8a81cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54342-na-c0d11c67</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54342%3A%20n%2Fa&amp;severity=low&amp;id=69176d03db1bcd4e0c8a81c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54346-na-e96175ee</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54346%3A%20n%2Fa&amp;severity=high&amp;id=69176937db1bcd4e0c856816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54343-na-d10cd226</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54343%3A%20n%2Fa&amp;severity=critical&amp;id=69176937db1bcd4e0c856812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54340-na-b9d6a5a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54340%3A%20n%2Fa&amp;severity=medium&amp;id=69176937db1bcd4e0c85680e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63830-na-3d3bb314</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63830%3A%20n%2Fa&amp;severity=medium&amp;id=6917665fdb1bcd4e0c837836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54339-na-dcbbadcf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54339%3A%20n%2Fa&amp;severity=critical&amp;id=6917665fdb1bcd4e0c837832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44640-na-349443a2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44640%3A%20n%2Fa&amp;severity=medium&amp;id=6917574f7ba9501c4c9c2491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44639-na-27a6a514</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44639%3A%20n%2Fa&amp;severity=medium&amp;id=6917574f7ba9501c4c9c248d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44630-na-9b346bc6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44630%3A%20n%2Fa&amp;severity=medium&amp;id=691753bf7ba9501c4c978721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55016-na-860df5af</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55016%3A%20n%2Fa&amp;severity=medium&amp;id=691753bf7ba9501c4c978713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44635-na-7cd390ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44635%3A%20n%2Fa&amp;severity=medium&amp;id=6917503b7ba9501c4c92bc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44632-na-d442ca8a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44632%3A%20n%2Fa&amp;severity=medium&amp;id=6917503b7ba9501c4c92bc04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44636-na-bf373124</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44636%3A%20n%2Fa&amp;severity=medium&amp;id=6917503b7ba9501c4c92bc01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44633-na-d25e8e68</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44633%3A%20n%2Fa&amp;severity=medium&amp;id=69174cd17ba9501c4c8e3c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42749-na-5839200c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42749%3A%20n%2Fa&amp;severity=medium&amp;id=69174cd17ba9501c4c8e3c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-flaw-in-imunifyav-puts-millions-of-linux-hoste-3e003ebe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20flaw%20in%20ImunifyAV%20puts%20millions%20of%20Linux-hosted%20sites%20at%20risk&amp;severity=high&amp;id=691673f17c4d52e6fb3dfc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-create-4300-fake-travel-sites-to-s-ba699a55</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Create%204%2C300%20Fake%20Travel%20Sites%20to%20Steal%20Hotel%20Guests&apos;%20Payment%20Data&amp;severity=high&amp;id=691673f17c4d52e6fb3dfc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-terrible-horrible-no-good-very-bad-day-8561d29a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20terrible%2C%20horrible%2C%20no%20good%2C%20very%20bad%20day&amp;severity=medium&amp;id=6917145e4632ec4a62582236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64530-cwe-288-authentication-bypass-using-87832440</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64530%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20apollographql%20federation&amp;severity=high&amp;id=691672127c4d52e6fb3b2e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13131-incorrect-default-permissions-in-so-dbaaf0bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13131%3A%20Incorrect%20Default%20Permissions%20in%20Sonarr&amp;severity=high&amp;id=69165800ef0b598b9f6fad7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13130-incorrect-default-permissions-in-ra-28b4edc6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13130%3A%20Incorrect%20Default%20Permissions%20in%20Radarr&amp;severity=high&amp;id=69165800ef0b598b9f6fad75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36236-cwe-22-improper-limitation-of-a-pat-697fd261</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36236%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20AIX&amp;severity=high&amp;id=69165800ef0b598b9f6fad84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36250-cwe-114-process-control-in-ibm-aix-0e598a57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36250%3A%20CWE-114%20Process%20Control%20in%20IBM%20AIX&amp;severity=critical&amp;id=69165800ef0b598b9f6fad87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36096-cwe-522-insufficiently-protected-cr-b2685315</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36096%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20AIX&amp;severity=critical&amp;id=69165800ef0b598b9f6fad81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36251-cwe-114-process-control-in-ibm-aix-9533e607</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36251%3A%20CWE-114%20Process%20Control%20in%20IBM%20AIX&amp;severity=critical&amp;id=69165800ef0b598b9f6fad8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64754-cwe-601-url-redirection-to-untruste-b15ad9d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64754%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20jitsi%20jitsi-meet&amp;severity=low&amp;id=6916529405b975ba75927702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64753-cwe-863-incorrect-authorization-in--e02c1711</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64753%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gristlabs%20grist-core&amp;severity=medium&amp;id=6916529405b975ba759276fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64752-cwe-918-server-side-request-forgery-254cc206</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64752%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gristlabs%20grist-core&amp;severity=medium&amp;id=6916529405b975ba759276fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47913-cwe-703-improper-handling-of-except-65eac4c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47913%3A%20CWE-703%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20golang.org%2Fx%2Fcrypto%20golang.org%2Fx%2Fcrypto%2Fssh%2Fagent&amp;severity=high&amp;id=69164f1005b975ba758cef31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64745-cwe-79-improper-neutralization-of-i-31c0a50c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64745%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20withastro%20astro&amp;severity=low&amp;id=691642cf819e592e58c8d6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4619-cwe-754-improper-check-for-unusual-o-667a4034</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4619%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=691642cf819e592e58c8d6ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64726-cwe-15-external-control-of-system-o-fde71248</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64726%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20SocketDev%20firewall-release&amp;severity=high&amp;id=69163a0b6c6480bc321d2e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64709-cwe-918-server-side-request-forgery-59006f73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64709%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20baptisteArno%20typebot.io&amp;severity=critical&amp;id=691636876c6480bc3217c441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46369-cwe-377-insecure-temporary-file-in--9757af05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46369%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Dell%20Alienware%20Command%20Center%206.x%20(AWCC)&amp;severity=high&amp;id=691636876c6480bc3217c43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46370-cwe-114-process-control-in-dell-ali-79d42362</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46370%3A%20CWE-114%3A%20Process%20Control%20in%20Dell%20Alienware%20Command%20Center%206.x%20(AWCC)&amp;severity=low&amp;id=691636876c6480bc3217c43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46362-cwe-284-improper-access-control-in--07c6187e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46362%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Alienware%20Command%20Center%206.x%20(AWCC)&amp;severity=medium&amp;id=691634ab6c6480bc32165eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46368-cwe-377-insecure-temporary-file-in--6e793cfc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46368%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Dell%20Alienware%20Command%20Center%206.x%20(AWCC)&amp;severity=medium&amp;id=6916330e6c6480bc3212e0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46367-cwe-390-detection-of-error-conditio-09c026b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46367%3A%20CWE-390%3A%20Detection%20of%20Error%20Condition%20Without%20Action%20in%20Dell%20Alienware%20Command%20Center&amp;severity=high&amp;id=691634ab6c6480bc32165ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43515-an-unauthenticated-user-on-the-same-ab07fd38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43515%3A%20An%20unauthenticated%20user%20on%20the%20same%20network%20as%20a%20Compressor%20server%20may%20be%20able%20to%20execute%20arbitrary%20code%20in%20Apple%20Compressor&amp;severity=high&amp;id=69162e9f19431ce75c5ca197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13123-sql-injection-in-amtt-hotel-broadba-50b33b05</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13123%3A%20SQL%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=69162e9f19431ce75c5ca191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unleashing-the-kraken-ransomware-group-6417305b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unleashing%20the%20Kraken%20ransomware%20group&amp;severity=medium&amp;id=691639fd6c6480bc321d297a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13122-sql-injection-in-sourcecodester-pat-17ce1220</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13122%3A%20SQL%20Injection%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69162015cdc01d126425d790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-fake-ai-sidebar-can-steal-your-data-kaspersk-5a22f5e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20fake%20AI%20sidebar%20can%20steal%20your%20data%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69161cb1cdc01d1264200490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-are-abusing-whatsapp-screen-sharing-to-st-ce01814a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20are%20Abusing%20WhatsApp%20Screen%20Sharing%20to%20Steal%20OTPs%20and%20Funds&amp;severity=medium&amp;id=69161c96cdc01d12641fe35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64706-cwe-639-authorization-bypass-throug-e77b565a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64706%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20baptisteArno%20typebot.io&amp;severity=medium&amp;id=69161ca8cdc01d12641febbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12785-cwe-200-exposure-of-sensitive-infor-b2650aa2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12785%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%20Inc%20HP%20Color%20LaserJet%20MFP%20M478-M479%20series&amp;severity=medium&amp;id=69161915cdc01d12641ad2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12784-cwe-200-exposure-of-sensitive-infor-b7bd0c32</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12784%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%20Inc%20HP%20Color%20LaserJet%20MFP%20M478-M479%20series&amp;severity=medium&amp;id=69161915cdc01d12641ad2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/homeland-security-brief-november-2025-a2f73a3d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Homeland%20Security%20Brief%20-%20November%202025&amp;severity=medium&amp;id=691613a173934fe85f09e999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11538-binding-to-an-unrestricted-ip-addre-8ef7dacb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11538%3A%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69160ca773934fe85fff682b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13121-sql-injection-in-cameasy-liketea-0f8251f1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13121%3A%20SQL%20Injection%20in%20cameasy%20Liketea&amp;severity=medium&amp;id=69160aa2eb29b6dceb121465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20346-improper-privilege-management-in-ci-5a9f150a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20346%3A%20Improper%20Privilege%20Management%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=69160aa2eb29b6dceb12146c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20355-url-redirection-to-untrusted-site-o-437bcec1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20355%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=6916072eeb29b6dceb0d3f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20353-improper-neutralization-of-input-du-78c7c6b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=6916072eeb29b6dceb0d3f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20349-improper-neutralization-of-special--831cb1cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20349%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=6916072eeb29b6dceb0d3f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20341-improper-access-control-in-cisco-ci-8b0f6412</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20341%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=high&amp;id=6916072eeb29b6dceb0d3f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/orgs-move-to-sso-passkeys-to-solve-bad-password-ha-34360c9c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Orgs%20Move%20to%20SSO%2C%20Passkeys%20to%20Solve%20Bad%20Password%20Habits&amp;severity=medium&amp;id=6916070feb29b6dceb0d2532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-endgame-takes-down-rhadamanthys-infostea-073e4386</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Endgame%20Takes%20Down%20Rhadamanthys%20Infostealer%2C%20VenomRAT%20and%20Elysium%20Botnet%2C%20Seize%201025%20servers%20and%20Arrest%201&amp;severity=medium&amp;id=69160395eb29b6dceb07d9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64525-cwe-918-server-side-request-forgery-a0e0219b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64525%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=medium&amp;id=6916072eeb29b6dceb0d3f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64703-cwe-200-exposure-of-sensitive-infor-89fb686b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64703%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=6916001feb29b6dceb02d4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64511-cwe-918-server-side-request-forgery-d374dba5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64511%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%201Panel-dev%20MaxKB&amp;severity=high&amp;id=6916001feb29b6dceb02d4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-vulnerability-exposed-underlying-cloud-inf-158ef921</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChatGPT%20Vulnerability%20Exposed%20Underlying%20Cloud%20Infrastructure&amp;severity=medium&amp;id=6915fe3977eaf5a849601df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64718-cwe-1321-improperly-controlled-modi-3d12c916</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64718%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nodeca%20js-yaml&amp;severity=medium&amp;id=6915fe5477eaf5a849603956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13120-use-after-free-in-mruby-d35bb9d6</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13120%3A%20Use%20After%20Free%20in%20mruby&amp;severity=medium&amp;id=6915fe5477eaf5a84960393e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1000-servers-hit-in-law-enforcement-takedown-of-rh-7a8587be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1%2C000%2B%20Servers%20Hit%20in%20Law%20Enforcement%20Takedown%20of%20Rhadamanthys%2C%20VenomRAT%2C%20Elysium&amp;severity=medium&amp;id=6915f73177eaf5a84954dbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62484-cwe-1333-inefficient-regular-expres-f71949ff</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62484%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=high&amp;id=6915f74f77eaf5a84954f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-updates-guidance-on-patching-cisco-devices-ta-a2a308ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Updates%20Guidance%20on%20Patching%20Cisco%20Devices%20Targeted%20in%20China-Linked%20Attacks&amp;severity=medium&amp;id=6915f3b777eaf5a849502757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62483-cwe-212-improper-removal-of-sensiti-7f4529d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62483%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients&amp;severity=medium&amp;id=6915f74f77eaf5a84954f4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13119-cross-site-request-forgery-in-fabia-5f70faa7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13119%3A%20Cross-Site%20Request%20Forgery%20in%20Fabian%20Ros%20Simple%20E-Banking%20System&amp;severity=medium&amp;id=6915fe5477eaf5a849603960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13118-improper-authorization-in-macrozhen-284bd7a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13118%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915fe5477eaf5a84960395a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62482-cwe-79-improper-neutralization-of-i-8b9fa58a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62482%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=medium&amp;id=6915fe5577eaf5a84960398c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30662-cwe-646-reliance-on-file-name-or-ex-b8f60925</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30662%3A%20CWE-646%3A%20Reliance%20on%20File%20Name%20or%20Extension%20of%20Externally-Supplied%20File%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20VDI%20Plugin%20macOS%20Universal%20installer&amp;severity=medium&amp;id=6915fe5577eaf5a849603989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30669-cwe-295-improper-certificate-valida-e5acdbb1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30669%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20Clients&amp;severity=medium&amp;id=6915fac277eaf5a8495aabde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64741-cwe-74-improper-neutralization-of-s-767691eb</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64741%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20for%20Android&amp;severity=high&amp;id=6915fe5577eaf5a84960398f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64740-cwe-347-improper-verification-of-cr-86cdaa62</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64740%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20VDI%20Client&amp;severity=high&amp;id=6915ee5ff690f81e3c76b56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-state-of-ransomware-q3-2025-8062ee4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20State%20of%20Ransomware%20%E2%80%93%20Q3%202025&amp;severity=high&amp;id=6915ee61f690f81e3c76b650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13117-improper-authorization-in-macrozhen-a51caec2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13117%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915ee5ff690f81e3c76b569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64739-cwe-73-external-control-of-file-nam-674c2ad1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64739%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients&amp;severity=medium&amp;id=6915ee5ff690f81e3c76b575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64738-cwe-73-external-control-of-file-nam-4a1808bb</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64738%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20for%20macOS&amp;severity=medium&amp;id=6915ee5ff690f81e3c76b572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13116-improper-authorization-in-macrozhen-ddd4f292</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13116%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915e75af690f81e3c6bfb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coyote-maverick-banking-trojans-run-rampant-in-bra-439b7b1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coyote%2C%20Maverick%20Banking%20Trojans%20Run%20Rampant%20in%20Brazil&amp;severity=medium&amp;id=6915e559b9a712c4986ecd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13115-improper-authorization-in-macrozhen-b2c266a3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13115%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915e1e1b9a712c498695705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13114-improper-authorization-in-macrozhen-49006b49</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13114%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915e1e1b9a712c4986956ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41069-cwe-639-authorization-bypass-throug-6d688542</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41069%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20T-Innova%20DeporSite%20DSuite%202025&amp;severity=medium&amp;id=6915de5db9a712c4986429d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tens-of-thousands-of-malicious-npm-packages-distri-5e602bad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tens%20of%20Thousands%20of%20Malicious%20NPM%20Packages%20Distribute%20Self-Replicating%20Worm&amp;severity=medium&amp;id=6915d902f0c8e942cdf27149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-chrome-extension-safery-steals-ethereum-walle-6e547bb8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Chrome%20Extension%20%E2%80%9CSafery%E2%80%9D%20Steals%20Ethereum%20Wallet%20Seed%20Phrases%20Using%20Sui%20Blockchain&amp;severity=medium&amp;id=6917bcfbed594783724528e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12818-integer-overflow-or-wraparound-in-p-b40a45fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12818%3A%20Integer%20Overflow%20or%20Wraparound%20in%20PostgreSQL&amp;severity=medium&amp;id=6915d923f0c8e942cdf27495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12817-missing-authorization-in-postgresql-52bb5a53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12817%3A%20Missing%20Authorization%20in%20PostgreSQL&amp;severity=low&amp;id=6915d923f0c8e942cdf27492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12765-vulnerability-in-pgadminorg-pgadmin-00c51997</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12765%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=high&amp;id=6915d923f0c8e942cdf2748f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12764-vulnerability-in-pgadminorg-pgadmin-a24dcb53</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12764%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=high&amp;id=6915d923f0c8e942cdf2748c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12763-vulnerability-in-pgadminorg-pgadmin-ba91ddad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12763%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=medium&amp;id=6915d923f0c8e942cdf27489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12762-vulnerability-in-pgadminorg-pgadmin-c79bed57</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12762%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=critical&amp;id=6915d923f0c8e942cdf27486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40681-cwe-79-improper-neutralization-of-i-a0393514</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20xCally%20Omnichannel&amp;severity=medium&amp;id=6915d923f0c8e942cdf27498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nhs-investigating-oracle-ebs-hack-claims-as-hacker-de1dbb5c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NHS%20Investigating%20Oracle%20EBS%20Hack%20Claims%20as%20Hackers%20Name%20Over%2040%20Alleged%20Victims&amp;severity=medium&amp;id=6915d57ef0c8e942cded1836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-watchguard-firebox-vulnerability-exploite-9e8148c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20WatchGuard%20Firebox%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=6915d1faf0c8e942cde6f92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-attacks-come-faster-than-patches-why-2026-wil-61c21427</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Attacks%20Come%20Faster%20Than%20Patches%3A%20Why%202026%20Will%20be%20the%20Year%20of%20Machine-Speed%20Security&amp;severity=medium&amp;id=6917bcfbed594783724528e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12377-cwe-862-missing-authorization-in-sm-f50a5a9d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12377%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20Envira%20Gallery%20%E2%80%93%20Image%20Photo%20Gallery%2C%20Albums%2C%20Video%20Gallery%2C%20Slideshows%20%26%20More&amp;severity=medium&amp;id=6915c26127981db3b432b94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/synnovis-confirms-patient-information-stolen-in-di-db242213</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Synnovis%20Confirms%20Patient%20Information%20Stolen%20in%20Disruptive%20Ransomware%20Attack&amp;severity=medium&amp;id=6915becf27981db3b42d0d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-endgame-dismantles-rhadamanthys-venom-ra-8d4d3091</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Endgame%20Dismantles%20Rhadamanthys%2C%20Venom%20RAT%2C%20and%20Elysium%20Botnet%20in%20Global%20Crackdown&amp;severity=medium&amp;id=6917bcfbed594783724528e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-67000-fake-npm-packages-flood-registry-in-wor-4b00f9b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2067%2C000%20Fake%20npm%20Packages%20Flood%20Registry%20in%20Worm-Like%20Spam%20Attack&amp;severity=high&amp;id=6915b5da6afadf441850216b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-watchguard-fireware-flaw-expos-ea334abc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20WatchGuard%20Fireware%20Flaw%20Exposing%2054%2C000%20Fireboxes%20to%20No-Login%20Attacks&amp;severity=critical&amp;id=6915b5da6afadf441850215f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dehashed-alternative-for-pentestersred-teamers-fe3a05ae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dehashed%20alternative%20for%20pentesters%2Fred%20teamers&amp;severity=medium&amp;id=6915b6026afadf4418506925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-cisco-0-days-ai-bug-bounties-c-41e7970c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Cisco%200-Days%2C%20AI%20Bug%20Bounties%2C%20Crypto%20Heists%2C%20State-Linked%20Leaks%20and%2020%20More%20Stories&amp;severity=medium&amp;id=6915b6e86afadf4418514a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-ise-citrixbleed-2-vulnerabilities-exploited--7c26f5e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20ISE%2C%20CitrixBleed%202%20Vulnerabilities%20Exploited%20as%20Zero-Days%3A%20Amazon&amp;severity=critical&amp;id=6915aa13dac9b42fc37a402f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64384-missing-authorization-in-jetmonster-89e4da7f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64384%3A%20Missing%20Authorization%20in%20jetmonsters%20JetFormBuilder&amp;severity=medium&amp;id=6915aa35dac9b42fc37a5aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64383-improper-neutralization-of-input-du-ffcede09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64383%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Qode%20Qi%20Blocks&amp;severity=medium&amp;id=6915aa35dac9b42fc37a5aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64382-missing-authorization-in-webtoffee--0496d5d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64382%3A%20Missing%20Authorization%20in%20WebToffee%20Order%20Export%20%26%20Order%20Import%20for%20WooCommerce&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64381-improper-neutralization-of-input-du-01fa1860</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64381%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64380-improper-neutralization-of-input-du-3911b3c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64380%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64379-missing-authorization-in-pluggabl-b-8c7ef4a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64379%3A%20Missing%20Authorization%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64370-missing-authorization-in-yop-yop-po-1e4ace09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64370%3A%20Missing%20Authorization%20in%20YOP%20YOP%20Poll&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64369-missing-authorization-in-codepeople-5789f6de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64369%3A%20Missing%20Authorization%20in%20codepeople%20Contact%20Form%20Email&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64292-improper-neutralization-of-input-du-397c1bed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64292%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PascalBajorat%20Analytics%20Germanized%20for%20Google%20Analytics&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64277-missing-authorization-in-quantumclo-7e18c364</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64277%3A%20Missing%20Authorization%20in%20QuantumCloud%20ChatBot&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64276-missing-authorization-in-ays-pro-su-4a42a3fe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64276%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64275-improper-neutralization-of-input-du-4ef839f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64275%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Manager&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64274-missing-authorization-in-wpkoitheme-39572292</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64274%3A%20Missing%20Authorization%20in%20wpkoithemes%20WPKoi%20Templates%20for%20Elementor&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64271-cross-site-request-forgery-csrf-in--a8bccbed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64271%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20HasThemes%20WP%20Plugin%20Manager&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64269-missing-authorization-in-edgarrojas-41a41385</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64269%3A%20Missing%20Authorization%20in%20EDGARROJAS%20WooCommerce%20PDF%20Invoice%20Builder&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64267-exposure-of-sensitive-system-inform-0c0a607d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64267%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPSwings%20WooCommerce%20Ultimate%20Points%20And%20Rewards&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64265-missing-authorization-in-n-media-fr-1529ea5e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64265%3A%20Missing%20Authorization%20in%20N-Media%20Frontend%20File%20Manager&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64264-improper-neutralization-of-input-du-f3eec651</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64264%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aman%20Popup%20addon%20for%20Ninja%20Forms&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64263-missing-authorization-in-pluginever-696af5bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64263%3A%20Missing%20Authorization%20in%20PluginEver%20WP%20Content%20Pilot&amp;severity=medium&amp;id=6915aa33dac9b42fc37a589e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64262-cross-site-request-forgery-csrf-in--030f728d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64262%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ramon%20fincken%20Auto%20Prune%20Posts&amp;severity=medium&amp;id=6915aa33dac9b42fc37a589b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64261-missing-authorization-in-codepeople-004f3de6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64261%3A%20Missing%20Authorization%20in%20codepeople%20Appointment%20Booking%20Calendar&amp;severity=medium&amp;id=6915aa33dac9b42fc37a5898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64259-missing-authorization-in-jeroen-sch-53c32c71</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64259%3A%20Missing%20Authorization%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=medium&amp;id=6915aa33dac9b42fc37a5895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7704-cwe-121-stack-based-buffer-overflow--ba55be8c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7704%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20SYS-111C-NR&amp;severity=medium&amp;id=6915a604dac9b42fc374b8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/formbook-delivered-through-multiple-scripts-thu-no-488dbf6b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Formbook%20Delivered%20Through%20Multiple%20Scripts%2C%20(Thu%2C%20Nov%2013th)&amp;severity=medium&amp;id=69159dbff47b1f1c8b576bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11769-cwe-79-improper-neutralization-of-i-0f22f952</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aumsrini%20WordPress%20Content%20Flipper&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11260-cwe-693-protection-mechanism-failur-9875e2e8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11260%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20benmoody%20WP%20Headless%20CMS%20Framework&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10295-cwe-79-improper-neutralization-of-i-585702ef</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10295%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kayapati%20Angel%20%E2%80%93%20Fashion%20Model%20Agency%20WordPress%20CMS%20Theme&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8397-cwe-79-improper-neutralization-of-in-6ddcfcce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20restpack%20Save%20as%20PDF%20Button&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12015-cwe-862-missing-authorization-in-sa-e6e0beaf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12015%3A%20CWE-862%20Missing%20Authorization%20in%20sanderkah%20Convert%20WebP%20%26%20AVIF%20%7C%20Quicq%20%7C%20Best%20image%20optimizer%20and%20compression%20plugin%20%7C%20Improve%20your%20Google%20Pagespeed&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12844-cwe-502-deserialization-of-untruste-df085492</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12844%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=high&amp;id=691590f26cb36fb34fdfdf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12681-cwe-200-exposure-of-sensitive-infor-d1081c97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12681%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ronalfy%20Comment%20Edit%20Core%20%E2%80%93%20Simple%20Comment%20Editing&amp;severity=medium&amp;id=691590f26cb36fb34fdfdf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-watchguard-fireware-flaw-expos-bcc7dca7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20WatchGuard%20Fireware%20Flaw%20Exposing%2054%2C000%20Fireboxes%20to%20No-Login%20Attacks&amp;severity=critical&amp;id=691591c46cb36fb34fe04ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12620-cwe-89-improper-neutralization-of-s-ca82dd6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12620%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ays-pro%20Poll%20Maker%20%E2%80%93%20Versus%20Polls%2C%20Anonymous%20Polls%2C%20Image%20Polls&amp;severity=medium&amp;id=691579339e485ce1c4d841f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/firefox-145-and-chrome-142-patch-high-severity-fla-bab22c38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Firefox%20145%20and%20Chrome%20142%20Patch%20High-Severity%20Flaws%20in%20Latest%20Releases&amp;severity=high&amp;id=69156c738f1a6240445ac526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-46000-fake-npm-packages-flood-registry-in-wor-4c2f0da1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2067%2C000%20Fake%20npm%20Packages%20Flood%20Registry%20in%20Worm-Like%20Spam%20Attack&amp;severity=medium&amp;id=691579379e485ce1c4d84262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12891-cwe-862-missing-authorization-in-ay-977c1f25</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12891%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Survey%20Maker&amp;severity=medium&amp;id=691562068f1a6240444c43e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11923-cwe-269-improper-privilege-manageme-7cdf09f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11923%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WP%20LMS%20for%20eLearning%2C%20Online%20Courses%2C%20%26%20Quizzes&amp;severity=high&amp;id=691553e024a15f0eafbbc090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12536-cwe-359-exposure-of-private-persona-54ca21a4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12536%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=medium&amp;id=691553e024a15f0eafbbc0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12733-cwe-94-improper-control-of-generati-c6e4037a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12733%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpallimport%20WP%20All%20Import%20%E2%80%93%20Drag%20%26%20Drop%20Import%20for%20CSV%2C%20XML%2C%20Excel%20%26%20Google%20Sheets&amp;severity=high&amp;id=691553e024a15f0eafbbc0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12892-cwe-862-missing-authorization-in-ay-388ec258</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12892%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Survey%20Maker&amp;severity=medium&amp;id=691553e024a15f0eafbbc0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12979-cwe-862-missing-authorization-in-us-7fdbf067</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12979%3A%20CWE-862%20Missing%20Authorization%20in%20uscnanbu%20Welcart%20e-Commerce&amp;severity=medium&amp;id=691553e024a15f0eafbbc0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12366-cwe-639-authorization-bypass-throug-f1a60945</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12366%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=691553e024a15f0eafbbc09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12089-cwe-22-improper-limitation-of-a-pat-e4abebb2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12089%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20supsysticcom%20Data%20Tables%20Generator%20by%20Supsystic&amp;severity=medium&amp;id=691553e024a15f0eafbbc097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59367-cwe-288-authentication-bypass-by-al-142847a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59367%3A%20CWE-288%3A%20Authentication%20Bypass%20by%20Alternate%20Path%20or%20Channel%20in%20ASUS%20DSL-AC51&amp;severity=critical&amp;id=691543c7edb89fd9702216e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64716-cwe-79-improper-neutralization-of-i-ffa5944e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64716%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TecharoHQ%20anubis&amp;severity=medium&amp;id=691543c7edb89fd9702216ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64710-cwe-79-improper-neutralization-of-i-547b76bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64710%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitfoundation%20bitplatform&amp;severity=medium&amp;id=691543c7edb89fd9702216e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-13-4241e92f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-13&amp;severity=medium&amp;id=691673de7c4d52e6fb3d2c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47222-na-3971523e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47222%3A%20n%2Fa&amp;severity=medium&amp;id=691649d9819e592e58d3e48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47221-na-6acab099</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47221%3A%20n%2Fa&amp;severity=medium&amp;id=691649d9819e592e58d3e489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47220-na-cbfdf08e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47220%3A%20n%2Fa&amp;severity=medium&amp;id=69164657819e592e58ce3a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60679-na-952ebf8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60679%3A%20n%2Fa&amp;severity=high&amp;id=691634ab6c6480bc32165ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60702-na-1b186ba6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60702%3A%20n%2Fa&amp;severity=medium&amp;id=691634ab6c6480bc32165ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60699-na-559ebb15</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60699%3A%20n%2Fa&amp;severity=medium&amp;id=691634ab6c6480bc32165eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63406-na-3e6ebacd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63406%3A%20n%2Fa&amp;severity=high&amp;id=69162e9f19431ce75c5ca19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55810-na-60392777</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55810%3A%20n%2Fa&amp;severity=medium&amp;id=69162e9f19431ce75c5ca18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60676-na-e79a1e58</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60676%3A%20n%2Fa&amp;severity=medium&amp;id=69162b1819431ce75c569446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60674-na-22166f30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60674%3A%20n%2Fa&amp;severity=medium&amp;id=69162b1819431ce75c569440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60673-na-d59a08c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60673%3A%20n%2Fa&amp;severity=medium&amp;id=69162b1819431ce75c56943a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60675-na-e5398e38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60675%3A%20n%2Fa&amp;severity=medium&amp;id=6916279419431ce75c50bd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60672-na-b6d4f89d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60672%3A%20n%2Fa&amp;severity=medium&amp;id=6916279419431ce75c50bd78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60698-na-7630704f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60698%3A%20n%2Fa&amp;severity=high&amp;id=69162015cdc01d126425d79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60697-na-2106c3cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60697%3A%20n%2Fa&amp;severity=high&amp;id=69162015cdc01d126425d796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60701-na-736eafec</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60701%3A%20n%2Fa&amp;severity=medium&amp;id=69162015cdc01d126425d78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60700-na-0c00e123</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60700%3A%20n%2Fa&amp;severity=medium&amp;id=69162015cdc01d126425d784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60671-na-1f67e596</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60671%3A%20n%2Fa&amp;severity=medium&amp;id=69162015cdc01d126425d77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60693-na-bc595625</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60693%3A%20n%2Fa&amp;severity=medium&amp;id=69161ca8cdc01d12641febb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60695-na-1b507137</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60695%3A%20n%2Fa&amp;severity=medium&amp;id=6916102073934fe85f046f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60694-na-a3c3b9d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60694%3A%20n%2Fa&amp;severity=high&amp;id=6916102073934fe85f046f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60689-na-354cdf1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60689%3A%20n%2Fa&amp;severity=medium&amp;id=69160e4773934fe85f031b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60696-na-b428add8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60696%3A%20n%2Fa&amp;severity=high&amp;id=69160aa2eb29b6dceb121479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60692-na-3fff8020</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60692%3A%20n%2Fa&amp;severity=high&amp;id=69160aa2eb29b6dceb121474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60691-na-61ad5377</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60691%3A%20n%2Fa&amp;severity=high&amp;id=69160aa2eb29b6dceb12146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60690-na-f5da5270</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60690%3A%20n%2Fa&amp;severity=high&amp;id=6916072eeb29b6dceb0d3f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60686-na-da6465f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60686%3A%20n%2Fa&amp;severity=medium&amp;id=6916001feb29b6dceb02d49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60685-na-a1c9c731</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60685%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a849603951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60683-na-8fbc777d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60683%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a84960394c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60682-na-e7cc3df4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60682%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a849603947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60688-na-4bb4c91d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60688%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a849603939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60687-na-2c99f993</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60687%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a849603934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60684-na-a540ae9f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60684%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a84960392f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52186-na-5a2610a9</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52186%3A%20n%2Fa&amp;severity=medium&amp;id=6915fac277eaf5a8495aabda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breaking-mpdf-with-regex-and-logic-9f99b913</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Breaking%20mPDF%20with%20regex%20and%20logic&amp;severity=medium&amp;id=69151a4aa47dcaa1fc2ad29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13076-sql-injection-in-code-projects-resp-4ce91d89</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13076%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=6915154012715e9af4610fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13075-sql-injection-in-code-projects-resp-218ac7ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13075%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=69150e3812715e9af456ea49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citrixbleed-2-wreaks-havoc-as-zero-day-bug-d3cc0456</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;CitrixBleed%202&apos;%20Wreaks%20Havoc%20as%20Zero-Day%20Bug&amp;severity=critical&amp;id=6915168512715e9af461a29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64707-cwe-863-incorrect-authorization-in--6049d360</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64707%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20frappe%20lms&amp;severity=low&amp;id=69150c3912715e9af455a30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64705-cwe-200-exposure-of-sensitive-infor-4d904d7f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64705%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20frappe%20lms&amp;severity=low&amp;id=69150c3912715e9af455a309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7326-cwe-400-uncontrolled-resource-consum-0790d07e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7326%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Seiko%20Epson%20Epson%20Stylus%20SX510W&amp;severity=high&amp;id=691509abe6b3e50d509f11ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64517-cwe-287-improper-authentication-in--83cfa17d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64517%3A%20CWE-287%3A%20Improper%20Authentication%20in%20trifectatechfoundation%20sudo-rs&amp;severity=medium&amp;id=691509abe6b3e50d509f11d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7327-cwe-22-improper-limitation-of-a-path-ba3b1530</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7327%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ozeki%20Ltd.%20Ozeki%20SMS%20Gateway&amp;severity=high&amp;id=691509abe6b3e50d509f11bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7329-cwe-306-missing-authentication-for-c-dab427df</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7329%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20tinycontrol%20Lan%20Controller&amp;severity=high&amp;id=691509abe6b3e50d509f11c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64503-cwe-787-out-of-bounds-write-in-open-a071cb62</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64503%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20OpenPrinting%20cups-filters&amp;severity=medium&amp;id=691509abe6b3e50d509f11cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/making-net-serialization-gadgets-by-hand-c34129fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Making%20.NET%20Serialization%20Gadgets%20by%20Hand&amp;severity=medium&amp;id=69150587e6b3e50d5099d1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-looks-to-dim-lighthouse-phishing-as-a-servi-7336eac2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Looks%20to%20Dim%20&apos;Lighthouse&apos;%20Phishing-as-a-Service%20Op&amp;severity=medium&amp;id=6915168512715e9af461a29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartapesg-campaign-uses-clickfix-page-to-push-net-2df7d469</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartApeSG%20campaign%20uses%20ClickFix%20page%20to%20push%20NetSupport%20RAT%2C%20(Wed%2C%20Nov%2012th)&amp;severity=medium&amp;id=691501f3e6b3e50d5094b0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64482-cwe-352-cross-site-request-forgery--3c809db6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64482%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=69150002e6b3e50d50936baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64345-cwe-362-concurrent-execution-using--0561429f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64345%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=6914fdef6c8e220c428f7f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mindgard-finds-sora-2-vulnerability-leaking-hidden-8d351166</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mindgard%20Finds%20Sora%202%20Vulnerability%20Leaking%20Hidden%20System%20Prompt%20via%20Audio&amp;severity=medium&amp;id=6914fdd96c8e220c428f7c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33119-cwe-260-password-in-configuration-f-1fc87cf9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33119%3A%20CWE-260%20Password%20in%20Configuration%20File%20in%20IBM%20QRadar%20Security%20Information%20and%20Event%20Management&amp;severity=medium&amp;id=6914fdef6c8e220c428f7f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36223-cwe-644-improper-neutralization-of--c6ee5299</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36223%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=6914f9cc6c8e220c428a4836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13063-missing-authorization-in-dinukanava-718b8562</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13063%3A%20Missing%20Authorization%20in%20DinukaNavaratna%20Dee%20Store&amp;severity=medium&amp;id=6914f9cc6c8e220c428a4830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64186-cwe-347-improper-verification-of-cr-39ffc2a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64186%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20evervault%20evervault-go&amp;severity=high&amp;id=6914f08607da5f027f55f1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13061-unrestricted-upload-in-itsourcecode-ee410065</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13061%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Online%20Voting%20System&amp;severity=medium&amp;id=6914f08607da5f027f55f1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64170-cwe-549-missing-password-field-mask-f10b3a6d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64170%3A%20CWE-549%3A%20Missing%20Password%20Field%20Masking%20in%20trifectatechfoundation%20sudo-rs&amp;severity=low&amp;id=6914f08607da5f027f55f1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46608-cwe-284-improper-access-control-in--8232e27c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46608%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Data%20Lakehouse&amp;severity=critical&amp;id=6914ed2507da5f027f521f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13060-sql-injection-in-sourcecodester-sur-29d5585e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13060%3A%20SQL%20Injection%20in%20SourceCodester%20Survey%20Application%20System&amp;severity=medium&amp;id=6914eb7ff3584f3d8b259f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13059-sql-injection-in-sourcecodester-alu-4890cf58</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13059%3A%20SQL%20Injection%20in%20SourceCodester%20Alumni%20Management%20System&amp;severity=medium&amp;id=6914eb7ff3584f3d8b259f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46427-cwe-77-improper-neutralization-of-s-2d6dcee6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46427%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=6914eb7ff3584f3d8b259f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46428-cwe-77-improper-neutralization-of-s-7ce1c2ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46428%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=6914e7f6f3584f3d8b21226f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48829-cwe-94-improper-control-of-generati-0daf5554</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48829%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=6914e7f6f3584f3d8b212272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13058-cross-site-scripting-in-soerennb-ex-6031653d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13058%3A%20Cross%20Site%20Scripting%20in%20soerennb%20eXtplorer&amp;severity=medium&amp;id=6914e278f3584f3d8b1a26ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12048-cwe-434-unrestricted-upload-of-file-463b8834</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12048%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Lenovo%20Scanner%20Pro&amp;severity=high&amp;id=6914e033789e20b800798cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12047-cwe-295-improper-certificate-valida-3e86fa86</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12047%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20Scanner%20Pro&amp;severity=medium&amp;id=6914e033789e20b800798cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10495-cwe-295-improper-certificate-valida-be9c50ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10495%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20App%20Store&amp;severity=high&amp;id=6914e033789e20b800798cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8485-cwe-276-incorrect-default-permission-7f087b8e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8485%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20App%20Store&amp;severity=high&amp;id=6914e033789e20b800798ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8421-cwe-276-incorrect-default-permission-8ff71c21</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8421%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20Dock%20Manager&amp;severity=medium&amp;id=6914e033789e20b800798cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64117-cwe-352-cross-site-request-forgery--434e3e46</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64117%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=6914e033789e20b800798ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27368-cwe-497-exposure-of-sensitive-syste-9e22d28e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27368%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=6914e033789e20b800798ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64099-cwe-74-improper-neutralization-of-s-357dce7a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64099%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20OpenIdentityPlatform%20OpenAM&amp;severity=high&amp;id=6914d9d9789e20b800721473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61667-cwe-276-incorrect-default-permissio-bfd3e499</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61667%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20DataDog%20datadog-agent&amp;severity=high&amp;id=6914d9d9789e20b800721476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57812-cwe-125-out-of-bounds-read-in-openp-058083b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57812%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OpenPrinting%20libcupsfilters&amp;severity=low&amp;id=6914d7b9e9dc40953bf857d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sues-china-based-hackers-behind-1-billion-l-6537319e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Sues%20China-Based%20Hackers%20Behind%20%241%20Billion%20Lighthouse%20Phishing%20Platform&amp;severity=high&amp;id=6914d432e9dc40953bf2f673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13057-sql-injection-in-campcodes-school-f-6d5a00c1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13057%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=6914d470e9dc40953bf3791a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkcomet-rat-resurfaces-disguised-as-bitcoin-wall-dc6222bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkComet%20RAT%20Resurfaces%20Disguised%20as%20Bitcoin%20Wallet&amp;severity=medium&amp;id=6914d432e9dc40953bf2f677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25236-cwe-204-observable-discrepancy-resp-c66f1bec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25236%3A%20CWE-204%20Observable%20Discrepancy%20Response%20in%20Omnissa%20Omnissa%20Workspace%20ONE%20UEM&amp;severity=medium&amp;id=6914cdd8e9dc40953be8734e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-exchange-under-imminent-threat-act-now-a5b8937c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Exchange%20&apos;Under%20Imminent%20Threat%2C&apos;%20Act%20Now&amp;severity=medium&amp;id=6914c49cf490e7dc3cca23ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20379-the-product-exposes-sensitive-infor-5e4e2ec7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20379%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=6914cdd8e9dc40953be87359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20378-a-web-application-accepts-a-user-co-8b2c7716</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20378%3A%20A%20web%20application%20accepts%20a%20user-controlled%20input%20that%20specifies%20a%20link%20to%20an%20external%20site%2C%20and%20uses%20that%20link%20in%20a%20Redirect.%20This%20simplifies%20phishing%20attacks.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=6914cdd8e9dc40953be87356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12649-vulnerability-in-the-canon-ttf-inte-500d6b6c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12649%3A%20vulnerability%20in%20the%20Canon%20TTF%20interpreter&amp;severity=medium&amp;id=6914bf85be619665a24c28be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13042-inappropriate-implementation-in-goo-d8b09865</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13042%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6914bbf8be619665a2474cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59089-allocation-of-resources-without-lim-7b726020</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59089%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20latchset%20kdcproxy&amp;severity=medium&amp;id=6914bbf8be619665a2474cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2843-incorrect-privilege-assignment-in-re-e0804672</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2843%3A%20Incorrect%20Privilege%20Assignment%20in%20rhobs%20observability-operator&amp;severity=high&amp;id=6914c133f490e7dc3cc5b766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59088-server-side-request-forgery-ssrf-in-bac330b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59088%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20latchset%20kdcproxy&amp;severity=high&amp;id=6914c133f490e7dc3cc5b76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinas-cyber-silence-is-more-worrying-than-russias-01abac19</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%E2%80%99s%20Cyber%20Silence%20Is%20More%20Worrying%20Than%20Russia%E2%80%99s%20Noise%2C%20Chief%20Cybersecurity%20Strategist%20Says&amp;severity=medium&amp;id=6914b867be619665a241f6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11797-cwe-416-use-after-free-in-autodesk--8ec171c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11797%3A%20CWE-416%20Use%20After%20Free%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=6914b570be619665a23e09e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11795-cwe-787-out-of-bounds-write-in-auto-c921b4c2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11795%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=6914b570be619665a23e09dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64293-cwe-89-improper-neutralization-of-s-f52b3fe7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64293%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Golemiq%200%20Day%20Analytics&amp;severity=high&amp;id=6914afd8224357dd22f5a671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-tool-uses-smart-redirects-to-bypass-detec-6d2b39b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Tool%20Uses%20Smart%20Redirects%20to%20Bypass%20Detection&amp;severity=medium&amp;id=6914b537be619665a23d4a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-ttp-based-defenses-outperform-traditional-ioc--2685c3fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20TTP-based%20Defenses%20Outperform%20Traditional%20IoC%20Hunting&amp;severity=high&amp;id=6914ac47224357dd22f05d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11367-cwe-502-deserialization-of-untruste-64bc34ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11367%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20N-able%20N-central&amp;severity=critical&amp;id=6914ac61224357dd22f06447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11366-cwe-22-improper-limitation-of-a-pat-07866850</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11366%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20N-able%20N-central&amp;severity=critical&amp;id=6914ac61224357dd22f06444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11700-cwe-611-improper-restriction-of-xml-e6e5c2c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11700%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20N-able%20N-central&amp;severity=high&amp;id=6914ac61224357dd22f0644a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9316-cwe-1284-improper-validation-of-spec-71e572e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9316%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20N-able%20N-central&amp;severity=medium&amp;id=6914a8db224357dd22ebe356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-uncovers-attacks-exploited-cisco-ise-and-ci-34fe2991</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Uncovers%20Attacks%20Exploited%20Cisco%20ISE%20and%20Citrix%20NetScaler%20as%20Zero-Day%20Flaws&amp;severity=critical&amp;id=6914a720917942a77a06bc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australias-spy-chief-warns-of-china-linked-threats-974228ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australia%E2%80%99s%20spy%20chief%20warns%20of%20China-linked%20threats%20to%20critical%20infrastructure&amp;severity=critical&amp;id=6914a720917942a77a06bc13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-use-kakaotalk-and-google-find-2e027671</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Use%20KakaoTalk%20and%20Google%20Find%20Hub%20in%20Android%20Spyware%20Attack&amp;severity=medium&amp;id=69149acae0dfecc86585b18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-uncovers-attacks-exploited-cisco-ise-and-ci-defa187e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Uncovers%20Attacks%20Exploited%20Cisco%20ISE%20and%20Citrix%20NetScaler%20as%20Zero-Day%20Flaws&amp;severity=critical&amp;id=69149bc7e0dfecc865864127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11567-cwe-276-incorrect-default-permissio-f8739d42</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11567%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=high&amp;id=691491c4e0dfecc865795596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11566-cwe-307-improper-restriction-of-exc-5193587d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11566%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=691491c4e0dfecc865795593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11565-cwe-22-improper-limitation-of-a-pat-7ea4cccf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11565%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=high&amp;id=69148b1edc194680d69bd95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sues-chinese-cybercriminals-behind-lighthou-98477771</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Sues%20Chinese%20Cybercriminals%20Behind%20%E2%80%98Lighthouse%E2%80%99%20Phishing%20Kit&amp;severity=medium&amp;id=6914878edc194680d69590be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62876-cwe-250-execution-with-unnecessary--ed4ac18e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62876%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20SUSE%20openSUSE&amp;severity=medium&amp;id=691487b6dc194680d695990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/high-severity-vulnerabilities-patched-by-ivanti-an-92daa945</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=High-Severity%20Vulnerabilities%20Patched%20by%20Ivanti%20and%20Zoom&amp;severity=high&amp;id=69147b3c73eb0cdb45ee5003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-paid-out-458000-at-live-hacking-event-98d639fa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Paid%20Out%20%24458%2C000%20at%20Live%20Hacking%20Event&amp;severity=medium&amp;id=6914728b7ef2915d491408e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12998-cwe-287-improper-authentication-in--d28b293e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12998%3A%20CWE-287%20Improper%20Authentication%20in%20TYPO3%20Extension%20%22Modules%22&amp;severity=high&amp;id=69146f167ef2915d490f0559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-directory-under-siege-why-critical-infrastr-87160f7a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Directory%20Under%20Siege%3A%20Why%20Critical%20Infrastructure%20Needs%20Stronger%20Security&amp;severity=critical&amp;id=6914773f7ef2915d491ab343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11994-cwe-79-improper-neutralization-of-i-40e30a4f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yudiz%20Easy%20Email%20Subscription&amp;severity=high&amp;id=69146d167ef2915d490dc38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11454-cwe-89-improper-neutralization-of-s-3cdc0cd4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11454%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20giuse%20Specific%20Content%20For%20Mobile%20%E2%80%93%20Customize%20the%20mobile%20version%20without%20redirections&amp;severity=medium&amp;id=69146d167ef2915d490dc387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/facebookmailcom-invites-exploited-to-phish-faceboo-833d457b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%40facebookmail.com%20Invites%20Exploited%20to%20Phish%20Facebook%20Business%20Users%20in%20Global%20Campaign&amp;severity=medium&amp;id=69146b987ef2915d490a7d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chipmaker-patch-tuesday-over-60-vulnerabilities-pa-4480d100</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chipmaker%20Patch%20Tuesday%3A%20Over%2060%20Vulnerabilities%20Patched%20by%20Intel&amp;severity=medium&amp;id=6914642aeaee7c6cd8a1da05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitcoin-queen-gets-11-years-in-prison-for-73-billi-9dca68cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CBitcoin%20Queen%E2%80%9D%20gets%2011%20years%20in%20prison%20for%20%247.3%20billion%20Bitcoin%20scam&amp;severity=high&amp;id=69146443eaee7c6cd8a1df7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-triofox-antivirus-feature-to-deploy--064fec21</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20abuse%20Triofox%20antivirus%20feature%20to%20deploy%20remote%20access%20tools&amp;severity=high&amp;id=69146443eaee7c6cd8a1df80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-fixed-a-maximum-severity-flaw-in-sql-anywhere--404d4e00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20fixed%20a%20maximum%20severity%20flaw%20in%20SQL%20Anywhere%20Monitor&amp;severity=medium&amp;id=69146443eaee7c6cd8a1df84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/synology-fixes-beestation-zero-days-demoed-at-pwn2-e3bf5817</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Synology%20fixes%20BeeStation%20zero-days%20demoed%20at%20Pwn2Own%20Ireland&amp;severity=high&amp;id=691460b1eaee7c6cd89c5415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40144-4f986a14</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40144&amp;severity=null&amp;id=69201f2edd76cb6d6068db26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40128-42733db7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40128&amp;severity=null&amp;id=69161915cdc01d12641ad2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rhadamanthys-infostealer-disrupted-as-cybercrimina-6a6155e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rhadamanthys%20infostealer%20disrupted%20as%20cybercriminals%20lose%20server%20access&amp;severity=high&amp;id=691460b1eaee7c6cd89c5419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-fixes-63-security-flaws-including-a-wind-296e00fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Fixes%2063%20Security%20Flaws%2C%20Including%20a%20Windows%20Kernel%20Zero-Day%20Under%20Active%20Attack&amp;severity=critical&amp;id=6914773f7ef2915d491ab346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37734-cwe-346-origin-validation-error-in--111ba0d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37734%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69145d30eaee7c6cd896f657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-the-link-between-two-evolving-brazilian--60c96394</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20the%20Link%20Between%20Two%20Evolving%20Brazilian%20Banking%20Trojans&amp;severity=medium&amp;id=691457ec32a6693f6a217616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12382-cwe-22-improper-limitation-of-a-pat-4e00646e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12382%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AlgoSec%20Firewall%20Analyzer&amp;severity=high&amp;id=691457fb32a6693f6a219e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-infection-vector-using-applescripts-to-bypas-5a929635</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MacOS%20Infection%20Vector%3A%20Using%20AppleScripts%20to%20bypass%20Gatekeeper&amp;severity=medium&amp;id=6914547632a6693f6a1c8ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61623-cwe-79-improper-neutralization-of-i-a8d862cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20OFBiz&amp;severity=medium&amp;id=6914547632a6693f6a1c8ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59118-cwe-434-unrestricted-upload-of-file-1421ffd0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59118%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Apache%20Software%20Foundation%20Apache%20OFBiz&amp;severity=high&amp;id=6914547632a6693f6a1c8aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11962-cwe-79-improper-neutralization-of-i-233f188e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11962%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20DivvyDrive%20Information%20Technologies%20Inc.%20Digital%20Corporate%20Warehouse&amp;severity=high&amp;id=6914547632a6693f6a1c8ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64407-cwe-862-missing-authorization-in-ap-364fe2cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64407%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=medium&amp;id=6914547632a6693f6a1c8ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64406-cwe-787-out-of-bounds-write-in-apac-e25fbb6a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64406%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=medium&amp;id=691450f332a6693f6a1683f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64405-cwe-862-missing-authorization-in-ap-8c73f704</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64405%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=high&amp;id=691450f332a6693f6a1683ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64404-cwe-862-missing-authorization-in-ap-6bbd619d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64404%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=high&amp;id=691450f332a6693f6a1683eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64403-cwe-862-missing-authorization-in-ap-0a2cddc0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64403%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=high&amp;id=691450f332a6693f6a1683e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64402-cwe-862-missing-authorization-in-ap-dfd30df6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64402%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=medium&amp;id=691450f332a6693f6a1683e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64401-cwe-862-missing-authorization-in-ap-e28401a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64401%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=high&amp;id=69144e2332a6693f6a14571c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-launches-private-ai-compute-secure-ai-proce-dbebb724</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Launches%20&apos;Private%20AI%20Compute&apos;%20%E2%80%94%20Secure%20AI%20Processing%20with%20On-Device-Level%20Privacy&amp;severity=medium&amp;id=691458e032a6693f6a225981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12903-cwe-639-authorization-bypass-throug-f2db291a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12903%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20paymentplugins%20Payment%20Plugins%20Braintree%20For%20WooCommerce&amp;severity=high&amp;id=6914483ad823118ac8c87d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12732-cwe-200-exposure-of-sensitive-infor-dc8d38f7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12732%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=medium&amp;id=6914483ad823118ac8c87d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-addressed-by-sie-fae2a683</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Addressed%20by%20Siemens%2C%20Rockwell%2C%20Aveva%2C%20Schneider&amp;severity=medium&amp;id=69144422d823118ac8c2feb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13047-cwe-89-improper-neutralization-of-s-c96c5d17</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13047&amp;severity=null&amp;id=691442b3d823118ac8c20f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13046-cwe-89-improper-neutralization-of-s-92a0314c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13046&amp;severity=null&amp;id=69143f7a41f31825271e58d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12872-cwe-79-improper-neutralization-of-i-a2eb0040</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12872%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20aEnrich%20a%2BHRD&amp;severity=medium&amp;id=69143f7a41f31825271e58da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12871-cwe-1390-weak-authentication-in-aen-ea6bb62a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12871%3A%20CWE-1390%20Weak%20Authentication%20in%20aEnrich%20a%2BHRD&amp;severity=critical&amp;id=69143bf741f3182527191a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12870-cwe-1390-weak-authentication-in-aen-ba4648c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12870%3A%20CWE-1390%20Weak%20Authentication%20in%20aEnrich%20a%2BHRD&amp;severity=critical&amp;id=69143bf741f3182527191a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12869-cwe-79-improper-neutralization-of-i-c20f7fba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20aEnrich%20a%2BHRD&amp;severity=medium&amp;id=6914387341f318252713cf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12018-cwe-79-improper-neutralization-of-i-755afbb2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12018%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sourcefound%20MembershipWorks%20%E2%80%93%20Membership%2C%20Events%20%26%20Directory&amp;severity=medium&amp;id=6914387341f318252713cf45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12113-cwe-862-missing-authorization-in-we-f835ba61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12113%3A%20CWE-862%20Missing%20Authorization%20in%20webtoffee%20Alt%20Text%20Generator%20AI%20%E2%80%93%20Auto%20Generate%20%26%20Bulk%20Update%20Alt%20Texts%20For%20Images&amp;severity=medium&amp;id=6914387341f318252713cf4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12633-cwe-862-missing-authorization-in-st-96b3459f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12633%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Bookit%20%E2%80%94%20Booking%20%26%20Appointment%20Calendar&amp;severity=high&amp;id=6914387341f318252713cf51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/no-leak-no-problem-bypassing-aslr-with-a-rop-chain-7255e599</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=No%20Leak%2C%20No%20Problem%20-%20Bypassing%20ASLR%20with%20a%20ROP%20Chain%20to%20Gain%20RCE&amp;severity=medium&amp;id=6914387341f318252713cf31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11560-cwe-79-cross-site-scripting-xss-in--6bb1e9bf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11560%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Team%20Members%20Showcase&amp;severity=high&amp;id=691423e692108619e6de5f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12901-cwe-352-cross-site-request-forgery--d1cca107</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12901%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20asgaros%20Asgaros%20Forum&amp;severity=medium&amp;id=691410463f7e91646d5ffa33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12833-cwe-639-authorization-bypass-throug-ce618d2b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12833%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20paoltaia%20GeoDirectory%20%E2%80%93%20WP%20Business%20Directory%20Plugin%20and%20Classified%20Listings%20Directory&amp;severity=medium&amp;id=691410463f7e91646d5ffa2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12087-cwe-639-authorization-bypass-throug-7a161748</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12087%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20acowebs%20Wishlist%20and%20Save%20for%20later%20for%20Woocommerce&amp;severity=medium&amp;id=691410463f7e91646d5ffa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54983-cwe-772-missing-release-of-resource-4fd2fbab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54983%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Zscaler%20Zscaler%20Client%20Connector&amp;severity=medium&amp;id=6913fe4faf9b993b90ac5582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43205-an-app-may-be-able-to-bypass-aslr-i-e8289a95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43205%3A%20An%20app%20may%20be%20able%20to%20bypass%20ASLR%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6913d87f385fb4be458c9b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-12-ed7d1e08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-12&amp;severity=medium&amp;id=6915213aa47dcaa1fc35ec0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63645-na-80d499e0</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63645%3A%20n%2Fa&amp;severity=medium&amp;id=6914fdef6c8e220c428f7f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63396-na-e796c969</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63396%3A%20n%2Fa&amp;severity=low&amp;id=6914f6446c8e220c4284c5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57310-na-07f36aab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57310%3A%20n%2Fa&amp;severity=high&amp;id=6914dcae789e20b800748ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56385-na-a308a841</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56385%3A%20n%2Fa&amp;severity=critical&amp;id=6914dcae789e20b800748adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63929-na-0913a1c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63929%3A%20n%2Fa&amp;severity=high&amp;id=6914d9d9789e20b800721479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63679-na-7907f420</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63679%3A%20n%2Fa&amp;severity=critical&amp;id=6914d9d9789e20b80072146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63927-na-40eb4cfe</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63927%3A%20n%2Fa&amp;severity=medium&amp;id=6914d7b9e9dc40953bf857e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60646-na-dcb90289</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60646%3A%20n%2Fa&amp;severity=medium&amp;id=6914d470e9dc40953bf37921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63811-na-c3a5e037</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63811%3A%20n%2Fa&amp;severity=high&amp;id=6914cdd8e9dc40953be8735c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65001-cwe-787-out-of-bounds-write-in-fuji-97cfedd6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65001%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Fujitsu%20fbiosdrv.sys&amp;severity=high&amp;id=6914cdd8e9dc40953be87352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60645-na-7f73a914</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60645%3A%20n%2Fa&amp;severity=medium&amp;id=6914cdd8e9dc40953be8734a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65002-cwe-863-incorrect-authorization-in--95cbd85a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65002%3A%20CWE-863%20Incorrect%20Authorization%20in%20Fujitsu%20%2F%20Fsas%20Technologies%20iRMC&amp;severity=high&amp;id=6914cbb4f490e7dc3cd418cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52331-na-441e461c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52331%3A%20n%2Fa&amp;severity=medium&amp;id=6914c133f490e7dc3cc5b761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63419-na-bf10203e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63419%3A%20n%2Fa&amp;severity=medium&amp;id=6914bf7cbe619665a24c2606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59491-na-253f7347</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59491%3A%20n%2Fa&amp;severity=medium&amp;id=6914b570be619665a23e09e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64281-na-f0518d84</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64281%3A%20n%2Fa&amp;severity=critical&amp;id=6914b35c224357dd22fa7e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64280-na-36a9403c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64280%3A%20n%2Fa&amp;severity=critical&amp;id=6914b35c224357dd22fa7e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63353-na-0a4b09fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63353%3A%20n%2Fa&amp;severity=critical&amp;id=6914b35c224357dd22fa7e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63289-na-2259ad26</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63289%3A%20n%2Fa&amp;severity=critical&amp;id=6914afd8224357dd22f5a66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63666-na-e05fd733</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63666%3A%20n%2Fa&amp;severity=critical&amp;id=6914a3a0917942a77a010ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63667-na-8345481e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63667%3A%20n%2Fa&amp;severity=high&amp;id=69149adfe0dfecc86585ba9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-29-vulnerabilities-1ba101c1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%2029%20Vulnerabilities&amp;severity=medium&amp;id=6913a8b3768d655a7be2ad49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-actively-exploited-windows-kerne-a7d7d5c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Actively%20Exploited%20Windows%20Kernel%20Zero-Day&amp;severity=medium&amp;id=6913a538768d655a7bdc570b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61835-integer-underflow-wrap-or-wraparoun-4bce971a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61835%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6913a41ef4d5bbdab5b686f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61833-out-of-bounds-read-cwe-125-in-adobe-0c3f2afd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61833%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6913a41ef4d5bbdab5b686ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64531-use-after-free-cwe-416-in-adobe-sub-e8ed0aae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64531%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6913a41ef4d5bbdab5b686f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61834-use-after-free-cwe-416-in-adobe-sub-43e653f2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61834%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6913a41ef4d5bbdab5b686ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patch-now-microsoft-flags-zero-day-amp-critical-ze-fee5fd63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patch%20Now%3A%20Microsoft%20Flags%20Zero-Day%20%26amp%3B%20Critical%20Zero-Click%20Bugs&amp;severity=critical&amp;id=6913dd72385fb4be4590de3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40827-cwe-427-uncontrolled-search-path-el-5d011f68</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40827%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20Siemens%20Software%20Center&amp;severity=high&amp;id=6913a08cf4d5bbdab5b1c76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40817-cwe-306-missing-authentication-for--2559547b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40817%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20LOGO!%2012%2F24RCE&amp;severity=medium&amp;id=6913a08cf4d5bbdab5b1c76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40816-cwe-306-missing-authentication-for--4b35fe39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40816%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20LOGO!%2012%2F24RCE&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40815-cwe-120-buffer-copy-without-checkin-cef0120a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40815%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Siemens%20LOGO!%2012%2F24RCE&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40763-cwe-427-uncontrolled-search-path-el-b781678a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40763%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20Altair%20Grid%20Engine&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40760-cwe-209-generation-of-error-message-f1bb3cc6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40760%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Siemens%20Altair%20Grid%20Engine&amp;severity=medium&amp;id=6913a08bf4d5bbdab5b1c73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40744-cwe-295-improper-certificate-valida-c42cb791</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40744%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20Solid%20Edge%20SE2025&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32014-cwe-732-incorrect-permission-assign-1f4b4046</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32014%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20Spectrum%20Power%204&amp;severity=medium&amp;id=6913a08bf4d5bbdab5b1c734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32011-cwe-829-inclusion-of-functionality--9532e1cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32011%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Siemens%20Spectrum%20Power%204&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32010-cwe-732-incorrect-permission-assign-04b2acf1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32010%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20Spectrum%20Power%204&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32009-cwe-266-incorrect-privilege-assignm-ca1262db</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32009%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Siemens%20Spectrum%20Power%204&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32008-cwe-648-incorrect-use-of-privileged-4ec5bdd3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32008%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Siemens%20Spectrum%20Power%204&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41116-cwe-653-in-grafana-labs-grafana-dat-8cc4fcf0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41116%3A%20CWE-653%20in%20Grafana%20Labs%20Grafana%20Databricks%20Datasource%20Plugin&amp;severity=low&amp;id=6913a6d6768d655a7be0441c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3717-cwe-653-in-grafana-labs-grafana-snow-c766e893</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3717%3A%20CWE-653%20in%20Grafana%20Labs%20Grafana%20Snowflake%20Datasource%20Plugin&amp;severity=low&amp;id=6913a6d6768d655a7be04419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12748-allocation-of-resources-without-lim-09c56e7a</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12748%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=6913946b553a74ed95f8eddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cl0p-ransomware-lists-nhs-uk-as-victim-days-after--a7fe826e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cl0p%20Ransomware%20Lists%20NHS%20UK%20as%20Victim%2C%20Days%20After%20Washington%20Post%20Breach&amp;severity=high&amp;id=69139457553a74ed95f8cf6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-for-november-2025-tue-nov--3fb8b7ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20for%20November%202025%2C%20(Tue%2C%20Nov%2011th)&amp;severity=critical&amp;id=691390c8553a74ed95f3a54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61843-out-of-bounds-read-cwe-125-in-adobe-03f74a3c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61843%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61839-out-of-bounds-read-cwe-125-in-adobe-eaa4dd99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61839%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=high&amp;id=691388803abd2cedbf57e43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61845-out-of-bounds-read-cwe-125-in-adobe-50dacef5</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61845%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61840-out-of-bounds-read-cwe-125-in-adobe-d72212a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61840%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61837-heap-based-buffer-overflow-cwe-122--8f979584</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61837%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Format%20Plugins&amp;severity=high&amp;id=691388803abd2cedbf57e435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61838-heap-based-buffer-overflow-cwe-122--e6457f48</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61838%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Format%20Plugins&amp;severity=high&amp;id=691388803abd2cedbf57e438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61841-out-of-bounds-read-cwe-125-in-adobe-b5d14a08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61841%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61842-use-after-free-cwe-416-in-adobe-for-e86f2f68</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61842%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61844-out-of-bounds-read-cwe-125-in-adobe-9df87e2c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61844%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-malware-maverick-hijacks-browser-sessions-c711f61c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Malware%20&apos;Maverick&apos;%20Hijacks%20Browser%20Sessions%20to%20Target%20Brazil&apos;s%20Biggest%20Banks&amp;severity=medium&amp;id=6913dcc3385fb4be45906327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61830-incorrect-authorization-cwe-863-in--e211b755</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61830%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Pass&amp;severity=high&amp;id=69138f06553a74ed95f238b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-fake-hotel-domains-used-in-massive-ph-e00a9ed9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20Fake%20Hotel%20Domains%20Used%20in%20Massive%20Phishing%20Campaign&amp;severity=medium&amp;id=69138101c532f1ef717691b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30398-cwe-862-missing-authorization-in-mi-8525b819</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30398%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Nuance%20PowerScribe%20360%20version%204.0.1&amp;severity=high&amp;id=69137c4747ab3590319da053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62453-cwe-1426-improper-validation-of-gen-c5c18320</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62453%3A%20CWE-1426%3A%20Improper%20Validation%20of%20Generative%20AI%20Output%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=medium&amp;id=69137c4d47ab3590319dbf81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60721-cwe-270-privilege-context-switching-2ca92e32</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60721%3A%20CWE-270%3A%20Privilege%20Context%20Switching%20Error%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69137c4a47ab3590319da0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62449-cwe-22-improper-limitation-of-a-pat-b9158742</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62449%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=medium&amp;id=69137c4d47ab3590319dbf73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62222-cwe-77-improper-neutralization-of-s-4f6c6b06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62222%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=high&amp;id=69137c4c47ab3590319dbefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62213-cwe-416-use-after-free-in-microsoft-15624c49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62213%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4c47ab3590319dbee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62215-cwe-362-concurrent-execution-using--7521150c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62215%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4c47ab3590319dbeea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62214-cwe-77-improper-neutralization-of-s-451fb3bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62214%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.14&amp;severity=medium&amp;id=69137c4c47ab3590319dbee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62211-cwe-79-improper-neutralization-of-i-a2d38082</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62211%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Dynamics%20365%20Field%20Service%20(online)&amp;severity=high&amp;id=69137c4c47ab3590319dbee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59499-cwe-89-improper-neutralization-of-s-75128a85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59499%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=69137c4747ab3590319da05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62209-cwe-532-insertion-of-sensitive-info-a7be5b0f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62209%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69137c4b47ab3590319dbec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62208-cwe-532-insertion-of-sensitive-info-253717a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62208%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69137c4b47ab3590319dbec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62205-cwe-416-use-after-free-in-microsoft-e7ece5c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62205%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62204-cwe-502-deserialization-of-untruste-3c39ca12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62204%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69137c4b47ab3590319dbeb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62203-cwe-416-use-after-free-in-microsoft-ba882bb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62203%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62202-cwe-125-out-of-bounds-read-in-micro-4c651779</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62202%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbeb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62201-cwe-122-heap-based-buffer-overflow--f185cded</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62201%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbeaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62200-cwe-822-untrusted-pointer-dereferen-f58e1ae8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62200%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbeac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60724-cwe-122-heap-based-buffer-overflow--8ba2b170</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60724%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=critical&amp;id=69137c4a47ab3590319da106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60723-cwe-362-concurrent-execution-using--d608174f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60723%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69137c4a47ab3590319da103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60720-cwe-126-buffer-over-read-in-microso-b5cb5d56</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60720%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4a47ab3590319da0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60718-cwe-426-untrusted-search-path-in-mi-d3103e9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60718%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69137c4947ab3590319da0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60717-cwe-416-use-after-free-in-microsoft-5c22b32d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60717%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4947ab3590319da0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60716-cwe-416-use-after-free-in-microsoft-09a4fcf1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60716%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4947ab3590319da0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60715-cwe-122-heap-based-buffer-overflow--fce55c24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60715%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4947ab3590319da0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60714-cwe-122-heap-based-buffer-overflow--eec556c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60714%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4947ab3590319da0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60713-cwe-822-untrusted-pointer-dereferen-706dbdb7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60713%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=69137c4947ab3590319da0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59515-cwe-416-use-after-free-in-microsoft-70863b22</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59515%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4847ab3590319da094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59514-cwe-269-improper-privilege-manageme-2f9942ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59514%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47179-cwe-284-improper-access-control-in--e51584e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47179%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=medium&amp;id=69137c4747ab3590319da056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59240-cwe-200-exposure-of-sensitive-infor-b10b8291</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59240%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=69137c4747ab3590319da059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62452-cwe-122-heap-based-buffer-overflow--5bb3b416</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62452%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4d47ab3590319dbf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62220-cwe-122-heap-based-buffer-overflow--d16614f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62220%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Subsystem%20for%20Linux%20GUI&amp;severity=high&amp;id=69137c4c47ab3590319dbef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62219-cwe-415-double-free-in-microsoft-wi-61854063</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62219%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4c47ab3590319dbef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62218-cwe-362-concurrent-execution-using--2046682f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62218%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4c47ab3590319dbef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62217-cwe-362-concurrent-execution-using--d5272c53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62217%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4c47ab3590319dbef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60722-cwe-22-improper-limitation-of-a-pat-0c579c8a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60722%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20OneDrive%20for%20Android&amp;severity=medium&amp;id=69137c4a47ab3590319da100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60719-cwe-822-untrusted-pointer-dereferen-1ca968ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60719%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4a47ab3590319da0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62216-cwe-416-use-after-free-in-microsoft-72cd18bd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62216%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4c47ab3590319dbeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62210-cwe-79-improper-neutralization-of-i-35018d6f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62210%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Dynamics%20365%20Field%20Service%20(online)&amp;severity=high&amp;id=69137c4b47ab3590319dbec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62206-cwe-200-exposure-of-sensitive-infor-08dd1692</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62206%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=medium&amp;id=69137c4b47ab3590319dbebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62199-cwe-416-use-after-free-in-microsoft-562e5d11</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62199%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4a47ab3590319da112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60728-cwe-822-untrusted-pointer-dereferen-9cdfe06a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60728%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=69137c4a47ab3590319da10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60727-cwe-125-out-of-bounds-read-in-micro-b5bf22ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60727%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4a47ab3590319da10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60726-cwe-125-out-of-bounds-read-in-micro-883f7fd8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60726%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4a47ab3590319da109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60710-cwe-59-improper-link-resolution-bef-960ec2ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60710%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69137c4947ab3590319da0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60709-cwe-125-out-of-bounds-read-in-micro-e44aac41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60709%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4947ab3590319da0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60708-cwe-822-untrusted-pointer-dereferen-c673c25b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60708%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69137c4947ab3590319da0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60707-cwe-416-use-after-free-in-microsoft-ec18a66e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60707%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4947ab3590319da0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60706-cwe-125-out-of-bounds-read-in-micro-61b4092d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60706%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69137c4847ab3590319da0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60705-cwe-284-improper-access-control-in--49429161</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60705%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60704-cwe-325-missing-cryptographic-step--7deb0de7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60704%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60703-cwe-822-untrusted-pointer-dereferen-8d7f0efb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60703%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59513-cwe-125-out-of-bounds-read-in-micro-ad738bd3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59513%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69137c4847ab3590319da08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59512-cwe-284-improper-access-control-in--978ed218</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59512%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59511-cwe-73-external-control-of-file-nam-f7bae898</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59511%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4847ab3590319da088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59510-cwe-59-improper-link-resolution-bef-cdae5dd5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59510%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69137c4847ab3590319da085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59509-cwe-201-insertion-of-sensitive-info-c39115d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59509%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69137c4747ab3590319da06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59508-cwe-362-concurrent-execution-using--cf0c4445</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59508%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4747ab3590319da06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59507-cwe-362-concurrent-execution-using--2d6ff914</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59507%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4747ab3590319da068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59506-cwe-362-concurrent-execution-using--ff15ce0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59506%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4747ab3590319da065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59505-cwe-415-double-free-in-microsoft-wi-b513b0fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59505%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4747ab3590319da062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59504-cwe-122-heap-based-buffer-overflow--8277f06c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59504%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=69137c4747ab3590319da05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-cpu-spike-led-to-uncovering-a-ransomhub-rans-5e444c90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20CPU%20spike%20led%20to%20uncovering%20a%20RansomHub%20ransomware%20attack&amp;severity=high&amp;id=691378bc47ab359031985a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fantasy-hub-russian-sold-android-rat-boasts-full-d-d86dfbe8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fantasy%20Hub%3A%20Russian-sold%20Android%20RAT%20boasts%20full%20device%20espionage%20as%20MaaS&amp;severity=medium&amp;id=691378bc47ab359031985a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/globallogic-warns-10000-employees-of-data-theft-af-9afa4caf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlobalLogic%20warns%2010%2C000%20employees%20of%20data%20theft%20after%20Oracle%20breach&amp;severity=high&amp;id=691378bc47ab359031985a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-fixes-hardcoded-credentials-flaw-in-sql-anywhe-870f228c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20fixes%20hardcoded%20credentials%20flaw%20in%20SQL%20Anywhere%20Monitor&amp;severity=high&amp;id=691378bc47ab359031985a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61828-out-of-bounds-write-cwe-787-in-adob-0a1b3006</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61828%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab35903198925f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61827-heap-based-buffer-overflow-cwe-122--1f2b3e62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61827%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab35903198925c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61826-integer-underflow-wrap-or-wraparoun-1fda6622</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61826%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab359031989259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61829-heap-based-buffer-overflow-cwe-122--a60a22ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61829%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab359031989262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61836-integer-underflow-wrap-or-wraparoun-ce469a8d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61836%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab359031989265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61831-out-of-bounds-write-cwe-787-in-adob-39b629ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61831%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=6913708312d2ca32afd4839d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61820-heap-based-buffer-overflow-cwe-122--2f685b7f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61820%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=6913708312d2ca32afd4839a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61819-heap-based-buffer-overflow-cwe-122--a81afdd0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61819%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=6913708312d2ca32afd48397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61818-use-after-free-cwe-416-in-adobe-inc-9a125929</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61818%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=6913708312d2ca32afd483b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61816-heap-based-buffer-overflow-cwe-122--3ae891ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61816%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=6913708312d2ca32afd483b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61817-use-after-free-cwe-416-in-adobe-inc-f2746b1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61817%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=6913708312d2ca32afd483b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61815-use-after-free-cwe-416-in-adobe-ind-64faab50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61815%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=6913708312d2ca32afd483ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61814-use-after-free-cwe-416-in-adobe-ind-4fc45bc9</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61814%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=6913708312d2ca32afd483aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61824-heap-based-buffer-overflow-cwe-122--febaaebc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61824%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=6913708412d2ca32afd483f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61832-heap-based-buffer-overflow-cwe-122--63497d09</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61832%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=6913708412d2ca32afd483f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35972-escalation-of-privilege-in-intel-mp-acf53ddd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35972%3A%20Escalation%20of%20Privilege%20in%20Intel%20MPI%20Library&amp;severity=medium&amp;id=69136b7412d2ca32afccdbd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35971-denial-of-service-in-intelr-prosetw-7875367c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35971%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7412d2ca32afccdbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35968-escalation-of-privilege-in-slim-boo-9651f763</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35968%3A%20Escalation%20of%20Privilege%20in%20Slim%20Bootloader&amp;severity=high&amp;id=69136b7412d2ca32afccdbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35967-denial-of-service-in-intelr-prosetw-e50f67d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35967%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7312d2ca32afccdbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35963-denial-of-service-in-intelr-prosetw-d0026c7c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35963%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7312d2ca32afccdbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33029-denial-of-service-in-intelr-prosetw-b49d631f</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33029%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7312d2ca32afccdba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33000-escalation-of-privilege-in-intel-qu-c3f7f00f</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33000%3A%20Escalation%20of%20Privilege%20in%20Intel%20QuickAssist%20Technology&amp;severity=high&amp;id=69136b7312d2ca32afccdba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32732-denial-of-service-in-intelr-qat-win-32ff3334</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32732%3A%20Denial%20of%20Service%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32449-escalation-of-privilege-in-pri-driv-cf66d30d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32449%3A%20Escalation%20of%20Privilege%20in%20PRI%20Driver%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32446-escalation-of-privilege-in-intel-qu-1fdc9a05</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32446%3A%20Escalation%20of%20Privilege%20in%20Intel%20QuickAssist%20Technology%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdb9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32091-escalation-of-privilege-in-intelr-a-38abb795</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32091%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Arc(TM)%20B-series%20GPUs&amp;severity=high&amp;id=69136b7312d2ca32afccdb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32088-denial-of-service-in-intelr-qat-win-08e42ed0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32088%3A%20Denial%20of%20Service%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdb96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32038-escalation-of-privilege-in-intel-on-60fbd012</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32038%3A%20Escalation%20of%20Privilege%20in%20Intel%20oneAPI%20DPC%2B%2BC%2B%2B%20Compiler%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32037-denial-of-service-in-intelr-present-b87c2c07</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32037%3A%20Denial%20of%20Service%20in%20Intel(R)%20PresentMon&amp;severity=low&amp;id=69136b7212d2ca32afccdb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32001-escalation-of-privilege-in-intelr-p-2194e05c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32001%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processor%20Identification%20Utility&amp;severity=medium&amp;id=69136b7212d2ca32afccdb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31948-denial-of-service-in-intelr-oneapi--822c6ab0</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31948%3A%20Denial%20of%20Service%20in%20Intel(R)%20oneAPI%20Math%20Kernel%20Library&amp;severity=medium&amp;id=69136b7212d2ca32afccdb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31940-escalation-of-privilege-in-intelr-t-14e4ce0f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31940%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Thread%20Director%20Visualizer%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31937-denial-of-service-in-intelr-qat-win-04c54dd1</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31937%3A%20Denial%20of%20Service%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31931-escalation-of-privilege-in-instrume-3f52a2f3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31931%3A%20Escalation%20of%20Privilege%20in%20Instrumentation%20and%20Tracing%20Technology%20API%20(ITT%20API)%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31647-escalation-of-privilege-in-intelr-g-3b5ecd31</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31647%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31645-escalation-of-privilege-in-system-e-f675cca3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31645%3A%20Escalation%20of%20Privilege%20in%20System%20Event%20Log%20Viewer%20Utility%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31146-denial-of-service-in-intel-ethernet-b5c6db02</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31146%3A%20Denial%20of%20Service%20in%20Intel%20Ethernet%20Adapter%20Complete%20Driver%20Pack%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30518-escalation-of-privilege-in-intelr-p-b54ab4da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30518%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20PresentMon&amp;severity=medium&amp;id=69136b7212d2ca32afccdb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30509-escalation-of-privilege-in-intel-qu-bd0a2da1</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30509%3A%20Escalation%20of%20Privilege%20in%20Intel%20QuickAssist%20Technology%20software&amp;severity=medium&amp;id=69136b7112d2ca32afccdb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30506-escalation-of-privilege-in-intel-dr-7d6cb8b5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30506%3A%20Escalation%20of%20Privilege%20in%20Intel%20Driver%20and%20Support%20Assistant&amp;severity=medium&amp;id=69136b7112d2ca32afccdb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30255-denial-of-service-in-intelr-prosetw-cc867c50</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30255%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7112d2ca32afccdb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30185-escalation-of-privilege-denial-of-s-b3a276e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30185%3A%20Escalation%20of%20Privilege%2C%20Denial%20of%20Service%20in%20Intel%20UEFI%20reference%20platforms&amp;severity=high&amp;id=69136b7112d2ca32afccdb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30182-escalation-of-privilege-in-intelr-d-a260cdaa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30182%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Distribution%20for%20Python%20software%20installers&amp;severity=medium&amp;id=69136b7112d2ca32afccdb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27725-denial-of-service-in-acat-00c9bfdc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27725%3A%20Denial%20of%20Service%20in%20ACAT&amp;severity=medium&amp;id=69136b7112d2ca32afccdb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27713-escalation-of-privilege-in-intelr-q-82aef77d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27713%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=high&amp;id=69136b7112d2ca32afccdb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27712-escalation-of-privilege-in-intelr-n-1ad547b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27712%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Neural%20Compressor%20software&amp;severity=low&amp;id=69136b7112d2ca32afccdb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27711-escalation-of-privilege-in-intelr-o-82feefe9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27711%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20One%20Boot%20Flash%20Update%20(Intel(R)%20OFU)%20software&amp;severity=medium&amp;id=69136b7112d2ca32afccdb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27710-information-disclosure-in-intelr-qa-6549795c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27710%3A%20Information%20Disclosure%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7112d2ca32afccdb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27249-denial-of-service-in-gaudi-software-d11bd282</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27249%3A%20Denial%20of%20Service%20in%20Gaudi%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27246-escalation-of-privilege-in-intelr-p-0c902e99</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27246%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processor%20Identification%20Utility&amp;severity=medium&amp;id=69136b7012d2ca32afccdb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26694-denial-of-service-in-intelr-qat-win-81832c6b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26694%3A%20Denial%20of%20Service%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26405-denial-of-service-in-intelr-npu-dri-98e2aefe</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26405%3A%20Denial%20of%20Service%20in%20Intel(R)%20NPU%20Drivers&amp;severity=medium&amp;id=69136b7012d2ca32afccdb1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26402-denial-of-service-in-intelr-npu-dri-b1326d94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26402%3A%20Denial%20of%20Service%20in%20Intel(R)%20NPU%20Drivers&amp;severity=medium&amp;id=69136b7012d2ca32afccdb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25216-denial-of-service-in-intelr-graphic-ac4c5817</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25216%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers%20and%20Intel%20LTS%20kernels&amp;severity=low&amp;id=69136b7012d2ca32afccdb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25059-escalation-of-privilege-in-intelr-o-187efdc3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25059%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20One%20Boot%20Flash%20Update%20(Intel(R)%20OFU)%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24918-escalation-of-privilege-in-intelr-s-f51758fe</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24918%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Server%20Configuration%20Utility%20software%20and%20Intel(R)%20Server%20Firmware%20Update%20Utility%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24863-information-disclosure-in-intelr-ci-d65844a5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24863%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24862-escalation-of-privilege-in-intelr-c-06fd24ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24862%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=low&amp;id=69136b7012d2ca32afccdb09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24848-escalation-of-privilege-in-intelr-c-c354dfb7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24848%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24847-information-disclosure-in-intelr-ci-c9aaed07</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24847%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24842-escalation-of-privilege-in-intelr-s-67f94b52</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24842%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20System%20Support%20Utility&amp;severity=medium&amp;id=69136b6f12d2ca32afccda45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24838-escalation-of-privilege-in-intelr-c-dba81dfd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24838%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=high&amp;id=69136b6f12d2ca32afccda42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24834-information-disclosure-in-intelr-ci-17d21ff2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24834%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24519-escalation-of-privilege-in-intelr-q-35ef233f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24519%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24516-information-disclosure-in-intelr-ci-63f9097b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24516%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24512-denial-of-service-in-intelr-prosetw-e1e0284f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24512%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=medium&amp;id=69136b6f12d2ca32afccda36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24491-escalation-of-privilege-in-intelr-k-d0738585</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24491%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Killer(TM)%20Performance%20Suite%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24327-escalation-of-privilege-in-intelr-r-0c3503a2</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24327%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Rapid%20Storage%20Technology%20Application&amp;severity=medium&amp;id=69136b6f12d2ca32afccda30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24314-information-disclosure-in-intelr-ci-fed80f06</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24314%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=low&amp;id=69136b6e12d2ca32afccda17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24307-escalation-of-privilege-in-intelr-c-ef5c664d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24307%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=low&amp;id=69136b6e12d2ca32afccda14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24299-escalation-of-privilege-in-intelr-c-0c4793b3</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24299%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=high&amp;id=69136b6e12d2ca32afccda11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22391-escalation-of-privilege-in-sigtest-27512e47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22391%3A%20Escalation%20of%20Privilege%20in%20SigTest&amp;severity=medium&amp;id=69136b6e12d2ca32afccda0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20622-information-disclosure-in-intelr-np-2bd612de</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20622%3A%20Information%20Disclosure%20in%20Intel(R)%20NPU%20Drivers%20for%20Windows&amp;severity=low&amp;id=69136b6e12d2ca32afccda0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20614-escalation-of-privilege-in-intelr-c-fdeaefb5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20614%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6e12d2ca32afccda08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20065-escalation-of-privilege-in-display--264465b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20065%3A%20Escalation%20of%20Privilege%20in%20Display%20Virtualization%20for%20Windows%20OS%20software&amp;severity=medium&amp;id=69136b6e12d2ca32afccda05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20056-escalation-of-privilege-in-intel-vt-f4012e36</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20056%3A%20Escalation%20of%20Privilege%20in%20Intel%20VTune%20Profiler&amp;severity=medium&amp;id=69136b6e12d2ca32afccda02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20050-escalation-of-privilege-in-intelr-c-8e0ae3af</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20050%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6e12d2ca32afccd9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20010-escalation-of-privilege-in-intelr-p-5e178b63</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20010%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processor%20Identification%20Utility&amp;severity=high&amp;id=69136b6e12d2ca32afccd9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-the-pixnapping-vulnerability-and-how-to-pr-f86fdfc6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20the%20Pixnapping%20vulnerability%2C%20and%20how%20to%20protect%20your%20Android%20smartphone%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69136631f922b639ab601387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33186-cwe-798-use-of-hard-coded-credentia-acf2a764</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33186%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20NVIDIA%20AuthN%20component%20of%20NVIDIA%20AIStore&amp;severity=high&amp;id=69136629f922b639ab60127a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33185-cwe-862-missing-authorization-in-nv-0993ca5d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33185%3A%20CWE-862%20Missing%20Authorization%20in%20NVIDIA%20AuthN%20component%20of%20NVIDIA%20AIStore&amp;severity=medium&amp;id=69136629f922b639ab601275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33202-cwe-121-stack-based-buffer-overflow-bb587535</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33202%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=69136629f922b639ab60127f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33178-cwe-94-improper-control-of-generati-31cf333e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33178%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69136629f922b639ab601270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23361-cwe-94-improper-control-of-generati-b574a985</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23361%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69136629f922b639ab60126b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12944-cwe-20-improper-input-validation-in-3dd765ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12944%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20DGN2200v4&amp;severity=medium&amp;id=69136629f922b639ab601267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12943-cwe-295-improper-certificate-valida-ab25bf56</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12943%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20NETGEAR%20RAX30&amp;severity=medium&amp;id=69136629f922b639ab601262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12942-cwe-20-improper-input-validation-in-712ef338</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12942%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20R6260&amp;severity=medium&amp;id=69136629f922b639ab60125d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12940-cwe-532-insertion-of-sensitive-info-0c2878b9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12940%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20NETGEAR%20WAX610&amp;severity=low&amp;id=691362a4f922b639ab5baf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23357-cwe-94-improper-control-of-generati-028ccdb8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23357%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=691362a4f922b639ab5baf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13032-cwe-367-time-of-check-time-of-use-t-193bf47e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13032%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Avast%20(Free%2FPremiium%2FUltimeat)%20Antivirus&amp;severity=critical&amp;id=691362a4f922b639ab5baf6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10905-cwe-693-protection-mechanism-failur-c43ff941</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10905%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20Avast%20Free%20Antivirus&amp;severity=medium&amp;id=69135f1ef922b639ab566fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13027-vulnerability-in-mozilla-firefox-993e9be1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13027%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d98f922b639ab555fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13020-vulnerability-in-mozilla-firefox-9ceb3403</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13020%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13019-vulnerability-in-mozilla-firefox-50a90c9a</loc>
    <lastmod>2026-04-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13019%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13018-vulnerability-in-mozilla-firefox-246cf439</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13018%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13017-vulnerability-in-mozilla-firefox-25d14d7b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13017%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13026-vulnerability-in-mozilla-firefox-81f48656</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13026%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d98f922b639ab555fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13025-vulnerability-in-mozilla-firefox-086538a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13025%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d98f922b639ab555fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13024-vulnerability-in-mozilla-firefox-be9a6062</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13024%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d98f922b639ab555fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13016-vulnerability-in-mozilla-firefox-467f579b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13016%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13023-vulnerability-in-mozilla-firefox-4fe99db0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13023%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d98f922b639ab555fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13022-vulnerability-in-mozilla-firefox-301dd4e0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13022%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d98f922b639ab555fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13021-vulnerability-in-mozilla-firefox-29039dd3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13021%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d97f922b639ab555f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13015-vulnerability-in-mozilla-firefox-17595576</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13015%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=low&amp;id=69135d97f922b639ab555f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13014-vulnerability-in-mozilla-firefox-8ec798d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13014%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13013-vulnerability-in-mozilla-firefox-fbf5119f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13013%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69135d97f922b639ab555f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13012-vulnerability-in-mozilla-firefox-e3142bab</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13012%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gootloader-is-back-using-a-new-font-trick-to-hide--237ab899</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GootLoader%20Is%20Back%2C%20Using%20a%20New%20Font%20Trick%20to%20Hide%20Malware%20on%20WordPress%20Sites&amp;severity=medium&amp;id=69135a23b36faa5b6c0e4fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9408-privilege-context-switching-error-in-42aa32aa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9408%3A%20Privilege%20Context%20Switching%20Error%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=69135a44b36faa5b6c0e5fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10918-cwe-276-incorrect-default-permissio-0e26dc9e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10918%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69135a44b36faa5b6c0e5fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grandparents-to-c-suite-elder-fraud-reveals-gaps-i-33c8c305</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grandparents%20to%20C-Suite%3A%20Elder%20Fraud%20Reveals%20Gaps%20in%20Human-Centered%20Cybersecurity&amp;severity=medium&amp;id=6913dd72385fb4be4590de3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-triofox-vulnerability-exploited-in-the-wi-aed46803</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Triofox%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=691356a3b36faa5b6c099ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64773-cwe-362-in-jetbrains-youtrack-b7904d44</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64773%3A%20CWE-362%20in%20JetBrains%20YouTrack&amp;severity=low&amp;id=691356bfb36faa5b6c09d257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11959-cwe-552-files-or-directories-access-7e61ecfb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11959%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Premierturk%20Information%20Technologies%20Inc.%20Excavation%20Management%20Information%20System&amp;severity=high&amp;id=6913479c9f8eafcddaf75f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-firefox-protections-halve-the-number-of-tracka-3b363dbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Firefox%20Protections%20Halve%20the%20Number%20of%20Trackable%20Users&amp;severity=medium&amp;id=691342d1e55e7c79b8cee282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prompt-injection-in-ai-browsers-6d354b57</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prompt%20Injection%20in%20AI%20Browsers&amp;severity=medium&amp;id=691342e6e55e7c79b8cee9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11697-cwe-200-exposure-of-sensitive-infor-7a27a34a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11697%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Rockwell%20Automation%20Studio%205000%20%C2%AE%20Simulation%20Interface&amp;severity=high&amp;id=691342f4e55e7c79b8cef9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11696-cwe-22-improper-limitation-of-a-pat-ab878ddb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11696%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Rockwell%20Automation%20Studio%205000%C2%AE%20Simulation%20Interface%E2%84%A2&amp;severity=high&amp;id=69133f64e55e7c79b8ca8fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12101-cwe-79-improper-neutralization-of-i-8a911c53</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12101%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NetScaler%20ADC&amp;severity=medium&amp;id=69133f64e55e7c79b8ca8feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11862-cwe-863-incorrect-authorization-in--920d5051</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11862%3A%20CWE-863%20Incorrect%20Authorization%20in%20Rockwell%20Automation%20Verve%20Asset%20Manager&amp;severity=high&amp;id=69133f64e55e7c79b8ca8fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-flaws-in-sql-anywhere-monitor-c1bc148e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20Flaws%20in%20SQL%20Anywhere%20Monitor%2C%20Solution%20Manager&amp;severity=critical&amp;id=69133f49e55e7c79b8ca7d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11085-cwe-116-improper-encoding-or-escapi-3bbd7e67</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11085%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20DataMosaix%E2%84%A2%20Private%20Cloud&amp;severity=high&amp;id=69133f64e55e7c79b8ca8ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9227-cwe-79-improper-neutralization-of-in-30e1308c</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9227%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20OpManager&amp;severity=medium&amp;id=69133f64e55e7c79b8ca8ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11084-cwe-1390-weak-authentication-in-roc-7958b431</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11084%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20DataMosaix%E2%84%A2%20Private%20Cloud&amp;severity=high&amp;id=69133f64e55e7c79b8ca8fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cmmc-live-pentagon-demands-verified-cybersecurity--51d5d936</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CMMC%20Live%3A%20Pentagon%20Demands%20Verified%20Cybersecurity%20From%20Contractors&amp;severity=medium&amp;id=69133bc5e55e7c79b8c58d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9223-cwe-77-improper-neutralization-of-sp-90963a3d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9223%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20Applications%20Manager&amp;severity=high&amp;id=691346259f8eafcddaf6083f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8324-cwe-89-improper-neutralization-of-sp-aebfbfd1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8324%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20Analytics%20Plus&amp;severity=critical&amp;id=6913371a85a5d1234f7f3b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10161-cwe-307-improper-restriction-of-exc-e303164f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10161%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Turkguven%20Software%20Technologies%20Inc.%20Perfektive&amp;severity=high&amp;id=6913339a85a5d1234f7ad4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/have-i-been-pwned-adds-196b-accounts-from-synthien-2c7c029f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Have%20I%20Been%20Pwned%20Adds%201.96B%20Accounts%20From%20Synthient%20Credential%20Data&amp;severity=medium&amp;id=6913301085a5d1234f759295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41106-cwe-79-improper-neutralization-of-i-05c121be</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41106%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132c9785a5d1234f7108f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41105-cwe-79-improper-neutralization-of-i-2d5c267a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41105%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132c9785a5d1234f7108f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41104-cwe-79-improper-neutralization-of-i-0d495bae</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41104%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132c9785a5d1234f7108f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41103-cwe-79-improper-neutralization-of-i-119f1929</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41103%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132c9785a5d1234f7108ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whisper-leak-llm-side-channel-attack-infers-user-p-b2ba1dbe</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Whisper%20Leak%E2%80%99%20LLM%20Side-Channel%20Attack%20Infers%20User%20Prompt%20Topics&amp;severity=medium&amp;id=69132b29f1a0d9a2f13727d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisos-expert-guide-to-ai-supply-chain-attacks-66b9ca98</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISO&apos;s%20Expert%20Guide%20To%20AI%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=691327a3f1a0d9a2f132acff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41102-cwe-79-improper-neutralization-of-i-5f5ee28c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41102%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=691327c1f1a0d9a2f132ccc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-detect-malicious-npm-package-targeting-d00e275b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Npm%20Package%20Targeting%20GitHub-Owned%20Repositories%20Flagged%20as%20Red%20Team%20Exercise&amp;severity=medium&amp;id=6913dcc3385fb4be4590632a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-npm-package-with-206k-downloads-targeted-gith-6efb88cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20NPM%20Package%20With%20206K%20Downloads%20Targeted%20GitHub%20for%20Credentials&amp;severity=medium&amp;id=69132428f1a0d9a2f12d61c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41101-cwe-79-improper-neutralization-of-i-35f70b4c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41101%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132437f1a0d9a2f12d675d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11960-cwe-79-improper-neutralization-of-i-75833a6a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11960%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Aryom%20Software%20High%20Technology%20Systems%20Inc.%20KVKNET&amp;severity=medium&amp;id=69132437f1a0d9a2f12d675a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-trojan-fantasy-hub-malware-service-turns-t-63bbcc00</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Trojan%20&apos;Fantasy%20Hub&apos;%20Malware%20Service%20Turns%20Telegram%20Into%20a%20Hub%20for%20Hackers&amp;severity=low&amp;id=6913dcc3385fb4be4590632d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-apt-takes-over-south-korean-androids-abuse-b4ac8db2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20APT%20Takes%20Over%20South%20Korean%20Androids%2C%20Abuses%20KakaoTalk&amp;severity=medium&amp;id=6913dd72385fb4be4590de41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12846-cwe-434-unrestricted-upload-of-file-4ecae2aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12846%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20creativethemeshq%20Blocksy%20Companion&amp;severity=high&amp;id=69131c131c700d145d0c4ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12788-cwe-602-client-side-enforcement-of--228956de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12788%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20themefic%20Hydra%20Booking%20%E2%80%94%20Appointment%20Scheduling%20%26%20Booking%20Calendar&amp;severity=medium&amp;id=69131c131c700d145d0c4ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12953-cwe-862-missing-authorization-in-te-4f88e0b9</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12953%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20AI-Powered%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=medium&amp;id=69131c131c700d145d0c4cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12787-cwe-330-use-of-insufficiently-rando-76cf99be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12787%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20themefic%20Hydra%20Booking%20%E2%80%94%20Appointment%20Scheduling%20%26%20Booking%20Calendar&amp;severity=medium&amp;id=69131c131c700d145d0c4ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12539-cwe-922-insecure-storage-of-sensiti-c9e639ab</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12539%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20leopardhost%20TNC%20Toolbox%3A%20Web%20Performance&amp;severity=critical&amp;id=69131c131c700d145d0c4ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quantum-route-redirect-phaas-targets-microsoft-365-1432e29e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quantum%20Route%20Redirect%20PhaaS%20targets%20Microsoft%20365%20users%20worldwide&amp;severity=high&amp;id=691318691c700d145d067ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt37-hackers-abuse-google-find-hub-in-android-dat-da1c45da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT37%20hackers%20abuse%20Google%20Find%20Hub%20in%20Android%20data-wiping%20attacks&amp;severity=high&amp;id=691318691c700d145d067ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-triofox-bug-exploited-to-run-malicious-pa-7c49b93a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Triofox%20bug%20exploited%20to%20run%20malicious%20payloads%20via%20AV%20configuration&amp;severity=critical&amp;id=691318691c700d145d067de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-finds-open-weight-ai-models-easy-to-exploit--ae411e66</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Finds%20Open-Weight%20AI%20Models%20Easy%20to%20Exploit%20in%20Long%20Conversations&amp;severity=high&amp;id=691313ce4e59013eb31f4e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7633-cwe-79-improper-neutralization-of-in-4e693893</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7633%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=691313db4e59013eb31f4ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7632-cwe-79-improper-neutralization-of-in-1579055e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=691313db4e59013eb31f4ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7430-cwe-79-improper-neutralization-of-in-f7897222</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7430%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=691313db4e59013eb31f4ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5317-cwe-862-missing-authorization-in-bit-6a10435c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5317%3A%20CWE-862%20Missing%20Authorization%20in%20Bitdefender%20Endpoint%20Security%20Tools%20for%20Mac&amp;severity=medium&amp;id=6912f0f7b7bc43ed74712fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7429-cwe-79-improper-neutralization-of-in-795f5f1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=6912f40ef9e2bb16257bdc8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9055-cwe-250-execution-with-unnecessary-p-a09c255e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9055%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e86ab7bc43ed74661873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8998-cwe-73-external-control-of-file-name-9e7e8b3c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8998%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=low&amp;id=6912e86ab7bc43ed74661870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9524-cwe-1287-improper-validation-of-spec-b708b828</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9524%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e86ab7bc43ed74661876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10714-cwe-428-unquoted-search-path-or-ele-7a627b50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10714%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Axis%20Communications%20AB%20AXIS%20Optimizer&amp;severity=high&amp;id=6912e555a26e42951ce84f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8108-cwe-1287-improper-validation-of-spec-d89921ee</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8108%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6779-cwe-732-incorrect-permission-assignm-34380ef3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6779%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6571-cwe-522-insufficiently-protected-cre-bda7216c</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6571%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5452-cwe-214-invocation-of-process-using--968933e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5452%3A%20CWE-214%3A%20Invocation%20of%20Process%20Using%20Visible%20Sensitive%20Information%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6298-cwe-1287-improper-validation-of-spec-2576a712</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6298%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5718-cwe-59-improper-link-resolution-befo-176fe35a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5718%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912de4da26e42951cdeabd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5454-cwe-35-path-traversal-in-axis-commun-a248cae8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5454%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912de4da26e42951cdeabcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4645-cwe-1287-improper-validation-of-spec-954220fa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4645%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912de4da26e42951cdeabcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11855-cwe-269-improper-privilege-manageme-0beac750</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11855%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20age-restriction&amp;severity=high&amp;id=6912d40cdcb51f5ee464bb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11307-cwe-79-cross-site-scripting-xss-in--c7b3f6ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11307%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=high&amp;id=6912d40cdcb51f5ee464bb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11237-cwe-862-missing-authorization-in-ma-f06be6cf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11237%3A%20CWE-862%20Missing%20Authorization%20in%20Make%20Email%20Customizer%20for%20WooCommerce&amp;severity=medium&amp;id=6912d40cdcb51f5ee464bb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12667-cwe-79-improper-neutralization-of-i-a14445da</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paul1999%20GitHub%20Gist%20Shortcode%20Plugin&amp;severity=medium&amp;id=6912b13314bc3e00ba783db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12651-cwe-79-improper-neutralization-of-i-e10f4d38</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12651%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eggemplo%20Live%20Photos%20on%20WordPress&amp;severity=medium&amp;id=6912b13314bc3e00ba783d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12019-cwe-79-improper-neutralization-of-i-2553830f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12019%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mervinpraison%20Featured%20Image&amp;severity=medium&amp;id=6912b13014bc3e00ba783d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11521-cwe-285-improper-authorization-in-a-4d7ee02e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11521%3A%20CWE-285%20Improper%20Authorization%20in%20astrasecuritysuite%20Astra%20Security%20Suite%20%E2%80%93%20Firewall%20%26%20Malware%20Scan&amp;severity=high&amp;id=6912b12e14bc3e00ba783ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11999-cwe-862-missing-authorization-in-kr-0955a644</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11999%3A%20CWE-862%20Missing%20Authorization%20in%20krishaweb%20Multi%20Location%20Marker&amp;severity=medium&amp;id=6912b13014bc3e00ba783d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12662-cwe-79-improper-neutralization-of-i-7422d699</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andrico%20Coon%20Google%20Maps&amp;severity=medium&amp;id=6912b13314bc3e00ba783da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11129-cwe-79-improper-neutralization-of-i-796a5764</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11129%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mheob%20Include%20Fussball.de%20Widgets&amp;severity=medium&amp;id=6912b12e14bc3e00ba783c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11986-cwe-306-missing-authentication-for--70b08077</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11986%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20odude%20Crypto%20Tool&amp;severity=medium&amp;id=6912b13014bc3e00ba783d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12126-cwe-639-authorization-bypass-throug-29a2a5b3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12126%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ryanmoyer%20The%20Total%20Book%20Project&amp;severity=medium&amp;id=6912b13114bc3e00ba783d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12637-cwe-94-improper-control-of-generati-788a5052</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12637%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20koopersmith%20Elastic%20Theme%20Editor&amp;severity=high&amp;id=6912b13314bc3e00ba783d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11882-cwe-79-improper-neutralization-of-i-2928c118</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11882%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ethoseo%20Simple%20Donate&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12663-cwe-79-improper-neutralization-of-i-9fd0cbdc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jahed%20Jeba%20Cute%20forkit&amp;severity=medium&amp;id=6912b13314bc3e00ba783dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11860-cwe-79-improper-neutralization-of-i-cb5aa992</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20caselock%20Twitter%20Feed&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11821-cwe-79-improper-neutralization-of-i-2ef4243d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11821%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elvismdev%20Woocommerce%20%E2%80%93%20Products%20By%20Custom%20Tax&amp;severity=medium&amp;id=6912b12e14bc3e00ba783cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12668-cwe-79-improper-neutralization-of-i-f35def4a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12668%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sitedin%20WP%20Count%20Down%20Timer&amp;severity=medium&amp;id=6912b13414bc3e00ba783dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12658-cwe-79-improper-neutralization-of-i-9c5bd4f5</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12658%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mmdeveloper%20Preload%20Current%20Images&amp;severity=medium&amp;id=6912b13314bc3e00ba783da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11859-cwe-79-improper-neutralization-of-i-553df0ba</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11859%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coenjacobs%20Paypal%20Donation%20Shortcode&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11532-cwe-639-authorization-bypass-throug-8d09d9bb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11532%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20softivus%20Wisly&amp;severity=medium&amp;id=6912b12e14bc3e00ba783cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12631-cwe-79-improper-neutralization-of-i-73426b32</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12631%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spokanetony%20Squirrels%20Auto%20Inventory&amp;severity=medium&amp;id=6912b13114bc3e00ba783d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12665-cwe-862-missing-authorization-in-lo-af41e0ab</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12665%3A%20CWE-862%20Missing%20Authorization%20in%20lovelightplugins%20Ninja%20Countdown%20%7C%20Fastest%20Countdown%20Builder&amp;severity=medium&amp;id=6912b13314bc3e00ba783db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12671-cwe-79-improper-neutralization-of-i-6b8cb69f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12671%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrx3k1%20WP-Iconics&amp;severity=medium&amp;id=6912b13414bc3e00ba783dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11869-cwe-79-improper-neutralization-of-i-dff98443</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simonpedge%20Precise%20Columns&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12526-cwe-862-missing-authorization-in-mi-5a0f36ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12526%3A%20CWE-862%20Missing%20Authorization%20in%20michielve%20Private%20Google%20Calendars&amp;severity=medium&amp;id=6912b13114bc3e00ba783d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11828-cwe-79-improper-neutralization-of-i-ab1206c1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11828%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pubudu-malalasekara%20Post%20Blocks%20%26%20Tools&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12753-cwe-80-improper-neutralization-of-s-20c15c5f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12753%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20sagortouch%20Chart%20Expert&amp;severity=medium&amp;id=6912b13414bc3e00ba783dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11170-cwe-434-unrestricted-upload-of-file-3da2ad24</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11170%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kddiwebcommunications%20WP%E7%A7%BB%E8%A1%8C%E5%B0%82%E7%94%A8%E3%83%97%E3%83%A9%E3%82%B0%E3%82%A4%E3%83%B3%20for%20CPI&amp;severity=critical&amp;id=6912b12e14bc3e00ba783c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12711-cwe-79-improper-neutralization-of-i-7497e289</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pritenhshah%20Share%20to%20Google%20Classroom&amp;severity=medium&amp;id=6912b13414bc3e00ba783dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12813-cwe-94-improper-control-of-generati-e892d4a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12813%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20strix-bubol5%20Holiday%20class%20post%20calendar&amp;severity=critical&amp;id=6912b13414bc3e00ba783de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11457-cwe-269-improper-privilege-manageme-ee3667f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11457%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20easycommerce%20EasyCommerce%20%E2%80%93%20AI-Powered%20WordPress%20Ecommerce%20Plugin%20to%20Sell%20Digital%20Products%2C%20Subscriptions%20%26%20Physical%20Goods&amp;severity=critical&amp;id=6912b12e14bc3e00ba783ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11856-cwe-79-improper-neutralization-of-i-a0ea12e3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11856%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eventbee%20Eventbee%20Ticketing%20Widget&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12590-cwe-352-cross-site-request-forgery--ee90bfa8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12590%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20andreaferracani%20YSlider&amp;severity=medium&amp;id=6912b13114bc3e00ba783d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12021-cwe-79-improper-neutralization-of-i-c0cdd41e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12021%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hectavex%20WP-OAuth&amp;severity=medium&amp;id=6912b13114bc3e00ba783d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12588-cwe-352-cross-site-request-forgery--e7b305c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12588%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20behzadrohizadeh%20USB%20Qr%20Code%20Scanner%20For%20Woocommerce&amp;severity=medium&amp;id=6912b13114bc3e00ba783d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12020-cwe-79-improper-neutralization-of-i-eec81234</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12020%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kanwei_doublethedonation%20Double%20the%20Donation%20%E2%80%93%20A%20workplace%20giving%20tool&amp;severity=medium&amp;id=6912b13114bc3e00ba783d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12132-cwe-352-cross-site-request-forgery--234920f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12132%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20larsactionhero%20WP%20Custom%20Admin%20Login%20Page%20Logo&amp;severity=medium&amp;id=6912b13114bc3e00ba783d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12589-cwe-352-cross-site-request-forgery--11392215</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12589%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20baronen%20WP-Walla&amp;severity=medium&amp;id=6912b13114bc3e00ba783d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12672-cwe-79-improper-neutralization-of-i-0d8ed3ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nuvuscripts%20Flickr%20Show&amp;severity=medium&amp;id=6912b13414bc3e00ba783dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11997-cwe-200-exposure-of-sensitive-infor-96fa7b4c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11997%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ngothoai%20Document%20Pro%20Elementor%20%E2%80%93%20Documentation%20%26%20Knowledge%20Base&amp;severity=medium&amp;id=6912b13014bc3e00ba783d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11451-cwe-73-external-control-of-file-nam-2bb0b851</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11451%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20miunosoft%20Auto%20Amazon%20Links%20%E2%80%93%20Amazon%20Associates%20Affiliate%20Plugin&amp;severity=high&amp;id=6912b12e14bc3e00ba783c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12010-cwe-200-exposure-of-sensitive-infor-dc49f3b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12010%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpkube%20Authors%20List&amp;severity=medium&amp;id=6912b13014bc3e00ba783d3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12754-cwe-79-improper-neutralization-of-i-27a5648d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rampantlogic%20Geopost&amp;severity=medium&amp;id=6912b13414bc3e00ba783ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11805-cwe-79-improper-neutralization-of-i-e344ea1b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20doytch%20Skip%20to%20Timestamp&amp;severity=medium&amp;id=6912b12e14bc3e00ba783caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12644-cwe-79-improper-neutralization-of-i-85a0557c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcox%20Nonaki%20%E2%80%93%20Drag%20and%20Drop%20Email%20Template%20builder%20and%20Newsletter%20plugin%20for%20WordPress&amp;severity=medium&amp;id=6912b13314bc3e00ba783d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11886-cwe-352-cross-site-request-forgery--d558d203</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11886%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codethislab%20CTL%20Arcade%20Lite&amp;severity=medium&amp;id=6912b13014bc3e00ba783d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12632-cwe-79-improper-neutralization-of-i-c7743531</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20loveless%20RandomQuotr&amp;severity=medium&amp;id=6912b13314bc3e00ba783d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12538-cwe-79-improper-neutralization-of-i-0ff1ff8b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12538%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iworks%20Fleet%20Manager&amp;severity=medium&amp;id=6912b13114bc3e00ba783d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12880-cwe-79-improper-neutralization-of-i-e805a5a9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12880%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jobayer534%20Progress%20Bar%20Blocks%20for%20Gutenberg&amp;severity=medium&amp;id=6912b13414bc3e00ba783de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11996-cwe-862-missing-authorization-in-to-3a4eeacc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11996%3A%20CWE-862%20Missing%20Authorization%20in%20toastwebsites%20Find%20Unused%20Images&amp;severity=medium&amp;id=6912b13014bc3e00ba783d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11863-cwe-79-improper-neutralization-of-i-903b961a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11863%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mindstien%20My%20Geo%20Posts%20Free&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11988-cwe-862-missing-authorization-in-od-78285aee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11988%3A%20CWE-862%20Missing%20Authorization%20in%20odude%20Crypto%20Tool&amp;severity=medium&amp;id=6912b13014bc3e00ba783d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11829-cwe-79-improper-neutralization-of-i-881075f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11829%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20five9%20Five9%20Live%20Chat&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12652-cwe-79-improper-neutralization-of-i-e31ba7f4</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12652%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oscaruribe%20Ungapped%20Widgets&amp;severity=medium&amp;id=6912b13314bc3e00ba783d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11168-cwe-269-improper-privilege-manageme-2ed49b3b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11168%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20mvirik%20Mementor%20Core&amp;severity=high&amp;id=6912b12e14bc3e00ba783c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11873-cwe-79-improper-neutralization-of-i-84d036eb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eflyjason%20WP%20BBCode&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11874-cwe-80-improper-neutralization-of-s-790b7b8c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11874%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mitegvg%20Slippy%20Slider%20%E2%80%93%20Responsive%20Touch%20Navigation%20Slider&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11891-cwe-538-insertion-of-sensitive-info-86169ece</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11891%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20shelfplanner%20Shelf%20Planner%20Inventory%20Management%20for%20WooCommerce&amp;severity=medium&amp;id=6912b13014bc3e00ba783d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11822-cwe-79-improper-neutralization-of-i-613c3be8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20virtus-designs%20WP%20Bootstrap%20Tabs&amp;severity=medium&amp;id=6912b12e14bc3e00ba783cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11894-cwe-862-missing-authorization-in-sh-b3a4ca1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11894%3A%20CWE-862%20Missing%20Authorization%20in%20shelfplanner%20Shelf%20Planner%20Inventory%20Management%20for%20WooCommerce&amp;severity=medium&amp;id=6912b13014bc3e00ba783d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31719-cwe-665-improper-initialization-in--1b9f65f8</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31719%3A%20cwe-665%20Improper%20Initialization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42940-cwe-787-out-of-bounds-write-in-saps-cfdc8073</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42940%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20SAP_SE%20SAP%20CommonCryptoLib&amp;severity=high&amp;id=6912870814bc3e00ba6f3c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42924-cwe-601-url-redirection-to-untruste-96990b2c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42924%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20S%2F4HANA%20landscape%20(SAP%20E-Recruiting%20BSP)&amp;severity=medium&amp;id=6912870814bc3e00ba6f3c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42919-cwe-22-improper-limitation-of-a-pat-1892d8de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42919%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java&amp;severity=medium&amp;id=6912870814bc3e00ba6f3c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42899-cwe-862-missing-authorization-in-sa-2212ff5d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42899%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S4CORE%20(Manage%20Journal%20Entries)&amp;severity=medium&amp;id=6912870814bc3e00ba6f3c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42897-cwe-522-insufficiently-protected-cr-f30abd12</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42897%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SAP_SE%20SAP%20Business%20One%20(SLD)&amp;severity=medium&amp;id=6912870814bc3e00ba6f3c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42895-cwe-94-improper-control-of-generati-a4993b7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42895%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20HANA%20JDBC%20Client&amp;severity=medium&amp;id=6912870814bc3e00ba6f3bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42894-cwe-22-improper-limitation-of-a-pat-dfc27f7d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42894%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6912870814bc3e00ba6f3bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42893-cwe-601-url-redirection-to-untruste-55e7bd9f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42893%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6912870814bc3e00ba6f3bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42892-cwe-78-improper-neutralization-of-s-9e315964</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42892%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6912870814bc3e00ba6f3bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42890-cwe-798-use-of-hard-coded-credentia-91b98cfd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42890%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20SAP_SE%20SQL%20Anywhere%20Monitor%20(Non-Gui)&amp;severity=critical&amp;id=6912870714bc3e00ba6f3be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42889-cwe-89-improper-neutralization-of-s-5fbdc362</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42889%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20Starter%20Solution%20(PL%20SAFT)&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42888-cwe-316-cleartext-storage-of-sensit-99b28eb6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42888%3A%20CWE-316%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20SAP_SE%20SAP%20GUI%20for%20Windows&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42887-cwe-94-improper-control-of-generati-7ff873ad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42887%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Solution%20Manager&amp;severity=critical&amp;id=6912870714bc3e00ba6f3bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42886-cwe-79-improper-neutralization-of-i-668a6ab8</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42886%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42885-cwe-306-missing-authentication-for--573a4d6d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42885%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SAP_SE%20SAP%20HANA%202.0%20(hdbrss)&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42884-cwe-943-improper-neutralization-of--82aff810</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42884%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42883-cwe-434-unrestricted-upload-of-file-32bf205b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42883%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP%20(Migration%20Workbench)&amp;severity=low&amp;id=6912870714bc3e00ba6f3bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42882-cwe-862-missing-authorization-in-sa-8488bf51</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42882%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-11-2a6f9ec9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-11&amp;severity=medium&amp;id=6913cffa74e5e09a14beac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57695-na-322268d2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57695%3A%20n%2Fa&amp;severity=high&amp;id=69134ea49f8eafcdda031b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11578-cwe-59-improper-link-resolution-bef-95a6bf97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11578%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69126c0c6b3b7718db092a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11892-cwe-79-improper-neutralization-of-i-d2aac8ee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69126c0c6b3b7718db092a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64529-cwe-770-allocation-of-resources-wit-cd6fa7bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64529%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20authzed%20spicedb&amp;severity=low&amp;id=691268886b3b7718db04cf00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/owasp-highlights-supply-chain-risks-in-new-top-10--3deccfb4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OWASP%20Highlights%20Supply%20Chain%20Risks%20in%20New%20Top%2010%20List&amp;severity=high&amp;id=69129bc014bc3e00ba7424fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64522-cwe-918-server-side-request-forgery-b1a9435c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64522%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20charmbracelet%20soft-serve&amp;severity=critical&amp;id=6912671f6b3b7718db03f35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64518-cwe-611-improper-restriction-of-xml-bf744b65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64518%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20CycloneDX%20cyclonedx-core-java&amp;severity=high&amp;id=691264812d2520af5f327675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64513-cwe-287-improper-authentication-in--2cbfc97a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64513%3A%20CWE-287%3A%20Improper%20Authentication%20in%20milvus-io%20milvus&amp;severity=critical&amp;id=691264812d2520af5f32766f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unauthenticated-remote-access-via-triofox-vulnerab-afc6b1ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unauthenticated%20Remote%20Access%20via%20Triofox%20Vulnerability%20CVE-2025-12480&amp;severity=medium&amp;id=691308308240c40e4c090aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64512-cwe-502-deserialization-of-untruste-8aacc917</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64512%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pdfminer%20pdfminer.six&amp;severity=high&amp;id=6912626244f28dbfe990a14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64507-cwe-269-improper-privilege-manageme-aa82c817</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64507%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20lxc%20incus&amp;severity=high&amp;id=6912626244f28dbfe990a148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-returns-slices-back-into-vs-code-extensi-f7c0b614</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20Returns%2C%20Slices%20Back%20into%20VS%20Code%20Extensions&amp;severity=medium&amp;id=69129bc014bc3e00ba742501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64502-cwe-201-insertion-of-sensitive-info-f884f232</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64502%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69125dcc44f28dbfe98bf100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64501-cwe-79-improper-neutralization-of-i-99a44780</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64501%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20etaminstudio%20prosemirror_to_html&amp;severity=high&amp;id=69125dcc44f28dbfe98bf0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64183-cwe-416-use-after-free-in-academyso-19fcca57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64183%3A%20CWE-416%3A%20Use%20After%20Free%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69125dcc44f28dbfe98bf109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64182-cwe-120-buffer-copy-without-checkin-00dc5500</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64182%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69125dcc44f28dbfe98bf105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64181-cwe-457-use-of-uninitialized-variab-2ce8d603</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64181%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20AcademySoftwareFoundation%20openexr&amp;severity=low&amp;id=69125a3d26655404d5684626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62780-cwe-79-improper-neutralization-of-i-431bee76</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62780%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=low&amp;id=69125a3d26655404d5684623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64167-cwe-79-improper-neutralization-of-i-dcffaec6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64167%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=6912576658b9e66d50002ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49145-cwe-863-incorrect-authorization-in--fbc2710a</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49145%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Combodo%20iTop&amp;severity=high&amp;id=6912576658b9e66d50002ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/popular-javascript-library-expr-eval-vulnerable-to-418367c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Popular%20JavaScript%20library%20expr-eval%20vulnerable%20to%20RCE%20flaw&amp;severity=high&amp;id=691253de58b9e66d50fc5b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploiting-triofox-flaw-to-install-remote--094f0056</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploiting%20Triofox%20Flaw%20to%20Install%20Remote%20Access%20Tools%20via%20Antivirus%20Feature&amp;severity=critical&amp;id=69129af814bc3e00ba7407a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48878-cwe-862-missing-authorization-in-co-e1ae13b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48878%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Combodo%20iTop&amp;severity=medium&amp;id=6912505b58b9e66d50f7c9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48065-cwe-79-improper-neutralization-of-i-3e730e71</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48065%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=6912505b58b9e66d50f7c9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48055-cwe-79-improper-neutralization-of-i-6ec27387</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48055%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=69124ce358b9e66d50f34b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konni-hackers-turn-googles-find-hub-into-a-remote--ca6d826f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Konni%20Hackers%20Turn%20Google%E2%80%99s%20Find%20Hub%20into%20a%20Remote%20Data-Wiping%20Weapon&amp;severity=medium&amp;id=69129af814bc3e00ba7407a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12729-inappropriate-implementation-in-goo-6f34e228</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12729%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465f941466772c506b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12728-inappropriate-implementation-in-goo-c8dece2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12728%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465f941466772c506b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12727-inappropriate-implementation-in-goo-135af20f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12727%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465f941466772c506b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12726-inappropriate-implementation-in-goo-a9617a0a</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12726%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465f941466772c506b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12725-out-of-bounds-read-in-google-chrome-d3bba38d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12725%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465d941466772c506b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12447-incorrect-security-ui-in-google-chr-1ae2195b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12447%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12446-incorrect-security-ui-in-google-chr-93668527</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12446%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12445-policy-bypass-in-google-chrome-12fe166e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12445%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12444-incorrect-security-ui-in-google-chr-28d1886a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12444%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12443-out-of-bounds-read-in-google-chrome-14beda5f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12443%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12441-out-of-bounds-read-in-google-chrome-25f18816</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12441%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12440-inappropriate-implementation-in-goo-d34a4674</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12440%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12439-inappropriate-implementation-in-goo-4c7ff807</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12439%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12438-use-after-free-in-google-chrome-f7fb85bf</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12438%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465d941466772c506b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12437-use-after-free-in-google-chrome-830726c2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12437%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12436-policy-bypass-in-google-chrome-f58fcd24</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12436%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12435-incorrect-security-ui-in-google-chr-e6a35931</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12435%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12434-race-in-google-chrome-fd9b95d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12434%3A%20Race%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12433-inappropriate-implementation-in-goo-60e5797f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12433%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12432-race-in-google-chrome-02526513</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12432%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12431-inappropriate-implementation-in-goo-c665dcf6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12431%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12430-object-lifecycle-issue-in-google-ch-d9d48b68</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12430%3A%20Object%20lifecycle%20issue%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12429-inappropriate-implementation-in-goo-9394d491</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12429%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12428-type-confusion-in-google-chrome-4d8840dd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12428%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33150-cwe-552-files-or-directories-access-01ca809c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33150%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20IBM%20Cognos%20Analytics%20Certified%20Containers&amp;severity=medium&amp;id=69124159941466772c4b1f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47932-cwe-79-improper-neutralization-of-i-96ba7cee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47932%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=69123dd5819dd34e6850aab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47773-cwe-79-improper-neutralization-of-i-e39c2755</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47773%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=69123a5b819dd34e684c5420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43723-cwe-327-use-of-a-broken-or-risky-cr-a4d8617d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43723%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69123a5b819dd34e684c541d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47286-cwe-74-improper-neutralization-of-s-9880d5ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47286%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=69123410a4f3f087830c43ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intel-sues-ex-engineer-for-stealing-18000-top-secr-6c8706b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intel%20Sues%20Ex-Engineer%20for%20Stealing%2018%2C000%20%E2%80%98Top%20Secret%E2%80%99%20Files%20Before%20Layoff&amp;severity=medium&amp;id=69122d12a4f3f0878303b2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12967-cwe-470-use-of-externally-controlle-ef63eb58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12967%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20AWS%20JDBC%20Wrapper&amp;severity=high&amp;id=69122d25a4f3f0878303d256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-attacks-against-secure-enclaves-schneier-on-se-356ef94d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Attacks%20Against%20Secure%20Enclaves%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=69122642eeb17d72b8d02558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/denmark-and-norway-investigate-yutong-bus-security-c677db9c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Denmark%20and%20Norway%20investigate%20Yutong%20bus%20security%20flaw%20amid%20rising%20tech%20fears&amp;severity=medium&amp;id=69122642eeb17d72b8d0255c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-aligned-uta0388-uses-ai-tools-in-global-phis-3c891616</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Aligned%20UTA0388%20Uses%20AI%20Tools%20in%20Global%20Phishing%20Campaigns&amp;severity=high&amp;id=69122642eeb17d72b8d02550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43079-cwe-732-incorrect-permission-assign-262928b4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43079%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Qualys%20Inc%20Qualys%20Agent&amp;severity=medium&amp;id=69121fbbc86173478b6e1457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/landfall-spyware-targeted-samsung-galaxy-phones-vi-ab02cf53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LANDFALL%20Spyware%20Targeted%20Samsung%20Galaxy%20Phones%20via%20Malicious%20WhatsApp%20Images&amp;severity=medium&amp;id=69121650cab732a2636e5bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disclosure-doordash-enabled-5-year-xsshtml-injecti-b33109e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BDISCLOSURE%5D%20DoorDash%20Enabled%205-Year%20XSS%2FHTML%20Injection%20Flaw%20via%20Official%20Email%3B%20VDP%20Misclassified%20Report%20for%2015%20Months&amp;severity=critical&amp;id=69121361d84bdc1ba6926f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-filefix-a-clickfix-variation-kaspersky-off-6b722fec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20FileFix%20%E2%80%94%20a%20ClickFix%20variation%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69121380d84bdc1ba692821c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/many-forbes-ai-50-companies-leak-secrets-on-github-9a25a636</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Many%20Forbes%20AI%2050%20Companies%20Leak%20Secrets%20on%20GitHub&amp;severity=medium&amp;id=69120fe0d84bdc1ba68e943b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46430-cwe-250-execution-with-unnecessary--9b87c3a8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46430%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Display%20and%20Peripheral%20Manager&amp;severity=high&amp;id=69121a68c86173478b6866f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/http-request-smuggling-in-kestrel-via-chunk-extens-5622aaed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTTP%20Request%20Smuggling%20in%20Kestrel%20via%20chunk%20extensions%20(CVE-2025-55315)&amp;severity=medium&amp;id=69120c59d84bdc1ba68a05eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/it-isnt-always-defaults-scans-for-3cx-usernames-mo-a7867b47</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=It%20isn&apos;t%20always%20defaults%3A%20Scans%20for%203CX%20usernames%2C%20(Mon%2C%20Nov%2010th)&amp;severity=medium&amp;id=69120474b8ffd8a38b9d8f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-campaign-targets-hotels-spurs-secondary-c-c2180c38</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Campaign%20Targets%20Hotels%2C%20Spurs%20Secondary%20Customer%20Attacks&amp;severity=medium&amp;id=69129bc014bc3e00ba742504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/runc-vulnerabilities-can-be-exploited-to-escape-co-f850a904</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Runc%20Vulnerabilities%20Can%20Be%20Exploited%20to%20Escape%20Containers&amp;severity=medium&amp;id=6911f71c500a810dcc094fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10th-november-threat-intelligence-report-2c72c1ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10th%20November%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6911eb4bbb27cbde2e79d800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64457-cwe-367-in-jetbrains-dottrace-11881476</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64457%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20JetBrains%20ReSharper%2C%20Rider%20and%20dotTrace&amp;severity=medium&amp;id=6911ecfbbb27cbde2e7c666b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64456-cwe-347-in-jetbrains-resharper-1d8f1964</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64456%3A%20CWE-347%20in%20JetBrains%20ReSharper&amp;severity=high&amp;id=6911ecfbbb27cbde2e7c6668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64690-cwe-862-in-jetbrains-youtrack-9a6a7a0a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64690&amp;severity=null&amp;id=6911ecfcbb27cbde2e7c6695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64689-cwe-522-in-jetbrains-youtrack-7be8105f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64689&amp;severity=null&amp;id=6911ecfcbb27cbde2e7c6692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64688-cwe-639-in-jetbrains-youtrack-baca4cba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64688&amp;severity=null&amp;id=6911ecfbbb27cbde2e7c6683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64687-cwe-862-in-jetbrains-youtrack-88d99abe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64687&amp;severity=null&amp;id=6911ecfbbb27cbde2e7c6680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64686-cwe-672-in-jetbrains-youtrack-9847f1e2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64686&amp;severity=null&amp;id=6911ecfbbb27cbde2e7c667d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64685-cwe-295-in-jetbrains-youtrack-a06c4620</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64685%3A%20CWE-295%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=6911ecfbbb27cbde2e7c667a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64684-cwe-862-in-jetbrains-youtrack-5a221939</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64684%3A%20CWE-862%20in%20JetBrains%20YouTrack&amp;severity=medium&amp;id=6911ecfbbb27cbde2e7c6677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64683-cwe-362-in-jetbrains-hub-d4493de4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64683%3A%20CWE-362%20in%20JetBrains%20Hub&amp;severity=medium&amp;id=6911ecfbbb27cbde2e7c6674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64682-cwe-362-in-jetbrains-hub-6b0be68f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64682%3A%20CWE-362%20in%20JetBrains%20Hub&amp;severity=low&amp;id=6911ecfbbb27cbde2e7c6671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64681-cwe-862-in-jetbrains-hub-b5b40db1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64681%3A%20CWE-862%20in%20JetBrains%20Hub&amp;severity=low&amp;id=6911ecfbbb27cbde2e7c666e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-new-web-application-risk-categories-added-to-o-bd3073f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20New%20Web%20Application%20Risk%20Categories%20Added%20to%20OWASP%20Top%2010&amp;severity=critical&amp;id=6911e8bf6161266dcb98ea0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-malware-discovered-in-three-vs-code-exte-68d14ab5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20Malware%20Discovered%20in%20Three%20VS%20Code%20Extensions%20with%20Thousands%20of%20Installs&amp;severity=high&amp;id=6911e8d86161266dcb99127d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/large-scale-clickfix-phishing-attacks-target-hotel-3ce395d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Large-Scale%20ClickFix%20Phishing%20Attacks%20Target%20Hotel%20Systems%20with%20PureRAT%20Malware&amp;severity=high&amp;id=6911e8d86161266dcb991279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nine-nuget-packages-disrupt-dbs-and-industrial-sys-07536777</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nine%20NuGet%20packages%20disrupt%20DBs%20and%20industrial%20systems%20with%20time-delayed%20payloads&amp;severity=medium&amp;id=6911e8d86161266dcb991281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/louvre-museums-camera-network-password-was-reporte-9b17fb8d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Louvre%20Museum%E2%80%99s%20Camera%20Network%20Password%20Was%20Reportedly%20Just%20%E2%80%9CLouvre%E2%80%9D&amp;severity=medium&amp;id=6911e66be2a2408170ade3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12939-sql-injection-in-sourcecodester-int-362217c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12939%3A%20SQL%20Injection%20in%20SourceCodester%20Interview%20Management%20System&amp;severity=medium&amp;id=6911e67fe2a2408170ae1f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-hyper-v-malware-malicious-ai-bots-rdp-98d90e6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Hyper-V%20Malware%2C%20Malicious%20AI%20Bots%2C%20RDP%20Exploits%2C%20WhatsApp%20Lockdown%20and%20More&amp;severity=high&amp;id=69129af814bc3e00ba7407a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-malware-returns-to-open-vsx-emerges-on-g-3a8a8daf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20Malware%20Returns%20to%20Open%20VSX%2C%20Emerges%20on%20GitHub&amp;severity=medium&amp;id=6911e022c3394bcf0da644ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12938-sql-injection-in-projectworlds-onli-d8ca496e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12938%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=6911dc1bc3394bcf0da063c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-browser-security-report-reveals-emerging-threa-1b377d57</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Browser%20Security%20Report%20Reveals%20Emerging%20Threats%20for%20Enterprises&amp;severity=low&amp;id=69129af814bc3e00ba7407ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nearly-30-alleged-victims-of-oracle-ebs-hack-named-ffb9fd70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nearly%2030%20Alleged%20Victims%20of%20Oracle%20EBS%20Hack%20Named%20on%20Cl0p%20Ransomware%20Site&amp;severity=medium&amp;id=6911d18053b42a4b74ce76e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fantasy-hub-another-russian-based-rat-as-malware-a-90c83e7a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fantasy%20Hub%3A%20Another%20Russian%20Based%20RAT%20as%20Malware-as-a-Service&amp;severity=medium&amp;id=6911d19153b42a4b74ce7a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/state-sponsored-remote-wipe-tactics-targeting-andr-08e8da9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=State-Sponsored%20Remote%20Wipe%20Tactics%20Targeting%20Android%20Devices&amp;severity=medium&amp;id=6911ca57c9af41ae0ebf1d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-targets-aerospace-and-defense-with-n-e1ff8123</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20targets%20Aerospace%20and%20Defense%20with%20new%20Comebacker%20variant&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-patches-vulnerabilities-exploited-at-pwn2own--6b66551d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20Patches%20Vulnerabilities%20Exploited%20at%20Pwn2Own%20Ireland&amp;severity=critical&amp;id=6911c6d6c9af41ae0ebb903c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-monsta-ftp-vulnerability-exposed-thousand-b6e12da0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Monsta%20FTP%20Vulnerability%20Exposed%20Thousands%20of%20Servers%20to%20Full%20Takeover&amp;severity=critical&amp;id=6911c6e9c9af41ae0ebba311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australia-sanctions-hackers-supporting-north-korea-2b91902e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australia%20Sanctions%20Hackers%20Supporting%20North%20Korea%E2%80%99s%20Weapons%20Program&amp;severity=medium&amp;id=6911c353c9af41ae0eb6aa0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12405-cwe-269-improper-privilege-manageme-bf184c0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12405%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Google%20Cloud%20Looker%20Studio&amp;severity=high&amp;id=6911b458512c1b862c8e34fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41107-cwe-79-improper-neutralization-of-i-1aad2daa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41107%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20QDOCS%20Smart%20Schoo&amp;severity=medium&amp;id=6911ad57512c1b862c84c0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12409-cwe-89-improper-neutralization-of-s-3c372f02</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12409%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Google%20Cloud%20Looker%20Studio&amp;severity=high&amp;id=6911aa71983053a663d21209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12397-cwe-89-improper-neutralization-of-s-d31b84d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12397%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Google%20Cloud%20Looker%20Studio&amp;severity=high&amp;id=6911aa71983053a663d21205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12155-cwe-77-improper-neutralization-of-s-e2c239be</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12155%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=6911aa71983053a663d2120d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41731-cwe-338-use-of-cryptographically-we-7cc12fcf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41731%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Jumo%20variTRON300&amp;severity=high&amp;id=6911a2ea983053a663c8b2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12933-sql-injection-in-sourcecodester-bab-8f0f2f0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12933%3A%20SQL%20Injection%20in%20SourceCodester%20Baby%20Care%20System&amp;severity=medium&amp;id=69117a853d94f7819bac325f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12932-sql-injection-in-sourcecodester-bab-81f71413</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12932%3A%20SQL%20Injection%20in%20SourceCodester%20Baby%20Care%20System&amp;severity=medium&amp;id=691175e6d0f5adfa3d85f74f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12613-arbitrary-argument-injection-in-clo-d3c7d951</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12613%3A%20Arbitrary%20Argument%20Injection%20in%20cloudinary&amp;severity=high&amp;id=691175e6d0f5adfa3d85f74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12931-sql-injection-in-sourcecodester-foo-35c7c00f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12931%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20System&amp;severity=medium&amp;id=69116eded0f5adfa3d7d797f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62689-heap-based-buffer-overflow-in-gnu-p-dfdc73e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62689%3A%20Heap-based%20buffer%20overflow%20in%20GNU%20Project%20GNU%20libbmicrohttpd&amp;severity=high&amp;id=69116a20b0eb67653eb0f0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59777-null-pointer-dereference-in-gnu-pro-47f9438d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59777%3A%20NULL%20pointer%20dereference%20in%20GNU%20Project%20GNU%20libbmicrohttpd&amp;severity=high&amp;id=69116a20b0eb67653eb0f0ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12930-sql-injection-in-sourcecodester-foo-2af1c10d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12930%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20System&amp;severity=medium&amp;id=691166511e0afa394a9d233b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12929-sql-injection-in-sourcecodester-sur-aa4a821f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12929%3A%20SQL%20Injection%20in%20SourceCodester%20Survey%20Application%20System&amp;severity=medium&amp;id=69116258b9239aa390814bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12868-cwe-603-use-of-client-side-authenti-63bfb658</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12868%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20CyberTutor%20New%20Site%20Server&amp;severity=critical&amp;id=69115ed4b9239aa3908085aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12867-cwe-434-unrestricted-upload-of-file-8460192f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12867%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Hundred%20Plus%20EIP%20Plus&amp;severity=high&amp;id=69115ed4b9239aa3908085a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12928-sql-injection-in-code-projects-onli-36045207</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12928%3A%20SQL%20Injection%20in%20code-projects%20Online%20Job%20Search%20Engine&amp;severity=medium&amp;id=69115ed4b9239aa3908085ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12866-cwe-640-weak-password-recovery-mech-3284230c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12866%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Hundred%20Plus%20EIP%20Plus&amp;severity=critical&amp;id=691157ccb9239aa3907e6b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12927-sql-injection-in-dedebiz-9db5dc76</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12927%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=691157ccb9239aa3907e6b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12865-cwe-89-improper-neutralization-of-s-8e7a12b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12865%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20e-Excellence%20U-Office%20Force&amp;severity=high&amp;id=69114d40b9239aa3907ac87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12864-cwe-89-improper-neutralization-of-s-2bc67a3d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12864%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20e-Excellence%20U-Office%20Force&amp;severity=high&amp;id=69114d40b9239aa3907ac87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12926-sql-injection-in-sourcecodester-far-d9458103</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12926%3A%20SQL%20Injection%20in%20SourceCodester%20Farm%20Management%20System&amp;severity=medium&amp;id=69114d40b9239aa3907ac882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12925-missing-authorization-in-rymcu-fore-58a3f75d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12925%3A%20Missing%20Authorization%20in%20rymcu%20forest&amp;severity=medium&amp;id=691142b4b9239aa39070f832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12924-missing-authorization-in-rymcu-fore-ac058fb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12924%3A%20Missing%20Authorization%20in%20rymcu%20forest&amp;severity=medium&amp;id=691142b4b9239aa39070f82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12923-path-traversal-in-liweiyi-chestnutc-4dc173cf</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12923%3A%20Path%20Traversal%20in%20liweiyi%20ChestnutCMS&amp;severity=medium&amp;id=691134b9b9239aa39064e0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12922-path-traversal-in-openclinica-commu-667c3259</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12922%3A%20Path%20Traversal%20in%20OpenClinica%20Community%20Edition&amp;severity=medium&amp;id=691134b9b9239aa39064e0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-10-ab85e832</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-10&amp;severity=medium&amp;id=69127ff014bc3e00ba67453c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63678-na-42ef7c3a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63678%3A%20n%2Fa&amp;severity=low&amp;id=69126fa46b3b7718db0c7bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-phantomcaptcha-multi-stage-websocket-rat-tar-ea72d1dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PhantomCaptcha%20%7C%20Multi-Stage%20WebSocket%20RAT%20Targets%20Ukraine%20in%20Single-Day%20Spearphishing%20Operation&amp;severity=medium&amp;id=69126f856b3b7718db0c6ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63397-na-d10b10c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63397%3A%20n%2Fa&amp;severity=medium&amp;id=6912576658b9e66d50002eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63296-na-7fa46e64</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63296%3A%20n%2Fa&amp;severity=medium&amp;id=691253f258b9e66d50fc71d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63384-na-b28d115d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63384%3A%20n%2Fa&amp;severity=medium&amp;id=691249dd941466772c5416cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63617-na-4dfed4ff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63617%3A%20n%2Fa&amp;severity=medium&amp;id=691249dd941466772c5416c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60876-na-6ecd776b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60876%3A%20n%2Fa&amp;severity=medium&amp;id=6912465f941466772c506b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56503-na-83f770ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56503%3A%20n%2Fa&amp;severity=medium&amp;id=6912465f941466772c506b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63149-na-05bf7092</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63149%3A%20n%2Fa&amp;severity=high&amp;id=69124159941466772c4b1f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63288-na-fe48e93b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63288%3A%20n%2Fa&amp;severity=high&amp;id=69123a5b819dd34e684c5423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63497-na-d519aa46</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63497%3A%20n%2Fa&amp;severity=high&amp;id=69121c24c86173478b6a098f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63834-na-7588b1e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63834%3A%20n%2Fa&amp;severity=medium&amp;id=69121b9bc86173478b69b3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63456-na-8685dfab</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63456%3A%20n%2Fa&amp;severity=medium&amp;id=69121b9bc86173478b69b3a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63455-na-f78d82bc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63455%3A%20n%2Fa&amp;severity=high&amp;id=69121b9bc86173478b69b3a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63835-na-b2b6762b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63835%3A%20n%2Fa&amp;severity=medium&amp;id=6912165ecab732a2636e714b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63147-na-952031df</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63147%3A%20n%2Fa&amp;severity=medium&amp;id=6912165ecab732a2636e7148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63457-na-9a9fd077</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63457%3A%20n%2Fa&amp;severity=medium&amp;id=69121361d84bdc1ba6926f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63154-na-8f4aa309</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63154%3A%20n%2Fa&amp;severity=high&amp;id=69120ff3d84bdc1ba68e99cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63153-na-f76e6836</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63153%3A%20n%2Fa&amp;severity=high&amp;id=69120ff3d84bdc1ba68e99cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63152-na-6a65654e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63152%3A%20n%2Fa&amp;severity=high&amp;id=69120ff3d84bdc1ba68e99c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63712-na-00ab6d24</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63712%3A%20n%2Fa&amp;severity=medium&amp;id=69120774b8ffd8a38ba23792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63710-na-69a80133</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63710%3A%20n%2Fa&amp;severity=medium&amp;id=69120774b8ffd8a38ba2378e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63709-na-c95eee49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63709%3A%20n%2Fa&amp;severity=medium&amp;id=6911fe20500a810dcc12633d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63711-na-3f5fadbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63711%3A%20n%2Fa&amp;severity=high&amp;id=6911fa9b500a810dcc0e18aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12921-xml-injection-in-openclinica-commun-5f24dcac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12921%3A%20XML%20Injection%20in%20OpenClinica%20Community%20Edition&amp;severity=medium&amp;id=69112787a0a00dcacbece57c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12920-cross-site-scripting-in-qianfox-fox-b6fa4694</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12920%3A%20Cross%20Site%20Scripting%20in%20qianfox%20FoxCMS&amp;severity=medium&amp;id=69112046b991753c98029761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12919-improper-control-of-resource-identi-73b478b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12919%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20EverShop&amp;severity=medium&amp;id=691102ed4abca22cf3180d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dangerous-runc-flaws-could-allow-hackers-to-escape-bf6584fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dangerous%20runC%20flaws%20could%20allow%20hackers%20to%20escape%20Docker%20containers&amp;severity=high&amp;id=6910e4d3e28c534f9cea922f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-malware-returns-on-openvsx-with-3-new-vs-196168aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20malware%20returns%20on%20OpenVSX%20with%203%20new%20VSCode%20extensions&amp;severity=high&amp;id=69106e5ccf04d12accf04540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-target-us-non-profit-in-long--b9bfaf78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20hackers%20target%20U.S.%20non-profit%20in%20long-term%20espionage%20campaign&amp;severity=medium&amp;id=69106e5ccf04d12accf04544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12918-improper-control-of-resource-identi-c22bdf02</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12918%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20yungifez%20Skuul%20School%20Management%20System&amp;severity=low&amp;id=69104ccfc7861954111d1f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12917-denial-of-service-in-tozed-zlt-t10-10ff89d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12917%3A%20Denial%20of%20Service%20in%20TOZED%20ZLT%20T10&amp;severity=medium&amp;id=6910457ac786195411069ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watch-out-for-svg-files-booby-trapped-with-malware-5579952d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Watch%20out%20for%20SVG%20files%20booby-trapped%20with%20malware&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-primitive-crypto-theft-to-sophisticated-ai-ba-69c16e53</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20primitive%20crypto%20theft%20to%20sophisticated%20AI-based%20deception&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gotta-fly-targeting-the-uav-sector-f211c012</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gotta%20fly%3A%20Targeting%20the%20UAV%20sector&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-09-7b9b5b14</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-09&amp;severity=medium&amp;id=69112f0da0a00dcacbf6b766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12916-command-injection-in-sangfor-operat-72fe5375</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12916%3A%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=690fd5651fa9d93f266108d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12915-file-inclusion-in-70mai-x200-a0652ef7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12915%3A%20File%20Inclusion%20in%2070mai%20X200&amp;severity=high&amp;id=690fcfd8932891ff16e907d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12914-sql-injection-in-aapanel-baota-438049e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12914%3A%20SQL%20Injection%20in%20aaPanel%20BaoTa&amp;severity=medium&amp;id=690fb8cd7021794900e353c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12913-sql-injection-in-code-projects-resp-d4e0c815</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12913%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=690fa36310a10cc633780a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-uncovers-whisper-leak-attack-that-identi-f9fe2002</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Uncovers%20&apos;Whisper%20Leak&apos;%20Attack%20That%20Identifies%20AI%20Chat%20Topics%20in%20Encrypted%20Traffic&amp;severity=high&amp;id=690f8fe62cf59ec1f17535a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-italian-citizen-was-targeted-with-paragons-g-ad5f9684</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20Italian%20citizen%20was%20targeted%20with%20Paragon%E2%80%99s%20Graphite%20spyware.%20We%20have%20a%20serious%20problem&amp;severity=high&amp;id=690f8fe62cf59ec1f17535a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-uncovers-whisper-leak-attack-that-identi-eaeb40fc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Uncovers%20&apos;Whisper%20Leak&apos;%20Attack%20That%20Identifies%20AI%20Chat%20Topics%20in%20Encrypted%20Traffic&amp;severity=medium&amp;id=6911531fb9239aa3907cc387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/free-open-source-file-scanner-bf7939a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=free%2C%20open-source%20file%20scanner&amp;severity=high&amp;id=690f56578fc7843e3d462bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arbitrary-app-installation-on-intune-managed-andro-96f1ea7f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arbitrary%20App%20Installation%20on%20Intune%20Managed%20Android%20Enterprise%20BYOD%20in%20Work%20Profile&amp;severity=medium&amp;id=690f4f0fa9ae4c51c61b25ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-actively-exploited-firewall-flaws-now-abused-032b82c8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%3A%20Actively%20exploited%20firewall%20flaws%20now%20abused%20for%20DoS%20attacks&amp;severity=high&amp;id=690f2536d127c1b08b96ff5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-log4j-to-iis-chinas-hackers-turn-legacy-bugs--dd6b8851</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Log4j%20to%20IIS%2C%20China%E2%80%99s%20Hackers%20Turn%20Legacy%20Bugs%20into%20Global%20Espionage%20Tools&amp;severity=high&amp;id=690f21bad127c1b08b91d688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-fixes-seven-nas-zero-day-flaws-exploited-at-p-7f2caaca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20fixes%20seven%20NAS%20zero-day%20flaws%20exploited%20at%20Pwn2Own&amp;severity=critical&amp;id=690f21bad127c1b08b91d67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-nuget-packages-drop-disruptive-time-bomb-2b1c3e4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20NuGet%20packages%20drop%20disruptive%20&apos;time%20bombs&apos;&amp;severity=high&amp;id=690f21bad127c1b08b91d68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12399-cwe-434-unrestricted-upload-of-file-2d963d08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12399%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20alexreservations%20Alex%20Reservations%3A%20Smart%20Restaurant%20Booking&amp;severity=high&amp;id=690f0e9f15ddfe7d54073e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11967-cwe-434-unrestricted-upload-of-file-277b2bf0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11967%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20getwpfunnels%20Mail%20Mint%20%E2%80%93%20Email%20Marketing%2C%20Newsletter%2C%20Email%20Automation%20%26%20WooCommerce%20Emails&amp;severity=high&amp;id=690f0e9f15ddfe7d54073e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11448-cwe-862-missing-authorization-in-sm-00b93c9f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11448%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20Envira%20Gallery%20%E2%80%93%20Image%20Photo%20Gallery%2C%20Albums%2C%20Video%20Gallery%2C%20Slideshows%20%26%20More&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12837-cwe-79-improper-neutralization-of-i-05dbe6ec</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12837%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20aThemes%20Addons%20for%20Elementor&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12643-cwe-79-improper-neutralization-of-i-cc4f70fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saphali%20Saphali%20LiqPay%20for%20donate&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11980-cwe-89-improper-neutralization-of-s-b7d7d4b2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11980%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kybernetikservices%20Quick%20Featured%20Images&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12092-cwe-22-improper-limitation-of-a-pat-da06969a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12092%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gregross%20CYAN%20Backup&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12098-cwe-200-exposure-of-sensitive-infor-0626340b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12098%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20academylms%20Academy%20LMS%20Pro&amp;severity=medium&amp;id=690f02ef224224608af9754f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12099-cwe-502-deserialization-of-untruste-4f0a42e9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12099%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20kodezen%20Academy%20LMS%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Complete%20eLearning%20Solution&amp;severity=high&amp;id=690f02ef224224608af97553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12621-cwe-863-incorrect-authorization-in--239f4ae6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12621%3A%20CWE-863%20Incorrect%20Authorization%20in%20wpdesk%20Flexible%20Refund%20and%20Return%20Order%20for%20WooCommerce&amp;severity=medium&amp;id=690ef21a097c6a910ad5e3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12498-cwe-862-missing-authorization-in-me-1c2e239b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12498%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=690ee8d444af18c375220269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeypot-requests-for-code-repositories-sat-nov-8t-8abd15aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Honeypot%3A%20Requests%20for%20(Code)%20Repositories%2C%20(Sat%2C%20Nov%208th)&amp;severity=medium&amp;id=690ee0222137a290ee061dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9334-cwe-94-improper-control-of-generatio-828c3590</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9334%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20codesolz%20Better%20Find%20and%20Replace%20%E2%80%93%20AI-Powered%20Suggestions&amp;severity=high&amp;id=690edcb42137a290ee0198e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12125-cwe-79-improper-neutralization-of-i-b42d44e8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linksoftware%20HTML%20Forms%20%E2%80%93%20Simple%20WordPress%20Forms%20Plugin&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12112-cwe-79-improper-neutralization-of-i-fdb4fc65</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12112%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20Insert%20Headers%20and%20Footers%20Code%20%E2%80%93%20HT%20Script&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12000-cwe-22-improper-limitation-of-a-pat-84002efc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12000%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getwpfunnels%20WPFunnels%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20with%20Checkout%20%26%20One%20Click%20Upsell&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11748-cwe-639-authorization-bypass-throug-43924098</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11748%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20itthinx%20Groups&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf6420c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12161-cwe-434-unrestricted-upload-of-file-7dd7582a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12161%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20burhandodhy%20Smart%20Auto%20Upload%20Images%20%E2%80%93%20Import%20External%20Images&amp;severity=high&amp;id=690ebeaf3a8fd010ecf6422b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12193-cwe-79-improper-neutralization-of-i-94b2f4fc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12193%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kitae-park%20Mang%20Board%20WP&amp;severity=medium&amp;id=690ebeb03a8fd010ecf64252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11972-cwe-89-improper-neutralization-of-s-3824ae02</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11972%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7663-cwe-862-missing-authorization-in-ova-de40624e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7663%3A%20CWE-862%20Missing%20Authorization%20in%20ovatheme%20Ovatheme%20Events%20Manager&amp;severity=medium&amp;id=690ebeb03a8fd010ecf6425b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12353-cwe-639-authorization-bypass-throug-eb442bcc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12353%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20getwpfunnels%20WPFunnels%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20with%20Checkout%20%26%20One%20Click%20Upsell&amp;severity=medium&amp;id=690ebeb03a8fd010ecf64256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12042-cwe-862-missing-authorization-in-we-d9b39f8f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12042%3A%20CWE-862%20Missing%20Authorization%20in%20werbeagenturcommotion%20Course%20Booking%20System&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf6421b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12064-cwe-79-improper-neutralization-of-i-e654ccac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20WP2Social%20Auto%20Publish&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf6421f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12177-cwe-321-use-of-hard-coded-cryptogra-e1fb6848</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12177%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12167-cwe-862-missing-authorization-in-rn-2d3c8ed4</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12167%3A%20CWE-862%20Missing%20Authorization%20in%20rnzo%20Connect%20Contact%20Form%207%20and%20AWeber&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf6422f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12583-cwe-862-missing-authorization-in-ne-33b2fc78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12583%3A%20CWE-862%20Missing%20Authorization%20in%20neofix%20Simple%20Downloads%20List&amp;severity=medium&amp;id=690eb0d73a8fd010ecf282da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11452-cwe-89-improper-neutralization-of-s-30f144b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11452%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20asgaros%20Asgaros%20Forum&amp;severity=high&amp;id=690eb0d73a8fd010ecf282d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64494-cwe-150-improper-neutralization-of--af0ffe90</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64494%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20charmbracelet%20soft-serve&amp;severity=medium&amp;id=690e9f0a3a8fd010ecd0f4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64493-cwe-89-improper-neutralization-of-s-266fcbe1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64493%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=690e9f0a3a8fd010ecd0f4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64492-cwe-89-improper-neutralization-of-s-6bbff9d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64492%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=high&amp;id=690e9f0a3a8fd010ecd0f4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-08-53832820</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-08&amp;severity=medium&amp;id=690fdc521fa9d93f266a607c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64486-cwe-73-external-control-of-file-nam-d894c775</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64486%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20kovidgoyal%20calibre&amp;severity=critical&amp;id=690e812b0e7acb8066fb4466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12911-inappropriate-implementation-in-goo-b46e6c13</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12911%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb445e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12910-inappropriate-implementation-in-goo-b50be9dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12910%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb445a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12909-insufficient-policy-enforcement-in--25baa46d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12909%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb4456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12908-insufficient-validation-of-untruste-71cd81ea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12908%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb4452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12907-insufficient-validation-of-untruste-88e4df1c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12907%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=690e812b0e7acb8066fb444e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12906-inappropriate-implementation-in-goo-96437911</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12906%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb444a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12905-inappropriate-implementation-in-goo-5147d9e5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12905%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb4446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64485-cwe-22-improper-limitation-of-a-pat-aef7038b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64485%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=690e812b0e7acb8066fb4462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-rise-of-online-casino-spam-29af03bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Rise%20of%20Online%20Casino%20Spam&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37736-cwe-863-incorrect-authorization-in--679fb322</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37736%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Elastic%20Cloud%20Enterprise%20(ECE)&amp;severity=high&amp;id=690e71563a5f68e27f2ed920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12418-cwe-59-improper-link-resolution-bef-58225bcd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12418%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Revenera%20InstallShield&amp;severity=medium&amp;id=690e653fde4eb1b9f756d678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/landfall-malware-targeted-samsung-galaxy-users-daa9203c</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Landfall&apos;%20Malware%20Targets%20Samsung%20Galaxy%20Users&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12863-use-after-free-in-red-hat-red-hat-e-6f448282</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12863&amp;severity=null&amp;id=690e5f49323c4112fbad3517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomvibing-infests-visual-studio-extension-marke-ba369b63</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Ransomvibing&apos;%20Infests%20Visual%20Studio%20Extension%20Market&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64481-cwe-601-url-redirection-to-untruste-b90ff5a4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64481%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20simonw%20datasette&amp;severity=low&amp;id=694f079233784cecd499b7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12875-out-of-bounds-write-in-mruby-a5920cd3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12875%3A%20Out-of-bounds%20Write%20in%20mruby&amp;severity=medium&amp;id=690e59e81aa5a3f4ee1fc7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12896-cwe-307-improper-restriction-of-exc-32187ba3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12896%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Solidigm%E2%84%A2%20D5-P5316%2C%20D7-P5510%2C%20D7-P5520%2FD7-P5620%2C%20D5-P5430%2C%20D5-P5336&amp;severity=medium&amp;id=690e5d6d1aa5a3f4ee24f357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12902-cwe-665-improper-initialization-in--94915407</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12902%3A%20CWE-665%20Improper%20Initialization%20in%20Solidigm%E2%84%A2%20D5-P5316%2C%20D5-P5430%2C%20D7-P5520%2FD7-P5620%2C%20D5-P5336&amp;severity=medium&amp;id=690e5d6d1aa5a3f4ee24f35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64439-cwe-502-deserialization-of-untruste-12c0bc65</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64439%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langgraph&amp;severity=high&amp;id=690e623c323c4112fbb14727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-backs-massive-ai-push-in-uae-raising-sec-9e75cb73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Backs%20Massive%20AI%20Push%20in%20UAE%2C%20Raising%20Security%20Concerns&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10230-improper-neutralization-of-special--4e28a7fd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10230%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=690e4d7dc4445bd1e6c78d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36006-cwe-404-improper-resource-shutdown--b248aa76</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36006%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e449cdc0204d2f6657991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7700-null-pointer-dereference-4f448a73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7700%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=690e449cdc0204d2f6657997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36008-cwe-770-allocation-of-resources-wit-f4f71011</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36008%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e449cdc0204d2f6657994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36131-cwe-359-exposure-of-private-persona-675fbfa6</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36131%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e411fdc0204d2f6606153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36136-cwe-770-allocation-of-resources-wit-73a37965</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36136%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e411fdc0204d2f6606156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36185-cwe-943-improper-neutralization-of--9a425597</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36185%3A%20CWE-943%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e411fdc0204d2f6606159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12890-improper-check-or-handling-of-excep-1694b706</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12890%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=690e411fdc0204d2f660615c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36186-cwe-250-execution-with-unnecessary--202d6663</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36186%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Db2&amp;severity=high&amp;id=690e3d99dc0204d2f65bf867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33012-cwe-324-use-of-a-key-past-its-expir-2d834222</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33012%3A%20CWE-324%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e3d99dc0204d2f65bf864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2534-cwe-789-memory-allocation-with-exces-8b0f1c70</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2534%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e3d99dc0204d2f65bf861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36135-cwe-79-improper-neutralization-of-i-83b55546</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47118-cwe-121-stack-based-buffer-overflow-e1b6b891</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47118%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12829-cwe-125-out-of-bounds-read-in-amazo-16a00e5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12829%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Amazon%20Ion-C&amp;severity=medium&amp;id=690e35acf29beb96f88f84a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12873-sql-injection-in-campcodes-school-f-e9d77667</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12873%3A%20SQL%20Injection%20in%20Campcodes%20School%20File%20Management&amp;severity=medium&amp;id=690e35acf29beb96f88f84a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9458-cwe-120-buffer-copy-without-checking-71ea4f13</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9458%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=690e35acf29beb96f88f84b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/samsung-zero-click-flaw-exploited-to-deploy-landfa-eebc5c61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Samsung%20Mobile%20Flaw%20Exploited%20as%20Zero-Day%20to%20Deploy%20LANDFALL%20Android%20Spyware&amp;severity=low&amp;id=690eb03c3a8fd010ecf20020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64430-cwe-918-server-side-request-forgery-c86441a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64430%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=690e3d06dc0204d2f65bb8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64347-cwe-284-improper-access-control-in--c126b0b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64347%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20apollographql%20router&amp;severity=high&amp;id=690e3201f29beb96f88aff9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12862-unrestricted-upload-in-projectworld-fc491cf2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12862%3A%20Unrestricted%20Upload%20in%20projectworlds%20Online%20Notes%20Sharing%20Platform&amp;severity=medium&amp;id=690e23aa5ed2b3c9882b343b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3222-cwe-287-improper-authentication-in-g-a21e94c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3222%3A%20CWE-287%20Improper%20Authentication%20in%20GE%20Vernova%20Smallworld&amp;severity=critical&amp;id=690e23aa5ed2b3c9882b3441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7719-cwe-22-improper-limitation-of-a-path-aad7bef7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7719%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GE%20Vernova%20Smallworld&amp;severity=medium&amp;id=690e23aa5ed2b3c9882b3448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-controversial-ransomware-report-goot-5c934bae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Controversial%20Ransomware%20Report%2C%20Gootloader%20Returns%2C%20More%20AN0M%20Arrests&amp;severity=medium&amp;id=690e1c965ed2b3c98821386a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-log4j-to-iis-chinas-hackers-turn-legacy-bugs--50b0e8fc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Log4j%20to%20IIS%2C%20China%E2%80%99s%20Hackers%20Turn%20Legacy%20Bugs%20into%20Global%20Espionage%20Tools&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12861-sql-injection-in-dedebiz-d5e521c6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12861%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=690e19295ed2b3c9881d11e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-paid-twice-scam-infects-bookingcom-and-other-boo-b082842f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CI%20Paid%20Twice%E2%80%9D%20Scam%20Infects%20Booking.com%20and%20Other%20Booking%20Sites&apos;%20Users%20with%20PureRAT%20via%20ClickFix&amp;severity=medium&amp;id=690e17380d6e36ffa27aa06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/landfall-android-spyware-targeted-samsung-phones-v-8f3d9a2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Landfall%20Android%20Spyware%20Targeted%20Samsung%20Phones%20via%20Zero-Day&amp;severity=medium&amp;id=690e13ab0d6e36ffa27582b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47207-cwe-476-in-qnap-systems-inc-file-st-327e6d86</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47207%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=690e10330d6e36ffa2711b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52425-cwe-89-in-qnap-systems-inc-qumagie-f7ca937e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52425%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20QuMagie&amp;severity=critical&amp;id=690e10330d6e36ffa2711b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52865-cwe-476-in-qnap-systems-inc-file-st-5bc39ea2</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52865%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e10330d6e36ffa2711b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53408-cwe-476-in-qnap-systems-inc-file-st-c750caec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53408%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e10330d6e36ffa2711b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53409-cwe-770-in-qnap-systems-inc-file-st-cb75bff7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53409%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53410-cwe-770-in-qnap-systems-inc-file-st-9451c2e9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53410%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53411-cwe-770-in-qnap-systems-inc-file-st-9205e18b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53411%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53412-cwe-476-in-qnap-systems-inc-file-st-cdb4220f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53412%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53413-cwe-770-in-qnap-systems-inc-file-st-1add67a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53413%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54167-cwe-79-in-qnap-systems-inc-notifica-dd3a8c48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54167%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20Notification%20Center&amp;severity=high&amp;id=690e0fbd0d6e36ffa270ef38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54168-cwe-79-in-qnap-systems-inc-qulog-ce-699cf2f8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54168%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20QuLog%20Center&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57706-cwe-79-in-qnap-systems-inc-file-sta-cbc99d41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57706%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57712-cwe-22-in-qnap-systems-inc-qsync-ce-d48d964d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57712%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58463-cwe-23-in-qnap-systems-inc-download-827e9f0a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58463%3A%20CWE-23%20in%20QNAP%20Systems%20Inc.%20Download%20Station&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58464-cwe-23-in-qnap-systems-inc-qumagie-7ae37603</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58464%3A%20CWE-23%20in%20QNAP%20Systems%20Inc.%20QuMagie&amp;severity=high&amp;id=690e0fbe0d6e36ffa270ef7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58465-cwe-79-in-qnap-systems-inc-download-e971514b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58465%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20Download%20Station&amp;severity=low&amp;id=690e0fbe0d6e36ffa270ef82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58469-cwe-352-in-qnap-systems-inc-qulog-c-9c8484d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58469%3A%20CWE-352%20in%20QNAP%20Systems%20Inc.%20QuLog%20Center&amp;severity=low&amp;id=690e0fbe0d6e36ffa270ef86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12860-sql-injection-in-dedebiz-db8a5451</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12860%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=690e0b59623ee59e95d5a1b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12859-sql-injection-in-dedebiz-34a1039f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12859%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=690e0b59623ee59e95d5a1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-agents-are-going-rogue-heres-how-to-rein-them-i-49b68ab1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Agents%20Are%20Going%20Rogue%3A%20Here&apos;s%20How%20to%20Rein%20Them%20In&amp;severity=medium&amp;id=690e0b3d623ee59e95d58d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-security-agents-get-personas-to-make-them-more--9ef30911</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Security%20Agents%20Get%20Persona%20Makeovers&amp;severity=medium&amp;id=690e0438623ee59e95cbb95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-scammers-use-email-for-blackmail-and-extortion-e62b0cff</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20scammers%20use%20email%20for%20blackmail%20and%20extortion%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=690e005768fa31be9219230f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12857-sql-injection-in-code-projects-resp-4424d6a9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12857%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=690e03b5623ee59e95cb7e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ollama-nvidia-flaws-put-ai-infrastructure-at-risk-259bba8c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ollama%2C%20Nvidia%20Flaws%20Put%20AI%20Infrastructure%20at%20Risk&amp;severity=critical&amp;id=690dfcad68fa31be9214e019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-exposure-vulnerability-found-in-deep-learning-d297c5ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Exposure%20Vulnerability%20Found%20in%20Deep%20Learning%20Tool%20Keras&amp;severity=medium&amp;id=690df93668fa31be921001b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whats-that-coming-over-the-hill-monsta-ftp-remote--1589dff1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%E2%80%99s%20That%20Coming%20Over%20The%20Hill%3F%20(Monsta%20FTP%20Remote%20Code%20Execution%20CVE-2025-34299)%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=690df95668fa31be92103442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12856-sql-injection-in-code-projects-resp-90c37754</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12856%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=690e03b5623ee59e95cb7e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12855-sql-injection-in-code-projects-resp-8dd72fa8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12855%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=690e03b5623ee59e95cb7e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attacks-against-macos-users-evolving-fbb50b58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attacks%20Against%20macOS%20Users%20Evolving&amp;severity=medium&amp;id=690df5a868fa31be920d2a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10968-cwe-89-improper-neutralization-of-s-c2e3cd70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10968%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20GG%20Soft%20Software%20Services%20Inc.%20PaperWork&amp;severity=high&amp;id=690defa9f9c655f2f6a01ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-0-day-exploit-emails-trick-crypto-users-into--1cd97376</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%200-Day%20Exploit%20Emails%20Trick%20Crypto%20Users%20Into%20Running%20Malicious%20Code&amp;severity=high&amp;id=690deceefb039e6a56848667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12854-authorization-bypass-in-newbee-mall-681e755c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12854%3A%20Authorization%20Bypass%20in%20newbee-mall-plus&amp;severity=medium&amp;id=690de966fb039e6a5680e60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12853-sql-injection-in-sourcecodester-bes-f9f31f02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12853%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=690de966fb039e6a5680e604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/free-test-for-post-quantum-cryptography-tls-abf9df69</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Free%20test%20for%20Post-Quantum%20Cryptography%20TLS&amp;severity=medium&amp;id=690de267fb039e6a5677f1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-logic-bombs-in-malware-laced-nuget-packages-3f82666f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20Logic%20Bombs%20in%20Malware-Laced%20NuGet%20Packages%20Set%20to%20Detonate%20Years%20After%20Installation&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-congressional-budget-office-was-hacked-it-says-0301f508</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Congressional%20Budget%20Office%20Was%20Hacked.%20It%20Says%20It%20Has%20Implemented%20New%20Security%20Measures&amp;severity=medium&amp;id=690dd321c2e5047ad7450707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dragonforce-cartel-scattered-spider-at-the-gat-a983b8ec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20DragonForce%20Cartel%3A%20Scattered%20Spider%20at%20the%20gate&amp;severity=medium&amp;id=690dcfa5c2e5047ad74185f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-142-update-patches-high-severity-flaws-8e16e61a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20142%20Update%20Patches%20High-Severity%20Flaws&amp;severity=critical&amp;id=690dcc1ec2e5047ad73cd2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/enterprise-credentials-at-risk-same-old-same-old-ddb62a45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Enterprise%20Credentials%20at%20Risk%20%E2%80%93%20Same%20Old%2C%20Same%20Old%3F&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-became-aware-of-a-new-attack-variant-against-ee5c768a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20became%20aware%20of%20a%20new%20attack%20variant%20against%20Secure%20Firewall%20ASA%20and%20FTD%20devices&amp;severity=medium&amp;id=690dcb8e03ca312466af6ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-ransomware-group-claims-the-breach-of-the-was-c837e62c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20Ransomware%20group%20claims%20the%20breach%20of%20The%20Washington%20Post&amp;severity=high&amp;id=690dc80903ca312466ab6c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-congressional-budget-office-hit-by-suspected-fo-6563847b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Congressional%20Budget%20Office%20hit%20by%20suspected%20foreign%20cyberattack&amp;severity=high&amp;id=690dc80903ca312466ab6c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-coded-malicious-vs-code-extension-found-with--7b05f476</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vibe-Coded%20Malicious%20VS%20Code%20Extension%20Found%20with%20Built-In%20Ransomware%20Capabilities&amp;severity=high&amp;id=690dc80903ca312466ab6c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-linked-apt-inedibleochotense-impersonates-e-3a260e85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-linked%20APT%20InedibleOchotense%20impersonates%20ESET%20to%20deploy%20backdoor%20on%20Ukrainian%20systems&amp;severity=medium&amp;id=690dc80903ca312466ab6c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/destructive-russian-cyberattacks-on-ukraine-expand-c82cecbd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Destructive%20Russian%20Cyberattacks%20on%20Ukraine%20Expand%20to%20Grain%20Sector&amp;severity=medium&amp;id=690dbd7d03ca3124669e0a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10870-cwe-89-improper-neutralization-of-s-676f18de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10870%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20DIAL%20CentrosNet&amp;severity=critical&amp;id=690dbd9f03ca3124669e5516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bookingcom-phishing-campaign-targeting-hotels-and--3b7ab6b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Booking.com%20Phishing%20Campaign%20Targeting%20Hotels%20and%20Customers&amp;severity=medium&amp;id=690dbd8a03ca3124669e0ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-launches-new-maps-feature-to-help-businesse-8e34ffff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Launches%20New%20Maps%20Feature%20to%20Help%20Businesses%20Report%20Review-Based%20Extortion%20Attempts&amp;severity=low&amp;id=690eb03c3a8fd010ecf2002c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/18-arrested-in-crackdown-on-credit-card-fraud-ring-1632cce5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=18%20Arrested%20in%20Crackdown%20on%20Credit%20Card%20Fraud%20Rings&amp;severity=medium&amp;id=690dba571280f279b842fc1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-kimsuky-malware-endclient-rat-technical-report-d4b6f50b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Kimsuky%20Malware%20%22EndClient%20RAT%22%3A%20Technical%20Report%20and%20IOCs&amp;severity=medium&amp;id=690dba651280f279b842fd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cavalry-werewolf-hacker-group-attacks-russian-stat-f193b8d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cavalry%20Werewolf%20hacker%20group%20attacks%20Russian%20state%20institutions&amp;severity=medium&amp;id=690dba651280f279b842fd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leakyinjector-and-leakystealer-duo-hunts-for-crypt-f5059bf3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeakyInjector%20and%20LeakyStealer%20Duo%20Hunts%20For%20Crypto%20and%20Browser%20History&amp;severity=medium&amp;id=690dba651280f279b842fd9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46413-use-of-password-hash-with-insuffici-7559e5b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46413%3A%20Use%20of%20password%20hash%20with%20insufficient%20computational%20effort%20in%20BUFFALO%20INC.%20WSR-1800AX4&amp;severity=medium&amp;id=690db7deafb341dfebb2fe72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-coded-malicious-vs-code-extension-found-with--7826867f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vibe-Coded%20Malicious%20VS%20Code%20Extension%20Found%20with%20Built-In%20Ransomware%20Capabilities&amp;severity=medium&amp;id=690eb03c3a8fd010ecf2002f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64346-cwe-22-improper-limitation-of-a-pat-700a9e87</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64346%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jaredallard%20archives&amp;severity=medium&amp;id=690d86fc82f4da9bb2f8a059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12527-cwe-862-missing-authorization-in-yy-b535c46f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12527%3A%20CWE-862%20Missing%20Authorization%20in%20yydevelopment%20Page%20%26%20Post%20Notes&amp;severity=medium&amp;id=690d86fc82f4da9bb2f8a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12520-cwe-79-improper-neutralization-of-i-b9c3f8fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12520%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20Airbnb%20Review%20Slider&amp;severity=medium&amp;id=690d86fc82f4da9bb2f8a04d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64343-cwe-289-authentication-bypass-by-al-98c81eba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64343%3A%20CWE-289%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20conda%20constructor&amp;severity=high&amp;id=690d838682f4da9bb2f4364e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64339-cwe-79-improper-neutralization-of-i-52c5b86b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64339%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=690d81c33ea13e495ecb0972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64336-cwe-79-improper-neutralization-of-i-e31649a8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64336%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=690d79bf3ea13e495ec0cafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4522-cwe-862-missing-authorization-in-the-a4eba6c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4522%3A%20CWE-862%20Missing%20Authorization%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=medium&amp;id=690d79bf3ea13e495ec0caf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4519-cwe-285-improper-authorization-in-th-b0fe8baa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4519%3A%20CWE-285%20Improper%20Authorization%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=high&amp;id=690d79bf3ea13e495ec0caee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64328-cwe-78-improper-neutralization-of-s-7b278c42</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64328%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20filestore&amp;severity=high&amp;id=690d71c16e13fd093e3db3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5483-cwe-862-missing-authorization-in-nia-1149b667</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5483%3A%20CWE-862%20Missing%20Authorization%20in%20niaj%20Connector%20Wizard%20(formerly%20LC%20Wizard)&amp;severity=high&amp;id=690d71c16e13fd093e3db3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64323-cwe-862-missing-authorization-in-kg-4d199189</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64323%3A%20CWE-862%3A%20Missing%20Authorization%20in%20kgateway-dev%20kgateway&amp;severity=medium&amp;id=690d65e75b03e68548857302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64184-cwe-22-improper-limitation-of-a-pat-c9922cf3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64184%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webcomics%20dosage&amp;severity=high&amp;id=690d65e75b03e685488572fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64180-cwe-367-time-of-check-time-of-use-t-ee12b800</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64180%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Manager-io%20Manager&amp;severity=critical&amp;id=690d65e75b03e685488572fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11546-cwe-78-improper-neutralization-of-s-d690b3a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11546%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NEC%20Corporation%20CLUSTERPRO%20X%20for%20Linux%20(EXPRESSCLUSTER%20X%20for%20Linux)&amp;severity=critical&amp;id=690d500c6b26dbd672d3921f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48985-vulnerability-in-vercel-ai-sdk-ff15e5e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48985%3A%20Vulnerability%20in%20Vercel%20AI%20SDK&amp;severity=low&amp;id=690d4641dd7ca828ab196197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52662-vulnerability-in-vercel-nuxt-devtoo-ddb38cea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52662%3A%20Vulnerability%20in%20Vercel%20Nuxt%20Devtools&amp;severity=medium&amp;id=690d4641dd7ca828ab19619b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remember-remember-the-fifth-of-november-e10a6632</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remember%2C%20remember%20the%20fifth%20of%20November&amp;severity=medium&amp;id=690dba651280f279b842fda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-07-23182676</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-07&amp;severity=medium&amp;id=690e8b920e7acb80660960cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63420-na-2c0c3583</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63420%3A%20n%2Fa&amp;severity=medium&amp;id=690e653fde4eb1b9f756d67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60574-na-f1f4e398</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60574%3A%20n%2Fa&amp;severity=high&amp;id=690e653fde4eb1b9f756d67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63543-na-d3cdf1ff</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63543%3A%20n%2Fa&amp;severity=medium&amp;id=690e623c323c4112fbb14724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63544-na-af771253</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63544%3A%20n%2Fa&amp;severity=medium&amp;id=690e59e81aa5a3f4ee1fc7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63640-na-2a62ff83</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63640%3A%20n%2Fa&amp;severity=medium&amp;id=690e52ee1aa5a3f4ee16c74c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63639-na-1f2d55a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63639%3A%20n%2Fa&amp;severity=medium&amp;id=690e52ee1aa5a3f4ee16c748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63638-na-6e7e145a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63638%3A%20n%2Fa&amp;severity=medium&amp;id=690e5100c4445bd1e6cc8eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63718-na-b29569fc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63718%3A%20n%2Fa&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63713-na-947e9d57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63713%3A%20n%2Fa&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61261-na-ab63001f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61261%3A%20n%2Fa&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63717-na-27268ed0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63717%3A%20n%2Fa&amp;severity=medium&amp;id=690e3861a7fbadd0a6bb15c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63716-na-70168f70</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63716%3A%20n%2Fa&amp;severity=medium&amp;id=690e35acf29beb96f88f84af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63714-na-a8ff97a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63714%3A%20n%2Fa&amp;severity=medium&amp;id=690e3201f29beb96f88aff98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57697-na-437e2ee0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57697%3A%20n%2Fa&amp;severity=medium&amp;id=690e3201f29beb96f88aff95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63785-na-f449aacf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63785%3A%20n%2Fa&amp;severity=medium&amp;id=690e23aa5ed2b3c9882b3444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57698-na-e0631ef5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57698%3A%20n%2Fa&amp;severity=high&amp;id=690e23aa5ed2b3c9882b3438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63784-na-a05f8789</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63784%3A%20n%2Fa&amp;severity=medium&amp;id=690e20275ed2b3c988264701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63687-na-04697aee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63687%3A%20n%2Fa&amp;severity=medium&amp;id=690e1c1a5ed2b3c988210d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63783-na-8f83404a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63783%3A%20n%2Fa&amp;severity=high&amp;id=690e19295ed2b3c9881d11ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63686-na-b9514941</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63686%3A%20n%2Fa&amp;severity=medium&amp;id=690e17530d6e36ffa27ab8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63689-na-4ab30e8d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63689%3A%20n%2Fa&amp;severity=critical&amp;id=690e13c80d6e36ffa2758cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63691-na-6df29cbd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63691%3A%20n%2Fa&amp;severity=critical&amp;id=690e10330d6e36ffa2711b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63690-na-24d195a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63690%3A%20n%2Fa&amp;severity=critical&amp;id=690e10330d6e36ffa2711b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12789-url-redirection-to-untrusted-site-o-f128c0fa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12789%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20Red%20Hat%20Single%20Sign-On%207&amp;severity=medium&amp;id=690d31bfc99da72cbe178d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58423-cwe-22-in-advantech-deviceoniedge-8a469319</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58423%3A%20CWE-22%20in%20Advantech%20DeviceOn%2FiEdge&amp;severity=high&amp;id=690d258e790724a13ccd5543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59171-cwe-22-in-advantech-deviceoniedge-46b94232</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59171%3A%20CWE-22%20in%20Advantech%20DeviceOn%2FiEdge&amp;severity=high&amp;id=690d258e790724a13ccd5548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62630-cwe-22-in-advantech-deviceoniedge-42bf251b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62630%3A%20CWE-22%20in%20Advantech%20DeviceOn%2FiEdge&amp;severity=high&amp;id=690d258e790724a13ccd554d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11460-use-after-free-in-google-chrome-705b7beb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11460%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=690d258d790724a13ccd5537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11458-heap-buffer-overflow-in-google-chro-5d3e6bd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11458%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=690d258d790724a13ccd5533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11756-use-after-free-in-google-chrome-311a7470</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11756%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=690d258e790724a13ccd553b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12036-inappropriate-implementation-in-goo-da7c430d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12036%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=690d258e790724a13ccd553f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64302-cwe-79-in-advantech-deviceoniedge-52d9eb42</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64302%3A%20CWE-79%20in%20Advantech%20DeviceOn%2FiEdge&amp;severity=medium&amp;id=690d258e790724a13ccd5552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12636-cwe-522-in-ubia-ubox-0ca6d3c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12636%3A%20CWE-522%20in%20Ubia%20Ubox%20Android&amp;severity=medium&amp;id=690d258e790724a13ccd5557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11219-use-after-free-in-google-chrome-6d401465</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11219%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=low&amp;id=690d1f62a155e591f58b6604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11216-inappropriate-implementation-in-goo-baf1c387</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11216%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f62a155e591f58b6600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11215-off-by-one-error-in-google-chrome-542fb659</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11215%3A%20Off%20by%20one%20error%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b65a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11213-inappropriate-implementation-in-goo-a985cc0f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11213%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b659e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11212-inappropriate-implementation-in-goo-18d5d3a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11212%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b6597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11211-out-of-bounds-read-in-google-chrome-d935f395</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11211%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=690d1f60a155e591f58b6593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11210-side-channel-information-leakage-in-9b28a315</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11210%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b658e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11209-inappropriate-implementation-in-goo-4bcef65a</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11209%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=690d1f60a155e591f58b658a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11208-inappropriate-implementation-in-goo-ab276424</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11208%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b6586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11207-side-channel-information-leakage-in-14e24c42</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11207%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b6582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11206-heap-buffer-overflow-in-google-chro-7ca107d5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11206%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=690d1f60a155e591f58b657e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11205-heap-buffer-overflow-in-google-chro-b21b8f53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11205%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=690d1f60a155e591f58b657a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64179-cwe-862-missing-authorization-in-tr-b5542c2d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64179%3A%20CWE-862%3A%20Missing%20Authorization%20in%20treeverse%20lakeFS&amp;severity=medium&amp;id=690d1bd3a155e591f5870723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12125-improper-preservation-of-permission-e97f8f95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12125%3A%20Improper%20Preservation%20of%20Permissions%20in%203scale%20porta&amp;severity=high&amp;id=690d1bd3a155e591f5870727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64178-cwe-918-server-side-request-forgery-fe16c62e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64178%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jon4hz%20jellysweep&amp;severity=high&amp;id=690d1871a155e591f583f3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sora-2-makes-videos-so-believable-reality-checks-a-5788fef9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sora%202%20Makes%20Videos%20So%20Believable%2C%20Reality%20Checks%20Are%20Required&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64177-cwe-79-improper-neutralization-of-i-0e3f9198</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64177%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MatiasDesuu%20ThinkDashboard&amp;severity=medium&amp;id=690d1871a155e591f583f3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64176-cwe-20-improper-input-validation-in-7616768a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64176%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20MatiasDesuu%20ThinkDashboard&amp;severity=medium&amp;id=690d131508e329e0f8f68c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12790-path-traversal-filename-in-red-hat--a0e4bac3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12790%3A%20Path%20Traversal%3A%20&apos;..filename&apos;%20in%20Nicholas%20J%20Humfrey%20ruby-mqtt&amp;severity=high&amp;id=690d0f9108e329e0f8f19b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64327-cwe-918-server-side-request-forgery-4f7cf67c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64327%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MatiasDesuu%20ThinkDashboard&amp;severity=medium&amp;id=690d0f9108e329e0f8f19b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64326-cwe-212-improper-removal-of-sensiti-7ae919f1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64326%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=690d0c0d08e329e0f8ef65ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-firewall-backups-stolen-by-nation-state--edd437ab</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Firewall%20Backups%20Stolen%20by%20Nation-State%20Actor&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64174-cwe-79-improper-neutralization-of-i-889a5a08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64174%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenMage%20magento-lts&amp;severity=medium&amp;id=690d0c0d08e329e0f8ef65d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33110-cwe-80-improper-neutralization-of-s-0d93e084</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33110%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=690d0c0d08e329e0f8ef65c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64173-cwe-288-authentication-bypass-using-25a47fbb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64173%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20apollographql%20router&amp;severity=high&amp;id=690d0c0d08e329e0f8ef65cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52881-cwe-61-unix-symbolic-link-symlink-f-22d5c489</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52881%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20opencontainers%20runc&amp;severity=high&amp;id=690d06aae0be3996723e47c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12486-cwe-79-improper-neutralization-of-i-6bbf6296</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12486%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Heimdall%20Data%20Database%20Proxy&amp;severity=high&amp;id=690d06aae0be3996723e47da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12487-cwe-807-reliance-on-untrusted-input-ffa604f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12487%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20oobabooga%20text-generation-webui&amp;severity=critical&amp;id=690d06aae0be3996723e47dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12488-cwe-807-reliance-on-untrusted-input-03a30621</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12488%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20oobabooga%20text-generation-webui&amp;severity=critical&amp;id=690d06aae0be3996723e47e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12490-cwe-22-improper-limitation-of-a-pat-d25efcdd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12490%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Netgate%20pfSense&amp;severity=high&amp;id=690d0327e0be3996723a126b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52565-cwe-61-unix-symbolic-link-symlink-f-11414537</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52565%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20opencontainers%20runc&amp;severity=high&amp;id=690d0327e0be3996723a126f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34247-cwe-89-improper-neutralization-of-s-219bab26</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34247%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690cffa2e0be399672357164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34246-cwe-89-improper-neutralization-of-s-2520184f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34246%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a129c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34245-cwe-89-improper-neutralization-of-s-5424843e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34245%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a1297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34244-cwe-89-improper-neutralization-of-s-4aaee6a3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34244%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a1292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34243-cwe-89-improper-neutralization-of-s-7ca826be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34243%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a128d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34242-cwe-89-improper-neutralization-of-s-03deb6ae</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34242%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=high&amp;id=690d0327e0be3996723a1288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34241-cwe-89-improper-neutralization-of-s-ec01adf4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34241%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a1283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34240-cwe-89-improper-neutralization-of-s-201ea04b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34240%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=high&amp;id=690d0b9008e329e0f8ef0d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34239-cwe-78-improper-neutralization-of-s-c0e954c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34239%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=high&amp;id=690d0b9008e329e0f8ef0d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34238-cwe-22-improper-limitation-of-a-pat-e568d0e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34238%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690cfc1ee0be39967232fe30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34237-cwe-79-improper-neutralization-of-i-863e0efa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34237%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690cfc1ee0be39967232fe2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34236-cwe-79-improper-neutralization-of-i-e07ba982</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690cfc1ee0be39967232fe26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-infrastructure-finds-stability-with-auro-0ed63b44</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Infrastructure%20Finds%20Stability%20with%20aurologic%20GmbH&amp;severity=medium&amp;id=690d0318e0be3996723a0747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31133-cwe-61-unix-symbolic-link-symlink-f-fb315234</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31133%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20opencontainers%20runc&amp;severity=high&amp;id=690cf8a6e0be3996722ed9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22397-cwe-22-improper-limitation-of-a-pat-2acfe304</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22397%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Integrated%20Dell%20Remote%20Access%20Controller%209%2014G%20Versions&amp;severity=medium&amp;id=690cf8a6e0be3996722ed99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12815-cwe-283-unverified-ownership-in-aws-decaad33</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12815%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20AWS%20Research%20and%20Engineering%20Studio%20(RES)&amp;severity=medium&amp;id=690cd9af1c9f718888294807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10885-cwe-250-execution-with-unnecessary--e1fc50b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10885%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Autodesk%20Installer&amp;severity=high&amp;id=690cd7dc70ae18879c793e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12485-cwe-269-improper-privilege-manageme-21312e47</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12485%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Devolutions%20Server&amp;severity=high&amp;id=690cd45870ae18879c759e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12808-cwe-284-improper-access-control-in--a86a6461</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12808%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=medium&amp;id=690cd0d370ae18879c72e598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/7-new-chatgpt-vulnerabilities-let-hackers-steal-da-dd3d7205</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=7%20New%20ChatGPT%20Vulnerabilities%20Let%20Hackers%20Steal%20Data%20and%20Hijack%20Memory&amp;severity=medium&amp;id=690ccd4d70ae18879c71a563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64287-improper-control-of-filename-for-in-c9143514</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64287%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Alloggio%20-%20Hotel%20Booking&amp;severity=high&amp;id=690cc81eca26fb4dd2f59cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64232-improper-neutralization-of-input-du-b6010889</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64232%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20Import%20from%20YML&amp;severity=high&amp;id=690cc81eca26fb4dd2f59cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64224-improper-neutralization-of-input-du-ab1bd953</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64224%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Conference%20Theme%20Custom%20Post%20Type&amp;severity=high&amp;id=690cc81eca26fb4dd2f59cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64198-improper-neutralization-of-input-du-0c8bc194</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64198%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appscreo%20Easy%20Social%20Share%20Buttons&amp;severity=high&amp;id=690cc81eca26fb4dd2f59ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64196-improper-neutralization-of-input-du-97a4dd87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64196%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=high&amp;id=690cc81eca26fb4dd2f59ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6327-unrestricted-upload-of-file-with-dan-ac142e1a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6327%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=critical&amp;id=690cc81eca26fb4dd2f59cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6325-incorrect-privilege-assignment-in-ki-ac0fa496</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6325%3A%20Incorrect%20Privilege%20Assignment%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=critical&amp;id=690cc81eca26fb4dd2f59cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62950-cross-site-request-forgery-csrf-in--725d6875</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62950%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=medium&amp;id=690cc81eca26fb4dd2f59ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62914-missing-authorization-in-anibalwain-14b82191</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62914%3A%20Missing%20Authorization%20in%20anibalwainstein%20Effect%20Maker&amp;severity=medium&amp;id=690cc81aca26fb4dd2f59c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62076-improper-neutralization-of-input-du-41787187</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ido%20Kobelkowsky%20Simple%20Payment&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62075-improper-control-of-filename-for-in-2f7be238</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62075%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ido%20Kobelkowsky%20Simple%20Payment&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62074-improper-neutralization-of-input-du-e16e8cc6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62074%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Amauri%20WPMobile.App&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62067-improper-control-of-filename-for-in-ab0bf6d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Savory&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62066-improper-control-of-filename-for-in-bd8c37a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20Revolution&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62065-unrestricted-upload-of-file-with-da-f700e695</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62065%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Rometheme%20RTMKit&amp;severity=critical&amp;id=690cc81aca26fb4dd2f59c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62064-authentication-bypass-using-an-alte-67539e0d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62064%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Elated-Themes%20Search%20%26%20Go&amp;severity=critical&amp;id=690cc81aca26fb4dd2f59c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62059-improper-neutralization-of-input-du-001f8598</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20SureRank&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62057-improper-neutralization-of-input-du-ebe11a9e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62055-improper-control-of-filename-for-in-f5be0d76</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62055%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Academist&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62053-improper-control-of-filename-for-in-0ac312de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62053%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20favethemes%20Houzez&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62051-improper-neutralization-of-input-du-40cb62a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AndonDesign%20UDesign%20Core&amp;severity=medium&amp;id=690cc816ca26fb4dd2f59b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62049-missing-authorization-in-stylemix-c-810a77fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62049%3A%20Missing%20Authorization%20in%20Stylemix%20Cost%20Calculator%20Builder&amp;severity=medium&amp;id=690cc816ca26fb4dd2f59b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62047-unrestricted-upload-of-file-with-da-91d8cb9f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62047%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Case-Themes%20Case%20Addons&amp;severity=critical&amp;id=690cc816ca26fb4dd2f59b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62046-missing-authorization-in-codextheme-e2c697cd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62046%3A%20Missing%20Authorization%20in%20CodexThemes%20TheGem%20Demo%20Import%20(for%20WPBakery)&amp;severity=medium&amp;id=690cc816ca26fb4dd2f59b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62045-improper-control-of-filename-for-in-89499e84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62045%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20WPBakery)&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62044-improper-neutralization-of-input-du-2c42e2fa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62044%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20WPBakery)&amp;severity=medium&amp;id=690cc816ca26fb4dd2f59b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62041-improper-neutralization-of-input-du-66464271</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62041%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20(Elementor)&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62040-improper-neutralization-of-input-du-a30fb70b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62040%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YOP%20YOP%20Poll&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62039-insertion-of-sensitive-information--6d353a5e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62039%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Ays%20Pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=high&amp;id=690cc814ca26fb4dd2f59b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62038-insertion-of-sensitive-information--bbd419f3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62038%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Sovlix%20MeetingHub&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62037-missing-authorization-in-uxper-togo-9977a3a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62037%3A%20Missing%20Authorization%20in%20uxper%20Togo&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62036-improper-neutralization-of-input-du-4677544d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62036%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Togo&amp;severity=high&amp;id=690cc814ca26fb4dd2f59b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62035-deserialization-of-untrusted-data-i-f824e158</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62035%3A%20Deserialization%20of%20Untrusted%20Data%20in%20uxper%20Togo&amp;severity=high&amp;id=690cc814ca26fb4dd2f59b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62034-incorrect-privilege-assignment-in-u-3f16263a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62034%3A%20Incorrect%20Privilege%20Assignment%20in%20uxper%20Togo&amp;severity=high&amp;id=690cc814ca26fb4dd2f59b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62033-missing-authorization-in-uxper-togo-2bc7f19c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62033%3A%20Missing%20Authorization%20in%20uxper%20Togo&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62032-improper-neutralization-of-input-du-adefbc7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Cloud%20Library&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62031-improper-neutralization-of-input-du-febed961</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=high&amp;id=690cc814ca26fb4dd2f59afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62030-improper-neutralization-of-input-du-edc07529</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62030%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62028-missing-authorization-in-themenecta-3430ee51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62028%3A%20Missing%20Authorization%20in%20ThemeNectar%20Salient&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62018-missing-authorization-in-hogash-kal-afb9b8d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62018%3A%20Missing%20Authorization%20in%20hogash%20KALLYAS&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62017-missing-authorization-in-hogash-kal-5ca74e98</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62017%3A%20Missing%20Authorization%20in%20hogash%20KALLYAS&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62016-unrestricted-upload-of-file-with-da-aebc8057</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62016%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20hogash%20KALLYAS&amp;severity=critical&amp;id=690cc810ca26fb4dd2f596ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62014-improper-control-of-filename-for-in-12fe845b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62014%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20ITok&amp;severity=high&amp;id=690cc810ca26fb4dd2f596a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62012-improper-neutralization-of-input-du-05ebc36f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62012%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20(Elementor)&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62011-improper-neutralization-of-input-du-a26f242e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62010-improper-control-of-filename-for-in-0b033482</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62010%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Famita&amp;severity=high&amp;id=690cc810ca26fb4dd2f5969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60248-improper-control-of-filename-for-in-7e98aa9c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60248%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WPClever%20WPC%20Product%20Options%20for%20WooCommerce&amp;severity=high&amp;id=690cc810ca26fb4dd2f5969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60247-missing-authorization-in-bux-bux-wo-1a7533cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60247%3A%20Missing%20Authorization%20in%20Bux%20Bux%20Woocommerce&amp;severity=medium&amp;id=690cc810ca26fb4dd2f59697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60244-improper-neutralization-of-script-r-8ffeaee2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60244%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20RealMag777%20TableOn&amp;severity=high&amp;id=690cc80cca26fb4dd2f595e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60243-incorrect-privilege-assignment-in-h-b129cfb8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60243%3A%20Incorrect%20Privilege%20Assignment%20in%20Holest%20Engineering%20Selling%20Commander%20for%20WooCommerce&amp;severity=critical&amp;id=690cc80cca26fb4dd2f595e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60242-improper-limitation-of-a-pathname-t-f6facc5b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60242%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Anatoly%20Download%20Counter&amp;severity=high&amp;id=690cc80cca26fb4dd2f595e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60240-improper-control-of-filename-for-in-dc15f2ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60240%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Alexander%20AnyComment&amp;severity=high&amp;id=690cc80cca26fb4dd2f595df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60239-improper-neutralization-of-special--f66272de</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60239%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Codexpert%2C%20Inc%20CoSchool%20LMS&amp;severity=high&amp;id=690cc80cca26fb4dd2f595dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60235-unrestricted-upload-of-file-with-da-9bb9a303</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60235%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Plugify%20Support%20Ticket%20System%20for%20WooCommerce%20(Premium)&amp;severity=critical&amp;id=690cc80cca26fb4dd2f595d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60207-unrestricted-upload-of-file-with-da-d80d98f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60207%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Addify%20Custom%20User%20Registration%20Fields%20for%20WooCommerce&amp;severity=critical&amp;id=690cc80cca26fb4dd2f595d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60204-improper-control-of-filename-for-in-70b6ee9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60204%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Josh%20Kohlbach%20WooCommerce%20Store%20Toolkit&amp;severity=high&amp;id=690cc80cca26fb4dd2f595d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60203-improper-control-of-filename-for-in-de31576a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60203%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Josh%20Kohlbach%20Store%20Exporter&amp;severity=high&amp;id=690cc80cca26fb4dd2f595d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60202-improper-control-of-filename-for-in-0c533443</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60202%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Kyle%20Phillips%20Favorites&amp;severity=high&amp;id=690cc80cca26fb4dd2f595cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60201-improper-control-of-filename-for-in-4db0e833</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60201%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20aguilatechnologies%20WP%20Customer%20Area&amp;severity=high&amp;id=690cc809ca26fb4dd2f594e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60200-improper-control-of-filename-for-in-f60d3d30</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60200%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20LearnPress%20Export%20Import&amp;severity=high&amp;id=690cc809ca26fb4dd2f594e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60199-improper-control-of-filename-for-in-32038179</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60199%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dedalx%20InHype%20-%20Blog%20%26%20Magazine%20WordPress%20Theme&amp;severity=high&amp;id=690cc809ca26fb4dd2f594de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60198-improper-control-of-filename-for-in-d7902855</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60198%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dedalx%20Saxon%20-%20Viral%20Content%20Blog%20%26%20Magazine%20Marketing%20WordPress%20Theme&amp;severity=high&amp;id=690cc809ca26fb4dd2f594db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60197-improper-control-of-filename-for-in-68df6462</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60197%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20owenr88%20Simple%20Contact%20Forms&amp;severity=high&amp;id=690cc809ca26fb4dd2f594d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60196-improper-control-of-filename-for-in-c8629ef1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60196%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Clearblue%20Clearblue%C2%AE%20Ovulation%20Calculator&amp;severity=high&amp;id=690cc809ca26fb4dd2f594d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60195-incorrect-privilege-assignment-in-v-ae37057d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60195%3A%20Incorrect%20Privilege%20Assignment%20in%20Vito%20Peleg%20Atarim&amp;severity=critical&amp;id=690cc809ca26fb4dd2f594d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60194-improper-control-of-filename-for-in-233bcd35</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60194%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20Product%20Search%20for%20WooCommerce&amp;severity=high&amp;id=690cc809ca26fb4dd2f594cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60193-improper-control-of-filename-for-in-d69e0ec6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60193%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20User%20Roles&amp;severity=high&amp;id=690cc809ca26fb4dd2f594cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60192-improper-control-of-filename-for-in-96eee885</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60192%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20Wholesale%20Pricing%20for%20WooCommerce&amp;severity=high&amp;id=690cc809ca26fb4dd2f594c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60191-improper-control-of-filename-for-in-0e13e8f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60191%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20Wishlist%20for%20WooCommerce&amp;severity=high&amp;id=690cc801ca26fb4dd2f593f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60190-improper-control-of-filename-for-in-4a51c0d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60190%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Hinnerk%20Altenburg%20Immocaster%20WordPress%20Plugin&amp;severity=high&amp;id=690cc801ca26fb4dd2f593ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60189-improper-control-of-filename-for-in-2ab3885c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60189%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PoloPag%20PoloPag%20%E2%80%93%20Pix%20Autom%C3%A1tico%20para%20Woocommerce&amp;severity=high&amp;id=690cc801ca26fb4dd2f593ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60188-insertion-of-sensitive-information--61ea6cde</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60188%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Vito%20Peleg%20Atarim&amp;severity=high&amp;id=690cc801ca26fb4dd2f593e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60187-unrestricted-upload-of-file-with-da-8f913a54</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60187%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=690cc801ca26fb4dd2f593e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60074-improper-control-of-filename-for-in-56758241</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60074%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Processby%20Lazy%20Load%20Optimizer&amp;severity=high&amp;id=690cc801ca26fb4dd2f593e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60073-improper-control-of-filename-for-in-05961d47</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60073%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Processby%20Responsive%20Sidebar&amp;severity=high&amp;id=690cc801ca26fb4dd2f593de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59556-improper-neutralization-of-input-du-61d92859</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20GoStore&amp;severity=high&amp;id=690cc801ca26fb4dd2f593d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58998-deserialization-of-untrusted-data-i-2dfbc093</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58998%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cristi%C3%A1n%20L%C3%A1vaque%20s2Member&amp;severity=critical&amp;id=690cc7f7ca26fb4dd2f590c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58996-unrestricted-upload-of-file-with-da-5ddb7c95</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58996%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Helmut%20Wandl%20Advanced%20Settings&amp;severity=critical&amp;id=690cc7f7ca26fb4dd2f590be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58995-improper-control-of-filename-for-in-6fc263ea</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58995%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Leblix&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58994-improper-control-of-filename-for-in-e1080e64</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58994%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20designervily%20Greenify&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58986-missing-authorization-in-ganddser-j-25ea8b2c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58986%3A%20Missing%20Authorization%20in%20ganddser%20Jock%20On%20Air%20Now%20(JOAN)&amp;severity=medium&amp;id=690cc7f7ca26fb4dd2f590b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58972-path-traversal-in-dmitry-v-ceo-of-u-fb5c3105</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58972%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58964-improper-neutralization-of-input-du-cb2d9559</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58964%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Enzy&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58638-improper-neutralization-of-input-du-151a9787</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Institutions%20Directory&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58636-deserialization-of-untrusted-data-i-bb216451</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58636%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Keap%2FInfusionsoft&amp;severity=critical&amp;id=690cc7f7ca26fb4dd2f590a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58629-missing-authorization-in-kamleshyad-6038c386</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58629%3A%20Missing%20Authorization%20in%20kamleshyadav%20Miraculous&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58627-authorization-bypass-through-user-c-41381fa6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58627%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kamleshyadav%20Miraculous%20Core%20Plugin&amp;severity=critical&amp;id=690cc7f5ca26fb4dd2f59062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58619-deserialization-of-untrusted-data-i-743adc33</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58619%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sbouey%20Falang%20multilanguage&amp;severity=high&amp;id=690cc7f5ca26fb4dd2f5905f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58595-authentication-bypass-by-spoofing-i-6472f50b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58595%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Saad%20Iqbal%20All%20In%20One%20Login&amp;severity=medium&amp;id=690cc7f5ca26fb4dd2f5905c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58592-deserialization-of-untrusted-data-i-95585646</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58592%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cozmoslabs%20TranslatePress&amp;severity=high&amp;id=690cc7f5ca26fb4dd2f59059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58243-missing-authorization-in-jthemes-im-66c08558</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58243%3A%20Missing%20Authorization%20in%20Jthemes%20imEvent&amp;severity=medium&amp;id=690cc7f5ca26fb4dd2f59056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58207-missing-authorization-in-wp-messiah-81900cbd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58207%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Ai%20Image%20Alt%20Text%20Generator%20for%20WP&amp;severity=high&amp;id=690cc7f5ca26fb4dd2f59053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5803-missing-authorization-in-e4jvikwp-vi-586d966e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5803%3A%20Missing%20Authorization%20in%20e4jvikwp%20VikBooking%20Hotel%20Booking%20Engine%20%26%20PMS&amp;severity=medium&amp;id=690cc801ca26fb4dd2f593db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54737-improper-neutralization-of-input-du-2cd33b0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54737%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=high&amp;id=690cc7f4ca26fb4dd2f59050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54722-improper-neutralization-of-input-du-d51ac229</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54722%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ex-Themes%20WooTour&amp;severity=high&amp;id=690cc7f4ca26fb4dd2f5904d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54721-improper-neutralization-of-input-du-db451d62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54721%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20Resca&amp;severity=high&amp;id=690cc7f4ca26fb4dd2f5904a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54719-deserialization-of-untrusted-data-i-33975485</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54719%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Yogi%20-%20Health%20Beauty%20%26%20Yoga&amp;severity=high&amp;id=690cc7f4ca26fb4dd2f59045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54718-improper-neutralization-of-input-du-a26043f1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54718%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Yogi%20-%20Health%20Beauty%20%26%20Yoga&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54711-missing-authorization-in-bplugins-i-131867df</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54711%3A%20Missing%20Authorization%20in%20bPlugins%20Info%20Cards&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53586-deserialization-of-untrusted-data-i-9f68c363</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53586%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20WeMusic&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53585-improper-neutralization-of-input-du-2b1ffa90</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20WeMusic&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53574-improper-neutralization-of-input-du-e382b85b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ptibogxiv%20Doliconnect&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53573-improper-neutralization-of-input-du-6c1993ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Epic%20Review&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53349-improper-neutralization-of-input-du-cd984c4e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Laborator%20Kalium&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53324-improper-neutralization-of-input-du-26fd73dd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeYatri%20Gutenify&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53316-cross-site-request-forgery-csrf-in--393a07f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53316%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjahan%20Jewel%20WP%20GDPR%20Cookie%20Consent&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53286-improper-neutralization-of-input-du-69e55344</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53286%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jhainey%20Milevis%20Dropify&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53283-unrestricted-upload-of-file-with-da-3e4237c9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53283%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20borisolhor%20Drop%20Uploader%20for%20CF7%20-%20Drag%26Drop%20File%20Uploader%20Addon&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53252-improper-control-of-filename-for-in-ee9f667a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53252%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zozothemes%20Zegen&amp;severity=high&amp;id=690cc7f0ca26fb4dd2f58b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53246-missing-authorization-in-gaurav-agg-1296edd8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53246%3A%20Missing%20Authorization%20in%20Gaurav%20Aggarwal%20Backup%20and%20Move&amp;severity=medium&amp;id=690cc7f0ca26fb4dd2f58b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53245-improper-neutralization-of-input-du-917a563d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Afzal%20Multani%20WP%20Logo%20Changer&amp;severity=high&amp;id=690cc7f0ca26fb4dd2f58b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53242-deserialization-of-untrusted-data-i-9290cf85</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53242%3A%20Deserialization%20of%20Untrusted%20Data%20in%20VictorThemes%20Seil&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53239-improper-neutralization-of-input-du-3a81bda6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bnovotny%20User%20Registration%20Aide&amp;severity=high&amp;id=690cc7f0ca26fb4dd2f58b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53214-missing-authorization-in-sertifier--42ae7fce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53214%3A%20Missing%20Authorization%20in%20sertifier%20Sertifier%20Certificate%20%26%20Badge%20Maker&amp;severity=medium&amp;id=690cc7f0ca26fb4dd2f58b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52773-improper-neutralization-of-special--9b0c4b8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52773%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20hiecor%20HieCOR%20Payment%20Gateway%20Plugin&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52764-improper-neutralization-of-input-du-c4c9ad04</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52764%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marielav%20flexoslider&amp;severity=high&amp;id=690cc7f0ca26fb4dd2f58b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49909-improper-neutralization-of-input-du-16ef2e34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49909%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Bookmark%20%26%20Follow&amp;severity=high&amp;id=690cc7f0ca26fb4dd2f58b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49905-improper-neutralization-of-input-du-faa8af29</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginsCafe%20Range%20Slider%20Addon%20for%20Gravity%20Forms&amp;severity=high&amp;id=690cc7eeca26fb4dd2f58b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49904-improper-neutralization-of-input-du-7f303d99</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=high&amp;id=690cc7eeca26fb4dd2f58b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49900-incorrect-privilege-assignment-in-b-55fe2f85</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49900%3A%20Incorrect%20Privilege%20Assignment%20in%20bPlugins%20Advanced%20scrollbar&amp;severity=high&amp;id=690cc7edca26fb4dd2f58b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49394-missing-authorization-in-bplugins-i-9336cb5e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49394%3A%20Missing%20Authorization%20in%20bPlugins%20Image%20Gallery%20block%20%E2%80%93%20Create%20and%20display%20photo%20gallery%2Fphoto%20album.&amp;severity=high&amp;id=690cc7edca26fb4dd2f58b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49393-deserialization-of-untrusted-data-i-f970e6f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49393%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Fetch%20Designs%20Sign-up%20Sheets&amp;severity=critical&amp;id=690cc7edca26fb4dd2f58b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49390-improper-neutralization-of-input-du-57b20c2a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49390%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20christophrado%20Cookie%20Notice%20%26%20Consent&amp;severity=high&amp;id=690cc7edca26fb4dd2f58b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49386-deserialization-of-untrusted-data-i-f5af9d35</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49386%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Scott%20Reilly%20Preserve%20Code%20Formatting&amp;severity=high&amp;id=690cc7edca26fb4dd2f58b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49372-improper-control-of-generation-of-c-6c75e0af</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49372%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20VillaTheme%20HAPPY&amp;severity=critical&amp;id=690cc7edca26fb4dd2f58b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48330-improper-control-of-filename-for-in-729bc385</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48330%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Daman%20Jeet%20Real%20Time%20Validation%20for%20Gravity%20Forms&amp;severity=high&amp;id=690cc7edca26fb4dd2f58afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48290-improper-control-of-filename-for-in-d4b0f559</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48290%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20bslthemes%20Kinsley&amp;severity=high&amp;id=690cc7edca26fb4dd2f58afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48090-path-traversal-in-cocobasic-blanka--58fd83cc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48090%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20CocoBasic%20Blanka%20-%20One%20Page%20WordPress%20Theme&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48089-improper-neutralization-of-special--2b2cfbd6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48089%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rainbow-Themes%20Education%20WordPress%20Theme%20%7C%20HiStudy&amp;severity=critical&amp;id=690cc7cdca26fb4dd2f57a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48086-deserialization-of-untrusted-data-i-05956df8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48086%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpdreams%20Ajax%20Search%20Lite&amp;severity=medium&amp;id=690cc7cdca26fb4dd2f57a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48085-cross-site-request-forgery-csrf-in--0025c22e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48085%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZIPANG%20Simple%20Stripe&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48083-cross-site-request-forgery-csrf-in--c74fe185</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48083%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20andriassundskard%20wpNamedUsers&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48078-cross-site-request-forgery-csrf-in--a6b8061f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48078%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Norbert%20Slick%20Google%20Map&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48077-cross-site-request-forgery-csrf-in--ed600bf5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48077%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nitinmaurya12%20Block%20Country&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47588-improper-control-of-generation-of-c-fa9ccb57</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47588%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20acowebs%20Dynamic%20Pricing%20With%20Discount%20Rules%20for%20WooCommerce&amp;severity=critical&amp;id=690cc7caca26fb4dd2f57a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39468-improper-control-of-filename-for-in-368ce5a8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39468%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pantherius%20Modal%20Survey&amp;severity=high&amp;id=690cc7caca26fb4dd2f57a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39467-path-traversal-in-mikado-themes-wan-02bfd5d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39467%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Mikado-Themes%20Wanderland&amp;severity=high&amp;id=690cc7c9ca26fb4dd2f57a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39466-improper-control-of-filename-for-in-8ffe6ee4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39466%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20D%C3%B8r&amp;severity=high&amp;id=690cc7c9ca26fb4dd2f57a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39465-missing-authorization-in-flippercod-20f09185</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39465%3A%20Missing%20Authorization%20in%20flippercode%20Advanced%20Google%20Maps&amp;severity=medium&amp;id=690cc7c9ca26fb4dd2f57a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39463-improper-control-of-filename-for-in-94f6103a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39463%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Dessau&amp;severity=high&amp;id=690cc7c9ca26fb4dd2f57a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32222-improper-control-of-generation-of-c-12513e85</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32222%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Widgetlogic.org%20Widget%20Logic&amp;severity=critical&amp;id=690cc7c9ca26fb4dd2f57a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31029-improper-neutralization-of-input-du-9cc9d3dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31029%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bingu%20replyMail&amp;severity=high&amp;id=690cc7c9ca26fb4dd2f57a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28953-improper-neutralization-of-special--edba27f0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28953%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20axiomthemes%20smart%20SEO&amp;severity=high&amp;id=690cc7c9ca26fb4dd2f57a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22288-path-traversal-in-wpmu-dev-your-all-cd6b88d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22288%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Smush%20Image%20Compression%20and%20Optimization&amp;severity=medium&amp;id=690cc7c9ca26fb4dd2f57a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-hack-chatgpt-memories-and-web-search-f-157f1281</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Hack%20ChatGPT%20Memories%20and%20Web%20Search%20Features&amp;severity=medium&amp;id=690cc3ca2a1e959dda36d66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12556-cwe-88-improper-neutralization-of-a-9a433af2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12556%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20IDIS%20ICM%20Viewer&amp;severity=high&amp;id=690cc3e82a1e959dda36da33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trojanized-eset-installers-drop-kalambur-backdoor--7409e011</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trojanized%20ESET%20Installers%20Drop%20Kalambur%20Backdoor%20in%20Phishing%20Attacks%20on%20Ukraine&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leakyinjector-and-leakystealer-duo-hunts-for-crypt-2de545d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeakyInjector%20and%20LeakyStealer%20Duo%20Hunts%20For%20Crypto%20and%20Browser%20History&amp;severity=medium&amp;id=690cbccf2a1e959dda31c62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-new-firewall-attack-exploiting-cve--68eddc4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Warns%20of%20New%20Firewall%20Attack%20Exploiting%20CVE-2025-20333%20and%20CVE-2025-20362&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11956-cwe-79-improper-neutralization-of-i-85ad9854</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11956%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proliz%20Software%20Ltd.%20Co.%20OBS%20(Student%20Affairs%20Information%20System)&amp;severity=high&amp;id=690cb9462a1e959dda2bef4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10955-cwe-79-improper-neutralization-of-i-407fe68b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10955%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netcad%20Software%20Inc.%20Netigma&amp;severity=medium&amp;id=690cb9462a1e959dda2bef56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37735-cwe-281-improper-preservation-of-pe-f9688ea3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37735%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Elastic%20Kibana&amp;severity=high&amp;id=690cb5652a1e959dda296a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gootloader-returns-what-goodies-did-they-bring-9f3bb99b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gootloader%20Returns%3A%20What%20Goodies%20Did%20They%20Bring%3F&amp;severity=medium&amp;id=690cb1e3ad97a06a3c494305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36054-cwe-79-improper-neutralization-of-i-7dba545d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Business%20Automation%20Workflow%20containers&amp;severity=medium&amp;id=690cb1f4ad97a06a3c497cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sandworm-hackers-use-data-wipers-to-disrupt-ukrain-a860235c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sandworm%20hackers%20use%20data%20wipers%20to%20disrupt%20Ukraine&apos;s%20grain%20sector&amp;severity=high&amp;id=690caad5ad97a06a3c439c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rigged-poker-games-schneier-on-security-201e9aef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rigged%20Poker%20Games%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=690caad5ad97a06a3c439c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cavalry-werewolf-hackers-hit-russian-government-or-c9c68d9c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cavalry%20Werewolf%20Hackers%20Hit%20Russian%20Government%20Organization%20with%20New%20ShellNET%20Backdoor&amp;severity=medium&amp;id=690ca3d1ad97a06a3c3cb0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evading-elastic-edrs-call-stack-signatures-with-ca-9965f623</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evading%20Elastic%20EDR&apos;s%20call%20stack%20signatures%20with%20call%20gadgets&amp;severity=medium&amp;id=690ca3e8ad97a06a3c3cbf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/follow-pragmatic-interventions-to-keep-agentic-ai--66decd0b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Follow%20Pragmatic%20Interventions%20to%20Keep%20Agentic%20AI%20in%20Check&amp;severity=low&amp;id=690c98f748bc5002b4ff8001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defi-protocol-balancer-starts-recovering-funds-sto-e53d6abb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeFi%20Protocol%20Balancer%20Starts%20Recovering%20Funds%20Stolen%20in%20%24128%20Million%20Heist&amp;severity=medium&amp;id=690c91ee48bc5002b4fd58d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nevada-ransomware-attack-started-months-before-it--10bd6374</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nevada%20Ransomware%20Attack%20Started%20Months%20Before%20It%20Was%20Discovered%2C%20Per%20Report&amp;severity=medium&amp;id=690c8e7448bc5002b4fc803b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-tools-in-malware-botnets-gd-4a8a37eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Tools%20in%20Malware%2C%20Botnets%2C%20GDI%20Flaws%2C%20Election%20Attacks%20%26%20More&amp;severity=medium&amp;id=690eb03c3a8fd010ecf2003b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-are-the-best-practices-for-reducing-ecommerce-7c11e0af</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20are%20the%20best%20practices%20for%20reducing%20ecommerce%20payment%20fraud%3F&amp;severity=medium&amp;id=690c876b48bc5002b4faf504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automotive-it-firm-hyundai-autoever-discloses-data-f4ca9aec</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automotive%20IT%20Firm%20Hyundai%20AutoEver%20Discloses%20Data%20Breach&amp;severity=medium&amp;id=690c83de48bc5002b4fa1dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-acrobat-2020-end-of-life-06829c29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Acrobat%202020%20End%20of%20Life&amp;severity=medium&amp;id=690c796c48bc5002b4f627d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-vulnerabilities-in-contact--a8856138</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20Vulnerabilities%20in%20Contact%20Center%20Appliance&amp;severity=critical&amp;id=690c795248bc5002b4f619ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-windows-hyper-v-to-hide-linux-vm-d997c4d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Weaponize%20Windows%20Hyper-V%20to%20Hide%20Linux%20VM%20and%20Evade%20EDR%20Detection&amp;severity=high&amp;id=690c796c48bc5002b4f627d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multiple-chatgpt-security-bugs-allow-rampant-data--397f2d9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multiple%20ChatGPT%20Security%20Bugs%20Allow%20Rampant%20Data%20Theft&amp;severity=low&amp;id=690c724d48bc5002b4f026d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/state-sponsored-hackers-stole-sonicwall-cloud-back-bf5ab30c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=State-Sponsored%20Hackers%20Stole%20SonicWall%20Cloud%20Backups%20in%20Recent%20Attack&amp;severity=medium&amp;id=690c727448bc5002b4f05843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fedora-linux-41-end-of-life-b92135b8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fedora%20Linux%2041%20End%20of%20Life&amp;severity=medium&amp;id=690c6b4b48bc5002b4e8a2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11268-cwe-79-improper-neutralization-of-i-acfd61c7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Strong%20Testimonials&amp;severity=medium&amp;id=690c621403d968117476fb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12360-cwe-285-improper-authorization-in-c-71462715</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12360%3A%20CWE-285%20Improper%20Authorization%20in%20codesolz%20Better%20Find%20and%20Replace%20%E2%80%93%20AI-Powered%20Suggestions&amp;severity=medium&amp;id=690c517b03d96811746f9a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-windows-hyper-v-to-hide-linux-vm-2b4db4be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Weaponize%20Windows%20Hyper-V%20to%20Hide%20Linux%20VM%20and%20Evade%20EDR%20Detection&amp;severity=medium&amp;id=690c513803d96811746f64b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10259-cwe-1284-improper-validation-of-spe-008ec737</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10259%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=medium&amp;id=690c4cee03d96811746c8703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12471-cwe-79-improper-neutralization-of-i-f02d371f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12471%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nerdpressteam%20Hubbub%20Lite%20%E2%80%93%20Fast%2C%20free%20social%20sharing%20and%20follow%20buttons&amp;severity=medium&amp;id=690c45e503d96811746b0702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9338-cwe-119-improper-restriction-of-oper-7c577b1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9338%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ASUS%20Armoury%20Crate&amp;severity=high&amp;id=690c3ee903d9681174680384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-confirms-state-sponsored-hackers-behind--4f512768</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Confirms%20State-Sponsored%20Hackers%20Behind%20September%20Cloud%20Backup%20Breach&amp;severity=medium&amp;id=690c37c603d968117461108a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12560-cwe-918-server-side-request-forgery-be79bb7d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12560%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=690c37e403d968117461160a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11271-cwe-807-reliance-on-untrusted-input-82bf2d88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11271%3A%20CWE-807%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=690c27e36cabeda23dacfe93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12563-cwe-862-missing-authorization-in-pr-4c17214d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12563%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=690c27e36cabeda23dacfe9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61994-cross-site-scripting-xss-in-growi-i-3781f18c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61994%3A%20Cross-site%20scripting%20(XSS)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=690c245f6cabeda23da8ace4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10691-cwe-352-cross-site-request-forgery--b7fcb326</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10691%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yudiz%20Easy%20Email%20Subscription&amp;severity=medium&amp;id=690c1959fd0d6d226485656f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10683-cwe-89-improper-neutralization-of-s-632e66d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10683%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20yudiz%20Easy%20Email%20Subscription&amp;severity=medium&amp;id=690c0ec4fd0d6d226483c9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/binary-breadcrumbs-correlating-malware-samples-wit-85dde6fd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Nov%205th)&amp;severity=medium&amp;id=690c09dcfd0d6d2264828491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-bronze-butler-exploits-zero-day-to-root-japan--8a6c8023</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20&apos;Bronze%20Butler&apos;%20Exploits%20Zero-Day%20to%20Root%20Japan%20Orgs&amp;severity=critical&amp;id=690c042bfd0d6d22647d78f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gootloader-malware-is-back-with-new-tricks-after-7-0fcc26c2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gootloader%20malware%20is%20back%20with%20new%20tricks%20after%207-month%20break&amp;severity=high&amp;id=690bebb6fd0d6d226463faa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64171-cwe-862-missing-authorization-in-3s-ce6d0c03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64171%3A%20CWE-862%3A%20Missing%20Authorization%20in%203scale-sre%20marin3r&amp;severity=high&amp;id=690bef58fd0d6d2264685b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hyundai-autoever-america-data-breach-exposes-ssns--4993b304</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hyundai%20AutoEver%20America%20data%20breach%20exposes%20SSNs%2C%20drivers%20licenses&amp;severity=high&amp;id=690be821fd0d6d22645fbcb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-06-83c82901</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-06&amp;severity=medium&amp;id=690d3944c99da72cbe1ff26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63551-na-83e9aa6e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63551%3A%20n%2Fa&amp;severity=high&amp;id=690cfba3e0be39967232b9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60541-na-6e2eb37d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60541%3A%20n%2Fa&amp;severity=high&amp;id=690cfba3e0be39967232b9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27919-na-7e2ea11d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27919%3A%20n%2Fa&amp;severity=high&amp;id=690cd9af1c9f718888294817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27918-na-c2275be1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27918%3A%20n%2Fa&amp;severity=critical&amp;id=690cd9af1c9f718888294813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27917-na-50d9712d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27917%3A%20n%2Fa&amp;severity=high&amp;id=690cd9af1c9f71888829480e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27916-na-b487ea7d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27916%3A%20n%2Fa&amp;severity=high&amp;id=690cd9af1c9f71888829480a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63560-na-db0dd909</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63560%3A%20n%2Fa&amp;severity=high&amp;id=690cd45870ae18879c759e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59396-na-39f3cc84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59396&amp;severity=null&amp;id=690cd0d370ae18879c72e59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63589-na-c11f6a8f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63589%3A%20n%2Fa&amp;severity=high&amp;id=690ccd5c70ae18879c71a8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63588-na-0d89e966</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63588%3A%20n%2Fa&amp;severity=high&amp;id=690ccd5c70ae18879c71a8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63307-na-ecd21af8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63307%3A%20n%2Fa&amp;severity=high&amp;id=690cc9d770ae18879c6de90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59392-na-0b55d9d9</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59392%3A%20n%2Fa&amp;severity=medium&amp;id=690cc801ca26fb4dd2f593d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64114-cwe-89-improper-neutralization-of-s-c4d85aef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64114%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=690bdff52de49fb2b59d6991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62596-cwe-61-unix-symbolic-link-symlink-f-8855d46f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62596%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20youki-dev%20youki&amp;severity=high&amp;id=690bdc882de49fb2b5990aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-steal-personal-data-and-17000-slack-messag-0b9634fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Steal%20Personal%20Data%20and%2017%2C000%2B%20Slack%20Messages%20in%20Nikkei%20Data%20Breach&amp;severity=high&amp;id=690bdc6f2de49fb2b598fda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62161-cwe-363-race-condition-enabling-lin-20d92f00</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62161%3A%20CWE-363%3A%20Race%20Condition%20Enabling%20Link%20Following%20in%20youki-dev%20youki&amp;severity=high&amp;id=690bdc882de49fb2b5990a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55278-cwe-613-insufficient-session-expira-569288c2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55278%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCL%20Software%20DevOps%20Loop&amp;severity=high&amp;id=690bd5375c8b8caf26f32450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nikkei-suffers-breach-via-slack-compromise-bb6c5ccb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nikkei%20Suffers%20Breach%20Via%20Slack%20Compromise&amp;severity=medium&amp;id=690c087afd0d6d22648229e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12779-cwe-497-access-of-sensitive-system--923d280a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12779%3A%20CWE-497%20Access%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Amazon%20Amazon%20WorkSpaces&amp;severity=high&amp;id=690bc2956ab8174a0d403370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/half-of-the-worlds-satellite-traffic-is-unencrypte-74621f21</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Half%20of%20the%20world&apos;s%20satellite%20traffic%20is%20unencrypted%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=690bb050976718a7330913ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-uncovers-promptflux-malware-that-uses-gemin-aef26eb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Uncovers%20PROMPTFLUX%20Malware%20That%20Uses%20Gemini%20AI%20to%20Rewrite%20Its%20Code%20Hourly&amp;severity=high&amp;id=690bb027976718a733090a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-pennsylvania-confirms-data-stolen-in-4e808e59</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Pennsylvania%20confirms%20data%20stolen%20in%20cyberattack&amp;severity=high&amp;id=690baca3976718a73305f3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-carriers-to-block-spoofed-phone-numbers-in-frau-60eb0d73</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20carriers%20to%20block%20spoofed%20phone%20numbers%20in%20fraud%20crackdown&amp;severity=high&amp;id=690baca3976718a73305f3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-says-state-sponsored-hackers-behind-sept-955116cb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20says%20state-sponsored%20hackers%20behind%20September%20security%20breach&amp;severity=high&amp;id=690baca3976718a73305f3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-critical-centos-web-panel-bug-exploi-197deaee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20warns%20of%20critical%20CentOS%20Web%20Panel%20bug%20exploited%20in%20attacks&amp;severity=critical&amp;id=690baca3976718a73305f3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10853-cwe-79-improper-neutralization-of-i-fc4c8e11</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Open%20Banking%20IAM&amp;severity=medium&amp;id=690ba5a1976718a733ff3159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crossed-wires-a-case-study-of-iranian-espionage-an-24932ba3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crossed%20wires%3A%20a%20case%20study%20of%20Iranian%20espionage%20and%20attribution&amp;severity=medium&amp;id=690bc71a5c8b8caf26e670c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5770-cwe-79-improper-neutralization-of-in-c5156c6b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=690ba217976718a733fdd256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43418-an-attacker-with-physical-access-to-e81b086e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43418%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690b9d3f5191fb7cf2298936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43000-processing-maliciously-crafted-web--6b2720b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43000%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20macOS&amp;severity=high&amp;id=690b9d3f5191fb7cf2298925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12745-buffer-over-read-in-quickjs-c448c738</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12745%3A%20Buffer%20Over-read%20in%20QuickJS&amp;severity=medium&amp;id=690b9d3f5191fb7cf229892d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11093-cwe-94-improper-control-of-generati-4775beb4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11093%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WSO2%20WSO2%20Micro%20Integrator&amp;severity=high&amp;id=690b9d3f5191fb7cf229892a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31954-cwe-598-use-of-get-request-method-w-d55b0736</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31954%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20HCL%20Software%20iAutomate&amp;severity=medium&amp;id=690b99bc5191fb7cf2265e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10907-cwe-434-unrestricted-upload-of-file-8a18c482</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10907%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=high&amp;id=690b96345191fb7cf2240254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10713-cwe-611-improper-restriction-of-xml-44cdf70d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10713%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=690b8b09ffac907e5bf4a9f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/severe-react-native-flaw-exposes-developer-systems-39d58deb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Severe%20React%20Native%20Flaw%20Exposes%20Developer%20Systems%20to%20Remote%20Attacks&amp;severity=critical&amp;id=690b83f9ffac907e5beedf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43990-cwe-250-execution-with-unnecessary--0ffefb12</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43990%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Command%20Monitor%20(DCM)&amp;severity=high&amp;id=690b877dffac907e5bf1d3b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46366-cwe-256-plaintext-storage-of-a-pass-dbd48aec</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46366%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Dell%20CloudLink&amp;severity=medium&amp;id=690b8418ffac907e5bef31c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46424-cwe-1240-use-of-a-cryptographic-pri-96d0647c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46424%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Dell%20CloudLink&amp;severity=medium&amp;id=690b8eb35191fb7cf21e1afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46365-cwe-77-improper-neutralization-of-s-46d00478</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46365%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20CloudLink&amp;severity=medium&amp;id=690b8eb35191fb7cf21e1af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46364-cwe-269-improper-privilege-manageme-89bb2a81</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46364%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20CloudLin&amp;severity=critical&amp;id=690b8077ffac907e5bea79ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20304-improper-neutralization-of-input-du-a30eaf42</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20304%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=690b8074ffac907e5bea7942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20305-insufficient-granularity-of-access--747a5089</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20305%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=690b8074ffac907e5bea7945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20289-improper-neutralization-of-input-du-e5398db0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=690b8074ffac907e5bea793c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20303-improper-neutralization-of-input-du-d904009e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20303%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=690b8074ffac907e5bea793f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45379-cwe-78-improper-neutralization-of-s-5ff8fa05</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45379%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20CloudLink&amp;severity=high&amp;id=690b8077ffac907e5bea79b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20377-exposure-of-sensitive-information-t-3dd7dca6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20377%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Packaged%20Contact%20Center%20Enterprise&amp;severity=medium&amp;id=690b8077ffac907e5bea79aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20375-unrestricted-upload-of-file-with-da-c7022c7d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20375%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=690b8074ffac907e5bea7954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20376-unrestricted-upload-of-file-with-da-a55edaad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20376%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=690b8074ffac907e5bea7957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20374-improper-limitation-of-a-pathname-t-631a67a8</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20374%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=690b8074ffac907e5bea7951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20358-missing-authentication-for-critical-31c5a58e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20358%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=critical&amp;id=690b8074ffac907e5bea794e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20354-unrestricted-upload-of-file-with-da-8626db6a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20354%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=critical&amp;id=690b8074ffac907e5bea794b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20343-incorrect-comparison-in-cisco-cisco-044c2318</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20343%3A%20Incorrect%20Comparison%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=high&amp;id=690b8074ffac907e5bea7948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30479-cwe-78-improper-neutralization-of-s-2e03a643</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30479%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20CloudLink&amp;severity=high&amp;id=690b8077ffac907e5bea79b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45378-cwe-78-improper-neutralization-of-s-4f87045a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45378%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20CloudLink&amp;severity=critical&amp;id=690b7c74ffac907e5be8d8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/updates-to-domainname-api-wed-nov-5th-eb8b8086</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Updates%20to%20Domainname%20API%2C%20(Wed%2C%20Nov%205th)&amp;severity=low&amp;id=690c09dcfd0d6d2264828494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operational-technology-security-poses-inherent-ris-bfdef819</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operational%20Technology%20Security%20Poses%20Inherent%20Risks%20for%20Manufacturers&amp;severity=medium&amp;id=690c087afd0d6d22648229e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-now-uses-ai-during-execution-to-mutate-and-1b42396b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Now%20Uses%20AI%20During%20Execution%20to%20Mutate%20and%20Collect%20Data%2C%20Google%20Warns&amp;severity=medium&amp;id=690b6efe39a16b4c6e57b6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64459-cwe-89-improper-neutralization-of-s-e82fc809</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64459%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=critical&amp;id=690b6b8d39a16b4c6e53b82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64458-cwe-407-inefficient-algorithmic-com-3038ebb8</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64458%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=high&amp;id=690b6b8d39a16b4c6e53b829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47151-cwe-843-access-of-resource-using-in-86a1a865</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47151%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Entr&apos;ouvert%20Lasso&amp;severity=critical&amp;id=690b6825eb4434bb4f92e008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46404-cwe-476-null-pointer-dereference-in-6ac4b37c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46404%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Entr&apos;ouvert%20Lasso&amp;severity=high&amp;id=690b6825eb4434bb4f92dfff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46784-cwe-401-improper-release-of-memory--81bc4c36</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46784%3A%20CWE-401%3A%20Improper%20Release%20of%20Memory%20Before%20Removing%20Last%20Reference%20in%20Entr&apos;ouvert%20Lasso&amp;severity=high&amp;id=690b6825eb4434bb4f92e005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46705-cwe-617-reachable-assertion-in-entr-60f19323</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46705%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20Entr&apos;ouvert%20Lasso&amp;severity=high&amp;id=690b6825eb4434bb4f92e002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3125-cwe-434-unrestricted-upload-of-file--e62e4ad0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3125%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=690b6825eb4434bb4f92e00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52602-cwe-359-exposure-of-private-persona-a67db4c4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52602%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Software%20BigFix%20Query&amp;severity=medium&amp;id=690b6825eb4434bb4f92e00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-site-takeover-flaw-affects-400k-wordpress-69adb202</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Site%20Takeover%20Flaw%20Affects%20400K%20WordPress%20Sites&amp;severity=critical&amp;id=690c087afd0d6d22648229e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-scattered-spider-exposed-critical-ta-f32fb066</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20Scattered%20Spider%20Exposed%20%E2%80%93%20Critical%20Takeaways%20for%20Cyber%20Defenders&amp;severity=critical&amp;id=690b5d79eb4434bb4f9100eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-chatgpt-vulnerabilities-that-let--29c8ad6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20ChatGPT%20Vulnerabilities%20That%20Let%20Attackers%20Trick%20AI%20Into%20Leaking%20Data&amp;severity=medium&amp;id=690c07d3fd0d6d226481f700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/closing-the-ai-execution-gap-in-cybersecurity-a-ci-900947c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Closing%20the%20AI%20Execution%20Gap%20in%20Cybersecurity%20%E2%80%94%20A%20CISO%20Framework&amp;severity=critical&amp;id=690c087afd0d6d22648229ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/risk-comparable-to-solarwinds-incident-lurks-in-po-1b19016d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Risk%20&apos;Comparable&apos;%20to%20SolarWinds%20Incident%20Lurks%20in%20Popular%20Software%20Update%20Tool&amp;severity=medium&amp;id=690b59f4eb4434bb4f8f9b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/norton-researchers-crack-midnight-ransomware-relea-892c5cc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Norton%20Researchers%20Crack%20Midnight%20Ransomware%2C%20Release%20Free%20Decryptor&amp;severity=medium&amp;id=690b5a12eb4434bb4f8fa0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/former-cybersecurity-firm-experts-attempted-to-ext-6b6019a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Former%20cybersecurity%20firm%20experts%20attempted%20to%20extort%20five%20U.S.%20companies%20in%202023%20using%20BlackCat%20ransomware%20attacks&amp;severity=medium&amp;id=690b4f71eb4434bb4f8c90e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-10-north-korean-entities-for-launderi-05676a63</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Sanctions%2010%20North%20Korean%20Entities%20for%20Laundering%20%2412.7M%20in%20Crypto%20and%20IT%20Fraud&amp;severity=high&amp;id=690b4f71eb4434bb4f8c90dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mysterious-smudgedserpent-hackers-target-us-policy-804e173f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mysterious%20&apos;SmudgedSerpent&apos;%20Hackers%20Target%20U.S.%20Policy%20Experts%20Amid%20Iran%E2%80%93Israel%20Tensions&amp;severity=high&amp;id=690b4f71eb4434bb4f8c90e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weaponized-military-documents-deliver-advanced-ssh-19fcfce5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weaponized%20Military%20Documents%20Deliver%20Advanced%20SSH-Tor%20Backdoor&amp;severity=medium&amp;id=690bc39f5c8b8caf26e1ed7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-dragon-breath-apt-q-27-dimensional-reduc-dc76cc1f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Dragon%20Breath%20(APT-Q-27)%3A%20Dimensional%20Reduction%20Attack%20Against%20the%20Gambling%20Industry&amp;severity=medium&amp;id=690bc39f5c8b8caf26e1ed95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-peek-a-baku-silent-lynx-apt-targets-dush-1e3d9910</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Peek-a-Baku%3A%20Silent%20Lynx%20APT%20Targets%20Dushanbe%20with%20Espionage%20Campaign&amp;severity=medium&amp;id=690bc2866ab8174a0d402f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneaky-new-android-malware-takes-over-your-phone-h-884285ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Sneaky%22%20new%20Android%20malware%20takes%20over%20your%20phone%2C%20hiding%20in%20fake%20news%20and%20ID%20apps&amp;severity=medium&amp;id=690bc2866ab8174a0d402f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aws-data-reveals-credentials-and-misconfigurations-3dfc23db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AWS%20Data%20Reveals%20Credentials%20and%20Misconfigurations%20Behind%20Most%20Cloud%20Breaches&amp;severity=medium&amp;id=690b44e5eb4434bb4f8a7ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-an-attacker-drained-128m-from-balancer-through-905af0c4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20an%20Attacker%20Drained%20%24128M%20from%20Balancer%20Through%20Rounding%20Error%20Exploitation&amp;severity=medium&amp;id=690b3f8ceb4434bb4f895c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-the-open-android-ecosystem-with-samsung-k-962b8fa9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20the%20Open%20Android%20Ecosystem%20with%20Samsung%20Knox&amp;severity=critical&amp;id=690b3e49eb4434bb4f89372a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-post-smtp-plugin-flaw-exposes-wordpress--0a03d9b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20%E2%80%98Post%20SMTP%E2%80%99%20Plugin%20Flaw%20Exposes%20WordPress%20Sites%20to%20Takeover&amp;severity=critical&amp;id=690b3f66eb4434bb4f8958fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11745-cwe-80-improper-neutralization-of-s-c0995e57</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11745%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20spacetime%20Ad%20Inserter%20%E2%80%93%20Ad%20Manager%20%26%20AdSense%20Ads&amp;severity=medium&amp;id=690b36fdeb4434bb4f874748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12497-cwe-98-improper-control-of-filename-d347b1e3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12497%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20averta%20Premium%20Portfolio%20Features%20for%20Phlox%20theme&amp;severity=high&amp;id=690b36fdeb4434bb4f87474d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nikkei-says-17000-impacted-by-data-breach-stemming-5bda1a32</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nikkei%20Says%2017%2C000%20Impacted%20by%20Data%20Breach%20Stemming%20From%20Slack%20Account%20Hack&amp;severity=medium&amp;id=690b36cfeb4434bb4f873567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-teams-flaws-allowed-attackers-to-fake-id-fc1857f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Teams%20Flaws%20Allowed%20Attackers%20to%20Fake%20Identities%20and%20Rewrite%20Chats&amp;severity=medium&amp;id=690b36eceb4434bb4f8736fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mysterious-smudgedserpent-hackers-target-us-policy-ce236eef</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mysterious%20&apos;SmudgedSerpent&apos;%20Hackers%20Target%20U.S.%20Policy%20Experts%20Amid%20Iran%E2%80%93Israel%20Tensions&amp;severity=medium&amp;id=690b3e49eb4434bb4f89372d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-10-north-korean-entities-for-launderi-c686582c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Sanctions%2010%20North%20Korean%20Entities%20for%20Laundering%20%2412.7M%20in%20Crypto%20and%20IT%20Fraud&amp;severity=medium&amp;id=690b3e49eb4434bb4f893730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elusive-iranian-apt-phishes-influential-us-policy--c9c6d00b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran&apos;s%20Elusive%20%26quot%3BSmudgedSerpent&apos;%20APT%20Phishes%20Influential%20US%20Policy%20Wonks&amp;severity=medium&amp;id=690b21b3eb4434bb4f7b0c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dragonforce-cartel-scattered-spider-at-the-gat-8b44e587</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20DragonForce%20Cartel%3A%20Scattered%20Spider%20at%20the%20gate&amp;severity=medium&amp;id=690dba651280f279b842fd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasion-and-persistence-via-hidden-hyper-v-virtual-ecf418b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasion%20and%20Persistence%20via%20Hidden%20Hyper-V%20Virtual%20Machines&amp;severity=medium&amp;id=690b1bc097eccd90738774a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12192-cwe-697-incorrect-comparison-in-ste-a2759a8d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12192%3A%20CWE-697%20Incorrect%20Comparison%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=690b1bd197eccd907387bdc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12469-cwe-862-missing-authorization-in-am-7780dbfe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12469%3A%20CWE-862%20Missing%20Authorization%20in%20amans2k%20FunnelKit%20Automations%20%E2%80%93%20Email%20Marketing%20Automation%20and%20CRM%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=690b1bd197eccd907387bdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11987-cwe-80-improper-neutralization-of-s-61a054bc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11987%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20brechtvds%20Visual%20Link%20Preview&amp;severity=medium&amp;id=690b1bd197eccd907387bdbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12468-cwe-200-exposure-of-sensitive-infor-c909e088</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12468%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20amans2k%20FunnelKit%20Automations%20%E2%80%93%20Email%20Marketing%20Automation%20and%20CRM%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=690b1bd197eccd907387bdc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11820-cwe-79-improper-neutralization-of-i-a06dcbfc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20Graphina%20%E2%80%93%20Charts%20and%20Graphs%20For%20Elementor&amp;severity=medium&amp;id=690b1bd197eccd907387bdb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58337-cwe-284-improper-access-control-in--2e3abcdf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58337%3A%20CWE-284%20Improper%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Doris-MCP-Server&amp;severity=medium&amp;id=690b1bd197eccd907387bdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55108-cwe-306-missing-authentication-for--6d680f41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55108%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20BMC%20Control-M%2FAgent&amp;severity=critical&amp;id=690b184397eccd90738383be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-north-korean-bankers-accused-of-laund-7250c556</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Sanctions%20North%20Korean%20Bankers%20Accused%20of%20Laundering%20Stolen%20Cryptocurrency&amp;severity=medium&amp;id=690b0b5580abb2a1204aa5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/update-on-attacks-by-threat-group-apt-c-60-952bb079</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Update%20on%20Attacks%20by%20Threat%20Group%20APT-C-60&amp;severity=medium&amp;id=690b113e97eccd907379bfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10622-client-side-enforcement-of-server-s-93f89c5a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10622%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20The%20Foreman%20Foreman&amp;severity=high&amp;id=690b0215da9019f6f2715678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12675-cwe-862-missing-authorization-in-my-d4ddb8e6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12675%3A%20CWE-862%20Missing%20Authorization%20in%20mykiot%20KiotViet%20Sync&amp;severity=medium&amp;id=690afea4da9019f6f26cbdf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12676-cwe-259-use-of-hard-coded-password--8cf4c833</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12676%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20mykiot%20KiotViet%20Sync&amp;severity=medium&amp;id=690afea4da9019f6f26cbdf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12674-cwe-434-unrestricted-upload-of-file-e0d702d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12674%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mykiot%20KiotViet%20Sync&amp;severity=critical&amp;id=690afea4da9019f6f26cbded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12677-cwe-200-exposure-of-sensitive-infor-109f049b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12677%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mykiot%20KiotViet%20Sync&amp;severity=medium&amp;id=690afea4da9019f6f26cbdf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-cwp-vulnerability-exploited-in-the-w-922135ff</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20CWP%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=690afe86da9019f6f26c8926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12384-cwe-862-missing-authorization-in-bp-9a5a8015</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12384%3A%20CWE-862%20Missing%20Authorization%20in%20bplugins%20Document%20Embedder%20%E2%80%93%20Embed%20PDFs%2C%20Word%2C%20Excel%2C%20and%20Other%20Files&amp;severity=high&amp;id=690af19c063e7c5f011fbd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12388-cwe-918-server-side-request-forgery-ec85e019</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12388%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20Carousel%20Block%20%E2%80%93%20Responsive%20Image%20and%20Content%20Carousel&amp;severity=medium&amp;id=690af19c063e7c5f011fbd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11373-cwe-862-missing-authorization-in-av-b6d09c97</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11373%3A%20CWE-862%20Missing%20Authorization%20in%20averta%20Depicter%20%E2%80%94%20Popup%20%26%20Slider%20Builder&amp;severity=medium&amp;id=690af19c063e7c5f011fbd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12139-cwe-200-exposure-of-sensitive-infor-6173f7dc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12139%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20princeahmed%20File%20Manager%20for%20Google%20Drive%20%E2%80%93%20Integrate%20Google%20Drive&amp;severity=high&amp;id=690af19c063e7c5f011fbd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11917-cwe-918-server-side-request-forgery-02412c73</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11917%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20etruel%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=medium&amp;id=690af19c063e7c5f011fbd3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62225-unquoted-search-path-or-element-in--4cd70736</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62225%3A%20Unquoted%20search%20path%20or%20element%20in%20Sony%20Corporation%20Optical%20Disc%20Archive%20Software%20(for%20Windows)&amp;severity=medium&amp;id=690aee14063e7c5f011b583c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64151-unquoted-search-path-or-element-in--d5fe30df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64151%3A%20Unquoted%20search%20path%20or%20element%20in%20Roboticsware%20PTE.%20LTD.%20FA-Panel6&amp;severity=medium&amp;id=690aee14063e7c5f011b5840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-gladinet-and-cwp-flaws-to-kev-catalog-am-5549eefd</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Gladinet%20and%20CWP%20Flaws%20to%20KEV%20Catalog%20Amid%20Active%20Exploitation%20Evidence&amp;severity=low&amp;id=690b3e49eb4434bb4f893736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6027-cwe-287-improper-authentication-in-a-d055708d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6027%3A%20CWE-287%20Improper%20Authentication%20in%20Ace%20User%20Management&amp;severity=medium&amp;id=690aea9b063e7c5f0116da7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11072-cwe-22-improper-limitation-of-a-pat-bbfb67ab</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11072%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MelAbu%20WP%20Download%20Counter%20Button&amp;severity=medium&amp;id=690aea9b063e7c5f0116da7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10873-cwe-862-missing-authorization-in-el-c9eeb523</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10873%3A%20CWE-862%20Missing%20Authorization%20in%20ElementInvader%20Addons%20for%20Elementor&amp;severity=medium&amp;id=690aea9b063e7c5f0116da77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10567-cwe-79-cross-site-scripting-xss-in--358fe4a3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10567%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20FunnelKit&amp;severity=medium&amp;id=690aea9b063e7c5f0116da74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21079-cwe-20-improper-input-validation-in-0a36b1d8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21079%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Members&amp;severity=high&amp;id=690aed84063e7c5f011b288f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21078-cwe-330-use-of-insufficiently-rando-177cbcdb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21078%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=690aed84063e7c5f011b288c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21077-cwe-20-improper-input-validation-in-6ed562bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21077%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Email&amp;severity=low&amp;id=690aed84063e7c5f011b2889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21076-cwe-280-improper-handling-of-insuff-717d2266</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21076%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=medium&amp;id=690aed84063e7c5f011b2886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21075-cwe-787-out-of-bounds-write-in-sams-4f55802f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21075%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=690aed84063e7c5f011b2883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21074-cwe-125-out-of-bounds-read-in-samsu-af1dd65b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21074%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=690aed84063e7c5f011b2880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21073-cwe-1188-initialization-of-a-resour-c6204bed</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21073%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=690aed84063e7c5f011b287d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21071-cwe-787-out-of-bounds-write-in-sams-f87e8197</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21071%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=690aed84063e7c5f011b287a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11749-cwe-200-exposure-of-sensitive-infor-fe07229e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11749%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=critical&amp;id=690ae4c4c336e58df48942bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12197-cwe-89-improper-neutralization-of-s-0832a5ff</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12197%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=high&amp;id=690ad7c644b7a50adeab69d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11162-cwe-79-improper-neutralization-of-i-82aa9a01</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11162%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Spectra%20Gutenberg%20Blocks%20%E2%80%93%20Website%20Builder%20for%20the%20Block%20Editor&amp;severity=medium&amp;id=690ad7c644b7a50adeab69d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11835-cwe-862-missing-authorization-in-co-96368cfa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11835%3A%20CWE-862%20Missing%20Authorization%20in%20cozmoslabs%20Paid%20Membership%20Subscriptions%20%E2%80%93%20Effortless%20Memberships%2C%20Recurring%20Payments%20%26%20Content%20Restriction&amp;severity=medium&amp;id=690ac97016b8dcb1e3eaa161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12580-cwe-79-improper-neutralization-of-i-8fe84616</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12580%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stanleychoi%20SMS%20for%20WordPress&amp;severity=medium&amp;id=690ac97016b8dcb1e3eaa165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12582-cwe-862-missing-authorization-in-kl-e96adf4f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12582%3A%20CWE-862%20Missing%20Authorization%20in%20klicher%20Features&amp;severity=medium&amp;id=690abee616b8dcb1e3e916b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8871-cwe-502-deserialization-of-untrusted-e8b62189</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8871%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=medium&amp;id=690abee616b8dcb1e3e916b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-debuts-httptroy-backdoor-against-south-kor-900fb401</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20Debuts%20HTTPTroy%20Backdoor%20Against%20South%20Korea%20Users&amp;severity=medium&amp;id=690ab0c616b8dcb1e3e1b7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12735-cwe-94-improper-control-of-generati-0c7d97f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12735%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(%E2%80%98Code%20Injection%E2%80%99)%20in%20silentmatt%20expr-eval&amp;severity=critical&amp;id=690a9bd016b8dcb1e3c928b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-05-c6186166</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-05&amp;severity=medium&amp;id=690be6ed2de49fb2b5a3549b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60784-na-331b7120</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60784%3A%20n%2Fa&amp;severity=medium&amp;id=690bb7fc6ab8174a0d369d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63585-na-d53a6dc5</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63585%3A%20n%2Fa&amp;severity=medium&amp;id=690bb4796ab8174a0d3511e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63334-na-ccb46fe7</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63334%3A%20n%2Fa&amp;severity=critical&amp;id=690bacf6976718a73306413d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55343-na-371d7a9b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55343%3A%20n%2Fa&amp;severity=critical&amp;id=690ba5a1976718a733ff315c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63418-na-f95bcbfb</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63418%3A%20n%2Fa&amp;severity=medium&amp;id=690ba1a5976718a733fd90e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63417-na-17b6d5d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63417%3A%20n%2Fa&amp;severity=high&amp;id=690ba1a5976718a733fd90dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55342-na-ea66e506</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55342%3A%20n%2Fa&amp;severity=medium&amp;id=690ba1a5976718a733fd90d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55341-na-215677d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55341%3A%20n%2Fa&amp;severity=medium&amp;id=690ba1a5976718a733fd90d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63416-na-4e575f93</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63416%3A%20n%2Fa&amp;severity=critical&amp;id=690b9d3f5191fb7cf2298939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56232-na-c990d8c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56232%3A%20n%2Fa&amp;severity=medium&amp;id=690b99bc5191fb7cf2265e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56231-na-c46b039d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56231%3A%20n%2Fa&amp;severity=critical&amp;id=690b96345191fb7cf2240257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59716-na-6c6d933d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59716%3A%20n%2Fa&amp;severity=medium&amp;id=690b8eb35191fb7cf21e1afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57244-na-b9f9dc02</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57244%3A%20n%2Fa&amp;severity=medium&amp;id=690b8077ffac907e5bea79c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61304-na-914aa049</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61304%3A%20n%2Fa&amp;severity=critical&amp;id=690b7c74ffac907e5be8d906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63248-na-cfe63466</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63248%3A%20n%2Fa&amp;severity=high&amp;id=690b7c74ffac907e5be8d902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57130-na-cc37a31f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57130%3A%20n%2Fa&amp;severity=high&amp;id=690b78ebf80d35c469c0bdfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63601-na-2f1b09d7</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63601%3A%20n%2Fa&amp;severity=critical&amp;id=690b728e39a16b4c6e598be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60753-na-1872e9fb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60753%3A%20n%2Fa&amp;severity=medium&amp;id=690b728e39a16b4c6e598bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61084-na-e5356601</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61084%3A%20n%2Fa&amp;severity=high&amp;id=690b648deb4434bb4f926ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privilege-escalation-with-jupyter-from-the-command-448f6782</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privilege%20Escalation%20With%20Jupyter%20From%20the%20Command%20Line&amp;severity=medium&amp;id=690a860e327a9365e25838e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59596-vulnerability-in-absolute-security--4b9ad083</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59596%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=690a8612327a9365e25841c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59595-vulnerability-in-absolute-secure-ac-0ba87216</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59595%3A%20Vulnerability%20in%20Absolute%20Secure%20Access&amp;severity=high&amp;id=690a8612327a9365e25841c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62722-cwe-79-improper-neutralization-of-i-4d71fd61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62722%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=690a8287327a9365e253b11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62721-cwe-200-exposure-of-sensitive-infor-991f470e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62721%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=690a797a9e609817bf7d764b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62720-cwe-200-exposure-of-sensitive-infor-56ba6c79</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62720%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=690a797a9e609817bf7d7646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62719-cwe-918-server-side-request-forgery-b375642d</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62719%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=low&amp;id=690a797a9e609817bf7d7650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54526-cwe-121-in-fuji-electric-monitouch--7dc27291</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54526%3A%20CWE-121%20in%20Fuji%20Electric%20Monitouch%20V-SFT-6&amp;severity=high&amp;id=690a75ef9e609817bf78f742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62715-cwe-79-improper-neutralization-of-i-e7a6157e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62715%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=690a75ef9e609817bf78f747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54496-cwe-122-in-fuji-electric-monitouch--1275230b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54496%3A%20CWE-122%20in%20Fuji%20Electric%20Monitouch%20V-SFT-6&amp;severity=high&amp;id=690a75ef9e609817bf78f73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-russian-hackers-use-linux-vms-to-hide-in-windo-99a7df5d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Russian%20Hackers%20Use%20Linux%20VMs%20to%20Hide%20in%20Windows&amp;severity=medium&amp;id=690ab78416b8dcb1e3e7ac99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-makes-ransomware-groups-successful-88bc6609</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20Makes%20Ransomware%20Groups%20Successful%3F&amp;severity=medium&amp;id=690c087afd0d6d22648229f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62369-cwe-94-improper-control-of-generati-aaa8e03d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62369%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20xibosignage%20xibo-cms&amp;severity=high&amp;id=690a75ef9e609817bf78f74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europe-sees-increase-in-ransomware-extortion-attac-d9ac7400</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europe%20Sees%20Increase%20in%20Ransomware%2C%20Extortion%20Attacks&amp;severity=medium&amp;id=690ab78416b8dcb1e3e7ac9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32786-cwe-89-improper-neutralization-of-s-e05e06b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32786%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=high&amp;id=690a624d4499e136c2117c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-expands-chrome-autofill-to-passports-and-li-6582b47e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Expands%20Chrome%20Autofill%20to%20Passports%20and%20Licenses&amp;severity=medium&amp;id=690a5c32a730e5a3d9e111d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23358-cwe-427-uncontrolled-search-path-el-7b1ad387</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23358%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20NVApp&amp;severity=high&amp;id=690a5c46a730e5a3d9e13c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33176-cwe-923-improper-restriction-of-com-a6e091a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33176%3A%20CWE-923%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20NVIDIA%20RunAI&amp;severity=medium&amp;id=690a5c46a730e5a3d9e13c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12108-cwe-306-missing-authentication-for--826d6506</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12108%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Survision%20License%20Plate%20Recognition%20Camera&amp;severity=critical&amp;id=690a4c012a90255b94d06938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64322-cwe-732-incorrect-permission-assign-404be1b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64322%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Salesforce%20Agentforce%20Vibes%20Extension&amp;severity=medium&amp;id=690a4c012a90255b94d0693b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64321-cwe-1427-improper-neutralization-of-bbfb7838</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64321%3A%20CWE-1427%20Improper%20Neutralization%20of%20Input%20Used%20for%20LLM%20Prompting%20in%20Salesforce%20Agentforce%20Vibes%20Extension&amp;severity=medium&amp;id=690a47346d939959c8021a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64320-cwe-1427-improper-neutralization-of-d5f8887c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64320%3A%20CWE-1427%20Improper%20Neutralization%20of%20Input%20Used%20for%20LLM%20Prompting%20in%20Salesforce%20Agentforce%20Vibes%20Extension&amp;severity=medium&amp;id=690a47346d939959c8021a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64319-cwe-732-incorrect-permission-assign-8b79e7c6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64319%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Salesforce%20Mulesoft%20Anypoint%20Code%20Builder&amp;severity=medium&amp;id=690a47346d939959c8021a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sesameop-backdoor-abused-openai-assistants-api-9692d3fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20SesameOp%20Backdoor%20Abused%20OpenAI%20Assistants%20API%20for%20Remote%20Access&amp;severity=medium&amp;id=690a470b6d939959c801f032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64318-cwe-1427-improper-neutralization-of-6268ed80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64318%3A%20CWE-1427%20Improper%20Neutralization%20of%20Input%20Used%20for%20LLM%20Prompting%20in%20Salesforce%20Mulesoft%20Anypoint%20Code%20Builder&amp;severity=medium&amp;id=690a47346d939959c8021a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10875-cwe-1427-improper-neutralization-of-4f2a929e</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10875%3A%20CWE-1427%20Improper%20Neutralization%20of%20Input%20Used%20for%20LLM%20Prompting%20in%20Salesforce%20Mulesoft%20Anypoint%20Code%20Builder&amp;severity=medium&amp;id=690a439b6d939959c8fdd563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cybercrime-merger-like-no-other-scattered-spider-d6040d7f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Cybercrime%20Merger%20Like%20No%20Other%20%E2%80%94%20Scattered%20Spider%2C%20LAPSUS%24%2C%20and%20ShinyHunters%20Join%20Forces&amp;severity=medium&amp;id=690ab65816b8dcb1e3e70732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react-native-cli-flaw-exposed-millions-of-1dddc1ea</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React%20Native%20CLI%20Flaw%20Exposed%20Millions%20of%20Developers%20to%20Remote%20Attacks&amp;severity=critical&amp;id=690a2eb5f0ba78a05054882d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61956-cwe-306-missing-authentication-for--0e27e1b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61956%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Radiometrics%20VizAir&amp;severity=critical&amp;id=690a2ddcf0ba78a050535a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54863-cwe-522-insufficiently-protected-cr-d009cf59</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54863%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Radiometrics%20VizAir&amp;severity=critical&amp;id=690a2ddcf0ba78a050535a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61945-cwe-306-missing-authentication-for--6f9507e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61945%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Radiometrics%20VizAir&amp;severity=critical&amp;id=690a2ddcf0ba78a050535a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaw-in-popular-react-native-npm-package--699bd2c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaw%20in%20Popular%20React%20Native%20NPM%20Package%20Exposes%20Developers%20to%20Attacks&amp;severity=critical&amp;id=690a279c93114d0ef5c88a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europol-and-eurojust-dismantle-600-million-crypto--1ebaae11</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Authorities%20Dismantle%20%E2%82%AC600%20Million%20Crypto%20Fraud%20Network%20in%20Global%20Sweep&amp;severity=medium&amp;id=690ab65816b8dcb1e3e70735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-court-delivers-split-verdict-in-getty-images-vs-06e52db2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Court%20Delivers%20Split%20Verdict%20in%20Getty%20Images%20vs.%20Stability%20AI%20Image%20Generation%20Case&amp;severity=medium&amp;id=690a21d69fe43a2ba317e0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transportation-companies-hacked-to-steal-cargo-ec32d741</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Transportation%20Companies%20Hacked%20to%20Steal%20Cargo&amp;severity=medium&amp;id=690a141d5ba1a6c630003dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sesameop-backdoor-uses-openai-api-for-covert-c2-43d711a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SesameOp%20Backdoor%20Uses%20OpenAI%20API%20for%20Covert%20C2&amp;severity=medium&amp;id=690ab78416b8dcb1e3e7ac9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12184-cwe-79-improper-neutralization-of-i-15675e7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12184%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rboatright%20MeetingList&amp;severity=medium&amp;id=690a109f5ba1a6c630faf34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react-native-cli-flaw-exposed-millions-of-ec4faa00</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React%20Native%20CLI%20Flaw%20Exposed%20Millions%20of%20Developers%20to%20Remote%20Attacks&amp;severity=critical&amp;id=690ab65816b8dcb1e3e70738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/built-slopguard-open-source-defense-against-ai-sup-6a0b4cbb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Built%20SlopGuard%20-%20open-source%20defense%20against%20AI%20supply%20chain%20attacks%20(slopsquatting)&amp;severity=medium&amp;id=690a0cc4dc8910934c489e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-teams-bugs-let-attackers-impersonate-col-6f82070b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Teams%20Bugs%20Let%20Attackers%20Impersonate%20Colleagues%20and%20Edit%20Messages%20Unnoticed&amp;severity=low&amp;id=690ab65816b8dcb1e3e7073b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploiting-microsoft-teams-impersonation-and-spoof-1c2977ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploiting%20Microsoft%20Teams%3A%20Impersonation%20and%20Spoofing%20Vulnerabilities%20Exposed&amp;severity=medium&amp;id=690a05e9dc8910934c3e995c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-skycloak-deploys-tor-enabled-openssh-bac-14ab2e8a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20SkyCloak%20Deploys%20Tor-Enabled%20OpenSSH%20Backdoor%20Targeting%20Defense%20Sectors&amp;severity=high&amp;id=690a05b8dc8910934c3e5e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-targeting-payroll-sites-schneier-on-09694e90</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Targeting%20Payroll%20Sites%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=690a05b8dc8910934c3e5e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12682-cwe-434-unrestricted-upload-of-file-baa0401b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12682%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20fahadmahmood%20Easy%20Upload%20Files%20During%20Checkout&amp;severity=critical&amp;id=690a05dfdc8910934c3e7291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sesameop-malware-abuses-openai-api-f0490f88</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SesameOp%20Malware%20Abuses%20OpenAI%20API&amp;severity=medium&amp;id=690a022cdc8910934c3b3175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12695-cwe-653-improper-isolation-or-compa-25cbba3c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12695%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization&amp;severity=medium&amp;id=690a0152dc8910934c3a8e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41345-cwe-862-missing-authorization-in-ca-9f5279a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41345%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0154dc8910934c3a8ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41344-cwe-862-missing-authorization-in-ca-aef247af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41344%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0154dc8910934c3a8ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41343-cwe-862-missing-authorization-in-ca-a475d37f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41343%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41342-cwe-862-missing-authorization-in-ca-1e825907</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41342%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41341-cwe-862-missing-authorization-in-ca-161acb57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41341%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41340-cwe-862-missing-authorization-in-ca-b10a2dbd</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41340%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41339-cwe-862-missing-authorization-in-ca-6d15d4ba</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41339%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41338-cwe-862-missing-authorization-in-ca-35acb405</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41338%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41337-cwe-862-missing-authorization-in-ca-81f4a027</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41337%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41336-cwe-862-missing-authorization-in-ca-043bc7ca</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41336%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41335-cwe-862-missing-authorization-in-ca-7d24dd40</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41335%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41114-cwe-862-missing-authorization-in-ca-9579beab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41114%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=6909fc133cfa4baba4c198bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41113-cwe-862-missing-authorization-in-ca-101956ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41113%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=6909fc133cfa4baba4c198b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41112-cwe-862-missing-authorization-in-ca-a098abd4</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41112%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=6909fc133cfa4baba4c198b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41111-cwe-862-missing-authorization-in-ca-3cc0cc50</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41111%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=6909fc133cfa4baba4c198b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-kernel-bluetooth-rce-b5dd106f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20kernel%20Bluetooth%20RCE&amp;severity=medium&amp;id=6909f5293cfa4baba4ba3922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-everything-again-tue-nov-4th-c9a84d18</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Everything%2C%20Again%2C%20(Tue%2C%20Nov%204th)&amp;severity=medium&amp;id=6909eef84c0d499dad8661a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12045-cwe-79-improper-neutralization-of-i-1695383c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Orbit%20Fox%3A%20Duplicate%20Page%2C%20Menu%20Icons%2C%20SVG%20Support%2C%20Cookie%20Notice%2C%20Custom%20Fonts%20%26%20More&amp;severity=medium&amp;id=6909e325e8d08963ed86c4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12493-cwe-22-improper-limitation-of-a-pat-643653c4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12493%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=critical&amp;id=6909e325e8d08963ed86c4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-19-webkit-vulnerabilities-f0859c76</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%2019%20WebKit%20Vulnerabilities&amp;severity=critical&amp;id=6909df99e8d08963ed81a71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-defense-using-the-wazuh-open-source-pla-bcf2478f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Defense%20Using%20the%20Wazuh%20Open%20Source%20Platform&amp;severity=critical&amp;id=690ab65816b8dcb1e3e7073e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-target-cisco-aka-firewalls-in-5d7d4cbb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Target%20Cisco%20AKA%20Firewalls%20in%20Global%20Campaign&amp;severity=medium&amp;id=6909dfbae8d08963ed81b70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-critical-auth-bypass-flaw-in-jobmo-e6cf9407</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploit%20critical%20auth%20bypass%20flaw%20in%20JobMonster%20WordPress%20theme&amp;severity=critical&amp;id=6909dc1ce8d08963ed7c7750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-ai-big-sleep-finds-5-new-vulnerabilities-i-78d4b758</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google&apos;s%20AI%20&apos;Big%20Sleep&apos;%20Finds%205%20New%20Vulnerabilities%20in%20Apple&apos;s%20Safari%20WebKit&amp;severity=high&amp;id=6909dc1ce8d08963ed7c7754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11690-cwe-639-authorization-bypass-throug-d15b640e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11690%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CFMOTO%20RIDE&amp;severity=high&amp;id=6909e7104c0d499dad7bcb28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-update-patches-critical-remote-code-execut-ce5bdd09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Update%20Patches%20Critical%20Remote%20Code%20Execution%20Flaw&amp;severity=critical&amp;id=6909c74a70fe4617e5489145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-rondodox-v2-a-650-expansion-in-exploi-e48b1077</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Research%3A%20RondoDox%20v2%2C%20a%20650%25%20Expansion%20in%20Exploits&amp;severity=high&amp;id=6909c3cf70fe4617e5439bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-ai-big-sleep-finds-5-new-vulnerabilities-i-6f5b6b43</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%E2%80%99s%20AI%20%E2%80%98Big%20Sleep%E2%80%99%20Finds%205%20New%20Vulnerabilities%20in%20Apple%E2%80%99s%20Safari%20WebKit&amp;severity=low&amp;id=690ab65816b8dcb1e3e70744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-prosecutors-indict-cybersecurity-insiders-accus-59419f37</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Prosecutors%20Indict%20Cybersecurity%20Insiders%20Accused%20of%20BlackCat%20Ransomware%20Attacks&amp;severity=medium&amp;id=690ab65816b8dcb1e3e70747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20749-cwe-121-stack-overflow-in-mediatek--438230a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20749%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6789%2C%20MT6835%2C%20MT6855%2C%20MT6878%2C%20MT6879%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8169%2C%20MT8188%2C%20MT8195%2C%20MT8196%2C%20MT8781%2C%20MT8796&amp;severity=medium&amp;id=6909a1aad66f5e62e3849366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20748-cwe-120-classic-buffer-overflow-in--d33fdbff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20748%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1aad66f5e62e3849363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20741-cwe-122-heap-overflow-in-mediatek-i-cdbbc0c2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20741%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a8d66f5e62e3849343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20747-cwe-121-stack-overflow-in-mediatek--c40c5745</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20747%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT2737%2C%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6982%2C%20MT6985%2C%20MT6986%2C%20MT6986D%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8893&amp;severity=medium&amp;id=6909a1aad66f5e62e3849360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20746-cwe-121-stack-overflow-in-mediatek--4e3cda7a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20746%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT2737%2C%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6982%2C%20MT6985%2C%20MT6986%2C%20MT6986D%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8893&amp;severity=medium&amp;id=6909a1aad66f5e62e384935d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20739-cwe-121-stack-overflow-in-mediatek--e40d2999</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20739%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a8d66f5e62e384933d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20738-cwe-121-stack-overflow-in-mediatek--fb568ac8</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20738%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a8d66f5e62e384933a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20736-cwe-121-stack-overflow-in-mediatek--11309f57</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20736%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a8d66f5e62e3849334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20734-cwe-122-heap-overflow-in-mediatek-i-f6d54018</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20734%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20732-cwe-121-stack-overflow-in-mediatek--3f48bd90</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20732%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20731-cwe-122-heap-overflow-in-mediatek-i-c67fed31</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20731%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20729-cwe-122-heap-overflow-in-mediatek-i-4617cb59</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20729%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20745-cwe-416-use-after-free-in-mediatek--cc8d5f57</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20745%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6989%2C%20MT6991%2C%20MT8370%2C%20MT8390%2C%20MT8395%2C%20MT8676%2C%20MT8678%2C%20MT87920&amp;severity=medium&amp;id=6909a1aad66f5e62e384935a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20744-cwe-416-use-after-free-in-mediatek--b04c33cc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20744%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT6899%2C%20MT6991%2C%20MT8793&amp;severity=medium&amp;id=6909a1a8d66f5e62e384934c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20743-cwe-416-use-after-free-in-mediatek--64d01756</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20743%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6853%2C%20MT6877%2C%20MT6886%2C%20MT6893%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6989%2C%20MT6991%2C%20MT8113%2C%20MT8163%2C%20MT8168%2C%20MT8169%2C%20MT8183%2C%20MT8186%2C%20MT8188%2C%20MT8195%2C%20MT8196%2C%20MT8321%2C%20MT8365%2C%20MT8385%2C%20MT8390%2C%20MT8391%2C%20MT8512%2C%20MT8516%2C%20MT8519%2C%20MT8676%2C%20MT8678%2C%20MT8695%2C%20MT8696%2C%20MT8698%2C%20MT8755%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8775%2C%20MT8781%2C%20MT8786%2C%20MT8788E%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8796%2C%20MT8797%2C%20MT8798%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=6909a1a8d66f5e62e3849349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20742-cwe-122-heap-overflow-in-mediatek-i-ee1f26e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20742%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7603%2C%20MT7615%2C%20MT7622%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=6909a1a8d66f5e62e3849346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20740-cwe-367-time-of-check-time-of-use-t-88025ee1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20740%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7920%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=6909a1a8d66f5e62e3849340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20737-cwe-121-stack-overflow-in-mediatek--04e7e2b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20737%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=6909a1a8d66f5e62e3849337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20735-cwe-122-heap-overflow-in-mediatek-i-41ff93ba</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20735%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=6909a1a8d66f5e62e3849331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20733-cwe-122-heap-overflow-in-mediatek-i-6d764ad7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20733%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20730-cwe-287-improper-authentication-gen-cbbdd504</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20730%3A%20CWE-287%20Improper%20Authentication%20-%20Generic%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8188%2C%20MT8195%2C%20MT8676%2C%20MT8678%2C%20MT8696&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20728-cwe-122-heap-overflow-in-mediatek-i-1a9ce91d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20728%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7920%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20725-cwe-787-out-of-bounds-write-in-medi-8495b48c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20725%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8766R%2C%20MT8768%2C%20MT8771%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8893&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20726-cwe-122-heap-overflow-in-mediatek-i-1bac505a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20726%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8766R%2C%20MT8768%2C%20MT8771%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20727-cwe-787-out-of-bounds-write-in-medi-6035c779</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20727%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8766R%2C%20MT8768%2C%20MT8771%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-detects-sesameop-backdoor-using-openais--d47f3fc5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Detects%20%22SesameOp%22%20Backdoor%20Using%20OpenAI&apos;s%20API%20as%20a%20Stealth%20Command%20Channel&amp;severity=medium&amp;id=690ab65816b8dcb1e3e7074a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12396-cwe-79-improper-neutralization-of-i-15a9f062</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alaminopu%20clubmember&amp;severity=medium&amp;id=690984dd2b77ca42b4883ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11812-cwe-79-improper-neutralization-of-i-1625327f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11812%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20redq%20Reuse%20Builder&amp;severity=medium&amp;id=690984dc2b77ca42b4883e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12403-cwe-352-cross-site-request-forgery--0d584639</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12403%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20revokee%20Associados%20Amazon%20Plugin&amp;severity=medium&amp;id=690984df2b77ca42b4883f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11753-cwe-79-improper-neutralization-of-i-ec78f777</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20augustinfotech%20Bootstrap%20Multi-language%20Responsive%20Portfolio&amp;severity=medium&amp;id=690984dc2b77ca42b4883e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12158-cwe-862-missing-authorization-in-ta-2fe2b264</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12158%3A%20CWE-862%20Missing%20Authorization%20in%20tanvirahmed1984%20Simple%20User%20Capabilities&amp;severity=critical&amp;id=690984dd2b77ca42b4883eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12452-cwe-352-cross-site-request-forgery--3e87e22d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12452%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bestiadurmiente%20Visit%20Counter&amp;severity=medium&amp;id=690984df2b77ca42b4883f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11733-cwe-79-improper-neutralization-of-i-4cb98692</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11733%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lumiblog%20Footnotes%20Made%20Easy&amp;severity=high&amp;id=690984dc2b77ca42b4883e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12065-cwe-79-improper-neutralization-of-i-b41a83f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12065%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20carticon%20WP%20Carticon&amp;severity=medium&amp;id=690984dc2b77ca42b4883e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12371-cwe-79-improper-neutralization-of-i-28b67e58</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12371%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shakhi%20Nari%20Accountant&amp;severity=medium&amp;id=690984dd2b77ca42b4883ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12389-cwe-862-missing-authorization-in-si-343301a3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12389%3A%20CWE-862%20Missing%20Authorization%20in%20sidngr%20Import%20Export%20For%20WooCommerce&amp;severity=medium&amp;id=690984dd2b77ca42b4883ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11704-cwe-98-improper-control-of-filename-f32ca2a9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11704%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20impacttechlab%20Elegance%20Menu&amp;severity=high&amp;id=690984dc2b77ca42b4883e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12402-cwe-352-cross-site-request-forgery--c2554007</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12402%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bondnono%20LinkedIn%20Resume&amp;severity=medium&amp;id=690984df2b77ca42b4883f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12415-cwe-352-cross-site-request-forgery--25cf328f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12415%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sugiartha%20MapMap&amp;severity=medium&amp;id=690984df2b77ca42b4883f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12156-cwe-862-missing-authorization-in-ai-93b4bb65</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12156%3A%20CWE-862%20Missing%20Authorization%20in%20aitool%20Ai%20Auto%20Tool%20Content%20Writing%20Assistant%20(Gemini%20Writer%2C%20ChatGPT%20)%20All%20in%20One&amp;severity=medium&amp;id=690984dc2b77ca42b4883e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11724-cwe-434-unrestricted-upload-of-file-ef8932f6</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11724%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20erinmorelli%20EM%20Beer%20Manager&amp;severity=high&amp;id=690984dc2b77ca42b4883e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12456-cwe-352-cross-site-request-forgery--11a483dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12456%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20centangle%20Centangle-Team&amp;severity=medium&amp;id=690984df2b77ca42b4883f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12400-cwe-352-cross-site-request-forgery--659d65b4</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12400%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lmbbox%20LMB%5EBox%20Smileys&amp;severity=medium&amp;id=690984dd2b77ca42b4883ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12369-cwe-79-improper-neutralization-of-i-f6dea0bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20Extensions%20for%20Leaflet%20Map&amp;severity=medium&amp;id=690984dd2b77ca42b4883ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11890-cwe-862-missing-authorization-in-be-b605ee21</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11890%3A%20CWE-862%20Missing%20Authorization%20in%20beycanpress%20Crypto%20Payment%20Gateway%20with%20Payeer%20for%20WooCommerce&amp;severity=high&amp;id=690984dc2b77ca42b4883e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12157-cwe-862-missing-authorization-in-ta-5993750b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12157%3A%20CWE-862%20Missing%20Authorization%20in%20tanvirahmed1984%20Simple%20User%20Capabilities&amp;severity=medium&amp;id=690984dd2b77ca42b4883ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12410-cwe-352-cross-site-request-forgery--2ac2930d</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20samhoamt%20SH%20Contextual%20Help&amp;severity=medium&amp;id=690984df2b77ca42b4883f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11758-cwe-862-missing-authorization-in-co-193596ae</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11758%3A%20CWE-862%20Missing%20Authorization%20in%20codebangers%20All%20in%20One%20Time%20Clock%20Lite%20%E2%80%93%20Tracking%20Employee%20Time%20Has%20Never%20Been%20Easier&amp;severity=medium&amp;id=690984dc2b77ca42b4883e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12413-cwe-352-cross-site-request-forgery--0e8136c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12413%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20socialmedialtd%20WPCF7%20Stop%20words&amp;severity=medium&amp;id=690984df2b77ca42b4883f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12350-cwe-862-missing-authorization-in-do-31a2cbcb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12350%3A%20CWE-862%20Missing%20Authorization%20in%20domiinodev%20DominoKit&amp;severity=medium&amp;id=690984dd2b77ca42b4883eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12393-cwe-79-improper-neutralization-of-i-a160cc62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12393%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kris_iv%20Free%20Quotation&amp;severity=medium&amp;id=690984dd2b77ca42b4883ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12416-cwe-352-cross-site-request-forgery--e8545de3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12416%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mahype%20Pagerank%20tools&amp;severity=medium&amp;id=690984df2b77ca42b4883f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10896-cwe-862-missing-authorization-in-li-df13c3ce</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10896%3A%20CWE-862%20Missing%20Authorization%20in%20litonice13%20Image%20Comparison%20Addon%20for%20Elementor&amp;severity=high&amp;id=690984dc2b77ca42b4883e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12412-cwe-352-cross-site-request-forgery--b164eb2d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12412%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20josereyev%20Top%20Bar%20Notification&amp;severity=medium&amp;id=690984df2b77ca42b4883f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12188-cwe-352-cross-site-request-forgery--d883b447</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12188%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpmasterscom%20Posts%20Navigation%20Links%20for%20Sections%20and%20Headings%20%E2%80%93%20Free%20by%20WP%20Masters&amp;severity=medium&amp;id=690984dd2b77ca42b4883eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12683-cwe-269-improper-privilege-manageme-edb2ef75</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12683%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Voidtools%20Everything&amp;severity=medium&amp;id=690984df2b77ca42b4883f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12069-cwe-352-cross-site-request-forgery--de9046bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12069%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stiand%20WP%20Global%20Screen%20Options&amp;severity=medium&amp;id=690977bf78d4f574c2b12d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11008-cwe-532-insertion-of-sensitive-info-28ecf379</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11008%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20ce21com%20CE21%20Suite&amp;severity=critical&amp;id=690977bf78d4f574c2b12d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12401-cwe-352-cross-site-request-forgery--85553ba1</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12401%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20theode%20Label%20Plugins&amp;severity=medium&amp;id=690977bf78d4f574c2b12d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11007-cwe-306-missing-authentication-for--e3e5c925</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11007%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ce21com%20CE21%20Suite&amp;severity=critical&amp;id=690977bf78d4f574c2b12d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47370-cwe-617-reachable-assertion-in-qual-fec8b16c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47370%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=690977c178d4f574c2b12d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47368-cwe-126-buffer-over-read-in-qualcom-0981403a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47368%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47367-cwe-787-out-of-bounds-write-in-qual-b405118e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47367%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47365-cwe-190-integer-overflow-or-wraparo-dd773da3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47365%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47362-cwe-126-buffer-over-read-in-qualcom-9339dc64</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47362%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=690977c178d4f574c2b12d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47361-cwe-129-improper-validation-of-arra-240c3273</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47361%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47360-cwe-121-stack-based-buffer-overflow-398239f3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47360%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47357-cwe-306-missing-authentication-for--4ab003cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47357%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47353-cwe-749-exposed-dangerous-method-or-53d18303</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47353%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47352-cwe-129-improper-validation-of-arra-f29d1643</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47352%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27074-cwe-131-incorrect-calculation-of-bu-fc3b18fd</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27074%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27070-cwe-787-out-of-bounds-write-in-qual-871c271b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27070%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27064-cwe-126-buffer-over-read-in-qualcom-e9a43067</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27064%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=690977bf78d4f574c2b12d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12324-cwe-79-improper-neutralization-of-i-dcbad306</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tobiasbg%20TablePress%20%E2%80%93%20Tables%20in%20WordPress%20made%20easy&amp;severity=medium&amp;id=69096d2c78d4f574c2addf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11841-cwe-79-improper-neutralization-of-i-d567fe19</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=690977c178d4f574c2b12d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43373-an-app-may-be-able-to-cause-unexpec-4bc9b8ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43373%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69095ba678d4f574c2a8f232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43365-an-unprivileged-process-may-be-able-eba39b95</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43365%3A%20An%20unprivileged%20process%20may%20be%20able%20to%20terminate%20a%20root%20processes%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095ba678d4f574c2a8f22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43430-processing-maliciously-crafted-web--735a3a18</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43430%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43426-an-app-may-be-able-to-access-sensit-abab13f1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43426%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bad78d4f574c2a8f36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43390-an-app-may-be-able-to-access-user-s-e0add798</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43390%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43447-an-app-may-be-able-to-cause-unexpec-569d0d0f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43447%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43502-an-app-may-be-able-to-bypass-certai-9ec435d3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43502%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bb578d4f574c2a8f60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43386-processing-a-maliciously-crafted-me-722e128e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43386%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095ba878d4f574c2a8f273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43345-an-app-may-be-able-to-access-sensit-d2d2f51f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43345%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43493-visiting-a-malicious-website-may-le-bc46f72e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43493%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20address%20bar%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43387-a-malicious-app-may-be-able-to-gain-aaeeba9d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43387%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69095ba878d4f574c2a8f278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43411-an-app-may-be-able-to-access-user-s-7b1b4f11</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43411%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43446-an-app-may-be-able-to-modify-protec-9ace1888</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43446%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43503-visiting-a-malicious-website-may-le-7c70c6e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43503%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20user%20interface%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bb578d4f574c2a8f60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43450-an-app-may-be-able-to-learn-informa-d7e40151</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43450%3A%20An%20app%20may%20be%20able%20to%20learn%20information%20about%20the%20current%20camera%20view%20before%20being%20granted%20camera%20access%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb078d4f574c2a8f443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43391-an-app-may-be-able-to-access-sensit-f717a638</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43391%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43407-an-app-may-be-able-to-break-out-of--cf59ee3e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43407%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095baa78d4f574c2a8f2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43309-an-attacker-with-physical-access-to-b78c54a7</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43309%3A%20An%20attacker%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20view%20notification%20contents%20from%20the%20Lock%20Screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095ba578d4f574c2a8f1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43427-processing-maliciously-crafted-web--45fc93ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43427%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43431-processing-maliciously-crafted-web--50dbdc94</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43431%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bad78d4f574c2a8f385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43348-an-app-may-bypass-gatekeeper-checks-7b4dd2c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43348%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43364-an-app-may-be-able-to-break-out-of--7d8e67bb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43364%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69095ba678d4f574c2a8f22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43396-a-sandboxed-app-may-be-able-to-acce-4f6b5798</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43396%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43379-an-app-may-be-able-to-access-protec-e38634ee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43379%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba678d4f574c2a8f243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43457-processing-maliciously-crafted-web--4926b968</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43457%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bb078d4f574c2a8f451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43441-processing-maliciously-crafted-web--defb4887</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43441%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43504-a-user-in-a-privileged-network-posi-274839b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43504%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69095bb578d4f574c2a8f615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43338-processing-a-maliciously-crafted-me-afd3f74e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43338%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095ba578d4f574c2a8f1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43380-parsing-a-file-may-lead-to-an-unexp-9eb224cc</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43380%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43288-an-app-may-be-able-to-bypass-privac-4d60b0d6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43288%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43322-an-app-may-be-able-to-access-user-s-b6de3793</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43322%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43334-an-app-may-be-able-to-access-user-s-1ace3175</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43334%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43436-an-app-may-be-able-to-enumerate-a-u-0115c8ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43436%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bae78d4f574c2a8f3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43420-an-app-may-be-able-to-access-sensit-0d11cfa7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43420%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43498-an-app-may-be-able-to-access-sensit-9ce3ab2a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43498%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43477-an-app-may-be-able-to-access-sensit-8ece605b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43477%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43499-an-app-may-be-able-to-access-sensit-c1b1a890</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43499%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43476-an-app-may-be-able-to-break-out-of--b8a24997</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43476%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69095bb178d4f574c2a8f489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43421-processing-maliciously-crafted-web--8ea7616d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43421%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bab78d4f574c2a8f349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43460-an-attacker-with-physical-access-to-01f312e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43460%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43335-an-app-may-be-able-to-access-user-s-e0c72b08</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43335%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43323-an-app-may-be-able-to-fingerprint-t-cc391836</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43323%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095ba578d4f574c2a8f1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43495-an-app-may-be-able-to-monitor-keyst-06188090</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43495%3A%20An%20app%20may%20be%20able%20to%20monitor%20keystrokes%20without%20user%20permission%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43440-processing-maliciously-crafted-web--c1d9efbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43440%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43505-processing-a-maliciously-crafted-fi-c49b40d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43505%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20heap%20corruption%20in%20Apple%20Xcode&amp;severity=high&amp;id=69095bb578d4f574c2a8f618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43397-an-app-may-be-able-to-cause-a-denia-b0d5a61a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43397%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43378-an-app-may-be-able-to-access-sensit-d2a0d093</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43378%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba678d4f574c2a8f240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43401-a-remote-attacker-may-be-able-to-ca-6e76160f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43401%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=high&amp;id=69095baa78d4f574c2a8f2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43479-an-app-may-be-able-to-access-sensit-90e66f13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43479%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43496-remote-content-may-be-loaded-even-w-bd90f5cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43496%3A%20Remote%20content%20may%20be%20loaded%20even%20when%20the%20&apos;Load%20Remote%20Images&apos;%20setting%20is%20turned%20off%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb378d4f574c2a8f4b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43438-processing-maliciously-crafted-web--c548a4ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43438%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43480-a-malicious-website-may-exfiltrate--bd49eea7</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43480%3A%20A%20malicious%20website%20may%20exfiltrate%20data%20cross-origin%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bb378d4f574c2a8f4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43382-an-app-may-be-able-to-access-sensit-c1c687aa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43382%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43414-a-shortcut-may-be-able-to-access-fi-24a5759b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43414%3A%20A%20shortcut%20may%20be%20able%20to%20access%20files%20that%20are%20normally%20inaccessible%20to%20the%20Shortcuts%20app%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43443-processing-maliciously-crafted-web--11eda922</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43443%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43455-a-malicious-app-may-be-able-to-take-32210236</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43455%3A%20A%20malicious%20app%20may%20be%20able%20to%20take%20a%20screenshot%20of%20sensitive%20information%20in%20embedded%20views%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43394-an-app-may-be-able-to-access-protec-9032b479</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43394%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43422-an-attacker-with-physical-access-to-0d378202</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43422%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20disable%20Stolen%20Device%20Protection%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43434-processing-maliciously-crafted-web--36051cd1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43434%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43361-a-malicious-app-may-be-able-to-read-e62b1bff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43361%3A%20A%20malicious%20app%20may%20be%20able%20to%20read%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095ba678d4f574c2a8f223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43336-an-app-with-root-privileges-may-be--32e63968</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43336%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43459-an-attacker-with-physical-access-to-d33ab445</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43459%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20Apple%20Watch%20may%20be%20able%20to%20view%20Live%20Voicemail%20in%20Apple%20watchOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43377-an-app-may-be-able-to-cause-a-denia-a70f117e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43377%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba678d4f574c2a8f23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43398-an-app-may-be-able-to-cause-unexpec-ef0b0a78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43398%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43376-a-remote-attacker-may-be-able-to-vi-bf1ceb44</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43376%3A%20A%20remote%20attacker%20may%20be%20able%20to%20view%20leaked%20DNS%20queries%20with%20Private%20Relay%20turned%20on%20in%20Apple%20Safari&amp;severity=high&amp;id=69095ba678d4f574c2a8f236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43399-an-app-may-be-able-to-access-protec-e14673ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43399%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095baa78d4f574c2a8f2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43458-processing-maliciously-crafted-web--6ed0773a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43458%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bb178d4f574c2a8f466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43360-password-fields-may-be-unintentiona-40ac4262</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43360%3A%20Password%20fields%20may%20be%20unintentionally%20revealed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba678d4f574c2a8f220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43419-processing-maliciously-crafted-web--4a4e258a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43419%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bab78d4f574c2a8f33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43462-an-app-may-be-able-to-cause-unexpec-63ba2b38</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43462%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb178d4f574c2a8f473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43435-processing-maliciously-crafted-web--80440aad</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43435%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43423-an-attacker-with-physical-access-to-ff82e867</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43423%3A%20An%20attacker%20with%20physical%20access%20to%20an%20unlocked%20device%20paired%20with%20a%20Mac%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20system%20logging%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095bad78d4f574c2a8f35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43474-an-app-may-be-able-to-cause-unexpec-d5ad011c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43474%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69095bb178d4f574c2a8f485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43395-an-app-may-be-able-to-access-protec-d53947d9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43395%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=69095baa78d4f574c2a8f2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43454-a-device-may-persistently-fail-to-l-f8b6b380</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43454%3A%20A%20device%20may%20persistently%20fail%20to%20lock%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb078d4f574c2a8f449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43507-an-app-may-be-able-to-fingerprint-t-6b367eb5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43507%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb578d4f574c2a8f61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43442-an-app-may-be-able-to-identify-what-221cc050</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43442%3A%20An%20app%20may%20be%20able%20to%20identify%20what%20other%20apps%20a%20user%20has%20installed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095bae78d4f574c2a8f400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43383-processing-a-maliciously-crafted-me-033de638</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43383%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43481-an-app-may-be-able-to-break-out-of--104b51e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43481%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43439-an-app-may-be-able-to-fingerprint-t-1c171731</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43439%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43478-an-app-may-be-able-to-cause-unexpec-a085dad9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43478%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43424-a-malicious-hid-device-may-cause-an-86a5a865</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43424%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bad78d4f574c2a8f364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43432-processing-maliciously-crafted-web--7b912960</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43432%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43449-a-malicious-app-may-be-able-to-trac-816aa556</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43449%3A%20A%20malicious%20app%20may%20be%20able%20to%20track%20users%20between%20installs%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb078d4f574c2a8f440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43408-an-attacker-with-physical-access-ma-57c5dd11</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43408%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20access%20contacts%20from%20the%20lock%20screen%20in%20Apple%20macOS&amp;severity=low&amp;id=69095bab78d4f574c2a8f323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43469-an-app-may-be-able-to-access-sensit-778a9a8f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43469%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43384-processing-a-maliciously-crafted-me-b9c38480</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43384%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43412-an-app-may-be-able-to-break-out-of--165a8cad</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43412%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43500-an-app-may-be-able-to-access-sensit-ad815492</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43500%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb378d4f574c2a8f4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43445-processing-a-maliciously-crafted-me-74c16cea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43445%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43392-a-website-may-exfiltrate-image-data-46a25dc7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43392%3A%20A%20website%20may%20exfiltrate%20image%20data%20cross-origin%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43405-an-app-may-be-able-to-access-user-s-a6d3f8df</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43405%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=69095baa78d4f574c2a8f2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43452-keyboard-suggestions-may-display-se-b6d18d9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43452%3A%20Keyboard%20suggestions%20may%20display%20sensitive%20information%20on%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43444-an-app-may-be-able-to-fingerprint-t-e10381b4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43444%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bae78d4f574c2a8f40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43413-a-sandboxed-app-may-be-able-to-obse-2c34eb4d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43413%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20observe%20system-wide%20network%20connections%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bab78d4f574c2a8f332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43385-processing-a-maliciously-crafted-me-6cfdca7b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43385%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43468-an-app-may-be-able-to-access-sensit-5c13ac4e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43468%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43429-processing-maliciously-crafted-web--24196af0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43429%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43350-an-attacker-may-be-able-to-view-res-9a51e3c1</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43350%3A%20An%20attacker%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095ba678d4f574c2a8f21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43409-an-app-may-be-able-to-access-sensit-f2743abc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43409%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43448-an-app-may-be-able-to-break-out-of--3c65c86b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43448%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43389-an-app-may-be-able-to-access-sensit-ebe3133b</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43389%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43433-processing-maliciously-crafted-web--068db1c2</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43433%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bad78d4f574c2a8f393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43425-processing-maliciously-crafted-web--6664d6e5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43425%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43472-an-app-may-be-able-to-gain-root-pri-b768dc49</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43472%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69095bb178d4f574c2a8f481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35021-cwe-1188-insecure-default-initializ-4494496b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35021%3A%20CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Abilis%20CPX&amp;severity=medium&amp;id=69094d8778d4f574c2794f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-04-fbd6dafe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-04&amp;severity=medium&amp;id=690a982816b8dcb1e3c3e05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56230-na-d157d9d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56230%3A%20n%2Fa&amp;severity=high&amp;id=690a75ef9e609817bf78f74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27374-na-99cb7080</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27374%3A%20n%2Fa&amp;severity=medium&amp;id=690a6cce4499e136c21ec516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52910-na-6a9dae74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52910%3A%20n%2Fa&amp;severity=critical&amp;id=690a694c4499e136c21a9bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54335-na-a24684c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54335%3A%20n%2Fa&amp;severity=medium&amp;id=690a65c74499e136c215e603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56426-na-4aab81d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56426%3A%20n%2Fa&amp;severity=high&amp;id=690a624d4499e136c2117c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49494-na-09d9c60e</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49494%3A%20n%2Fa&amp;severity=high&amp;id=690a5fc6a730e5a3d9e580e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54327-na-098914ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54327%3A%20n%2Fa&amp;severity=medium&amp;id=690a58b2a730e5a3d9dc1464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61431-na-21e6f0e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61431%3A%20n%2Fa&amp;severity=medium&amp;id=690a53132a90255b94da5743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52512-na-ef3e7358</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52512%3A%20n%2Fa&amp;severity=high&amp;id=690a47346d939959c8021a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54334-na-54255b4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54334%3A%20n%2Fa&amp;severity=high&amp;id=690a439b6d939959c8fdd56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52513-na-1b4d5861</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52513%3A%20n%2Fa&amp;severity=high&amp;id=690a439b6d939959c8fdd566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54325-na-0dddca44</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54325%3A%20n%2Fa&amp;severity=medium&amp;id=690a40ddff58c9332ff73d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54333-na-47a07cc1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54333%3A%20n%2Fa&amp;severity=medium&amp;id=690a3d63ff58c9332ff26cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54332-na-32ed6a3a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54332%3A%20n%2Fa&amp;severity=high&amp;id=690a323af0ba78a050599551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54331-na-7fb65d35</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54331%3A%20n%2Fa&amp;severity=medium&amp;id=690a323af0ba78a050599547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54323-na-ec2018af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54323%3A%20n%2Fa&amp;severity=high&amp;id=690a2ec3f0ba78a05054a163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60925-na-6c65a3a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60925%3A%20n%2Fa&amp;severity=medium&amp;id=690a2ddcf0ba78a050535a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54330-na-f448294a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54330%3A%20n%2Fa&amp;severity=medium&amp;id=690a2ddcf0ba78a050535a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54329-na-b369ae1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54329%3A%20n%2Fa&amp;severity=high&amp;id=690a2ddcf0ba78a050535a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63294-na-857c890a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63294%3A%20n%2Fa&amp;severity=medium&amp;id=690a1e549fe43a2ba3125a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/research-unvalidated-trust-cross-stage-failure-mod-a3df6706</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BResearch%5D%20Unvalidated%20Trust%3A%20Cross-Stage%20Failure%20Modes%20in%20LLM%2Fagent%20pipelines%20arXiv&amp;severity=medium&amp;id=6909438ca63c015b1ad8e1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-mutes-alerts-drains-crypto-wallets-4af149a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Malware%20Mutes%20Alerts%2C%20Drains%20Crypto%20Wallets&amp;severity=medium&amp;id=6909762578d4f574c2b06798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34501-cwe-798-use-of-hard-coded-credentia-b365052b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34501%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Light%20%26%20Wonder%2C%20Inc.%20%2F%20SHFL%20Entertainment%2C%20Inc.%20%2F%20Shuffle%20Master%2C%20Inc.%20Deck%20Mate%202&amp;severity=high&amp;id=690929a9fe7723195e0fd62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13997-cwe-269-improper-privilege-manageme-8f643a65</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13997%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Nagios%20XI&amp;severity=critical&amp;id=690929a9fe7723195e0fd62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13998-cwe-497-exposure-of-sensitive-syste-db841278</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13998%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20XI&amp;severity=medium&amp;id=69092613fe7723195e0b3000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11193-cwe-256-plaintext-storage-of-a-pass-7cb21465</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11193%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Lenovo%20Tab%20M11%20TB330FU%20TB330XU&amp;severity=medium&amp;id=6909227bfe7723195e06123a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-142-released-two-high-severity-v8-flaws-fix-a4b8b149</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20142%20Released%3A%20Two%20high-severity%20V8%20flaws%20fixed%2C%20%24100K%20in%20rewards%20paid&amp;severity=high&amp;id=69091dc4c28fd46ded866acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oauth-device-code-phishing-azure-vs-google-compare-d2a0b4f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OAuth%20Device%20Code%20Phishing%3A%20Azure%20vs.%20Google%20Compared&amp;severity=medium&amp;id=69091dc4c28fd46ded866ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-rmm-tools-to-breach-freighters-and-ste-4217769e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20use%20RMM%20tools%20to%20breach%20freighters%20and%20steal%20cargo%20shipments&amp;severity=high&amp;id=69091dc4c28fd46ded866ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36172-cwe-79-improper-neutralization-of-i-666d9f1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36172%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=69091e13c28fd46ded8695da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-vsx-extension-sleepyduck-uses-ethereum-t-2ecf319c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20VSX%20Extension%20%22SleepyDuck%22%20Uses%20Ethereum%20to%20Keep%20Its%20Command%20Server%20Alive&amp;severity=medium&amp;id=69091dc4c28fd46ded866ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jabber-zeus-developer-mricq-extradited-to-us-from--da3b0f12</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jabber%20Zeus%20developer%20%E2%80%98MrICQ%E2%80%99%20extradited%20to%20US%20from%20Italy&amp;severity=medium&amp;id=69091dc4c28fd46ded866ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12657-cwe-754-improper-check-for-unusual--6be44fd9</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12657%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=medium&amp;id=69092135fe7723195e0534bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12531-cwe-611-improper-restriction-of-xml-93abefeb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12531%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=690910fe7fff0e30ceee30a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-remote-tools-to-hijack-cargo-fre-dd281088</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=On%20the%20Road%20Again%3A%20Hackers%20Hijack%20Physical%20Cargo%20Freight&amp;severity=medium&amp;id=6909762578d4f574c2b0679b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mssql-exploitation-run-commands-like-a-pro-e8078eb2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MSSQL%20Exploitation%20-%20Run%20Commands%20Like%20A%20Pro&amp;severity=medium&amp;id=6908f876f612d110fea1760c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8558-cwe-306-missing-authentication-for-c-44e25d51</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8558%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Proofpoint%20Insider%20Threat%20Management%20(ITM)%20Server&amp;severity=low&amp;id=6908f874f612d110fea175d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-vsx-extension-sleepyduck-uses-ethereum-t-3f858c73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20VSX%20Extension%20%22SleepyDuck%22%20Uses%20Ethereum%20to%20Keep%20Its%20Command%20Server%20Alive&amp;severity=medium&amp;id=6909758c78d4f574c2b04f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-dante-spyware-linked-to-rebranded-hacking-team-2e492322</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Dante%20Spyware%20Linked%20to%20Rebranded%20Hacking%20Team%2C%20Now%20Memento%20Labs&amp;severity=medium&amp;id=6908ed3b1c2a0078ae50e584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sniffing-established-ble-connections-with-hackrf-o-1e56d858</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sniffing%20established%20BLE%20connections%20with%20HackRF%20One&amp;severity=low&amp;id=6908e5321c2a0078ae46cf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12463-cwe-89-improper-neutralization-of-s-957135d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12463%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Guetebruck%20G-Cam&amp;severity=critical&amp;id=6908e0dc2caf14b4c6e437c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-extradited-to-us-faces-charges-in-jabber-1ca8013a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Extradited%20to%20US%20Faces%20Charges%20in%20Jabber%20Zeus%20Cybercrime%20Case&amp;severity=medium&amp;id=6908dc622caf14b4c6de9f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10280-cwe-79-improper-neutralization-of-i-80f5396a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10280%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SailPoint%20Technologies%20IdentityIQ&amp;severity=high&amp;id=6908dc732caf14b4c6dea3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11953-cwe-78-improper-neutralization-of-s-8d972ba7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11953%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=6908dc732caf14b4c6dea3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-software-development-teams-can-securely-and-et-07f74eeb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Software%20Development%20Teams%20Can%20Securely%20and%20Ethically%20Deploy%20AI%20Tools&amp;severity=medium&amp;id=6908d4cabdcf00867c5adfcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36093-cwe-602-client-side-enforcement-of--f9b8f397</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36093%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Cloud%20Pak%20For%20Business%20Automation&amp;severity=medium&amp;id=6908d14bbdcf00867c55ae67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36092-cwe-1284-improper-validation-of-spe-e0929f82</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36092%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Cloud%20Pak%20For%20Business%20Automation&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b4670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36091-cwe-283-unverified-ownership-in-ibm-6047ad88</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36091%3A%20CWE-283%20Unverified%20Ownership%20in%20IBM%20Cloud%20Pak%20For%20Business%20Automation&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b466d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11761-cwe-427-uncontrolled-search-path-el-40269164</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11761%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20HP%20Inc%20HP%20Client%20Management%20Script%20Library&amp;severity=high&amp;id=6908ca4cbdcf00867c4b466a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ciso-burnout-epidemic-endemic-or-simply-inevitable-19153d04</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISO%20Burnout%20%E2%80%93%20Epidemic%2C%20Endemic%2C%20or%20Simply%20Inevitable%3F&amp;severity=medium&amp;id=6908c44969f0cf13c915470e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-access-real-cargo-cybercriminals-targeting--75eab978</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20access%2C%20real%20cargo%3A%20cybercriminals%20targeting%20trucking%20and%20logistics&amp;severity=medium&amp;id=690909ee7fff0e30cee423ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leveraging-generative-ai-to-reverse-engineer-xload-c07d0d8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leveraging%20Generative%20AI%20to%20Reverse%20Engineer%20XLoader&amp;severity=medium&amp;id=690909ee7fff0e30cee423d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8900-cwe-269-improper-privilege-managemen-c576ab7a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8900%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dreamstechnologies%20Doccure%20Core&amp;severity=critical&amp;id=6908c0d069f0cf13c9121bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xwiki-solrsearch-exploit-attempts-cve-2025-24893-w-ead34534</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWiki%20SolrSearch%20Exploit%20Attempts%20(CVE-2025-24893)%20with%20link%20to%20Chicago%20Gangs%2FRappers%2C%20(Mon%2C%20Nov%203rd)&amp;severity=critical&amp;id=6908bd0532a746b8e5d27d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-v2-when-an-iot-botnet-goes-enterprise-rea-30f5456d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20v2%3A%20When%20an%20IoT%20Botnet%20Goes%20Enterprise-Ready&amp;severity=high&amp;id=6908ba5132a746b8e5cf6041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-peek-a-baku-apt-targets-dushanbe-with-es-d26a9dcd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Peek-a-Baku%3A%20APT%20Targets%20Dushanbe%20with%20Espionage%20Campaign&amp;severity=medium&amp;id=690909ee7fff0e30cee423ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lets-get-physical-a-new-convergence-for-electrical-cc3d7cce</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Let&apos;s%20Get%20Physical%3A%20A%20New%20Convergence%20for%20Electrical%20Grid%20Security&amp;severity=medium&amp;id=6908b6c532a746b8e5ca09fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beating-xloader-at-speed-generative-ai-as-a-force--2a64250d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beating%20XLoader%20at%20Speed%3A%20Generative%20AI%20as%20a%20Force%20Multiplier%20for%20Reverse%20Engineering&amp;severity=medium&amp;id=6908b6f832a746b8e5ca6ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-ai-apis-can-be-abused-for-data-exfiltration-033a3ff3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20AI%20APIs%20Can%20Be%20Abused%20for%20Data%20Exfiltration&amp;severity=medium&amp;id=6908af3073fc97d070c66b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-exploit-remote-monitoring-tools-to--69b8ed40</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Exploit%20Remote%20Monitoring%20Tools%20to%20Infiltrate%20Logistics%20and%20Freight%20Networks&amp;severity=medium&amp;id=6908c95e69f0cf13c91d2d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64294-cwe-862-missing-authorization-in-d3-f5919c90</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64294%3A%20Missing%20Authorization%20in%20d3wp%20WP%20Snow%20Effect&amp;severity=medium&amp;id=6908adda73fc97d070c5c443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12626-path-traversal-in-jeecgboot-jeewx-b-fd2e7bfa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12626%3A%20Path%20Traversal%20in%20jeecgboot%20jeewx-boot&amp;severity=medium&amp;id=6908adda73fc97d070c5c446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-caught-on-video-using-ai-filt-bfff95db</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Caught%20on%20Video%20Using%20AI%20Filters%20in%20Fake%20Job%20Interviews&amp;severity=medium&amp;id=6908b6da32a746b8e5ca0bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-httptroy-backdoor-poses-as-vpn-invoice-in-targ-26a1b1fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20HttpTroy%20Backdoor%20Poses%20as%20VPN%20Invoice%20in%20Targeted%20Cyberattack%20on%20South%20Kore&amp;severity=high&amp;id=6908a96c73fc97d070bec004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-bankbot-ynrk-and-deliveryrat-a-86a9412b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20BankBot-YNRK%20and%20DeliveryRAT%20Android%20Trojans%20Stealing%20Financial%20Da&amp;severity=high&amp;id=6908a96c73fc97d070bec008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-lazarus-hits-web3-intelamd-tees-crack-df598cf2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Lazarus%20Hits%20Web3%2C%20Intel%2FAMD%20TEEs%20Cracked%2C%20Dark%20Web%20Leak%20Tool%20%26%20More&amp;severity=medium&amp;id=6908a94c73fc97d070bebaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-developed-code-5-critical-security-checkpoints--58cc4a5d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Developed%20Code%3A%205%20Critical%20Security%20Checkpoints%20for%20Human%20Oversight&amp;severity=critical&amp;id=6908aeab73fc97d070c61fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-evolution-of-soc-operations-how-continuous-exp-5f5c0e23</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Evolution%20of%20SOC%20Operations%3A%20How%20Continuous%20Exposure%20Management%20Transforms%20Security%20Operations&amp;severity=medium&amp;id=6908ae0d73fc97d070c5dc0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0987-cwe-639-authorization-bypass-through-3b0bdac5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0987%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CB%20Project%20Ltd.%20Co.%20CVLand&amp;severity=critical&amp;id=69089bb7e3f4acb2c352ed70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-vsx-rotates-access-tokens-used-in-supply-chai-1f41102a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20VSX%20rotates%20access%20tokens%20used%20in%20supply-chain%20malware%20attack&amp;severity=high&amp;id=69089836e3f4acb2c34f1b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alleged-jabber-zeus-coder-mricq-in-us-custody-e321b621</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alleged%20Jabber%20Zeus%20Coder%20%E2%80%98MrICQ%E2%80%99%20in%20U.S.%20Custody&amp;severity=high&amp;id=69089836e3f4acb2c34f1b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/penn-hacker-claims-to-have-stolen-12-million-donor-1c69e86e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Penn%20hacker%20claims%20to%20have%20stolen%201.2%20million%20donor%20records%20in%20data%20breach&amp;severity=high&amp;id=690894b7e3f4acb2c34ab250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/conduent-january-2025-breach-impacts-10m-people-32ca261b</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Conduent%20January%202025%20breach%20impacts%2010M%2B%20people&amp;severity=high&amp;id=690894b7e3f4acb2c34ab254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-bankbot-ynrk-and-deliveryrat-a-9c296903</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20BankBot-YNRK%20and%20DeliveryRAT%20Android%20Trojans%20Stealing%20Financial%20Data&amp;severity=medium&amp;id=6908a0cbe3f4acb2c35b4701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/youtube-ghost-network-spreads-infostealer-via-3000-d38387c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YouTube%20%E2%80%98Ghost%20Network%E2%80%99%20Spreads%20Infostealer%20via%203%2C000%20Fake%20Videos&amp;severity=medium&amp;id=69088dc45abee5c7f3616422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trufflenet-attack-wields-stolen-credentials-agains-962912f8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;TruffleNet&apos;%20Attack%20Wields%20Stolen%20Credentials%20Against%20AWS&amp;severity=medium&amp;id=6908c9fc69f0cf13c91d7280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-httptroy-backdoor-poses-as-vpn-invoice-in-targ-ff3cda7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20HttpTroy%20Backdoor%20Poses%20as%20VPN%20Invoice%20in%20Targeted%20Cyberattack%20on%20South%20Korea&amp;severity=medium&amp;id=69088a3c5abee5c7f35a3e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-uses-airstalk-malware-in-supply-chain--ff5ffaa7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Uses%20%E2%80%98Airstalk%E2%80%99%20Malware%20in%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=690883a67dae335bea13e8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprks-playbook-httptroy-and-new-blindingcan-varian-cc93e7a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK&apos;s%20Playbook%3A%20HttpTroy%20and%20New%20BLINDINGCAN%20Variant&amp;severity=medium&amp;id=69088a4d5abee5c7f35a4fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/certified-oysterloader-tracking-rhysida-ransomware-f37d37ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Certified%20OysterLoader%3A%20Tracking%20Rhysida%20ransomware%20gang%20activity%20via%20code-signing%20certificates&amp;severity=medium&amp;id=69088a4d5abee5c7f35a4dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3rd-november-threat-intelligence-report-0190ee2d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3rd%20November%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69087cb87dae335bea0b08dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breaking-down-8-open-source-ai-security-tools-at-b-ad4bf0e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Breaking%20Down%208%20Open%20Source%20AI%20Security%20Tools%20at%20Black%20Hat%20Europe%202025%20Arsenal&amp;severity=medium&amp;id=69087ca07dae335bea0b00ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-pays-100000-in-rewards-for-two-chrome-vulne-60950c8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Pays%20%24100%2C000%20in%20Rewards%20for%20Two%20Chrome%20Vulnerabilities&amp;severity=high&amp;id=690872355b1bd484a8c9bf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-writeup-for-what-to-check-when-you-see-fireb-21a1f14d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20writeup%20for%20what%20to%20check%20when%20you%20see%20Firebase%20in%20a%20pentest&amp;severity=medium&amp;id=6908724c5b1bd484a8c9c7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48397-cwe-306-missing-authentication-for--52125ac9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48397%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Eaton%20Eaton%20Brightlayer%20Software%20Suite%20(BLSS)&amp;severity=high&amp;id=6908698d3bb3e250c652e21f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12623-authorization-bypass-in-fushengqian-aae4f917</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12623%3A%20Authorization%20Bypass%20in%20fushengqian%20fuint&amp;severity=low&amp;id=690862853bb3e250c648388a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48396-cwe-434-unrestricted-upload-of-file-ea15d9fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48396%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Eaton%20Eaton%20Brightlayer%20Software%20Suite%20(BLSS)&amp;severity=high&amp;id=690862853bb3e250c6483890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12622-buffer-overflow-in-tenda-ac10-891cb438</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12622%3A%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=69085df94b5305b1c0b87d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12619-buffer-overflow-in-tenda-a15-3fd827e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12619%3A%20Buffer%20Overflow%20in%20Tenda%20A15&amp;severity=high&amp;id=690856ef4b5305b1c0ad521d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12503-cwe-89-improper-neutralization-of-s-9cd40743</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12503%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Digiwin%20EasyFlow%20.NET&amp;severity=high&amp;id=690852be2e0de603d5414690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12618-buffer-overflow-in-tenda-ac8-4178f479</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12618%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=690852be2e0de603d5414694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12617-sql-injection-in-itsourcecode-billi-05c510fe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12617%3A%20SQL%20Injection%20in%20itsourcecode%20Billing%20System&amp;severity=medium&amp;id=6908334e257da31884c8b6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12616-insertion-of-sensitive-information--38ef055d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12616%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=69082c50451a199c687e5d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12615-use-of-hard-coded-cryptographic-key-9124d76a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12615%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20PHPGurukul%20News%20Portal&amp;severity=low&amp;id=690825a268fbb04b61f1dfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12614-sql-injection-in-sourcecodester-bes-cd12bfac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12614%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=69081ea068fbb04b61f07fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12612-sql-injection-in-campcodes-school-f-e9d7b82d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12612%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=6908179b68fbb04b61ed8a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12611-buffer-overflow-in-tenda-ac21-cd0e66db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12611%3A%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=6908179b68fbb04b61ed8a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12610-sql-injection-in-codeastro-gym-mana-5188a280</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12610%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=69080d0b68fbb04b61e3d3b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12609-sql-injection-in-codeastro-gym-mana-26866042</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12609%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=690805fd68fbb04b61dd3046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12608-sql-injection-in-itsourcecode-onlin-4fbe7188</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12608%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907ffe668fbb04b61d889be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12607-sql-injection-in-itsourcecode-onlin-e16fa7fc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12607%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907f80268fbb04b61d3775b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-03-9eab0c1f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-03&amp;severity=medium&amp;id=6909437da63c015b1ad88f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63293-na-f346df31</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63293%3A%20n%2Fa&amp;severity=medium&amp;id=6909133ec28fd46ded78ba28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50735-na-06b35192</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50735%3A%20n%2Fa&amp;severity=high&amp;id=690909fb7fff0e30cee434ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63593-na-7e95b1d7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63593%3A%20n%2Fa&amp;severity=medium&amp;id=6909084f7fff0e30cee234fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63441-na-f9bbf39d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63441%3A%20n%2Fa&amp;severity=high&amp;id=6908d8e12caf14b4c6da1111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50363-na-9cf09b4e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50363%3A%20n%2Fa&amp;severity=medium&amp;id=6908d8e12caf14b4c6da110d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60503-na-f4f0c7f6</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60503%3A%20n%2Fa&amp;severity=high&amp;id=6908d4e3bdcf00867c5ae6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60785-na-257cc4ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60785%3A%20n%2Fa&amp;severity=high&amp;id=6908d4e3bdcf00867c5ae6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63452-na-141833c5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63452%3A%20n%2Fa&amp;severity=critical&amp;id=6908d14bbdcf00867c55ae6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63453-na-caa4488b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63453%3A%20n%2Fa&amp;severity=critical&amp;id=6908d14bbdcf00867c55ae6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63449-na-16b61803</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63449%3A%20n%2Fa&amp;severity=medium&amp;id=6908cdd1bdcf00867c4fc665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63451-na-7e18ff7d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63451%3A%20n%2Fa&amp;severity=critical&amp;id=6908cdd1bdcf00867c4fc657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63450-na-b43eb49c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63450%3A%20n%2Fa&amp;severity=medium&amp;id=6908cdd1bdcf00867c4fc651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63448-na-a238d6d6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63448%3A%20n%2Fa&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b4679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63447-na-e1f5113e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63447%3A%20n%2Fa&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b4676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63446-na-59bc6720</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63446%3A%20n%2Fa&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b4673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63443-na-9ebe62fb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63443%3A%20n%2Fa&amp;severity=medium&amp;id=6908c7d269f0cf13c91ad0f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63442-na-dba89a3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63442%3A%20n%2Fa&amp;severity=medium&amp;id=6908c7d269f0cf13c91ad0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60892-na-06710ee9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60892%3A%20n%2Fa&amp;severity=medium&amp;id=6908c45e69f0cf13c9156063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29699-na-e1ec2e33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29699%3A%20n%2Fa&amp;severity=medium&amp;id=6908c45e69f0cf13c915605f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51317-na-e3f33d44</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51317%3A%20n%2Fa&amp;severity=medium&amp;id=6908c45e69f0cf13c915605b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45663-na-dd71b373</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45663%3A%20n%2Fa&amp;severity=medium&amp;id=6908c45e69f0cf13c9156057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12606-sql-injection-in-itsourcecode-onlin-9d0f36f3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12606%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907eab77f25edc77b67d006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12605-sql-injection-in-itsourcecode-onlin-ca8361d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12605%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907e56eedf7d393671f50e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/steal-ms-teams-app-cookies-6e3d8e3b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Steal%20MS%20Teams%20app%20cookies&amp;severity=medium&amp;id=6907df7bedf7d393671779e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12604-sql-injection-in-itsourcecode-onlin-2e36bec6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12604%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907cf0ae86687b6d231194c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scans-for-port-85308531-tcp-likely-related-to-wsus-21cddef0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scans%20for%20Port%208530%2F8531%20(TCP).%20Likely%20related%20to%20WSUS%20Vulnerability%20CVE-2025-59287%2C%20(Sun%2C%20Nov%202nd)&amp;severity=medium&amp;id=69079dc57eef5c312db38b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/drawn-to-danger-windows-graphics-vulnerabilities-l-4462158f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Drawn%20to%20Danger%3A%20Windows%20Graphics%20Vulnerabilities%20Lead%20to%20Remote%20Code%20Execution%20and%20Memory%20Exposure&amp;severity=critical&amp;id=6907626a2d54209f78d98806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12598-sql-injection-in-sourcecodester-bes-75c9891c</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12598%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=69074a3c2c5f3d6573056ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12597-sql-injection-in-sourcecodester-bes-b847db98</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12597%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=6907424c2c5f3d6573fcfe15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12596-buffer-overflow-in-tenda-ac23-c61abae8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12596%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=69073c6d82ffca841a909986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12595-buffer-overflow-in-tenda-ac23-58e3253b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12595%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=69072ecb55f62b0f9af90999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12594-sql-injection-in-code-projects-simp-9ecc3119</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12594%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69071a8adb62f9b0ce09a13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12593-unrestricted-upload-in-code-project-b5b6341c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12593%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=6906f96c7ed26d3e679435ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-02-5b3c6ac0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-02&amp;severity=medium&amp;id=6907f3c97f25edc77b73844f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asd-warns-of-ongoing-badcandy-attacks-exploiting-c-205f23af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASD%20Warns%20of%20Ongoing%20BADCANDY%20Attacks%20Exploiting%20Cisco%20IOS%20XE%20Vulnerability&amp;severity=high&amp;id=69065d1d4f0ef70af711d217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12603-cwe-787-out-of-bounds-write-in-azur-4b111aed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12603%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=low&amp;id=69065d944f0ef70af712612d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12602-cwe-787-out-of-bounds-write-in-azur-87667d98</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12602%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=low&amp;id=69065d944f0ef70af712611c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12601-cwe-730-denial-of-service-in-azure--b3b372c1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12601%3A%20CWE-730%20Denial%20of%20Service%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690657e0fdaff23802df3e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12600-cwe-730-denial-of-service-in-azure--bcd06cc5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12600%3A%20CWE-730%20Denial%20of%20Service%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690657e0fdaff23802df3e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12599-cwe-321-use-of-hard-coded-cryptogra-f6ccf1ea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12599%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690657e0fdaff23802df3e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quantifying-swiss-cheese-the-bayesian-way-1c725fad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quantifying%20Swiss%20Cheese%2C%20the%20Bayesian%20Way&amp;severity=high&amp;id=69064fe2bd22b54dd70fbe0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-kurdish-hacktivists-hezi-rash-behind-350-ddos--0cb53e94</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Kurdish%20Hacktivists%20Hezi%20Rash%20Behind%20350%20DDoS%20Attacks%20in%202%20Months&amp;severity=medium&amp;id=690626b8a9f0be756def3e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-source-cve-scanner-for-project-dependencies-v-d4ed9b9d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=open%20source%20CVE%20scanner%20for%20project%20dependencies.%20VSCode%20extension.&amp;severity=medium&amp;id=69061c34a9f0be756decfa31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asd-warns-of-ongoing-badcandy-attacks-exploiting-c-2a68257e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASD%20Warns%20of%20Ongoing%20BADCANDY%20Attacks%20Exploiting%20Cisco%20IOS%20XE%20Vulnerability&amp;severity=critical&amp;id=6906ae5b4dd0d643165de7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36367-cwe-862-missing-authorization-6422a3cf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36367%3A%20CWE-862%20Missing%20Authorization&amp;severity=high&amp;id=6905f7d9b1eaf3d2f0fca9cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edr-redir-v2-blind-edr-with-fake-program-files-d6747ad6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EDR-Redir%20V2%3A%20Blind%20EDR%20With%20Fake%20%22Program%20Files%22&amp;severity=medium&amp;id=6905e809d7cf94fba2ea608f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloud-abuse-at-scale-9267025a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloud%20Abuse%20at%20Scale&amp;severity=medium&amp;id=69088a4d5abee5c7f35a4db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australia-warns-of-badcandy-infections-on-unpatche-df32f5a9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australia%20warns%20of%20BadCandy%20infections%20on%20unpatched%20Cisco%20devices&amp;severity=high&amp;id=6905d7fe3e4baa1dbaf8b646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/we-got-hacked-emails-threaten-to-leak-university-o-b590b958</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98We%20got%20hacked%E2%80%99%20emails%20threaten%20to%20leak%20University%20of%20Pennsylvania%20data&amp;severity=high&amp;id=6905d7fe3e4baa1dbaf8b63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6988-cwe-79-improper-neutralization-of-in-fb9a778e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hogash%20KALLYAS%20-%20Creative%20eCommerce%20Multi-Purpose%20WordPress%20Theme&amp;severity=medium&amp;id=6905b8c4149d58da8cb27fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6990-cwe-94-improper-control-of-generatio-d8cacd8a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6990%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20hogash%20KALLYAS%20-%20Creative%20eCommerce%20Multi-Purpose%20WordPress%20Theme&amp;severity=high&amp;id=6905b8c4149d58da8cb27fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12137-cwe-73-external-control-of-file-nam-26695e57</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12137%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20jcollings%20Import%20WP%20%E2%80%93%20Export%20and%20Import%20CSV%20and%20XML%20files%20to%20WordPress&amp;severity=medium&amp;id=6905ae02e1b1aafea8d7ec85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12171-cwe-434-unrestricted-upload-of-file-bf6d8f39</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12171%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20anthonyeden%20RESTful%20Content%20Syndication&amp;severity=high&amp;id=6905ae02e1b1aafea8d7ec90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11755-cwe-434-unrestricted-upload-of-file-f99e3169</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11755%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpdelicious%20WP%20Delicious%20%E2%80%93%20Recipe%20Plugin%20for%20Food%20Bloggers%20(formerly%20Delicious%20Recipes)&amp;severity=high&amp;id=6905ae02e1b1aafea8d7ec81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10487-cwe-94-improper-control-of-generati-9184271b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10487%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=high&amp;id=6905ae02e1b1aafea8d7ec78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11499-cwe-434-unrestricted-upload-of-file-6af947e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11499%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20essekia%20Tablesome%20Table%20%E2%80%93%20Contact%20Form%20DB%20%E2%80%93%20WPForms%2C%20CF7%2C%20Gravity%2C%20Forminator%2C%20Fluent&amp;severity=critical&amp;id=6905ae02e1b1aafea8d7ec7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6574-cwe-639-authorization-bypass-through-d6c582b7</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6574%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=high&amp;id=6905ae02e1b1aafea8d7ec94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11502-cwe-79-improper-neutralization-of-i-cc3eaefa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11740-cwe-89-improper-neutralization-of-s-818a25b5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11740%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12038-cwe-863-incorrect-authorization-in--edb88ace</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12038%3A%20CWE-863%20Incorrect%20Authorization%20in%20wpfolderly%20Folderly&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11983-cwe-200-exposure-of-sensitive-infor-20804bb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11983%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20scossar%20WP%20Discourse&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12090-cwe-79-improper-neutralization-of-i-7bb2e7a5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12090%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Employee%20Spotlight%20%E2%80%93%20Team%20Member%20Showcase%20%26%20Meet%20the%20Team%20Plugin&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12180-cwe-862-missing-authorization-in-qo-1a4778eb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12180%3A%20CWE-862%20Missing%20Authorization%20in%20qodeinteractive%20Qi%20Blocks&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11927-cwe-79-improper-neutralization-of-i-af727743</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11927%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gijo%20Flying%20Images%3A%20Optimize%20and%20Lazy%20Load%20Images%20for%20Faster%20Page%20Speed&amp;severity=medium&amp;id=69058f8066e0c23159a8ccf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5949-cwe-639-authorization-bypass-through-fde58663</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5949%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=high&amp;id=69058f8066e0c23159a8cd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12118-cwe-79-improper-neutralization-of-i-52fe8b11</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12118%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevingillispie%20Schema%20Scalpel&amp;severity=medium&amp;id=69058f8066e0c23159a8ccff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11995-cwe-79-improper-neutralization-of-i-fc09cd7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11995%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=high&amp;id=69058f8066e0c23159a8ccfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11377-cwe-200-exposure-of-sensitive-infor-171addb1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11377%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20fernandobt%20List%20category%20posts&amp;severity=medium&amp;id=69058f8066e0c23159a8ccef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11928-cwe-79-improper-neutralization-of-i-7a721ce7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11928%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wipeoutmedia%20CSS%20%26%20JavaScript%20Toolbox&amp;severity=medium&amp;id=6905841371a6fc4aff3da4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12367-cwe-285-improper-authorization-in-s-7eb2a310</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12367%3A%20CWE-285%20Improper%20Authorization%20in%20softaculous%20SiteSEO%20%E2%80%93%20SEO%20Simplified&amp;severity=medium&amp;id=6905841371a6fc4aff3da4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11833-cwe-862-missing-authorization-in-sa-8d513e87</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11833%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=critical&amp;id=6905841371a6fc4aff3da4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62275-cwe-863-incorrect-authorization-in--dba97816</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62275%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6905798771a6fc4aff3b85fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11922-cwe-79-improper-neutralization-of-i-281d1d6d</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11922%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20j_3rk%20Inactive%20Logout&amp;severity=medium&amp;id=690567f271a6fc4aff36b3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11920-cwe-98-improper-control-of-filename-37d199f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11920%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20whyun%20WPCOM%20Member&amp;severity=high&amp;id=690567f271a6fc4aff36b3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11174-cwe-285-improper-authorization-in-b-14d445b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11174%3A%20CWE-285%20Improper%20Authorization%20in%20barn2media%20Document%20Library%20Lite&amp;severity=medium&amp;id=690567f271a6fc4aff36b3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11816-cwe-862-missing-authorization-in-wp-b4a75309</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11816%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Privacy%20Policy%20Generator%20%E2%80%93%20WPLP%20Legal%20Pages&amp;severity=medium&amp;id=690567f271a6fc4aff36b3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-01-6229a138</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-01&amp;severity=medium&amp;id=6906a1ea3dd8f1d01dd46f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62276-cwe-525-use-of-web-browser-cache-co-e0c14fac</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62276%3A%20CWE-525%3A%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6905491afb7fda9fbd25249b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-arrests-meduza-stealer-developers-after-gov-a46174ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20Arrests%20Meduza%20Stealer%20Developers%20After%20Government%20Hack&amp;severity=medium&amp;id=69052f2fa02e7fe8a679652f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12464-stack-based-buffer-overflow-in-red--e68ed452</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12464%3A%20Stack-based%20Buffer%20Overflow&amp;severity=medium&amp;id=6905290a5a7d71ee5de3edbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-skycloak-tor-campaign-targets-military-o-18dd853b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20SkyCloak%3A%20Tor%20Campaign%20targets%20Military%20of%20Russia%20%26%20Belarus&amp;severity=medium&amp;id=69052bb4a02e7fe8a6757d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc6384-targets-european-diplomatic-entities-with--508ebc4f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC6384%20Targets%20European%20Diplomatic%20Entities%20With%20Windows%20Exploit&amp;severity=medium&amp;id=69055f4871a6fc4aff359281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ribbon-communications-breach-marks-latest-telecom--01eaced1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ribbon%20Communications%20Breach%20Marks%20Latest%20Telecom%20Attack&amp;severity=medium&amp;id=69055f4871a6fc4aff359284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60711-cwe-693-protection-mechanism-failur-9988d1b3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60711%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69050e83f07fd4df0f173840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10693-cwe-757-selection-of-less-secure-al-c9798528</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10693%3A%20CWE-757%20Selection%20of%20Less-Secure%20Algorithm%20During%20Negotiation%20(&apos;Algorithm%20Downgrade&apos;)%20in%20silabs.com%20Silicon%20Labs%20Z-Wave%20SDK&amp;severity=high&amp;id=69050e83f07fd4df0f173843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12547-improper-restriction-of-excessive-a-448a33af</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12547%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20LogicalDOC%20Community%20Edition&amp;severity=medium&amp;id=690504b88e4e311697907915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12546-cross-site-scripting-in-logicaldoc--362369f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12546%3A%20Cross%20Site%20Scripting%20in%20LogicalDOC%20Community%20Edition&amp;severity=medium&amp;id=690504b88e4e31169790790f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62267-cwe-79-improper-neutralization-of-i-c0578934</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6904fe6639657deb20180355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62264-cwe-79-improper-neutralization-of-i-363c3f09</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62264%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6904faef39657deb2013f7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-unveils-aardvark-gpt-5-agent-that-finds-and-577cd8b5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Unveils%20Aardvark%3A%20GPT-5%20Agent%20That%20Finds%20and%20Fixes%20Code%20Flaws%20Automatically&amp;severity=medium&amp;id=69055e2471a6fc4aff34f132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59501-cwe-290-authentication-bypass-by-sp-7cc506b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59501%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=medium&amp;id=6904e98dae52ebddb37144ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6075-vulnerability-in-python-software-fou-52ab587c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6075%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=6904e98dae52ebddb37144c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-hackers-deploy-new-airstalk-malware-i-2e4ab527</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20Hackers%20Deploy%20New%20Airstalk%20Malware%20in%20Suspected%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69055e2471a6fc4aff34f135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12554-cwe-693-protection-mechanism-failur-d8b806fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12554%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=6904e78dae52ebddb370320f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12509-cwe-829-inclusion-of-functionality--893f2856</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12509%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Bizerba%20BRAIN2&amp;severity=high&amp;id=6904e78dae52ebddb3703209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12508-cwe-319-cleartext-transmission-of-s-3727b2a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12508%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Bizerba%20BRAIN2&amp;severity=high&amp;id=6904e78dae52ebddb3703206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12507-cwe-428-unquoted-search-path-or-ele-c577aded</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12507%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20Bizerba%20_connect.BRAIN&amp;severity=high&amp;id=6904e78dae52ebddb3703203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12553-cwe-599-missing-validation-of-opens-52e3c03d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12553%3A%20CWE-599%20Missing%20Validation%20of%20OpenSSL%20Certificate%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=6904e78dae52ebddb370320c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12552-cwe-521-weak-password-requirements--eea5b071</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12552%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=6904db52cf9c100c41c3e00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/government-approach-to-disrupt-cyber-scams-is-frag-8aa7e605</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Government%20Approach%20to%20Disrupt%20Cyber%20Scams%20is%20&apos;Fragmented&apos;&amp;severity=medium&amp;id=6909762578d4f574c2b0679e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12357-cwe-923-in-iso-15118-2-network-and--3ffa7d8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12357%3A%20CWE-923%20in%20ISO%2015118-2%20Network%20and%20Application%20Protocol%20Requirements%20EV%20Car%20Chargers&amp;severity=medium&amp;id=6904db52cf9c100c41c3e00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-whatsapp-passkey-encrypted-backups-r-077c4282</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20WhatsApp%20Passkey-Encrypted%20Backups%2C%20Russia%20Targets%20Meduza%20Malware%2C%20New%20Mastercard%20Solution&amp;severity=medium&amp;id=6904d42fdadb00d130f6c830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64168-cwe-362-concurrent-execution-using--af3aeef3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64168%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20agno-agi%20agno&amp;severity=high&amp;id=6904d0bddadb00d130f3212f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64385-cwe-20-improper-input-validation-in-417f5325</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64385%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Circutor%20TCPRS1plus&amp;severity=critical&amp;id=6904c9ac8ec00889be37f4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64389-cwe-319-cleartext-transmission-of-s-74fab0d8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64389%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Circutor%20TCPRS1plus&amp;severity=high&amp;id=6904c9ac8ec00889be37f503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64388-cwe-400-uncontrolled-resource-consu-cac32ed0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64388%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Circutor%20TCPRS1plus&amp;severity=critical&amp;id=6904c7b38ec00889be3656e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64387-cwe-1021-improper-restriction-of-re-e1206d6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64387%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Circutor%20TCPRS1plus&amp;severity=medium&amp;id=6904c7b38ec00889be3656e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12501-integer-overflow-in-opera-norway-as-8fa09d71</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12501%3A%20Integer%20Overflow%20in%20Opera%20Norway%20AS%20GameMaker%20IDE&amp;severity=high&amp;id=6904c7b38ec00889be3656e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-exploit-windows-shortcut-flaw-49e2be6e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Exploit%20Windows%20Shortcut%20Flaw%20to%20Target%20European%20Diplomats&amp;severity=medium&amp;id=6904c289f54b4a899781a306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12460-cwe-79-improper-neutralization-of-i-f31bb708</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Afterlogic%20Aurora&amp;severity=medium&amp;id=6904c2a6f54b4a899781b912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12521-cwe-200-exposure-of-sensitive-infor-c1fe9368</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12521%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Analytify%20Analytify%20Pro&amp;severity=medium&amp;id=6904c2a6f54b4a899781b915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ernst-young-exposes-4tb-sql-server-backup-publicly-fd1b4d39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ernst%20%26%20Young%20Exposes%204TB%20SQL%20Server%20Backup%20Publicly%20on%20Microsoft%20Azure&amp;severity=high&amp;id=6904bf0ef54b4a89977c21c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-zero-day-actively-exploited-to-spy-on-euro-aed45052</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20zero-day%20actively%20exploited%20to%20spy%20on%20European%20diplomats&amp;severity=critical&amp;id=6904bf0ef54b4a89977c21c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64386-cwe-1021-improper-restriction-of-re-71b1ca95</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64386%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Circutor%20TCPRS1plus&amp;severity=high&amp;id=6904bf30f54b4a89977c5647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-tick-group-exploits-lanscope-zero-day-99b087f0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Tick%20Group%20Exploits%20Lanscope%20Zero-Day%20to%20Hijack%20Corporate%20Systems&amp;severity=critical&amp;id=69055e2471a6fc4aff34f138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-man-extradited-from-ireland-to-us-over-c-da4dcca6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Man%20Extradited%20From%20Ireland%20to%20US%20Over%20Conti%20Ransomware%20Charges&amp;severity=medium&amp;id=6904b827a6ddfd238693b43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36249-cwe-614-sensitive-cookie-in-https-s-1d452c9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36249%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20IBM%20Jazz%20for%20Service%20Management&amp;severity=low&amp;id=6904bd22f54b4a89977ab6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33003-cwe-250-execution-with-unnecessary--c0741535</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33003%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=6904bd22f54b4a89977ab6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-wsus-flaw-to-spread-skuld-stealer--6ea5f322</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20WSUS%20Flaw%20to%20Spread%20Skuld%20Stealer%20Despite%20Microsoft%20Patch&amp;severity=high&amp;id=6904b12fa6ddfd23868a9dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13992-cwe-79-improper-neutralization-of-i-0a1ca514</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13992%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6904b13fa6ddfd23868ab73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4952-cwe-732-incorrect-permission-assignm-a2c0b981</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4952%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ESET%20ESET%20NOD32%20Antivirus&amp;severity=medium&amp;id=6904add5541c5042bae1090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-vsx-downplays-impact-from-glassworm-campaign-69597ee5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20VSX%20Downplays%20Impact%20From%20GlassWorm%20Campaign&amp;severity=medium&amp;id=6904adbc541c5042bae0faf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64368-cross-site-request-forgery-csrf-in--340979d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64368%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mikado-Themes%20Bard&amp;severity=medium&amp;id=6904a350479ed964d8ea1f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64367-improper-neutralization-of-input-du-7cdabec8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64367%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Adrian%20Tobey%20Groundhogg&amp;severity=medium&amp;id=6904a350479ed964d8ea1f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64366-improper-neutralization-of-special--dbb299fd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64366%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=high&amp;id=6904a350479ed964d8ea1f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64365-improper-neutralization-of-input-du-c31b385b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64365%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20colabrio%20Ohio%20Extra&amp;severity=medium&amp;id=6904a350479ed964d8ea1f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64364-improper-control-of-filename-for-in-78389db8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Masterstudy&amp;severity=high&amp;id=6904a350479ed964d8ea1f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64363-improper-control-of-filename-for-in-2e46e954</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64363%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SeventhQueen%20Kleo&amp;severity=high&amp;id=6904a350479ed964d8ea1f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64362-improper-neutralization-of-input-du-74f88d70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64362%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SeventhQueen%20K%20Elements&amp;severity=medium&amp;id=6904a34e479ed964d8ea1ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64361-improper-neutralization-of-input-du-84f75ece</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StylemixThemes%20Consulting%20Elementor%20Widgets&amp;severity=medium&amp;id=6904a34e479ed964d8ea1ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64360-improper-control-of-filename-for-in-c2398146</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64360%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Consulting%20Elementor%20Widgets&amp;severity=high&amp;id=6904a34e479ed964d8ea1ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64359-improper-control-of-filename-for-in-f82d57b3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64359%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Consulting&amp;severity=high&amp;id=6904a34e479ed964d8ea1ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64358-missing-authorization-in-webtoffee--e6c936a7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64358%3A%20Missing%20Authorization%20in%20WebToffee%20Smart%20Coupons%20for%20WooCommerce&amp;severity=medium&amp;id=6904a34e479ed964d8ea1e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64357-cross-site-request-forgery-csrf-in--56cf65a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64357%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Younes%20JFR.%20Advanced%20Database%20Cleaner&amp;severity=medium&amp;id=6904a34e479ed964d8ea1e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64356-missing-authorization-in-f1logic-in-d4863d62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64356%3A%20Missing%20Authorization%20in%20f1logic%20Insert%20PHP%20Code%20Snippet&amp;severity=medium&amp;id=6904a34e479ed964d8ea1e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64354-improper-neutralization-of-input-du-1ca1acd9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matias%20Ventura%20Gutenberg&amp;severity=medium&amp;id=6904a34e479ed964d8ea1e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64353-deserialization-of-untrusted-data-i-c5a4bd0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64353%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Chouby%20Polylang&amp;severity=high&amp;id=6904a34e479ed964d8ea1e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64352-missing-authorization-in-wpdevelope-6b2c87b9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64352%3A%20Missing%20Authorization%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=low&amp;id=6904a34e479ed964d8ea1e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-conti-ransomware-suspect-extradited-to-u-395ed5c5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Conti%20Ransomware%20Suspect%20Extradited%20to%20US%20from%20Ireland&amp;severity=medium&amp;id=69049fc8479ed964d8e4638b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40603-cwe-532-insertion-of-sensitive-info-eb095ea2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40603%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20SonicWall%20SMA100&amp;severity=medium&amp;id=690498e560041281bb1cf1f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-exploited-xwiki-vmware-flaws-to-kev-cata-9f30d19b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Exploited%20XWiki%2C%20VMware%20Flaws%20to%20KEV%20Catalog&amp;severity=medium&amp;id=690498c760041281bb1cecd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-exploits-unpatched-windows-flaw-in-rec-e110ee35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Exploits%20Unpatched%20Windows%20Flaw%20in%20Recent%20Attacks&amp;severity=medium&amp;id=6904917f8338aee69048baf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11602-cwe-226-sensitive-information-in-re-e629c409</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11602%3A%20CWE-226%3A%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20neo4j%20Enterprise%20Edition&amp;severity=medium&amp;id=69048e028338aee690446fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11843-cwe-290-authentication-bypass-by-sp-06a0d0b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11843%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Therefore%20Corporation%20GmbH%20Therefore%20Online%20and%20Therefore%20On-Premises&amp;severity=high&amp;id=6904870d8338aee69039b244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wave-of-cyberattacks-by-apt-group-cloud-atlas--8a38ba1b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20wave%20of%20cyberattacks%20by%20APT%20group%20Cloud%20Atlas%20on%20Russia&apos;s%20government%20sector&amp;severity=medium&amp;id=69049c46479ed964d8e04a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-brazil-with-love-new-tactics-from-lampion-fef0df3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Brazil%20with%20Love%3A%20New%20Tactics%20from%20Lampion&amp;severity=medium&amp;id=69049c46479ed964d8e04a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-an-evolving-discord-based-rat-family-380166e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20an%20evolving%20Discord-based%20RAT%20family&amp;severity=medium&amp;id=690498dc60041281bb1ceeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/latam-baited-into-the-delivery-of-purehvnc-3d15ff64</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LATAM%20baited%20into%20the%20delivery%20of%20PureHVNC&amp;severity=medium&amp;id=690498dc60041281bb1cefe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-loader-executing-tornet-and-purehvnc-efed6f5f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Loader%20Executing%20TorNet%20and%20PureHVNC&amp;severity=medium&amp;id=690498dc60041281bb1cf013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigation-report-androidbankbot-ynrk-mobile-ba-7334d161</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigation%20Report%3A%20Android%2FBankBot-YNRK%20Mobile%20Banking%20Trojan&amp;severity=medium&amp;id=690491968338aee69048ea17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12115-cwe-602-client-side-enforcement-of--9dc63988</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12115%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20wpclever%20WPC%20Name%20Your%20Price%20for%20WooCommerce&amp;severity=high&amp;id=690483ba189d660333d91771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12041-cwe-862-missing-authorization-in-ap-a8e1e44e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12041%3A%20CWE-862%20Missing%20Authorization%20in%20apos37%20ERI%20File%20Library&amp;severity=medium&amp;id=690483ba189d660333d9176d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-vmware-zero-day-exploited-by-china-link-2ed1373a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20VMware%20Zero-Day%20Exploited%20by%20China-Linked%20Hackers%20in%20Active%20Attacks&amp;severity=critical&amp;id=690483a0189d660333d909de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eclipse-foundation-revokes-leaked-open-vsx-tokens--da758c0e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eclipse%20Foundation%20Revokes%20Leaked%20Open%20VSX%20Tokens%20Following%20Wiz%20Discovery&amp;severity=high&amp;id=690483a0189d660333d909e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30189-improper-preservation-of-consistenc-b9045fba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30189%3A%20Improper%20Preservation%20of%20Consistency%20Between%20Independent%20Representations%20of%20Shared%20State%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69048024189d660333d32ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30191-improper-restriction-of-rendered-ui-9790f329</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30191%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=69047ca9189d660333cf19e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30188-uncontrolled-resource-consumption-i-68cd8ed6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30188%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=high&amp;id=69047ca9189d660333cf19e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62232-cwe-532-insertion-of-sensitive-info-dfa48615</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62232%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=high&amp;id=69047ca9189d660333cf19e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-and-nsa-issue-urgent-guidance-to-secure-wsus--eb3952bb</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20and%20NSA%20Issue%20Urgent%20Guidance%20to%20Secure%20WSUS%20and%20Microsoft%20Exchange%20Servers&amp;severity=medium&amp;id=69055e2471a6fc4aff34f13e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc6384-weaponizes-zdi-can-25373-vulnerability-to--cd80b558</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC6384%20Weaponizes%20ZDI-CAN-25373%20Vulnerability%20to%20Deploy%20PlugX%20Against%20Hungarian%20and%20Belgian%20Diplomatic%20Entities&amp;severity=medium&amp;id=69047c9e189d660333cf0809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8383-cwe-352-cross-site-request-forgery-c-cc6a2cdf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8383%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20averta%20Depicter%20%E2%80%94%20Popup%20%26%20Slider%20Builder&amp;severity=medium&amp;id=690475de992e7194db50fe4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12094-cwe-693-protection-mechanism-failur-76331afb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12094%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20oopspam%20OOPSpam%20Anti-Spam%3A%20Spam%20Protection%20for%20WordPress%20Forms%20%26%20Comments%20(No%20CAPTCHA)&amp;severity=medium&amp;id=690475de992e7194db50fe41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12175-cwe-862-missing-authorization-in-st-a86d5f51</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12175%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=690475de992e7194db50fe46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eclipse-foundation-revokes-leaked-open-vsx-tokens--c073460e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eclipse%20Foundation%20Revokes%20Leaked%20Open%20VSX%20Tokens%20Following%20Wiz%20Discovery&amp;severity=low&amp;id=69055e2471a6fc4aff34f141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/japan-issues-ot-security-guidance-for-semiconducto-681d2db8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Japan%20Issues%20OT%20Security%20Guidance%20for%20Semiconductor%20Factories&amp;severity=medium&amp;id=69046b5ec4aece8eb7bba98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6520-cwe-89-improper-neutralization-of-sp-41035cd6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6520%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Abis%20Technology%20BAPSIS&amp;severity=critical&amp;id=69046b76c4aece8eb7bbb0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8385-cwe-22-improper-limitation-of-a-path-8abeba51</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8385%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PX-lab%20Zombify&amp;severity=medium&amp;id=6904678cd694fb7fc736cf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10897-cwe-22-improper-limitation-of-a-pat-aba0df75</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10897%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20JMA%20Plugins%20WooCommerce%20Designer%20Pro&amp;severity=high&amp;id=6904678cd694fb7fc736cefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-vmware-zero-day-exploited-by-china-link-797a141c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20VMware%20Zero-Day%20Exploited%20by%20China-Linked%20Hackers%20in%20Active%20Attacks&amp;severity=high&amp;id=690463f2d694fb7fc7319064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7846-cwe-36-absolute-path-traversal-in-va-90866acd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7846%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20vanquish%20WordPress%20User%20Extra%20Fields&amp;severity=high&amp;id=69045cb533ef7ec31284379d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8489-cwe-269-improper-privilege-managemen-b5b3a721</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8489%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%204%2C000%2B%20ready%20Elementor%20sections%2C%20650%2B%20templates%2C%2070%2B%20FREE%20widgets%20for%20Elementor&amp;severity=critical&amp;id=69045cb533ef7ec3128437a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5397-cwe-288-authentication-bypass-using--eaf3d7aa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5397%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Noo%20JobMonster&amp;severity=critical&amp;id=69045cb533ef7ec312843799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11191-cwe-862-missing-authorization-in-re-3344a713</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11191%3A%20CWE-862%20Missing%20Authorization%20in%20RealPress&amp;severity=medium&amp;id=69045e81d694fb7fc7296d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54763-improper-neutralization-of-special--f08e1930</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54763%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Century%20Systems%20Co.%2C%20Ltd.%20FutureNet%20MA-X%20series&amp;severity=high&amp;id=6904523333ef7ec31273476b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58152-files-or-directories-accessible-to--59c3d4da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58152%3A%20Files%20or%20directories%20accessible%20to%20external%20parties%20in%20Century%20Systems%20Co.%2C%20Ltd.%20FutureNet%20MA-X%20series&amp;severity=medium&amp;id=6904523333ef7ec31273476f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-security-layer-for-macos-takes-aim-at-admin--476b0907</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20New%20Security%20Layer%20for%20macOS%20Takes%20Aim%20at%20Admin%20Errors%20Before%20Hackers%20Do&amp;severity=medium&amp;id=69055e2471a6fc4aff34f144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11806-cwe-79-improper-neutralization-of-i-c75f04f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qzzr%20Qzzr%20Shortcode%20Plugin&amp;severity=medium&amp;id=69042534aebfcd547431d42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11975-cwe-862-missing-authorization-in-fu-b813de93</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11975%3A%20CWE-862%20Missing%20Authorization%20in%20fusewp%20FuseWP%20%E2%80%93%20WordPress%20User%20Sync%20to%20Email%20List%20%26%20Marketing%20Automation%20(Mailchimp%2C%20Constant%20Contact%2C%20ActiveCampaign%20etc.)&amp;severity=medium&amp;id=69042534aebfcd547431d430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6176-cwe-400-uncontrolled-resource-consum-e86a6505</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6176%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20scrapy%20scrapy%2Fscrapy&amp;severity=high&amp;id=6903fe8daebfcd5474a63725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-31-c0274374</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-31&amp;severity=medium&amp;id=6905500cfb7fda9fbd2ed095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63563-na-9d5d3738</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63563%3A%20n%2Fa&amp;severity=medium&amp;id=69051bc430c0d02a22040343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63561-na-530bbb87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63561%3A%20n%2Fa&amp;severity=high&amp;id=6905184f30c0d02a22fffc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63562-na-0eedc4d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63562%3A%20n%2Fa&amp;severity=medium&amp;id=69051574f07fd4df0f20dbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63458-na-b4598c46</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63458%3A%20n%2Fa&amp;severity=high&amp;id=690508328e4e311697948c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63454-na-77503cc0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63454%3A%20n%2Fa&amp;severity=high&amp;id=6905063d8e4e3116979314c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63460-na-1a6f26b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63460%3A%20n%2Fa&amp;severity=high&amp;id=6904f211986dd4e4187f7593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63459-na-d1dc2699</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63459%3A%20n%2Fa&amp;severity=high&amp;id=6904f08d986dd4e4187ccde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63465-na-5cb624f8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63465%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63464-na-e5c62316</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63464%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63463-na-9883fd32</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63463%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63462-na-72b95be3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63462%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63461-na-2a1ed345</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63461%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63469-na-57c23d27</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63469%3A%20n%2Fa&amp;severity=high&amp;id=6904e78dae52ebddb3703212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57108-na-58043a4e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57108%3A%20n%2Fa&amp;severity=critical&amp;id=6904dcd4cf9c100c41c66458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63468-na-53a3f353</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63468%3A%20n%2Fa&amp;severity=high&amp;id=6904db52cf9c100c41c3e016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63466-na-afc69715</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63466%3A%20n%2Fa&amp;severity=high&amp;id=6904db52cf9c100c41c3e013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63467-na-6bfa0cbc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63467%3A%20n%2Fa&amp;severity=high&amp;id=6904d7cadadb00d130fc157c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29270-na-c3c48668</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29270%3A%20n%2Fa&amp;severity=critical&amp;id=6904d7cadadb00d130fc1579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57107-na-4bb31bbe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57107%3A%20n%2Fa&amp;severity=high&amp;id=6904d0bddadb00d130f32132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57106-na-3e4ad546</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57106%3A%20n%2Fa&amp;severity=high&amp;id=6904d0bddadb00d130f3212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60749-na-64f7bea6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60749%3A%20n%2Fa&amp;severity=high&amp;id=6904cd2f8ec00889be3d7aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61427-na-d9dd7be0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61427%3A%20n%2Fa&amp;severity=medium&amp;id=6904c9ac8ec00889be37f4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flowise-304-remote-code-execution-rce-0d4ee7ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flowise%203.0.4%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=6904bcc1f54b4a89977a2e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23050-cwe-125-out-of-bounds-read-in-qt-8bd20c78</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23050%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Qt&amp;severity=low&amp;id=69041725aebfcd5474f35bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8849-cwe-400-uncontrolled-resource-consum-d4797e85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8849%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=6903fb06aebfcd5474a51c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-will-vote-to-scrap-telecom-cybersecurity-requi-955b1987</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20will%20vote%20to%20scrap%20telecom%20cybersecurity%20requirements&amp;severity=medium&amp;id=6903f780aebfcd5474a443c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zombie-projects-rise-again-to-undermine-security-98d9685d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zombie%20Projects%20Rise%20Again%20to%20Undermine%20Security&amp;severity=medium&amp;id=69055f4871a6fc4aff359287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48983-vulnerability-in-veeam-backup-and-r-c62835d7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48983%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=6903f7a3aebfcd5474a44742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48982-vulnerability-in-veeam-agent-for-mi-e117654c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48982%3A%20Vulnerability%20in%20Veeam%20Agent%20for%20Microsoft%20Windows&amp;severity=high&amp;id=6903f7a3aebfcd5474a4473f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27208-vulnerability-in-revive-revive-adse-f4fa953d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27208%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=6903f7a3aebfcd5474a4473c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48984-vulnerability-in-veeam-backup-and-r-9e80df79</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48984%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=high&amp;id=6903f7a3aebfcd5474a4474d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brush-exploit-can-cause-any-chromium-browser-to-co-ccedb57d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brush%20exploit%20can%20cause%20any%20Chromium%20browser%20to%20collapse%20in%2015-60%20seconds&amp;severity=high&amp;id=6903f780aebfcd5474a443c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52665-vulnerability-in-ubiquiti-inc-unifi-32cc4757</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52665%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Access%20Application&amp;severity=critical&amp;id=6903f7a3aebfcd5474a44756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52663-vulnerability-in-ubiquiti-inc-unifi-990c9baf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52663%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Talk%20Touch&amp;severity=high&amp;id=6903f7a3aebfcd5474a44750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48980-vulnerability-in-brave-desktop-brow-e9cf4c9c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48980%3A%20Vulnerability%20in%20Brave%20Desktop%20Browser&amp;severity=medium&amp;id=6903f7a3aebfcd5474a4474a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52664-vulnerability-in-revive-revive-adse-6ba87dfb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52664%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=6903f7a3aebfcd5474a44753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-claims-it-stole-23gb-from-apache--0b215574</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20Ransomware%20Claims%20It%20Stole%2023GB%20from%20Apache%20OpenOffice&amp;severity=medium&amp;id=6903f077aebfcd5474a1faef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7316-cwe-79-improper-neutralization-of-in-309084e5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7315-cwe-79-improper-neutralization-of-in-ebcc7746</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7315%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14001-cwe-79-improper-neutralization-of-i-a4ce2627</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14001%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7318-cwe-79-improper-neutralization-of-in-9d172c6d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7318%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14000-cwe-79-improper-neutralization-of-i-c08f3f85</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7313-cwe-79-improper-neutralization-of-in-f309c714</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7313%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7314-cwe-79-improper-neutralization-of-in-7eb9eefb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53688-cwe-79-improper-neutralization-of-i-400c930d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53688%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7317-cwe-862-missing-authorization-in-nag-58b17b6a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7317%3A%20CWE-862%20Missing%20Authorization%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee7aebfcd54749e67fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13996-cwe-613-insufficient-session-expira-a18b20c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13996%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13993-cwe-79-improper-neutralization-of-i-451fccf1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13993%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e6800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14008-cwe-78-improper-neutralization-of-s-34bf2173</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14008%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e682b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34286-cwe-78-improper-neutralization-of-s-efb80336</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34286%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e683f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14003-cwe-78-improper-neutralization-of-s-4a624af2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14003%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34134-cwe-78-improper-neutralization-of-s-ab21e3af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34134%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14009-cwe-269-improper-privilege-manageme-8f97daba</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14009%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14004-cwe-269-improper-privilege-manageme-304ddc2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14004%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Nagios%20XI&amp;severity=high&amp;id=6903dee8aebfcd54749e681c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34287-cwe-732-incorrect-permission-assign-b2b17dc1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34287%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Nagios%20XI&amp;severity=high&amp;id=6903deeaaebfcd54749e6b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34135-cwe-732-incorrect-permission-assign-5f207cbd</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34135%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee8aebfcd54749e683a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14006-cwe-346-origin-validation-error-in--5fac1da3</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14006%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Nagios%20XI&amp;severity=high&amp;id=6903dee8aebfcd54749e6826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-18-year-old-codebase-left-smart-buildings-wide--afaed408</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%2018-Year-Old%20Codebase%20Left%20Smart%20Buildings%20Wide%20Open&amp;severity=medium&amp;id=69055f4871a6fc4aff35928a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14005-cwe-78-improper-neutralization-of-s-637c7973</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14005%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14002-cwe-98-improper-control-of-filename-73b69dc1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14002%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db62aebfcd54749cd818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34284-cwe-78-improper-neutralization-of-s-1addf98c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34284%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903db62aebfcd54749cd81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13995-cwe-497-exposure-of-sensitive-syste-4d322a9b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13995%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db62aebfcd54749cd813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34283-cwe-497-exposure-of-sensitive-syste-34edced4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34283%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db64aebfcd54749cd8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13994-cwe-862-missing-authorization-in-na-10fe0d2b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13994%3A%20CWE-862%20Missing%20Authorization%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db63aebfcd54749cd84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13999-cwe-497-exposure-of-sensitive-syste-480dc901</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13999%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db63aebfcd54749cd853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7319-cwe-79-improper-neutralization-of-in-4b1988d8</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7319%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Network%20Analyzer&amp;severity=medium&amp;id=6903db62aebfcd54749cd831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34278-cwe-79-improper-neutralization-of-i-208c0262</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Network%20Analyzer&amp;severity=medium&amp;id=6903db64aebfcd54749cd8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34280-cwe-78-improper-neutralization-of-s-a8eb2c7b</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34280%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Network%20Analyzer&amp;severity=high&amp;id=6903db64aebfcd54749cd8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7321-cwe-79-improper-neutralization-of-in-10f871a1</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7321%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Log%20Server&amp;severity=medium&amp;id=6903db62aebfcd54749cd835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7323-cwe-79-improper-neutralization-of-in-53b4d033</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7323%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Log%20Server&amp;severity=medium&amp;id=6903db62aebfcd54749cd83d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58272-cwe-79-improper-neutralization-of-i-685a8f7c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58272&amp;severity=null&amp;id=6903db63aebfcd54749cd858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34298-cwe-281-improper-preservation-of-pe-60d50680</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34298%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db64aebfcd54749cd8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34277-cwe-94-improper-control-of-generati-e781fd2c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34277%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Nagios%20Log%20Server&amp;severity=critical&amp;id=6903db64aebfcd54749cd8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34272-cwe-200-exposure-of-sensitive-infor-d8859d85</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34272%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Nagios%20Log%20Server&amp;severity=medium&amp;id=6903db63aebfcd54749cd872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34273-cwe-863-incorrect-authorization-in--59a87b49</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34273%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db63aebfcd54749cd877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58273-cwe-266-incorrect-privilege-assignm-632aa834</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58273%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db63aebfcd54749cd85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34274-cwe-250-execution-with-unnecessary--6979e6b9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34274%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Nagios%20Log%20Server&amp;severity=critical&amp;id=6903db63aebfcd54749cd87c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7322-cwe-863-incorrect-authorization-in-n-e0241be2</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7322%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db62aebfcd54749cd839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34271-cwe-319-cleartext-transmission-of-s-ae1309bc</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34271%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db63aebfcd54749cd86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34270-cwe-312-cleartext-storage-of-sensit-66961f55</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34270%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Nagios%20Log%20Server&amp;severity=medium&amp;id=6903db63aebfcd54749cd867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53689-cwe-79-improper-neutralization-of-i-c228cc64</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53689%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Fusion&amp;severity=medium&amp;id=6903db62aebfcd54749cd822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53690-cwe-79-improper-neutralization-of-i-4edc0ff4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Fusion&amp;severity=medium&amp;id=6903db62aebfcd54749cd827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7312-cwe-79-improper-neutralization-of-in-12faff53</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7312%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Fusion&amp;severity=medium&amp;id=6903db62aebfcd54749cd82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34269-cwe-613-insufficient-session-expira-9d180085</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34269&amp;severity=null&amp;id=6903db63aebfcd54749cd862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34249-cwe-307-improper-restriction-of-exc-92c6659c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34249&amp;severity=null&amp;id=6903d7ddaebfcd54749bf69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7325-cwe-306-missing-authentication-for-c-b6820620</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7325%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Anheng%20Information%20(Hangzhou%20DBAPP%20Security%20Information%20Technology%20Co.%2C%20Ltd.)%20Mingyu%20Operations%20and%20Maintenance%20Audit%20and%20Risk%20Control%20System&amp;severity=critical&amp;id=6903d7ddaebfcd54749bf69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-stands-out-in-refusal-to-sign-un-cybercrime-tre-96a4d257</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Stands%20Out%20in%20Refusal%20to%20Sign%20UN%20Cybercrime%20Treaty&amp;severity=low&amp;id=69055f4871a6fc4aff35928d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-claroty-authentication-bypass-flaw-opened-04540570</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Claroty%20Authentication%20Bypass%20Flaw%20Opened%20OT%20to%20Attack&amp;severity=critical&amp;id=69055f4871a6fc4aff359290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automating-comdcom-vulnerability-research-f704b274</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automating%20COM%2FDCOM%20vulnerability%20research&amp;severity=medium&amp;id=6903c9ceaebfcd54749995e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8850-cwe-440-expected-behavior-violation--36b4c778</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8850%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=low&amp;id=6903c64aaebfcd5474991deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lotl-attack-hides-malware-in-windows-native-ai-sta-41166944</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LotL%20Attack%20Hides%20Malware%20in%20Windows%20Native%20AI%20Stack&amp;severity=medium&amp;id=69055f4871a6fc4aff359293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3356-cwe-22-improper-limitation-of-a-path-a7e7c432</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3356%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Tivoli%20Monitoring&amp;severity=high&amp;id=6903bbbdaebfcd5474960ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3355-cwe-22-improper-limitation-of-a-path-46c85436</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3355%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Tivoli%20Monitoring&amp;severity=high&amp;id=6903bbbdaebfcd5474960ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36137-cwe-250-execution-with-unnecessary--d12693ea</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36137%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Sterling%20Connect%3ADirect%20for%20Unix&amp;severity=high&amp;id=6903b838aebfcd5474944466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62265-cwe-79-improper-neutralization-of-i-d21a69fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62265%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6903b13baebfcd5474914704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spyware-plugged-chatgpt-dalle-and-whatsapp-apps-ta-3876fa1c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spyware-Plugged%20ChatGPT%2C%20DALL%C2%B7E%20and%20WhatsApp%20Apps%20Target%20US%20Users&amp;severity=medium&amp;id=6903adaaaebfcd54748fc5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64118-cwe-362-concurrent-execution-using--5e631f30</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64118%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20isaacs%20node-tar&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/can-you-break-our-pickle-sandbox-blog-exploit-chal-9c9b9bbf</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can%20you%20break%20our%20pickle%20sandbox%3F%20Blog%20%2B%20exploit%20challenge%20inside&amp;severity=high&amp;id=6903a6a5aebfcd54748ac6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64112-cwe-79-improper-neutralization-of-i-db2db47d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64112%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=6903a6a4aebfcd54748ac668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64115-cwe-601-url-redirection-to-untruste-3b477e22</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64115%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20leepeuker%20movary&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac66f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62266-cwe-601-url-redirection-to-untruste-ab6fc836</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62266%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64116-cwe-601-url-redirection-to-untruste-3e14f705</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64116%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20leepeuker%20movary&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64096-cwe-121-stack-based-buffer-overflow-f4e21142</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64096%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6903adccaebfcd54748fc906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-built-in-ai-defenses-on-android-now-block--a4a184e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google&apos;s%20Built-In%20AI%20Defenses%20on%20Android%20Now%20Block%2010%20Billion%20Scam%20Messages%20a%20Month&amp;severity=medium&amp;id=69055e2471a6fc4aff34f147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-ransomware-gangs-weaponize-open-source-ada-0e297d19</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Ransomware%20Gangs%20Weaponize%20Open-Source%20AdaptixC2%20for%20Advanced%20Attacks&amp;severity=medium&amp;id=69055e2471a6fc4aff34f14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/year-long-nation-state-hack-hits-us-telecom-ribbon-203d4c95</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Year-Long%20Nation-State%20Hack%20Hits%20US%20Telecom%20Ribbon%20Communications&amp;severity=medium&amp;id=6903951aaebfcd5474815d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62726-cwe-829-inclusion-of-functionality--0fa144da</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62726%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69039529aebfcd547481615c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11998-cwe-200-exposure-of-sensitive-infor-dd7d8c38</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11998%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%20Inc.%20Card%20Readers%20B%20Model&amp;severity=medium&amp;id=69038e10aebfcd54747db0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-found-2k-vulns-400-secrets-and-175-pii-inst-1aa44553</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20we%20found%20%2B2k%20vulns%2C%20400%2B%20secrets%20and%20175%20PII%20instances%20in%20publicly%20exposed%20apps%20built%20on%20vibe-coded%20platforms%20(Research%20methodology)&amp;severity=critical&amp;id=69038a86aebfcd54747b5aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12517-cwe-448-obsolete-feature-in-ui-in-a-ac63c9bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12517%3A%20CWE-448%20Obsolete%20Feature%20in%20UI%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=low&amp;id=69038a85aebfcd54747b5ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12516-cwe-394-unexpected-status-code-or-r-2740e6ee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12516%3A%20CWE-394%20Unexpected%20Status%20Code%20or%20Return%20Value%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=69038a85aebfcd54747b5ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12515-cwe-394-unexpected-status-code-or-r-8361783b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12515%3A%20CWE-394%20Unexpected%20Status%20Code%20or%20Return%20Value%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=69038a85aebfcd54747b5ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-deep-dive-into-warlock-ransomware-deployed-via-t-88ca7719</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Deep%20Dive%20Into%20Warlock%20Ransomware%20Deployed%20Via%20ToolShell%20SharePoint%20Chained%20Vulnerabilities&amp;severity=medium&amp;id=69038701aebfcd5474799457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36592-cwe-79-improper-neutralization-of-i-b913e0c4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36592%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Secure%20Connect%20Gateway%20SCG%20Policy%20Manager&amp;severity=medium&amp;id=69038700aebfcd5474799441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46363-cwe-23-relative-path-traversal-in-d-0b443e25</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46363%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Dell%20Secure%20Connect%20Gateway%20SCG%205.0%20Application%20and%20Appliance&amp;severity=medium&amp;id=69038700aebfcd5474799447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-brash-exploit-crashes-chromium-browsers-instan-940fa577</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%22Brash%22%20Exploit%20Crashes%20Chromium%20Browsers%20Instantly%20with%20a%20Single%20Malicious%20URL&amp;severity=low&amp;id=69055e2471a6fc4aff34f14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5347-cwe-79-improper-neutralization-of-in-fc242a99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=medium&amp;id=690378f1aebfcd547472f15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5343-cwe-79-improper-neutralization-of-in-0f1845c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=medium&amp;id=690378f1aebfcd547472f157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43942-cwe-78-improper-neutralization-of-s-e2e2b8cc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43942%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=690378f1aebfcd547472f154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloud-outages-highlight-the-need-for-resilient-sec-e42f7fa1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloud%20Outages%20Highlight%20the%20Need%20for%20Resilient%2C%20Secure%20Infrastructure%20Recovery&amp;severity=high&amp;id=69055f4871a6fc4aff359296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5342-cwe-400-uncontrolled-resource-consum-77d83293</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5342%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=medium&amp;id=6903756daebfcd547471732a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46422-cwe-78-improper-neutralization-of-s-71ebb324</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46422%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6903756daebfcd547471731f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46423-cwe-78-improper-neutralization-of-s-65ea5176</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46423%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6903756daebfcd5474717322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43027-cwe-284-improper-access-control-in--36520a6f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43027%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Genetec%20Inc.%20Genetec%20Security%20Center&amp;severity=critical&amp;id=6903756daebfcd547471731b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43939-cwe-78-improper-neutralization-of-s-17f5567f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43939%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;%20in%20Dell%20Unity&amp;severity=high&amp;id=690378f1aebfcd547472f15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43940-cwe-78-improper-neutralization-of-s-655404b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43940%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6903a6a4aebfcd54748ac679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43941-cwe-78-improper-neutralization-of-s-65a134ca</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43941%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=690371e9aebfcd54746e8f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x-request-purpose-identifying-research-and-bug-bou-15a7e400</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=X-Request-Purpose%3A%20Identifying%20%22research%22%20and%20bug%20bounty%20related%20scans%26%23x3f%3B%2C%20(Thu%2C%20Oct%2030th)&amp;severity=medium&amp;id=69036752aebfcd5474676d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/millions-impacted-by-conduent-data-breach-86274f88</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20Million%20Impacted%20by%20Conduent%20Data%20Breach&amp;severity=medium&amp;id=690363d0aebfcd547465b5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10348-cwe-79-improper-neutralization-of-i-45900c42</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10348%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Eveo%20URVE%20Smart%20Office&amp;severity=medium&amp;id=690363e9aebfcd547465bb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-defense-contractor-exec-pleads-guilty-to-sellin-2a7b8f12</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-Defense%20contractor%20exec%20pleads%20guilty%20to%20selling%20cyber%20exploits%20to%20Russia&amp;severity=medium&amp;id=69036054aebfcd547464671a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-us-telecom-backbone-firm-hacked-by-nation-st-53e5efd7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20US%20Telecom%20Backbone%20Firm%20Hacked%20by%20Nation-State%20Actors&amp;severity=medium&amp;id=69035cc8aebfcd547462d39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-exploit-adaptix-multi-platform-pen-4a316877</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Exploit%20Adaptix%20Multi-Platform%20Pentesting%20Tool%20in%20Ransomware%20Attacks&amp;severity=high&amp;id=690355cdaebfcd54745fa958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-death-of-the-security-checkbox-bas-is-the-powe-bcca287c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Death%20of%20the%20Security%20Checkbox%3A%20BAS%20Is%20the%20Power%20Behind%20Real%20Defense&amp;severity=medium&amp;id=69055e2471a6fc4aff34f15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10317-cwe-352-cross-site-request-forgery--8303a24e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10317%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenSolution%20Quick.Cart&amp;severity=medium&amp;id=69035245aebfcd54745da8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canada-says-hackers-tampered-with-ics-at-water-fac-3fbf71e7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canada%20Says%20Hackers%20Tampered%20With%20ICS%20at%20Water%20Facility%2C%20Oil%20and%20Gas%20Firm&amp;severity=medium&amp;id=69034eb8aebfcd54745be6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/136-npm-packages-delivering-infostealers-downloade-b4a33748</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=136%20NPM%20Packages%20Delivering%20Infostealers%20Downloaded%20100%2C000%20Times&amp;severity=medium&amp;id=690345d3aebfcd54745867b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-dns-poisoning-flaw-supply-chai-e92d73d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20DNS%20Poisoning%20Flaw%2C%20Supply-Chain%20Heist%2C%20Rust%20Malware%20Trick%20and%20New%20RATs%20Rising&amp;severity=high&amp;id=69055e2471a6fc4aff34f15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53883-cwe-80-improper-neutralization-of-s-3c6ac075</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53883%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20SUSE%20Container%20suse%20manager%205.0&amp;severity=critical&amp;id=690345edaebfcd54745877ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39663-cwe-80-improper-neutralization-of-s-3992d94f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39663%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=690345edaebfcd54745877ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53880-cwe-35-path-traversal-in-suse-conta-6026aa4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53880%3A%20CWE-35%3A%20Path%20Traversal%20in%20SUSE%20Container%20suse%2Fmanager%2F4.3%2Fproxy-httpd%3Alatest&amp;severity=high&amp;id=690340b1aebfcd547455b960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantomraven-malware-found-in-126-npm-packages-ste-028e3a3c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhantomRaven%20Malware%20Found%20in%20126%20npm%20Packages%20Stealing%20GitHub%20Tokens%20From%20Devs&amp;severity=medium&amp;id=69055e2471a6fc4aff34f160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54471-cwe-321-use-of-hard-coded-cryptogra-df538edb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54471%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20SUSE%20neuvector&amp;severity=medium&amp;id=690335411ead54a02dedddc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54941-cwe-78-improper-neutralization-of-s-7534876f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54941%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=690335411ead54a02dedddcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54469-cwe-78-improper-neutralization-of-s-36f98e7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54469%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SUSE%20neuvector&amp;severity=critical&amp;id=690335411ead54a02dedddc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54470-cwe-295-improper-certificate-valida-63474386</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54470%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20SUSE%20neuvector&amp;severity=high&amp;id=6903330c1ead54a02de8d06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/former-us-defense-contractor-executive-admits-to-s-05341e44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Former%20US%20Defense%20Contractor%20Executive%20Admits%20to%20Selling%20Exploits%20to%20Russia&amp;severity=medium&amp;id=690332f21ead54a02de8b063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62402-cwe-250-execution-with-unnecessary--81f6a57a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62402%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69032fc11ead54a02de5c439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62503-cwe-250-execution-with-unnecessary--3f793a6e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62503%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69032fc11ead54a02de5c43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11906-cwe-732-incorrect-permission-assign-19bbd1a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11906%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Progress%20Software%20Flowmon&amp;severity=medium&amp;id=690319b962f3017fc2134dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11881-cwe-862-missing-authorization-in-sc-6f85f453</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11881%3A%20CWE-862%20Missing%20Authorization%20in%20scottopolis%20AppPresser%20%E2%80%93%20Mobile%20App%20Framework&amp;severity=medium&amp;id=69030ee925802725f5b0163a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10636-cwe-79-cross-site-scripting-xss-in--9fcea5f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10636%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20NS%20Maintenance%20Mode%20for%20WP&amp;severity=low&amp;id=69030287a36935f67201748e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-leak-outs-students-of-irans-mois-training-aca-1529e86a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Leak%20Outs%20Hacker%20Students%20of%20Iran&apos;s%20MOIS%20Training%20Academy&amp;severity=medium&amp;id=6903026aa36935f672014418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62229-use-after-free-in-red-hat-red-hat-e-8c4c6704</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62229%3A%20Use%20After%20Free%20in%20X.Org%20Xwayland&amp;severity=high&amp;id=69030287a36935f67201749b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10008-cwe-862-missing-authorization-in-re-5b3bfb23</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10008%3A%20CWE-862%20Missing%20Authorization%20in%20remyb92%20Translate%20WordPress%20with%20Weglot%20%E2%80%93%20Multilingual%20AI%20Translation&amp;severity=medium&amp;id=69030287a36935f672017491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11627-cwe-117-improper-output-neutralizat-25e43d00</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11627%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20sminozzi%20Site%20Checkup%20Debug%20AI%20Troubleshooting%20with%20Wizard%20and%20Tips%20for%20Each%20Issue&amp;severity=medium&amp;id=69030287a36935f672017496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62230-use-after-free-in-red-hat-red-hat-e-c766d3dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62230%3A%20Use%20After%20Free%20in%20X.Org%20Xwayland&amp;severity=high&amp;id=6902f902867527dded2d9ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62231-integer-overflow-or-wraparound-in-r-f94f0749</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62231%3A%20Integer%20Overflow%20or%20Wraparound%20in%20X.Org%20Xwayland&amp;severity=high&amp;id=6902f42fa7d593c99349cd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12475-cwe-79-improper-neutralization-of-i-62c7d03d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12475%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy%20Companion&amp;severity=medium&amp;id=6902ed45a7d593c993388b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacktivists-breach-canadas-critical-infrastructure-98178fda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacktivists%20breach%20Canada%E2%80%99s%20critical%20infrastructure%2C%20cyber%20Agency%20warns&amp;severity=critical&amp;id=6902aac604b4f2cbf902fe66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50739-na-f0a70666</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50739%3A%20n%2Fa&amp;severity=critical&amp;id=69043203fe27b1aa12d0c69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50736-na-962ab9d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50736%3A%20n%2Fa&amp;severity=medium&amp;id=69043203fe27b1aa12d0c699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-30-dbde9e0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-30&amp;severity=medium&amp;id=6903fe7aaebfcd5474a5f00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60950-na-e294cc14</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60950%3A%20n%2Fa&amp;severity=medium&amp;id=6903d46daebfcd54749b1920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61498-na-e9239115</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61498%3A%20n%2Fa&amp;severity=high&amp;id=6903d46daebfcd54749b191c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61141-na-091e4a36</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61141%3A%20n%2Fa&amp;severity=high&amp;id=6903d46daebfcd54749b1917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63423-na-745342b5</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63423%3A%20n%2Fa&amp;severity=high&amp;id=6903bf40aebfcd547497a028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63422-na-4d4ac0e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63422%3A%20n%2Fa&amp;severity=high&amp;id=6903b838aebfcd5474944469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63885-na-0049e6f9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63885%3A%20n%2Fa&amp;severity=medium&amp;id=6903b13baebfcd547491470e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61196-na-cd0397fd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61196%3A%20n%2Fa&amp;severity=high&amp;id=6903b13baebfcd547491470b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63298-na-bd8ad9a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63298%3A%20n%2Fa&amp;severity=high&amp;id=6903b13baebfcd5474914707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52180-na-6bd746f4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52180%3A%20n%2Fa&amp;severity=medium&amp;id=6903b13baebfcd5474914700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57109-na-cb2986d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57109%3A%20n%2Fa&amp;severity=medium&amp;id=6903adc2aebfcd54748fc6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52179-na-c0584ef0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52179%3A%20n%2Fa&amp;severity=medium&amp;id=6903adc2aebfcd54748fc6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56313-na-7538d73e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56313%3A%20n%2Fa&amp;severity=medium&amp;id=6903a323aebfcd5474891e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61121-na-770a4d2f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61121%3A%20n%2Fa&amp;severity=high&amp;id=69039529aebfcd5474816158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61120-na-cbf0a87c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61120%3A%20n%2Fa&amp;severity=high&amp;id=69039529aebfcd5474816155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60319-na-a97e1990</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60319%3A%20n%2Fa&amp;severity=medium&amp;id=69039529aebfcd5474816151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61119-na-f40069bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61119%3A%20n%2Fa&amp;severity=high&amp;id=69039192aebfcd54747facdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61114-na-fdabc6ef</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61114%3A%20n%2Fa&amp;severity=high&amp;id=69039192aebfcd54747facda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61118-na-a879ba80</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61118%3A%20n%2Fa&amp;severity=high&amp;id=69038e10aebfcd54747db0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61117-na-d4255f5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61117%3A%20n%2Fa&amp;severity=high&amp;id=69038a85aebfcd54747b5acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61116-na-0090662a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61116%3A%20n%2Fa&amp;severity=high&amp;id=69038700aebfcd547479944d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61113-na-d96c61dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61113%3A%20n%2Fa&amp;severity=high&amp;id=69038700aebfcd547479944a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61115-na-82157f97</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61115%3A%20n%2Fa&amp;severity=high&amp;id=69038700aebfcd5474799444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50574-na-1e69c7b5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50574%3A%20n%2Fa&amp;severity=medium&amp;id=6903756daebfcd5474717325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63608-na-3c8df444</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63608%3A%20n%2Fa&amp;severity=medium&amp;id=69035ce4aebfcd547462d5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-security-posture-management-what-does-best-in-42b4ac67</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Security%20Posture%20Management%20%E2%80%94%20What%20Does%20&apos;Best%20in%20Class&apos;%20Look%20Like%3F&amp;severity=low&amp;id=69055f4871a6fc4aff359299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62257-cwe-307-improper-restriction-of-exc-1f076a25</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62257%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6902a496d6627ef5904f74b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12466-cwe-288-authentication-bypass-using-0eddf91c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12466%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Simple%20OAuth%20(OAuth2)%20%26%20OpenID%20Connect&amp;severity=high&amp;id=6902a10ed6627ef5904a7ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12083-cwe-79-improper-neutralization-of-i-53978d82</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20CivicTheme%20Design%20System&amp;severity=medium&amp;id=6902a10ed6627ef5904a7abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12082-cwe-863-incorrect-authorization-in--33597dfb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12082%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20CivicTheme%20Design%20System&amp;severity=high&amp;id=6902a10ed6627ef5904a7abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10929-cwe-1288-improper-validation-of-con-15756f96</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10929%3A%20CWE-1288%20Improper%20Validation%20of%20Consistency%20within%20Input%20in%20Drupal%20Reverse%20Proxy%20Header&amp;severity=medium&amp;id=6902a10ed6627ef5904a7ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10930-cwe-352-cross-site-request-forgery--d296d724</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10930%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Currency&amp;severity=medium&amp;id=6902a10ed6627ef5904a7ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10931-cwe-79-improper-neutralization-of-i-51c07ba6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10931%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Umami%20Analytics&amp;severity=low&amp;id=6902a10ed6627ef5904a7ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10928-cwe-307-improper-restriction-of-exc-6c155f5f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10928%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Drupal%20Access%20code&amp;severity=medium&amp;id=6902a10ed6627ef5904a7aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10927-cwe-79-improper-neutralization-of-i-0788e1e1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10927%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Plausible%20tracking&amp;severity=medium&amp;id=6902a10ed6627ef5904a7aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10926-cwe-79-improper-neutralization-of-i-0f30e46c</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10926%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20JSON%20Field&amp;severity=medium&amp;id=6902a10ed6627ef5904a7aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9954-cwe-862-missing-authorization-in-dru-0f631a23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9954%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Acquia%20DAM&amp;severity=high&amp;id=6902a10ed6627ef5904a7ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54549-cwe-347-improper-verification-of-cr-916649c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54549%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=medium&amp;id=69029c9ff29b216d6d6a4c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54548-cwe-200-exposure-of-sensitive-infor-3dd9e603</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54548%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=medium&amp;id=69029c9ff29b216d6d6a4c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54547-cwe-613-in-arista-networks-danz-mon-abbcb9b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54547%3A%20CWE-613%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=medium&amp;id=69029c9ff29b216d6d6a4c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54546-cwe-732-in-arista-networks-danz-mon-2bb9a658</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54546%3A%20CWE-732%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=high&amp;id=69029c9ff29b216d6d6a4c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54545-cwe-732-in-arista-networks-danz-mon-839b197b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54545%3A%20CWE-732%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=high&amp;id=69029c9ff29b216d6d6a4c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-nfc-relay-malware-to-clone-android-tap-d7689093</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20NFC%20Relay%20Malware%20to%20Clone%20Android%20Tap-to-Pay%20Transactions&amp;severity=medium&amp;id=69029784f29b216d6d62bfb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61724-cwe-407-inefficient-algorithmic-com-bdc8fdca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61724%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20net%2Ftextproto&amp;severity=medium&amp;id=69029404f29b216d6d5e20db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58183-cwe-400-uncontrolled-resource-consu-5f89bd3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58183%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20archive%2Ftar&amp;severity=medium&amp;id=69029404f29b216d6d5e20b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58188-cwe-248-uncaught-exception-in-go-st-452ba3cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58188%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69029404f29b216d6d5e20c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58186-cwe-400-uncontrolled-resource-consu-c94217ae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58186%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20net%2Fhttp&amp;severity=medium&amp;id=69029404f29b216d6d5e20bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58185-cwe-400-uncontrolled-resource-consu-25539bbb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58185%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20encoding%2Fasn1&amp;severity=medium&amp;id=69029404f29b216d6d5e20b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47912-cwe-1286-improper-validation-of-syn-ab015c69</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47912%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Go%20standard%20library%20net%2Furl&amp;severity=medium&amp;id=69029404f29b216d6d5e20ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61723-cwe-407-inefficient-algorithmic-com-f02bb21a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61723%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20encoding%2Fpem&amp;severity=high&amp;id=69029404f29b216d6d5e20d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58189-cwe-117-improper-output-neutralizat-b638c8bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58189%3A%20CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Go%20standard%20library%20crypto%2Ftls&amp;severity=medium&amp;id=69029404f29b216d6d5e20cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58187-cwe-407-inefficient-algorithmic-com-fc38edee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58187%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69029404f29b216d6d5e20c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61725-cwe-407-inefficient-algorithmic-com-793630da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61725%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20net%2Fmail&amp;severity=high&amp;id=69029406f29b216d6d5e20ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61959-cwe-209-generation-of-error-message-c46868e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61959%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Vertikal%20Systems%20Hospital%20Manager%20Backend%20Services&amp;severity=medium&amp;id=69028fd8779efea1caa7305b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54459-cwe-497-exposure-of-sensitive-syste-a3bbb673</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54459%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Vertikal%20Systems%20Hospital%20Manager%20Backend%20Services&amp;severity=high&amp;id=69028fd8779efea1caa73058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-disguised-with-invisible-de-60254b4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20NPM%20Packages%20Disguised%20With%20&apos;Invisible&apos;%20Dependencies&amp;severity=low&amp;id=690281ce8daac4bcead4b020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-search-tools-easily-fooled-by-fake-content-a8c75471</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Search%20Tools%20Easily%20Fooled%20by%20Fake%20Content&amp;severity=medium&amp;id=69028f16779efea1caa6d31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dentsu-subsidiary-breached-employee-data-stolen-a6542214</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dentsu%20Subsidiary%20Breached%2C%20Employee%20Data%20Stolen&amp;severity=medium&amp;id=690281ce8daac4bcead4b023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11465-cwe-416-use-after-free-in-ashlar-ve-73982a09</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11465%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=69027029ea3d051f22387348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11464-cwe-122-heap-based-buffer-overflow--5383a5e1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11464%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=69027029ea3d051f22387345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11463-cwe-190-integer-overflow-or-wraparo-931f582f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11463%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=69027028ea3d051f22387342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9870-cwe-59-improper-link-resolution-befo-f063dc65</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9870%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Razer%20Synapse%203&amp;severity=high&amp;id=69027029ea3d051f2238734b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9871-cwe-59-improper-link-resolution-befo-021a2f44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9871%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Razer%20Synapse%203&amp;severity=high&amp;id=69027029ea3d051f2238734e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9869-cwe-59-improper-link-resolution-befo-433a46ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9869%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Razer%20Synapse%203&amp;severity=high&amp;id=69026ca6ea3d051f2234935d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64104-cwe-89-improper-neutralization-of-s-5fe153a7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64104%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20langchain-ai%20langgraph&amp;severity=high&amp;id=69026375e09a14ef713ad330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-look-at-polaredge-adjacent-infrastructure-bd6bad13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Smoking%20Gun%20Uncovered%3A%20RPX%20Relay%20at%20PolarEdge&apos;s%20Core%20Exposed&amp;severity=medium&amp;id=68e0f2efb66c7f7acdd19dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-scripts-to-systems-a-comprehensive-look-at-ta-edc5174a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Scripts%20to%20Systems%3A%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations&amp;severity=medium&amp;id=6902755fea3d051f2241b5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-october-2025-cyber-attacks-your-soc-cant-ign-6479382e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20October%202025%20Cyber%20Attacks%20Your%20SOC%20Can&apos;t%20Ignore&amp;severity=medium&amp;id=6902755fea3d051f2241b5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11232-cwe-823-use-of-out-of-range-pointer-ad8fa2cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11232%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20ISC%20Kea&amp;severity=high&amp;id=6902598f52c03fa7b6eb66e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-security-change-for-azure-vms-creates-pi-ffb6f9ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Security%20Change%20for%20Azure%20VMs%20Creates%20Pitfalls&amp;severity=medium&amp;id=690255ff52c03fa7b6e5ac3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62797-cwe-352-cross-site-request-forgery--dfc70b3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62797%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rathena%20FluxCP&amp;severity=high&amp;id=6902561b52c03fa7b6e5bf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1549-cwe-77-improper-neutralization-of-sp-f30a95b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1549%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20WatchGuard%20Mobile%20VPN%20with%20SSL%20Client&amp;severity=medium&amp;id=69024872c461420f24c8f564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12479-cwe-352-cross-site-request-forgery--adbd5512</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12479%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=69024872c461420f24c8f561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12478-cwe-326-inadequate-encryption-stren-0796a748</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12478%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690244f5c461420f24c54244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12477-cwe-306-missing-authentication-for--5d81e1ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12477%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690244f5c461420f24c54241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12476-cwe-306-missing-authentication-for--785223db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12476%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690244f5c461420f24c5423e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-hijack-corporate-xwiki-servers-for-crypto--9073ddc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Hijack%20Corporate%20XWiki%20Servers%20for%20Crypto%20Mining&amp;severity=medium&amp;id=6902400de6b2d94ab7036e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/botnets-step-up-cloud-attacks-via-flaws-misconfigu-56c29260</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Botnets%20Step%20Up%20Cloud%20Attacks%20Via%20Flaws%2C%20Misconfigurations&amp;severity=medium&amp;id=69026876e09a14ef7141f993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-npm-packages-caught-stealing-developer-credenti-5b906cd8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20npm%20Packages%20Caught%20Stealing%20Developer%20Credentials%20on%20Windows%2C%20macOS%2C%20and%20Linux&amp;severity=high&amp;id=69023d22b9e127f7a36f1099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-target-ukrainian-organizations-usi-676e7bfb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Target%20Ukrainian%20Organizations%20Using%20Stealthy%20Living-Off-the-Land%20Tactics&amp;severity=high&amp;id=69023d22b9e127f7a36f109d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-reports-sharp-increase-in-automated-botnet-84315c2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Reports%20Sharp%20Increase%20in%20Automated%20Botnet%20Attacks%20Targeting%20PHP%20Servers%20and%20IoT%20Devices&amp;severity=medium&amp;id=69023607b9e127f7a36545eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12148-cwe-200-exposure-of-sensitive-infor-e1f04e9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12148%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69023631b9e127f7a3656331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14012-cwe-426-untrusted-search-path-in-re-966cba5e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14012%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Revenera%20InstallShield&amp;severity=high&amp;id=69023631b9e127f7a365632e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12147-cwe-200-exposure-of-sensitive-infor-a2555f16</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12147%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69023421b9e127f7a363597f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/which-social-media-are-the-most-privacy-oriented-i-6df90d71</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Which%20social%20media%20are%20the%20most%20privacy-oriented%20in%202025%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69022fd983bae5e856672194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58269-cwe-532-insertion-of-sensitive-info-892443ed</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58269%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20SUSE%20rancher&amp;severity=medium&amp;id=69022c4683bae5e8566219d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ai-targeted-cloaking-attack-tricks-ai-crawlers-1b2fba5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20AI-Targeted%20Cloaking%20Attack%20Tricks%20AI%20Crawlers%20Into%20Citing%20Fake%20Info%20as%20Verified%20Facts&amp;severity=medium&amp;id=69025c2652c03fa7b6eeccaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32199-cwe-281-improper-preservation-of-pe-6d66cde8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32199%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20SUSE%20rancher&amp;severity=medium&amp;id=69022c4683bae5e8566219ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10932-cwe-400-uncontrolled-resource-consu-8a9cae93</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10932%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Progress%20MOVEit%20Transfer&amp;severity=high&amp;id=690226d083bae5e8565b1722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-unveils-attck-v18-with-updates-to-detections-1ab94de5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Unveils%20ATT%26CK%20v18%20With%20Updates%20to%20Detections%2C%20Mobile%2C%20ICS&amp;severity=medium&amp;id=69021a6014cc779bff04bff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64150-vulnerability-in-jenkins-project-je-a837192d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64150%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Publish%20to%20Bitbucket%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64149-vulnerability-in-jenkins-project-je-f0977504</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64149%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Publish%20to%20Bitbucket%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64148-vulnerability-in-jenkins-project-je-2ede9281</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64148%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Publish%20to%20Bitbucket%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64147-vulnerability-in-jenkins-project-je-dc873849</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64147%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Curseforge%20Publisher%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff05107f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64146-vulnerability-in-jenkins-project-je-0e12b12f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64146%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Curseforge%20Publisher%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff05107b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64145-vulnerability-in-jenkins-project-je-f08e6f2b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64145%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20ByteGuard%20Build%20Actions%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64144-vulnerability-in-jenkins-project-je-e92ac7d2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64144%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20ByteGuard%20Build%20Actions%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64143-vulnerability-in-jenkins-project-je-ff876257</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64143%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20OpenShift%20Pipeline%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64142-vulnerability-in-jenkins-project-je-f58a1c98</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64142%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Nexus%20Task%20Runner%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff05106f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64141-vulnerability-in-jenkins-project-je-23e863f4</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64141%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Nexus%20Task%20Runner%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff05106c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64140-vulnerability-in-jenkins-project-je-fde60171</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64140%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Azure%20CLI%20Plugin&amp;severity=high&amp;id=69021a8414cc779bff050feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64139-vulnerability-in-jenkins-project-je-efe70d08</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64139%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Start%20Windocks%20Containers%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64138-vulnerability-in-jenkins-project-je-025e7dad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64138%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Start%20Windocks%20Containers%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64137-vulnerability-in-jenkins-project-je-a92f410b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64137%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Themis%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64136-vulnerability-in-jenkins-project-je-4453b905</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64136%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Themis%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64135-vulnerability-in-jenkins-project-je-b2b2a89c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64135%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Eggplant%20Runner%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64134-vulnerability-in-jenkins-project-je-b4a24dd2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64134%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20JDepend%20Plugin&amp;severity=high&amp;id=69021a8414cc779bff050fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64133-vulnerability-in-jenkins-project-je-bdfec17d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64133%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Extensible%20Choice%20Parameter%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64132-vulnerability-in-jenkins-project-je-be245172</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64132%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20MCP%20Server%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64131-vulnerability-in-jenkins-project-je-14782c0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64131%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20SAML%20Plugin&amp;severity=high&amp;id=69021a8414cc779bff050fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/suspected-nation-state-threat-actor-uses-new-airst-3cd86ab2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Suspected%20Nation-State%20Threat%20Actor%20Uses%20New%20Airstalk%20Malware%20in%20a%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=690216e314cc779bff00702a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11587-cwe-862-missing-authorization-in-jg-9e2672d9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11587%3A%20CWE-862%20Missing%20Authorization%20in%20jgrietveld%20Call%20Now%20Button%20%E2%80%93%20The%20%231%20Click%20to%20Call%20Button%20for%20WordPress&amp;severity=medium&amp;id=69020d512a3e20b1cb02a670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11632-cwe-862-missing-authorization-in-jg-f713491e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11632%3A%20CWE-862%20Missing%20Authorization%20in%20jgrietveld%20Call%20Now%20Button%20%E2%80%93%20The%20%231%20Click%20to%20Call%20Button%20for%20WordPress&amp;severity=medium&amp;id=69020d512a3e20b1cb02a675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12142-cwe-120-buffer-copy-without-checkin-06391073</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12142%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ABB%20Terra%20AC%20wallbox&amp;severity=medium&amp;id=690204523aaa02566521b4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/preparing-for-the-digital-battlefield-of-2026-ghos-2ad8e93c</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Preparing%20for%20the%20Digital%20Battlefield%20of%202026%3A%20Ghost%20Identities%2C%20Poisoned%20Accounts%2C%20%26%20AI%20Agent%20Havoc&amp;severity=medium&amp;id=690212ea2a3e20b1cb0af1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-target-ukrainian-organizations-usi-decc4b12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Target%20Ukrainian%20Organizations%20Using%20Stealthy%20Living-Off-the-Land%20Tactics&amp;severity=medium&amp;id=690212ea2a3e20b1cb0af200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberridge-emerges-from-stealth-with-26-million-fo-a1dcd543</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CyberRidge%20Emerges%20From%20Stealth%20With%20%2426%20Million%20for%20Photonic%20Encryption%20Solution&amp;severity=medium&amp;id=6901ff873aaa02566519c5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xwiki-vulnerability-exploited-in-cryptocurrency-mi-ed45fbf3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWiki%20Vulnerability%20Exploited%20in%20Cryptocurrency%20Mining%20Operation&amp;severity=medium&amp;id=6901f6848cf71dc7fdc07f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12461-cwe-522-insufficiently-protected-cr-f7089a96</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12461%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Grupo%20Castilla%20Epsilon%20RH&amp;severity=medium&amp;id=6901f6a28cf71dc7fdc086b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-trigona-threat-actors-latest-attack-ca-ee5b0ab6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20Trigona%20Threat%20Actor&apos;s%20Latest%20Attack%20Cases&amp;severity=medium&amp;id=6901f6978cf71dc7fdc08496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostgrab-android-malware-132acc8e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GHOSTGRAB%20ANDROID%20MALWARE&amp;severity=medium&amp;id=6901f6978cf71dc7fdc084a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/team46-and-taxoff-two-sides-of-the-same-coin-1179b947</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Team46%20and%20TaxOff%3A%20Two%20Sides%20of%20the%20Same%20Coin&amp;severity=medium&amp;id=6901f1da8cf71dc7fdb8619b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ad-and-pr-giant-dentsu-says-hackers-stole-merkle-d-db990c1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ad%20and%20PR%20Giant%20Dentsu%20Says%20Hackers%20Stole%20Merkle%20Data&amp;severity=medium&amp;id=6901f1cc8cf71dc7fdb84caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-eys-cloud-went-public-4tb-time-bomb-neo-securi-4e1d5f32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20EY&apos;s%20cloud%20went%20public.%204TB%20Time%20Bomb%20-%20Neo%20Security%20Labs&amp;severity=medium&amp;id=6901ee588cf71dc7fdb4878c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-two-more-actively-exploited-dassault-32c23902</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20warns%20of%20two%20more%20actively%20exploited%20Dassault%20vulnerabilities&amp;severity=high&amp;id=6901e4c367364219a65adb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-abuses-wsl-to-run-linux-encryptor-a01d069e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20ransomware%20abuses%20WSL%20to%20run%20Linux%20encryptors%20in%20Windows&amp;severity=high&amp;id=6901e4c367364219a65adb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-teefail-side-channel-attack-extracts-secrets-f-01167ddc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20TEE.Fail%20Side-Channel%20Attack%20Extracts%20Secrets%20from%20Intel%20and%20AMD%20DDR5%20Secure%20Enclaves&amp;severity=high&amp;id=6901e4c367364219a65adb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/advertising-giant-dentsu-reports-data-breach-at-su-727ac59a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Advertising%20giant%20Dentsu%20reports%20data%20breach%20at%20subsidiary%20Merkle&amp;severity=high&amp;id=6901e4c367364219a65adb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-botnet-shifts-from-ddos-to-residential-prox-c0191837</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20Botnet%20Shifts%20from%20DDoS%20to%20Residential%20Proxies&amp;severity=high&amp;id=6901e4c367364219a65adb8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/herodotus-android-malware-mimics-human-typing-to-e-1dd4d6a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Herodotus%20Android%20malware%20mimics%20human%20typing%20to%20evade%20detection&amp;severity=medium&amp;id=6901e4c367364219a65adb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-to-turn-https-on-by-default-for-public-site-a0c59282</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20to%20Turn%20HTTPS%20on%20by%20Default%20for%20Public%20Sites&amp;severity=medium&amp;id=6901e4a267364219a65ac38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12450-cwe-79-improper-neutralization-of-i-cad3a62c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litespeedtech%20LiteSpeed%20Cache&amp;severity=medium&amp;id=6901dfdacaab5f688cecedce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64291-improper-neutralization-of-input-du-5654c0fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64291%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premmerce%20Premmerce%20User%20Roles&amp;severity=medium&amp;id=6901d66086d093201c2b6248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64290-cross-site-request-forgery-csrf-in--ed7d957c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64290%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Premmerce%20Premmerce%20Product%20Search%20for%20WooCommerce&amp;severity=medium&amp;id=6901d66086d093201c2b6245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64289-improper-neutralization-of-input-du-2caa9d00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premmerce%20Premmerce%20Product%20Search%20for%20WooCommerce&amp;severity=medium&amp;id=6901d66086d093201c2b6242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64286-cross-site-request-forgery-csrf-in--c6779568</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64286%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WpEstate%20WP%20Rentals&amp;severity=medium&amp;id=6901d66086d093201c2b623f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64285-missing-authorization-in-premmerce--f076ce9c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64285%3A%20Missing%20Authorization%20in%20Premmerce%20Premmerce%20Wholesale%20Pricing%20for%20WooCommerce&amp;severity=medium&amp;id=6901d66086d093201c2b623c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64283-authorization-bypass-through-user-c-34d24bfe</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64283%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Rometheme%20RTMKit&amp;severity=medium&amp;id=6901d66086d093201c2b6239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64229-missing-authorization-in-boldgrid-c-eb9f2f4d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64229%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=medium&amp;id=6901d66086d093201c2b6236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64228-exposure-of-sensitive-system-inform-d6ec4dac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64228%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20FantasticPlugins%20SUMO%20Affiliates%20Pro&amp;severity=medium&amp;id=6901d65e86d093201c2b6191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64226-cross-site-request-forgery-csrf-in--9e1033b7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64226%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20colabrio%20Stockie%20Extra&amp;severity=medium&amp;id=6901d65e86d093201c2b618e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64220-improper-neutralization-of-input-du-ad07a313</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64220%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ReyCommerce%20Rey%20Core&amp;severity=medium&amp;id=6901d65e86d093201c2b618b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64219-missing-authorization-in-strategy11-4a49f173</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64219%3A%20Missing%20Authorization%20in%20Strategy11%20Team%20Business%20Directory&amp;severity=medium&amp;id=6901d65e86d093201c2b6188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64216-improper-control-of-filename-for-in-0697eb9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64216%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeSphere%20SmartMag&amp;severity=high&amp;id=6901d65e86d093201c2b6185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64212-missing-authorization-in-stylemixth-b08a53d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64212%3A%20Missing%20Authorization%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=medium&amp;id=6901d65e86d093201c2b6182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64211-missing-authorization-in-stylemixth-324169c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64211%3A%20Missing%20Authorization%20in%20StylemixThemes%20Masterstudy%20Elementor%20Widgets&amp;severity=medium&amp;id=6901d65e86d093201c2b617f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64210-missing-authorization-in-stylemixth-3de49d9a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64210%3A%20Missing%20Authorization%20in%20StylemixThemes%20Masterstudy%20Elementor%20Widgets&amp;severity=medium&amp;id=6901d65e86d093201c2b617c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64208-improper-neutralization-of-input-du-4b222e06</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64208%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TieLabs%20Jannah%20-%20Extensions&amp;severity=medium&amp;id=6901d65e86d093201c2b6179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64204-improper-neutralization-of-input-du-f7dadb6b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64204%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeSphere%20SmartMag&amp;severity=medium&amp;id=6901d65e86d093201c2b6176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64202-improper-neutralization-of-input-du-1b941b7c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64202%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TieLabs%20Sahifa&amp;severity=medium&amp;id=6901d65c86d093201c2b463f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64201-cross-site-request-forgery-csrf-in--543eedb6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64201%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=medium&amp;id=6901d65c86d093201c2b463c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64200-improper-neutralization-of-input-du-a701cb09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64200%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VillaTheme%20Email%20Template%20Customizer%20for%20WooCommerce&amp;severity=medium&amp;id=6901d65c86d093201c2b4639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64199-missing-authorization-in-wpestate-w-527b922b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64199%3A%20Missing%20Authorization%20in%20WpEstate%20wpresidence&amp;severity=medium&amp;id=6901d65c86d093201c2b4636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64197-improper-neutralization-of-input-du-fe5e9cc7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64197%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sizam%20Rehub&amp;severity=medium&amp;id=6901d65c86d093201c2b4633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64195-improper-control-of-filename-for-in-2c84f972</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64195%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20Eduma&amp;severity=high&amp;id=6901d65c86d093201c2b4630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64194-improper-neutralization-of-input-du-d4b6aa70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64194%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20Eduma&amp;severity=medium&amp;id=6901d65c86d093201c2b462d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60075-cross-site-request-forgery-csrf-in--f2ba5def</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60075%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Allegro%20Marketing%20hpb%20seo%20plugin%20for%20WordPress&amp;severity=high&amp;id=6901d65c86d093201c2b462a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58939-cross-site-request-forgery-csrf-in--6da036ed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58939%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=medium&amp;id=6901d65c86d093201c2b4627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58711-missing-authorization-in-solwin-blo-568d49c5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58711%3A%20Missing%20Authorization%20in%20solwin%20Blog%20Designer%20PRO&amp;severity=medium&amp;id=6901d65c86d093201c2b4624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-npm-packages-caught-stealing-developer-credenti-f2bbe61e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20npm%20Packages%20Caught%20Stealing%20Developer%20Credentials%20on%20Windows%2C%20macOS%2C%20and%20Linux&amp;severity=medium&amp;id=6901f64a8cf71dc7fdc00fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-delmia-factory-software-vu-44b6e187</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20DELMIA%20Factory%20Software%20Vulnerabilities&amp;severity=medium&amp;id=6901d10486d093201c2485b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-attack-targets-ddr5-memory-to-steal-keys-from--737dd12c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Attack%20Targets%20DDR5%20Memory%20to%20Steal%20Keys%20From%20Intel%20and%20AMD%20TEEs&amp;severity=medium&amp;id=6901c83eb4ac2fa6696c05be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-exploits-hit-dassault-and-xwiki-cisa-confir-b5a0c7e4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Exploits%20Hit%20Dassault%20and%20XWiki%20%E2%80%94%20CISA%20Confirms%20Critical%20Flaws%20Under%20Attack&amp;severity=critical&amp;id=6901dc1786d093201c32a356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7320-cwe-200-exposure-of-sensitive-inform-25d7f739</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7320%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20automattic%20WooCommerce&amp;severity=medium&amp;id=6901bb2cc38b57fedae38b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9544-cwe-862-missing-authorization-in-dop-222b5114</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9544%3A%20CWE-862%20Missing%20Authorization%20in%20Doppler%20Forms&amp;severity=medium&amp;id=6901af7f6b54f8e6682010d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-firms-see-surge-in-ai-powered-attack-36403765</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20Firms%20See%20Surge%20in%20AI-Powered%20Attacks%20Across%20Africa&amp;severity=medium&amp;id=6901af5e6b54f8e6681ff0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attacker-target-vscode-extension-marketplace-ide-p-c19644a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attacker%20Target%20VSCode%20Extension%20Marketplace%2C%20IDE%20Plugins%20Face%20Higher%20Supply%20Chain%20Attack%20Risks&amp;severity=medium&amp;id=6901a34214defc143b949662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-collect-memory-only-filesystems-on-linux-sy-263a639d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems%2C%20(Wed%2C%20Oct%2029th)&amp;severity=medium&amp;id=69019e7314defc143b8e8dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49042-cwe-79-improper-neutralization-of-i-802e71d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Automattic%20WooCommerce&amp;severity=medium&amp;id=6901a8d56b54f8e6681812fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62776-uncontrolled-search-path-element-in-8a38e015</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62776%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Wireless%20Tsukamoto%20Co.%2C%20Ltd.%20WTW%20EAGLE%20(for%20Windows)&amp;severity=high&amp;id=69019e3e14defc143b8e5540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11705-cwe-862-missing-authorization-in-sc-2c285992</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11705%3A%20CWE-862%20Missing%20Authorization%20in%20scheeeli%20Anti-Malware%20Security%20and%20Brute-Force%20Firewall&amp;severity=medium&amp;id=69019e3e14defc143b8e553c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64296-cwe-862-missing-authorization-in-fa-9f48e531</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64296%3A%20Missing%20Authorization%20in%20Facebook%20Facebook%20for%20WooCommerce&amp;severity=medium&amp;id=690194de28becc2dd67dfacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57931-cwe-352-cross-site-request-forgery--ef26ba33</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57931%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Popup%20box&amp;severity=medium&amp;id=690194de28becc2dd67dfac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-indias-largest-automaker-tata-motors-60604083</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20India&apos;s%20largest%20automaker%3A%20Tata%20Motors&amp;severity=medium&amp;id=690170ca3499185cc34fea3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-generated-code-poses-security-bloat-challenges-6d3d0232</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Generated%20Code%20Poses%20Security%2C%20Bloat%20Challenges&amp;severity=medium&amp;id=69026876e09a14ef7141f999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xctdh-crypto-heist-part-2-ellis-stannard-ea905212</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XCTDH%20Crypto%20Heist%20Part%202%20-%20Ellis%20Stannard&amp;severity=medium&amp;id=6903ded8aebfcd54749e6436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-29-43a4812c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-29&amp;severity=medium&amp;id=6902ae2004b4f2cbf9067471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60320-na-eeabd0fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60320%3A%20n%2Fa&amp;severity=medium&amp;id=69026ca6ea3d051f22349360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61876-na-d0d8dcbb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61876%3A%20n%2Fa&amp;severity=medium&amp;id=69026375e09a14ef713ad32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57227-na-e69ee319</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57227%3A%20n%2Fa&amp;severity=high&amp;id=6902561b52c03fa7b6e5bf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61234-na-3268eb37</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61234%3A%20n%2Fa&amp;severity=high&amp;id=69024872c461420f24c8f55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56558-na-2e0ec680</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56558%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Dyson%20MQTT%20server&amp;severity=low&amp;id=69024872c461420f24c8f55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60595-na-dc72a69c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60595%3A%20n%2Fa&amp;severity=high&amp;id=690244f5c461420f24c54247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60542-na-605053ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60542%3A%20n%2Fa&amp;severity=medium&amp;id=69023421b9e127f7a3635987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60898-na-03be67a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60898%3A%20n%2Fa&amp;severity=medium&amp;id=69023421b9e127f7a3635983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63622-na-ba164808</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63622%3A%20n%2Fa&amp;severity=critical&amp;id=69022fcb83bae5e85666db54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61429-na-fbc4b30f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61429%3A%20n%2Fa&amp;severity=high&amp;id=69022fcb83bae5e85666db51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61156-na-7864386f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61156%3A%20n%2Fa&amp;severity=high&amp;id=69022c4683bae5e8566219d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45162-na-0d1cad9a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45162%3A%20n%2Fa&amp;severity=critical&amp;id=690222c7d3833ffc6eb7191e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45161-na-222c67bd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45161%3A%20n%2Fa&amp;severity=medium&amp;id=690222c7d3833ffc6eb7191a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61161-na-578ef76c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61161%3A%20n%2Fa&amp;severity=high&amp;id=690222c7d3833ffc6eb71916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casdoor-2950-cross-site-request-forgery-csrf-3b50a255</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casdoor%202.95.0%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=6901b966c38b57fedaddc1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4665-cwe-89-improper-neutralization-of-sp-5cca9eab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4665%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WordPress%20Contact%20Form%207%20Database%20Addon%20CFDB7%20By%20Arshid%20CFDB7&amp;severity=critical&amp;id=69015aaf30d110a1a6d3e830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-data-on-insider-threats-what-1000-real--19ddb8a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20Data%20on%20Insider%20Threats%3A%20What%201%2C000%20Real%20Cases%20Reveal%20About%20Hidden%20Risk&amp;severity=medium&amp;id=6902049e3aaa02566521ca6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-leaks-att-carrier-records-deman-a766ddd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Leaks%20AT%26T%20Carrier%20Records%2C%20Demands%20%241M%20for%20Dublin%20Airport%20Passenger%20Data&amp;severity=medium&amp;id=69014702608506ea4395e4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64095-cwe-434-unrestricted-upload-of-file-9698bbb8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64095%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dnnsoftware%20Dnn.Platform&amp;severity=critical&amp;id=6901419f608506ea438f86a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64094-cwe-79-improper-neutralization-of-i-b32ddcd0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64094%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=6901419f608506ea438f86a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62802-cwe-1188-insecure-default-initializ-0a28b162</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62802%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=69013a71995b0464d953776b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62801-cwe-78-improper-neutralization-of-s-57fdd28c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62801%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jlowin%20fastmcp&amp;severity=medium&amp;id=69013a71995b0464d9537768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-soc-teams-operationalize-real-time-defense-aga-4dd49a09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20SOC%20Teams%20Operationalize%20Real-Time%20Defense%20Against%20Credential%20Replay%20Attacks&amp;severity=medium&amp;id=69013a76995b0464d9538345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62800-cwe-79-improper-neutralization-of-i-f3956d20</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62800%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jlowin%20fastmcp&amp;severity=medium&amp;id=69013a71995b0464d953776e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62798-cwe-79-improper-neutralization-of-i-1018d9fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62798%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20code16%20sharp&amp;severity=medium&amp;id=6901300969001fc67a67b9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62794-cwe-522-insufficiently-protected-cr-af93f1a2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62794%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20RichardoC%20github-workflow-updater-extension&amp;severity=low&amp;id=6901300969001fc67a67b9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43017-cwe-250-execution-with-unnecessary--8c723362</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43017%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20HP%20Inc.%20HP%20ThinPro%208.1&amp;severity=high&amp;id=69012c8569001fc67a62663e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ai-trust-paradox-why-security-teams-fear-autom-273985f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20AI%20Trust%20Paradox%3A%20Why%20Security%20Teams%20Fear%20Automated%20Remediation&amp;severity=medium&amp;id=69055f4871a6fc4aff35929c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/youtube-ghost-network-utilizes-spooky-tactics-to-t-e9b83789</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YouTube%20Ghost%20Network%20Utilizes%20Spooky%20Tactics%20to%20Target%20Users&amp;severity=medium&amp;id=69016ef83499185cc34fb172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11374-cwe-770-allocation-of-resources-wit-13136369</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11374%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Consul&amp;severity=medium&amp;id=6901290f69001fc67a5e1760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62727-cwe-407-inefficient-algorithmic-com-22b7a8fc</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62727%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Kludex%20starlette&amp;severity=high&amp;id=690126348f7e67aef0117ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11375-cwe-770-allocation-of-resources-wit-2325c23e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11375%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Consul&amp;severity=medium&amp;id=690126348f7e67aef0117de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62368-cwe-502-deserialization-of-untruste-97e46c7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62368%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20taigaio%20taiga-back&amp;severity=critical&amp;id=690126348f7e67aef0117dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-ebs-attack-victims-may-be-more-numerous-tha-375cf505</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20EBS%20Attack%20Victims%20May%20Be%20More%20Numerous%20Than%20Expected&amp;severity=medium&amp;id=69016ef83499185cc34fb175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62367-cwe-89-improper-neutralization-of-s-65aff5ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62367%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20taigaio%20taiga-back&amp;severity=medium&amp;id=690122b38f7e67aef00c128e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59837-cwe-918-server-side-request-forgery-fe9f7df8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59837%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=high&amp;id=690122b38f7e67aef00c1291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27093-cwe-284-improper-access-control-in--0e852adf</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27093%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69011c4b8f31b6f061ed5cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-teefail-side-channel-attack-extracts-secrets-f-fba67eff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20TEE.Fail%20Side-Channel%20Attack%20Extracts%20Secrets%20from%20Intel%20and%20AMD%20DDR5%20Secure%20Enclaves&amp;severity=low&amp;id=6901629430d110a1a6e799c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40843-cwe-121-stack-based-buffer-overflow-008a5fe1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40843%3A%20CWE-121%20Stack%20based%20buffer%20overflow%20in%20Ericsson%20CodeChecker&amp;severity=medium&amp;id=6901125021370b3f606d87be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-malware-mimics-human-behavior-to-evade-74f1b687</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Malware%20Mimics%20Human%20Behavior%20to%20Evade%20Detection&amp;severity=medium&amp;id=690118ba8f31b6f061e7a729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12425-cwe-269-improper-privilege-manageme-5cc68efa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12425%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=6901154e8f31b6f061e30bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12424-cwe-269-improper-privilege-manageme-ac110a5f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12424%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690116f28f31b6f061e5f1f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12423-cwe-248-uncaught-exception-in-azure-9b7c3217</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12423%3A%20CWE-248%20Uncaught%20Exception%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=6901154e8f31b6f061e30bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12422-cwe-22-improper-limitation-of-a-pat-d501cd78</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12422%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=6901089f8bc57bfc69a7043b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stragglers-from-myanmar-scam-center-raided-by-army-9f8dda96</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stragglers%20From%20Myanmar%20Scam%20Center%20Raided%20by%20Army%20Cross%20Into%20Thailand%20as%20Buildings%20are%20Blown%20Up&amp;severity=low&amp;id=6900ff80c2498ce55d2bc08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-atroposia-malware-comes-with-a-local-vulnerabi-20e6f9ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Atroposia%20malware%20comes%20with%20a%20local%20vulnerability%20scanner&amp;severity=high&amp;id=6900fc0ec2498ce55d254038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bidi-swap-the-bidirectional-text-trick-that-makes--fe9a50ba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BiDi%20Swap%3A%20The%20bidirectional%20text%20trick%20that%20makes%20fake%20URLs%20look%20real&amp;severity=high&amp;id=6900fc0ec2498ce55d25403c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-group-claimed-the-hack-of-swedens-power-gr-24b37274</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20group%20claimed%20the%20hack%20of%20Sweden%E2%80%99s%20power%20grid%20operator%20Svenska%20kraftn%C3%A4t&amp;severity=medium&amp;id=6900fc0ec2498ce55d254040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-trojan-herodotus-outsmarts-anti-fraud--d986d67a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Trojan%20&apos;Herodotus&apos;%20Outsmarts%20Anti-Fraud%20Systems%20by%20Typing%20Like%20a%20Human&amp;severity=medium&amp;id=6901629430d110a1a6e799c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-ghostcall-and-ghosthire-bluenor-12ab82a3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20GhostCall%20and%20GhostHire%3A%20BlueNoroff&apos;s%20New%20Malware%20Chains&amp;severity=medium&amp;id=6901629430d110a1a6e799c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-bluenoroff-expands-scope-of-crypto-he-7c298672</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea&apos;s%20BlueNoroff%20Expands%20Scope%20of%20Crypto%20Heists&amp;severity=medium&amp;id=69016ef83499185cc34fb178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36386-cwe-305-authentication-bypass-by-pr-4ac640d3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36386%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20IBM%20IBM%20Maximo%20Application%20Suite&amp;severity=critical&amp;id=6900e9469137f7a53a1f9d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34294-cwe-367-time-of-check-time-of-use-t-3f5579b0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34294&amp;severity=null&amp;id=6900f0e28b5ca1e4f6b448e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostcall-and-ghosthire-two-campaigns-by-bluenorof-0f247596</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostCall%20and%20GhostHire%20%E2%80%94%20two%20campaigns%20by%20BlueNoroff&amp;severity=medium&amp;id=6900e057d44cb7cb5001080e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hack-cessibility-when-dll-hijacks-meet-windows-hel-48f72209</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hack-cessibility%3A%20When%20DLL%20Hijacks%20Meet%20Windows%20Helpers&amp;severity=medium&amp;id=6900dcd5d44cb7cb50fc4e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36085-cwe-918-server-side-request-forgery-d20f33cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36085%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Concert&amp;severity=medium&amp;id=6900dcd1d44cb7cb50fc4af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36083-cwe-244-improper-clearing-of-heap-m-36294c47</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36083%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=6900dae71e78ed0e58915f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36081-cwe-117-improper-output-neutralizat-be7dce55</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36081%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=6900dae71e78ed0e58915f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-netbak-pc-agent-affected-by-recent-aspnet-cor-5267e80f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20NetBak%20PC%20Agent%20Affected%20by%20Recent%20ASP.NET%20Core%20Vulnerability&amp;severity=critical&amp;id=6900daca1e78ed0e58913f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34311-cwe-78-improper-neutralization-of-s-d104dfe3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34311%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IPFire.org%20IPFire&amp;severity=high&amp;id=6900d7521e78ed0e5889e0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34312-cwe-78-improper-neutralization-of-s-e8879c01</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34312%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IPFire.org%20IPFire&amp;severity=high&amp;id=6900d7521e78ed0e5889e0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34304-cwe-89-improper-neutralization-of-s-74be124f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34304%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IPFire.org%20IPFire&amp;severity=high&amp;id=6900d7521e78ed0e5889e099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34307-cwe-79-improper-neutralization-of-i-08ef4284</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34307%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34306-cwe-79-improper-neutralization-of-i-f1d199a5</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34306%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34308-cwe-79-improper-neutralization-of-i-ebace10f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34308%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34318-cwe-79-improper-neutralization-of-i-166f58e4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34318%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7531e78ed0e5889e100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34317-cwe-79-improper-neutralization-of-i-5203fde9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34317%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7531e78ed0e5889e0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34309-cwe-79-improper-neutralization-of-i-8d7e12f0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34309%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34301-cwe-79-improper-neutralization-of-i-b5ff6af4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34301%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34316-cwe-79-improper-neutralization-of-i-f38b43c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7531e78ed0e5889e0f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34305-cwe-79-improper-neutralization-of-i-702fb559</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34305%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34310-cwe-79-improper-neutralization-of-i-b178f180</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34310%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34315-cwe-79-improper-neutralization-of-i-ada648a9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34315%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34302-cwe-79-improper-neutralization-of-i-5b560915</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34302%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34314-cwe-79-improper-neutralization-of-i-6f36ab4a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34313-cwe-79-improper-neutralization-of-i-edf0a3d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34313%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34303-cwe-79-improper-neutralization-of-i-6af4e558</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redtiger-malware-steals-data-discord-tokens-and-ev-1e79c588</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RedTiger%20Malware%20Steals%20Data%2C%20Discord%20Tokens%20and%20Even%20Webcam%20Images&amp;severity=medium&amp;id=6900d1661db591194a8911e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12380-use-after-free-in-webgpu-internals--f33cb850</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12380%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=6900d1771db591194a8915da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/turbomirai-class-aisuru-botnet-blamed-for-20-tbps--3c9d5e2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TurboMirai-Class%20%E2%80%98Aisuru%E2%80%99%20Botnet%20Blamed%20for%2020%2B%20Tbps%20DDoS%20Attacks&amp;severity=medium&amp;id=6900cdd91db591194a82376b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53855-cwe-787-out-of-bounds-write-in-gcc--67a350fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53855%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20GCC%20Productions%20Inc.%20Fade%20In&amp;severity=high&amp;id=6900ca721db591194a7e02b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53814-cwe-416-use-after-free-in-gcc-produ-261d3773</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53814%3A%20CWE-416%3A%20Use%20After%20Free%20in%20GCC%20Productions%20Inc.%20Fade%20In&amp;severity=high&amp;id=6900ca721db591194a7e02b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12103-incorrect-privilege-assignment-in-r-a5738811</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12103%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%202.25&amp;severity=medium&amp;id=6900c82a05cd0025c8e834e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12390-session-fixation-in-red-hat-red-hat-8209dbcd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12390%3A%20Session%20Fixation%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=6900c82a05cd0025c8e834e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-payments-hit-record-low-only-23-pay-in--897eb089</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20payments%20hit%20record%20low%3A%20only%2023%25%20Pay%20in%20Q3%202025&amp;severity=low&amp;id=6900bf0feaec14ffc64824b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1038-cwe-78-improper-neutralization-of-sp-0528c4c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1038%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hitachi%20Energy%20TropOS%204th%20Gen&amp;severity=high&amp;id=6900b80ceaec14ffc63cb7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1037-cwe-269-improper-privilege-managemen-9d72790e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1037%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Hitachi%20Energy%20TropOS%204th%20Gen&amp;severity=high&amp;id=6900b80ceaec14ffc63cb7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1036-cwe-78-improper-neutralization-of-sp-6880a802</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1036%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hitachi%20Energy%20TropOS%204th%20Gen&amp;severity=high&amp;id=6900b5d793060580263d9ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/industrial-giants-schneider-electric-and-emerson-n-21d0de32</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Industrial%20Giants%20Schneider%20Electric%20and%20Emerson%20Named%20as%20Victims%20of%20Oracle%20Hack&amp;severity=medium&amp;id=6900b25393060580263724dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9313-cwe-288-authentication-bypass-using--12c062cb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9313%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Asseco%20Poland%20S.A.%20mMedica&amp;severity=critical&amp;id=6900aee0930605802632913a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ubuntu-kernel-lpe-6343474c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Ubuntu%20Kernel%20LPE!&amp;severity=medium&amp;id=6900acd316bbdbbc937764e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-trade-183-million-stolen-credential-6b0ca70b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Trade%20183%20Million%20Stolen%20Credentials%20on%20Telegram%2C%20Dark%20Forums&amp;severity=medium&amp;id=6900a5c016bbdbbc936b0aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-your-google-workspace-as-secure-as-you-think-it-af127eaf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20Your%20Google%20Workspace%20as%20Secure%20as%20You%20Think%20it%20is%3F&amp;severity=low&amp;id=6901629430d110a1a6e799cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-phishing-with-invisible-characters-in-the-subjec-cff17914</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line%2C%20(Tue%2C%20Oct%2028th)&amp;severity=medium&amp;id=69008f7868b9eefb8dadc43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mass-attack-targets-wordpress-sites-via-gutenkit-a-27c9c270</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mass%20Attack%20Targets%20WordPress%20Sites%20via%20GutenKit%20and%20Hunk%20Companion%20Plugins&amp;severity=medium&amp;id=690096201b1da53ce4946161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55758-cwe-352-cross-site-request-forgery--a4d534c7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55758%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jdownloads.com%20JDownloads%20component%20for%20Joomla&amp;severity=medium&amp;id=690099981b1da53ce49acbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-swedish-power-grid-operator-a515a4ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20Swedish%20Power%20Grid%20Operator&amp;severity=medium&amp;id=690096091b1da53ce49450c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/memento-labs-the-ghost-of-hacking-team-has-returne-f9dd3870</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Memento%20Labs%2C%20the%20ghost%20of%20Hacking%20Team%2C%20has%20returned%20%E2%80%94%20or%20maybe%20it%20was%20never%20gone%20at%20all.&amp;severity=medium&amp;id=69008f9668b9eefb8dae1d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disputes-false-claims-of-massive-gmail-data-7e83c7b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20disputes%20false%20claims%20of%20massive%20Gmail%20data%20breach&amp;severity=high&amp;id=69008f9668b9eefb8dae1d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sidewinder-adopts-new-clickonce-based-attack-chain-1319ef9a</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SideWinder%20Adopts%20New%20ClickOnce-Based%20Attack%20Chain%20Targeting%20South%20Asian%20Diplomats&amp;severity=high&amp;id=69008bfc68b9eefb8da84dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41090-cwe-306-missing-authentication-for--c0b84407</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41090%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CCN-CERT%20microCLAUDIA&amp;severity=high&amp;id=69008c1568b9eefb8da85d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-zero-day-exploited-to-deliver-italian-memen-ddf9932f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Zero-Day%20Exploited%20to%20Deliver%20Italian%20Memento%20Labs&apos;%20LeetAgent%20Spyware&amp;severity=medium&amp;id=6901629430d110a1a6e799cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crafting-self-masking-functions-using-llvm-65e64f02</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crafting%20self%20masking%20functions%20using%20LLVM&amp;severity=medium&amp;id=690079e4682198e57b19b30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10151-cwe-667-improper-locking-in-softing-fdebb895</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10151%3A%20CWE-667%20Improper%20Locking%20in%20Softing%20Industrial%20Automation%20GmbH%20smartLink%20HW-PN&amp;severity=high&amp;id=6900734ec20c2200665f5b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10150-cwe-833-deadlock-in-softing-industr-f035f88f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10150%3A%20CWE-833%3A%20Deadlock%20in%20Softing%20Industrial%20Automation%20GmbH%20smartLink%20HW-PN&amp;severity=high&amp;id=6900734ec20c2200665f5b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12378-unrestricted-upload-in-code-project-f15752d2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12378%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=69005d1b5553ed2111ccc338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11735-cwe-89-improper-neutralization-of-s-6dba87c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11735%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=high&amp;id=69005d1b5553ed2111ccc334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10145-cwe-918-server-side-request-forgery-dcd0bf2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10145&amp;severity=null&amp;id=69005d1b5553ed2111ccc330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62777-use-of-hard-coded-credentials-in-pl-9fa12352</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62777%3A%20Use%20of%20hard-coded%20credentials%20in%20PLANEX%20COMMUNICATIONS%20INC.%20MZK-DP300N&amp;severity=high&amp;id=690053d57fd05562372c1e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sidewinder-adopts-new-clickonce-based-attack-chain-c9417719</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SideWinder%20Adopts%20New%20ClickOnce-Based%20Attack%20Chain%20Targeting%20South%20Asian%20Diplomats&amp;severity=medium&amp;id=6901629430d110a1a6e799d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crypto-wasted-bluenoroffs-ghost-mirage-of-funding--7e49ab3f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crypto%20wasted%3A%20BlueNoroff%E2%80%99s%20ghost%20mirage%20of%20funding%20and%20jobs&amp;severity=medium&amp;id=69008f8b68b9eefb8dadcb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10939-uncontrolled-search-path-element-in-97508820</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10939%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69003706ba6dffc5e2309f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12347-unrestricted-upload-in-maxsite-cms-449bf3ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12347%3A%20Unrestricted%20Upload%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=690028ffba6dffc5e22648c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12346-unrestricted-upload-in-maxsite-cms-e3ffe8d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12346%3A%20Unrestricted%20Upload%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=690028ffba6dffc5e22648be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12344-unrestricted-upload-in-yonyou-u8-cl-ecedd8b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12344%3A%20Unrestricted%20Upload%20in%20Yonyou%20U8%20Cloud&amp;severity=medium&amp;id=690021eeba6dffc5e22267fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12342-sql-injection-in-serdar-bayram-ghos-a4aa7fef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12342%3A%20SQL%20Injection%20in%20Serdar%20Bayram%20Ghost%20Hot%20Spot&amp;severity=medium&amp;id=6900176aba6dffc5e21fd5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12341-link-following-in-ermig1979-antidup-2858bc81</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12341%3A%20Link%20Following%20in%20ermig1979%20AntiDupl&amp;severity=high&amp;id=6900176aba6dffc5e21fd5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12339-sql-injection-in-campcodes-retro-ba-2dc798c3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12339%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=690013efba6dffc5e21f118b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12338-sql-injection-in-campcodes-retro-ba-74389302</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12338%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=690013efba6dffc5e21f1184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12337-sql-injection-in-campcodes-retro-ba-f7470e68</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12337%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=69000cd9ba6dffc5e21dd5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12336-sql-injection-in-campcodes-retro-ba-dcefa458</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12336%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=69000cd9ba6dffc5e21dd5b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-28-80e3fb3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-28&amp;severity=medium&amp;id=69015a9b30d110a1a6d3c523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61235-na-d878544c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61235%3A%20n%2Fa&amp;severity=critical&amp;id=690122b38f7e67aef00c128b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60805-na-73841a13</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60805%3A%20n%2Fa&amp;severity=high&amp;id=69010ce521370b3f6065e07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61080-na-98592e86</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61080%3A%20n%2Fa&amp;severity=medium&amp;id=690101a38bc57bfc699ad6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60800-na-bb613e2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60800%3A%20n%2Fa&amp;severity=high&amp;id=6900ffacc2498ce55d2bf488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60355-na-01f45604</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60355%3A%20n%2Fa&amp;severity=critical&amp;id=6900ffacc2498ce55d2bf485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60354-na-24b62900</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60354%3A%20n%2Fa&amp;severity=high&amp;id=6900ffacc2498ce55d2bf482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54605-na-2b727aa4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54605%3A%20n%2Fa&amp;severity=high&amp;id=6900f88bc2498ce55d20aefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61155-na-377c9ca5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61155%3A%20n%2Fa&amp;severity=medium&amp;id=6900f0e28b5ca1e4f6b448ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60349-na-bbeedfff</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60349%3A%20n%2Fa&amp;severity=high&amp;id=6900f0e28b5ca1e4f6b448e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54604-na-4ff0c0fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54604%3A%20n%2Fa&amp;severity=high&amp;id=6900ef4f8b5ca1e4f6b16412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60858-na-78780f8d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60858%3A%20n%2Fa&amp;severity=high&amp;id=6900e9469137f7a53a1f9d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56399-na-d99932dd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56399%3A%20n%2Fa&amp;severity=high&amp;id=6900e5cb9137f7a53a1afc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61107-na-97ade869</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61107%3A%20n%2Fa&amp;severity=high&amp;id=6900de73d44cb7cb50ff0b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61106-na-a7777de9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61106%3A%20n%2Fa&amp;severity=high&amp;id=6900de73d44cb7cb50ff0b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61104-na-9f9825b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61104%3A%20n%2Fa&amp;severity=high&amp;id=6900de73d44cb7cb50ff0b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61103-na-22d8a93f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61103%3A%20n%2Fa&amp;severity=high&amp;id=6900de73d44cb7cb50ff0afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61128-na-9f129f2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61128%3A%20n%2Fa&amp;severity=critical&amp;id=6900dcd1d44cb7cb50fc4af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61043-na-08bc5af1</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61043%3A%20n%2Fa&amp;severity=critical&amp;id=6900d7531e78ed0e5889e105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33133-cwe-787-out-of-bounds-write-in-ibm--0a0e7918</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33133%3A%20CWE-787%20Out-of-bounds%20Write%20in%20IBM%20DB2%20High%20Performance%20Unload&amp;severity=medium&amp;id=69000951ba6dffc5e21a9fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33132-cwe-467-use-of-sizeof-on-a-pointer--9800ffc1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33132%3A%20CWE-467%20Use%20of%20sizeof()%20on%20a%20Pointer%20Type%20in%20IBM%20DB2%20High%20Performance%20Unload&amp;severity=medium&amp;id=69000951ba6dffc5e21a9f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33131-cwe-120-buffer-copy-without-checkin-0fef9c46</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33131%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20IBM%20DB2%20High%20Performance%20Unload&amp;severity=medium&amp;id=69000951ba6dffc5e21a9f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33126-cwe-131-incorrect-calculation-of-bu-a7deff6b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33126%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20IBM%20DB2%20High%20Performance%20Unload&amp;severity=medium&amp;id=69000951ba6dffc5e21a9f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12335-cross-site-scripting-in-code-projec-735b5c79</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12335%3A%20Cross%20Site%20Scripting%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=6900024dba6dffc5e21931f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12332-cross-site-scripting-in-sourcecodes-0b1f4942</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12332%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Grades%20Management%20System&amp;severity=medium&amp;id=6900024dba6dffc5e2193200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43024-cwe-497-exposure-of-sensitive-syste-f608330d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43024%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20HP%20Inc%20ThinPro%208.1&amp;severity=medium&amp;id=68fffec9ba6dffc5e218c2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62258-cwe-352-cross-site-request-forgery--04efa349</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62258%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Liferay%20Portal&amp;severity=high&amp;id=68fffb41ba6dffc5e218209b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12334-cross-site-scripting-in-code-projec-89bf1079</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12334%3A%20Cross%20Site%20Scripting%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68fff444ba6dffc5e21326a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12333-cross-site-scripting-in-code-projec-0195957d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12333%3A%20Cross%20Site%20Scripting%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68fff444ba6dffc5e21326a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62259-cwe-863-incorrect-authorization-in--839a3a9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62259%3A%20CWE-863%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68fff444ba6dffc5e21326af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12331-unrestricted-upload-in-willow-cms-4896ff1a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12331%3A%20Unrestricted%20Upload%20in%20Willow%20CMS&amp;severity=medium&amp;id=68ffed31ba6dffc5e2122369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12330-cross-site-scripting-in-willow-cms-4bc70c5c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12330%3A%20Cross%20Site%20Scripting%20in%20Willow%20CMS&amp;severity=medium&amp;id=68ffed31ba6dffc5e2122362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62260-cwe-400-uncontrolled-resource-consu-face2cfb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62260%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Liferay%20Portal&amp;severity=high&amp;id=68ffe9aeba6dffc5e211b781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12329-sql-injection-in-shawon100-ruet-oj-4c36d51b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12329%3A%20SQL%20Injection%20in%20shawon100%20RUET%20OJ&amp;severity=medium&amp;id=68ffe632ba6dffc5e21130bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12328-sql-injection-in-shawon100-ruet-oj-e99790fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12328%3A%20SQL%20Injection%20in%20shawon100%20RUET%20OJ&amp;severity=medium&amp;id=68ffe632ba6dffc5e21130ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62781-cwe-613-insufficient-session-expira-44094685</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62781%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20THM-Health%20PILOS&amp;severity=medium&amp;id=68ffe632ba6dffc5e21130cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62779-cwe-79-improper-neutralization-of-i-4168794f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62779%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=low&amp;id=68ffe632ba6dffc5e21130c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62778-cwe-425-direct-request-forced-brows-1700e009</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62778%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20frappe%20lms&amp;severity=low&amp;id=68ffe632ba6dffc5e21130c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62261-cwe-312-cleartext-storage-of-sensit-a1956b0a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62261%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ffe2a8ba6dffc5e210be3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jingle-thief-highlights-retail-cyber-threats-257bed41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Jingle%20Thief&apos;%20Highlights%20Retail%20Cyber%20Threats&amp;severity=high&amp;id=69016ef83499185cc34fb17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-tainted-memories-exploit-enables-command-i-fcbe7d33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98ChatGPT%20Tainted%20Memories%E2%80%99%20Exploit%20Enables%20Command%20Injection%20in%20Atlas%20Browser&amp;severity=high&amp;id=68ffdf22ba6dffc5e20e967e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12327-sql-injection-in-shawon100-ruet-oj-f72a0206</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12327%3A%20SQL%20Injection%20in%20shawon100%20RUET%20OJ&amp;severity=medium&amp;id=68ffdf31ba6dffc5e20e9776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12326-sql-injection-in-shawon100-ruet-oj-5e250c47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12326%3A%20SQL%20Injection%20in%20shawon100%20RUET%20OJ&amp;severity=medium&amp;id=68ffdf31ba6dffc5e20e9771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62784-cwe-837-improper-enforcement-of-a-s-6e55b336</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62784%3A%20CWE-837%3A%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Phoenix616%20InventoryGui&amp;severity=medium&amp;id=68ffdf31ba6dffc5e20e977b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62783-cwe-837-improper-enforcement-of-a-s-23210f90</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62783%3A%20CWE-837%3A%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Phoenix616%20InventoryGui&amp;severity=medium&amp;id=68ffdf31ba6dffc5e20e977f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62782-cwe-837-improper-enforcement-of-a-s-7c6c421b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62782%3A%20CWE-837%3A%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Phoenix616%20InventoryGui&amp;severity=medium&amp;id=68ffdbe2ba6dffc5e20d7f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x-warns-users-with-security-keys-to-re-enroll-befo-abe552c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=X%20Warns%20Users%20With%20Security%20Keys%20to%20Re-Enroll%20Before%20November%2010%20to%20Avoid%20Lockouts&amp;severity=high&amp;id=68ffdb9cba6dffc5e20d78d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italian-spyware-vendor-linked-to-chrome-zero-day-a-394e7909</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italian%20spyware%20vendor%20linked%20to%20Chrome%20zero-day%20attacks&amp;severity=critical&amp;id=68ffdb9cba6dffc5e20d78c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-warns-of-critical-aspnet-flaw-in-its-windows--3fa86493</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20warns%20of%20critical%20ASP.NET%20flaw%20in%20its%20Windows%20backup%20software&amp;severity=critical&amp;id=68ffdb9cba6dffc5e20d78cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-profits-drop-as-victims-stop-paying-hac-3c22df97</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20profits%20drop%20as%20victims%20stop%20paying%20hackers&amp;severity=high&amp;id=68ffdb9cba6dffc5e20d78d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62262-cwe-532-insertion-of-sensitive-info-1d13d28b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62262%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ffdbe2ba6dffc5e20d7f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62725-cwe-22-improper-limitation-of-a-pat-abc8fd06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62725%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20docker%20compose&amp;severity=high&amp;id=68ffdbe2ba6dffc5e20d7f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12325-sql-injection-in-sourcecodester-bes-f1093c2a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12325%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68ffdbe2ba6dffc5e20d7f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12322-buffer-overflow-in-tenda-ch22-c4af0141</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12322%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ffdbe2ba6dffc5e20d7f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12316-sql-injection-in-code-projects-cour-ca1ab1fb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12316%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=68ffdbe2ba6dffc5e20d7f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62524-cwe-200-exposure-of-sensitive-infor-6cb5e3d0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62524%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20THM-Health%20PILOS&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c6581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62523-cwe-942-permissive-cross-domain-pol-4b2c1f0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62523%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20THM-Health%20PILOS&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c657d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12315-sql-injection-in-code-projects-food-f143d504</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12315%3A%20SQL%20Injection%20in%20code-projects%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c6593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12314-sql-injection-in-code-projects-food-ba12fe90</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12314%3A%20SQL%20Injection%20in%20code-projects%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c658c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12313-command-injection-in-d-link-di-7001-1c796b40</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12313%3A%20Command%20Injection%20in%20D-Link%20DI-7001%20MINI&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c6585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/memento-spyware-tied-to-chrome-zero-day-attacks-bbe63122</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Memento%20Spyware%20Tied%20to%20Chrome%20Zero-Day%20Attacks&amp;severity=medium&amp;id=69016ef83499185cc34fb17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62516-cwe-200-exposure-of-sensitive-infor-60b50e0f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62516&amp;severity=null&amp;id=68ffcd8cba6dffc5e20add2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59151-cwe-93-improper-neutralization-of-c-8e6231bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59151%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20pi-hole%20web&amp;severity=high&amp;id=68ffcd8cba6dffc5e20add29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62263-cwe-79-improper-neutralization-of-i-ce2f2a13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ffcd8cba6dffc5e20add2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58356-cwe-347-improper-verification-of-cr-c05554f5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58356%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20edgelesssys%20constellation&amp;severity=high&amp;id=68ffca08ba6dffc5e209fffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12312-cross-site-scripting-in-phpgurukul--a1716d8e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12312%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=68ffca08ba6dffc5e209fff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12311-cross-site-scripting-in-phpgurukul--cfb30418</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12311%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=68ffca08ba6dffc5e209ffee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12310-improper-restriction-of-excessive-a-624bf1ae</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12310%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20VirtFusion&amp;severity=medium&amp;id=68ffca08ba6dffc5e209ffe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-sell-turnkey-remote-access-trojan-atropo-cc886787</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Sell%20Turnkey%20Remote%20Access%20Trojan%20&apos;Atroposia&apos;&amp;severity=low&amp;id=69016ef83499185cc34fb184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53533-cwe-79-improper-neutralization-of-i-70c3e71d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53533%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=medium&amp;id=68ffc684ba6dffc5e2095d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12309-sql-injection-in-code-projects-nero-fdbbe3dd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12309%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=68ffc300ba6dffc5e2087c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12308-sql-injection-in-code-projects-nero-298884a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12308%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=68ffc300ba6dffc5e2087c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12307-sql-injection-in-code-projects-nero-3a926002</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12307%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=68ffc300ba6dffc5e2087c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62253-cwe-601-url-redirection-to-untruste-3af9a573</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62253%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ffc300ba6dffc5e2087c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36138-cwe-79-improper-neutralization-of-i-4cb70af9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36138%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36170-cwe-79-improper-neutralization-of-i-81e3e383</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36170%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32785-cwe-79-improper-neutralization-of-i-fc0fbf05</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32785%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=low&amp;id=68ffbf81ba6dffc5e207e32f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46602-cwe-538-insertion-of-sensitive-info-25585f05</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46602%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Dell%20SupportAssist%20OS%20Recovery&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36007-cwe-266-incorrect-privilege-assignm-0be2ee83</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36007%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20IBM%20QRadar%20SIEM&amp;severity=high&amp;id=68ffbf81ba6dffc5e207e332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12306-sql-injection-in-code-projects-nero-20fb7e7b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12306%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12305-deserialization-in-quequnlong-shiyi-c4c833bd</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12305%3A%20Deserialization%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12304-improper-authorization-in-dulaiduwa-719577c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12304%3A%20Improper%20Authorization%20in%20dulaiduwang003%20TIME-SEA-PLUS&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12365-cwe-209-generation-of-error-message-8fdfba16</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12365%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68ffbbf8ba6dffc5e2076444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12364-cwe-521-weak-password-requirements--0d6651d6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12364%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68ffb875ba6dffc5e206e0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12363-cwe-200-exposure-of-sensitive-infor-7417b286</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12363%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68ffb875ba6dffc5e206e0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12303-cross-site-scripting-in-phpgurukul--c5e1b330</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12303%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=68ffb875ba6dffc5e206e0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12302-cross-site-scripting-in-code-projec-b9438a5c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12302%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffb875ba6dffc5e206e0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12301-unrestricted-upload-in-code-project-110679de</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12301%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffadeaba6dffc5e2050665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12300-cross-site-scripting-in-code-projec-40373787</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12300%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffadeaba6dffc5e205065d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61795-cwe-404-improper-resource-shutdown--a43301b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61795%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=68ffadeaba6dffc5e205067d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55752-cwe-23-relative-path-traversal-in-a-66522afd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55752%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=68ffadeaba6dffc5e205066e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55754-cwe-150-improper-neutralization-of--8d7d2fcf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55754%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=68ffadeaba6dffc5e2050674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12299-cross-site-scripting-in-code-projec-3fb1957c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12299%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffa6e0ba6dffc5e2036881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12298-cross-site-scripting-in-code-projec-dba6429f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12298%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffa6e0ba6dffc5e203687a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12297-information-disclosure-in-atjiu-pyb-9c88682a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12297%3A%20Information%20Disclosure%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=68ffa364ba6dffc5e202ccee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12296-os-command-injection-in-d-link-dap--9f83be38</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12296%3A%20OS%20Command%20Injection%20in%20D-Link%20DAP-2695&amp;severity=medium&amp;id=68ffa364ba6dffc5e202cce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12295-improper-verification-of-cryptograp-e875a592</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12295%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20D-Link%20DAP-2695&amp;severity=high&amp;id=68ffa364ba6dffc5e202cce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x-warns-users-with-security-keys-to-re-enroll-befo-7003c9a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=X%20Warns%20Users%20With%20Security%20Keys%20to%20Re-Enroll%20Before%20November%2010%20to%20Avoid%20Lockouts&amp;severity=medium&amp;id=6901629430d110a1a6e799d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12294-sql-injection-in-sourcecodester-poi-f9285c25</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12294%3A%20SQL%20Injection%20in%20SourceCodester%20Point%20of%20Sales&amp;severity=medium&amp;id=68ff98e5ba6dffc5e201350a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12293-sql-injection-in-sourcecodester-poi-5961733f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12293%3A%20SQL%20Injection%20in%20SourceCodester%20Point%20of%20Sales&amp;severity=medium&amp;id=68ff98e5ba6dffc5e2013503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/house-democrats-resume-bank-domewatch-leaked-data--75eba7cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=House%20Democrats%E2%80%99%20Resume%20Bank%20DomeWatch%20Leaked%20Data%20of%20Thousands%20of%20Capitol%20Hill%20Job%20Applicants&amp;severity=medium&amp;id=68ff98d2ba6dffc5e2013270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12292-sql-injection-in-sourcecodester-poi-ff18ccff</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12292%3A%20SQL%20Injection%20in%20SourceCodester%20Point%20of%20Sales&amp;severity=medium&amp;id=68ff91d3ba6dffc5e2000d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12291-unrestricted-upload-in-ashymuzuro-f-dc6bc574</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12291%3A%20Unrestricted%20Upload%20in%20ashymuzuro%20Full-Ecommece-Website&amp;severity=medium&amp;id=68ff91d3ba6dffc5e2000d23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leetagent-a-tool-shared-by-forumtroll-and-dante-f716c828</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeetAgent%3A%20a%20tool%20shared%20by%20ForumTroll%20and%20Dante&amp;severity=medium&amp;id=68ff8e5eba6dffc5e2ff113d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-water-saci-campaign-spreading-via-whatsapp--3ad4bff4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Water%20Saci%20Campaign%20Spreading%20Via%20WhatsApp%20Features%20Multi-Vector%20Persistence%20and%20Sophisticated%20C%26C&amp;severity=medium&amp;id=68ff9fd0ba6dffc5e2023fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-targets-windows-hosts-with-linux-based-ranso-17c9bfb3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Targets%20Windows%20Hosts%20With%20Linux-Based%20Ransomware&amp;severity=medium&amp;id=69016ef83499185cc34fb18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34133-cwe-352-cross-site-request-forgery--03d5610a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34133%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Cloud%20Solutions%20SAS%20Wimi%20Teamwork&amp;severity=high&amp;id=68ff8e44ba6dffc5e2ff0b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-weve-learned-from-scanning-thousands-of-smart-8462d68a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20we%E2%80%99ve%20learned%20from%20scanning%20thousands%20of%20smart%20contracts%20with%20SolidityScan&amp;severity=high&amp;id=68ff8e47ba6dffc5e2ff0bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10023-cwe-79-improper-neutralization-of-i-bd75db39</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10023%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ff8e44ba6dffc5e2ff0b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12351-cwe-639-authorization-bypass-throug-6104be6a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12351%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Honeywell%20S35%203M%2F5M%2F8M%2FPinhole%2FKit%20Camera&amp;severity=medium&amp;id=68ff8ac4ba6dffc5e2fe0fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12290-cross-site-scripting-in-sui-shang-i-4b26cad1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12290%3A%20Cross%20Site%20Scripting%20in%20Sui%20Shang%20Information%20Technology%20Suishang%20Enterprise-Level%20B2B2C%20Multi-User%20Mall%20System&amp;severity=medium&amp;id=68ff8ac4ba6dffc5e2fe0fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12289-cross-site-scripting-in-sui-shang-i-dcda611e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12289%3A%20Cross%20Site%20Scripting%20in%20Sui%20Shang%20Information%20Technology%20Suishang%20Enterprise-Level%20B2B2C%20Multi-User%20Mall%20System&amp;severity=medium&amp;id=68ff8ac4ba6dffc5e2fe0fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36121-cwe-80-improper-neutralization-of-s-59e9719c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36121%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=68ff8ac4ba6dffc5e2fe0fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34292-cwe-502-deserialization-of-untruste-f9adb8b7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34292%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20BeWelcome%20Rox&amp;severity=critical&amp;id=68ff8744ba6dffc5e2fd65e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12288-authorization-bypass-in-bdtask-phar-9ead32ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12288%3A%20Authorization%20Bypass%20in%20Bdtask%20Pharmacy%20Management%20System&amp;severity=medium&amp;id=68ff8744ba6dffc5e2fd65e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12287-sql-injection-in-bdtask-wholesale-i-15a9788c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12287%3A%20SQL%20Injection%20in%20Bdtask%20Wholesale%20Inventory%20Control%20and%20Inventory%20Management%20System&amp;severity=medium&amp;id=68ff8744ba6dffc5e2fd65da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chatgpt-atlas-browser-exploit-lets-attackers-p-369ffb12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ChatGPT%20Atlas%20Browser%20Exploit%20Lets%20Attackers%20Plant%20Persistent%20Hidden%20Commands&amp;severity=low&amp;id=6901629430d110a1a6e799d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12286-unquoted-search-path-in-veepn-7896ce70</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12286%3A%20Unquoted%20Search%20Path%20in%20VeePN&amp;severity=high&amp;id=68ff7cafba6dffc5e2fbe797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12283-authorization-bypass-in-code-projec-87d8913b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12283%3A%20Authorization%20Bypass%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff7cafba6dffc5e2fbe790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9164-cwe-427-uncontrolled-search-path-ele-5228e4d1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9164%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Docker%20Docker%20Desktop&amp;severity=high&amp;id=68ff7cafba6dffc5e2fbe7a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50055-cwe-79-improper-neutralization-of-i-9ecd431f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50055%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenVPN%20Access%20Server&amp;severity=medium&amp;id=68ff792cba6dffc5e2fb2ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12282-cross-site-scripting-in-code-projec-38d7b6e9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12282%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff792cba6dffc5e2fb2adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12281-cross-site-scripting-in-code-projec-0e8722b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12281%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff792cba6dffc5e2fb2ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12280-cross-site-scripting-in-code-projec-dc805d82</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12280%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff792cba6dffc5e2fb2acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-china-linked-smishing-campaign-leveraged-1-12e4c165</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20China-Linked%20Smishing%20Campaign%20Leveraged%20194%2C000%20Domains&amp;severity=medium&amp;id=68ff75a2ba6dffc5e2fab31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-hyperrat-android-malware-sold-as-ready-made-sp-de335054</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20HyperRat%20Android%20Malware%20Sold%20as%20Ready-Made%20Spy%20Tool&amp;severity=medium&amp;id=68ff75b8ba6dffc5e2fab4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-variant-of-qilin-ransomware-targets-windows--df686a8b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20variant%20of%20Qilin%20Ransomware%20targets%20Windows%20via%20remote%20management%20tools%20and%20BYOVD&amp;severity=medium&amp;id=68ff7222ba6dffc5e2fa4f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-wap-a-surveillance-computer-youve-never-hear-1db43d4f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=First%20Wap%3A%20A%20Surveillance%20Computer%20You&apos;ve%20Never%20Heard%20Of%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=68ff7222ba6dffc5e2fa4f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12279-cross-site-scripting-in-code-projec-4275b1da</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12279%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff7241ba6dffc5e2fa53c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12277-sql-injection-in-abdullah-hasan-saj-4f4753fa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12277%3A%20SQL%20Injection%20in%20Abdullah-Hasan-Sajjad%20Online-School&amp;severity=medium&amp;id=68ff7241ba6dffc5e2fa53be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12276-information-disclosure-in-learnhous-75a2b057</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12276%3A%20Information%20Disclosure%20in%20LearnHouse&amp;severity=medium&amp;id=68ff7241ba6dffc5e2fa53b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11248-cwe-532-insertion-of-sensitive-info-66d30e77</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11248%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Zohocorp%20ManageEngine%20Endpoint%20Central&amp;severity=low&amp;id=68ff7241ba6dffc5e2fa53b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-wsus-exploited-lockbit-50-returns-tel-9088ce9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20WSUS%20Exploited%2C%20LockBit%205.0%20Returns%2C%20Telegram%20Backdoor%2C%20F5%20Breach%20Widens&amp;severity=medium&amp;id=68ff6b16ba6dffc5e2f831fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41068-cwe-617-reachable-assertion-in-newp-d8a4c263</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41068%3A%20CWE-617%20Reachable%20Assertion%20in%20NewPlane%20Open5GS&amp;severity=high&amp;id=68ff6edbba6dffc5e2f97675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41067-cwe-617-reachable-assertion-in-newp-75c0fca9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41067%3A%20CWE-617%20Reachable%20Assertion%20in%20NewPlane%20Open5GS&amp;severity=high&amp;id=68ff6edbba6dffc5e2f97671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12274-buffer-overflow-in-tenda-ch22-373686ab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12274%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff6796ba6dffc5e2f5779f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12273-buffer-overflow-in-tenda-ch22-f6899b4a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12273%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff6796ba6dffc5e2f57798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12272-buffer-overflow-in-tenda-ch22-005a7234</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12272%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff609aba6dffc5e2ea040b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12271-buffer-overflow-in-tenda-ch22-109a818f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12271%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff609aba6dffc5e2ea0404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12270-improper-control-of-resource-identi-ceb2317a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12270%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20LearnHouse&amp;severity=medium&amp;id=68ff6099ba6dffc5e2ea03fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41009-cwe-89-improper-neutralization-of-s-0a593df3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41009%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Disenno%20de%20Recursos%20Educativos%20S.L%20virtual%20campus%20platform&amp;severity=critical&amp;id=68ff5b452359da13b53d315f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12269-cross-site-scripting-in-learnhouse-c10dedc7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12269%3A%20Cross%20Site%20Scripting%20in%20LearnHouse&amp;severity=medium&amp;id=68ff5b452359da13b53d3159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12268-unrestricted-upload-in-learnhouse-99d0273b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12268%3A%20Unrestricted%20Upload%20in%20LearnHouse&amp;severity=medium&amp;id=68ff5b452359da13b53d3153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11955-cwe-299-improper-check-for-certific-c32cbfcd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11955%3A%20CWE-299%3A%20Improper%20Check%20for%20Certificate%20Revocation%20in%20TheGreenBow%20TheGreenBow%20VPN%20Client%20Windows%20Enterprise&amp;severity=high&amp;id=68ff59692359da13b53b5873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-firefox-extensions-required-to-disclose-data-c-6ccd95f5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Firefox%20Extensions%20Required%20to%20Disclose%20Data%20Collection%20Practices&amp;severity=medium&amp;id=68ff55c904434cffeae9505f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12267-cross-site-scripting-in-abhicodebox-a97a9001</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12267%3A%20Cross%20Site%20Scripting%20in%20abhicodebox%20ModernShop&amp;severity=medium&amp;id=68ff524a04434cffeae2d25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12266-code-injection-in-zytec-dalian-zhuo-d21002f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12266%3A%20Code%20Injection%20in%20Zytec%20Dalian%20Zhuoyun%20Technology%20Central%20Authentication%20Service&amp;severity=medium&amp;id=68ff524a04434cffeae2d259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12265-buffer-overflow-in-tenda-ch22-78ff9447</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12265%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff524a04434cffeae2d252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/year-old-wordpress-plugin-flaws-exploited-to-hack--d70cee15</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Year-Old%20WordPress%20Plugin%20Flaws%20Exploited%20to%20Hack%20Websites&amp;severity=critical&amp;id=68ff4ed204434cffeade4f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/27th-october-threat-intelligence-report-e014336a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=27th%20October%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68ff4d12bbaf5d265c8ed70b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-steal-discord-accounts-with-redtiger-based-fc3c7187</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20steal%20Discord%20accounts%20with%20RedTiger-based%20infostealer&amp;severity=high&amp;id=68ff4ce5bbaf5d265c8de265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordfence-blocks-87m-attacks-exploiting-old-gutenk-4ff330b1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wordfence%20blocks%208.7M%20attacks%20exploiting%20old%20GutenKit%20and%20Hunk%20Companion%20flaws&amp;severity=medium&amp;id=68ff4ce5bbaf5d265c8de269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bytes-over-dns-sans-internet-storm-center-d8ccc291</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bytes%20over%20DNS%20-%20SANS%20Internet%20Storm%20Center&amp;severity=medium&amp;id=68ff4ce5bbaf5d265c8de26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12264-cross-site-scripting-in-wisencode-fe8f788b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12264%3A%20Cross%20Site%20Scripting%20in%20Wisencode&amp;severity=medium&amp;id=68ff4d0fbbaf5d265c8ed1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12263-sql-injection-in-code-projects-onli-c02c22b4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12263%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff4d0fbbaf5d265c8ed1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12262-sql-injection-in-code-projects-onli-13a3f798</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12262%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff4d0fbbaf5d265c8ed1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-payments-dropped-in-q3-2025-analysis-16c3acbe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Payments%20Dropped%20in%20Q3%202025%3A%20Analysis&amp;severity=medium&amp;id=68ff4960bbaf5d265c875b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59463-cwe-833-deadlock-in-sick-ag-tloc100-3b4d7a5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59463%3A%20CWE-833%20Deadlock%20in%20SICK%20AG%20TLOC100-100%20all%20Firmware%20versions&amp;severity=medium&amp;id=68ff4972bbaf5d265c87718d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59462-cwe-248-uncaught-exception-in-sick--5337da09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59462%3A%20CWE-248%20Uncaught%20Exception%20in%20SICK%20AG%20TLOC100-100%20all%20Firmware%20versions&amp;severity=medium&amp;id=68ff4972bbaf5d265c877185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59461-cwe-862-missing-authorization-in-si-cba65bd7</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59461%3A%20CWE-862%20Missing%20Authorization%20in%20SICK%20AG%20TLOC100-100%20all%20Firmware%20versions&amp;severity=high&amp;id=68ff4972bbaf5d265c87717d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-dream-job-to-malware-dreamloaders-in-recent-c-185b6ce0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Dream%20Job%20to%20Malware%3A%20DreamLoaders%20in%20Recent%20Campaign&amp;severity=medium&amp;id=68ff4ce1bbaf5d265c8de12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59460-cwe-1391-use-of-weak-credentials-in-4191a421</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59460%3A%20CWE-1391%20Use%20of%20Weak%20Credentials%20in%20SICK%20AG%20TLOC100-100%20with%20Firmware%20%3C7.1.1&amp;severity=high&amp;id=68ff4972bbaf5d265c877175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59459-cwe-770-allocation-of-resources-wit-86c816c4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59459%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20SICK%20AG%20TLOC100-100&amp;severity=medium&amp;id=68ff4972bbaf5d265c87716d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8432-cwe-276-incorrect-default-permission-b9d1c12e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8432%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Centreon%20Infra%20Monitoring&amp;severity=high&amp;id=68ff45eabbaf5d265c824126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12261-sql-injection-in-codeastro-gym-mana-7d47a7bb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12261%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68ff45eabbaf5d265c82411f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12260-stack-based-buffer-overflow-in-toto-696570db</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12260%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff45eabbaf5d265c824118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12259-stack-based-buffer-overflow-in-toto-437deb94</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12259%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff45eabbaf5d265c824111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10561-cwe-1104-use-of-unmaintained-third--44afcc9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10561&amp;severity=null&amp;id=68ff45eabbaf5d265c824109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-zero-day-exploitation-linked-to-hacking-tea-a2746689</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Zero-Day%20Exploitation%20Linked%20to%20Hacking%20Team%20Spyware&amp;severity=medium&amp;id=68ff3cec092efa8a037267c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12258-stack-based-buffer-overflow-in-toto-40657c71</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12258%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff4783bbaf5d265c856c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12257-sql-injection-in-sourcecodester-onl-242ff922</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12257%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Result%20System&amp;severity=medium&amp;id=68ff4783bbaf5d265c856c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12256-sql-injection-in-code-projects-onli-45cc6d8c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12256%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff4783bbaf5d265c856c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46583-cwe-116-improper-encoding-or-escapi-2a3a2588</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46583%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20ZTE%20MC889A%20Pro&amp;severity=medium&amp;id=68ff3b148ee3628e2d7f52dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bytes-over-dns-mon-oct-27th-685a5807</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bytes%20over%20DNS%2C%20(Mon%2C%20Oct%2027th)&amp;severity=low&amp;id=68ff378d8ee3628e2d779a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12255-sql-injection-in-code-projects-onli-f1d59206</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12255%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff37aa8ee3628e2d77b5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12254-sql-injection-in-code-projects-onli-29770114</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12254%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff37aa8ee3628e2d77b5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12253-sql-injection-in-amtt-hotel-broadba-1502365e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12253%3A%20SQL%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=68ff37aa8ee3628e2d77b5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-combines-linux-payload-with-byovd-659322bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Combines%20Linux%20Payload%20With%20BYOVD%20Exploit%20in%20Hybrid%20Attack&amp;severity=high&amp;id=68ff6e72ba6dffc5e2f95f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12080-cwe-345-insufficient-verification-o-b1e5b7dc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12080%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Google%20WearOS&amp;severity=medium&amp;id=68ff324b8f87cfec3dea7cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46582-cwe-321-use-of-hard-coded-cryptogra-199079ce</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46582%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ZTE%20ZXMP%20M721&amp;severity=high&amp;id=68ff324b8f87cfec3dea7cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12252-sql-injection-in-code-projects-onli-41edc75d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12252%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff324b8f87cfec3dea7cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12251-cross-site-scripting-in-openwga-d0584e75</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12251%3A%20Cross%20Site%20Scripting%20in%20OpenWGA&amp;severity=medium&amp;id=68ff324b8f87cfec3dea7cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12250-path-traversal-in-openwga-d2dc7eff</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12250%3A%20Path%20Traversal%20in%20OpenWGA&amp;severity=medium&amp;id=68ff324b8f87cfec3dea7cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jettys-addpath-allows-lfi-in-windows-traccar-unaut-81e8d559</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jetty&apos;s%20addPath%20allows%20LFI%20in%20Windows%20-%20Traccar%20Unauthenticated%20LFI%20v5.8-v6.8.1&amp;severity=medium&amp;id=68ff2ec58f87cfec3de3053c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-qilin-attack-methods-exposed-through-mu-acbc9c75</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Qilin%20attack%20methods%20exposed%20through%20multiple%20cases&amp;severity=medium&amp;id=68ff45e5bbaf5d265c82404a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12249-csv-injection-in-axosoft-scrum-and--1f7ac8c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12249%3A%20CSV%20Injection%20in%20Axosoft%20Scrum%20and%20Bug%20Tracking&amp;severity=medium&amp;id=68ff2ce08f87cfec3de104fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12248-sql-injection-in-cltphp-92597427</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12248%3A%20SQL%20Injection%20in%20CLTPHP&amp;severity=medium&amp;id=68ff2ce08f87cfec3de104f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12247-unquoted-search-path-in-hasleo-back-78db9bb1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12247%3A%20Unquoted%20Search%20Path%20in%20Hasleo%20Backup%20Suite&amp;severity=high&amp;id=68ff2ce08f87cfec3de104eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cophish-new-oauth-phishing-technique-abuses-micros-eb55c328</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CoPHish%3A%20New%20OAuth%20phishing%20technique%20abuses%20Microsoft%20Copilot%20Studio%20chatbots%20to%20create%20convincing%20credential%20theft%20campaigns&amp;severity=medium&amp;id=68ff29743fb824cb8ce78a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11682-cwe-79-improper-neutralization-of-i-68c1e2a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Perx%20Technologies%20Customer%20Engagement%20%26%20Loyalty%20Platform&amp;severity=high&amp;id=68ff22703fb824cb8cdada05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12246-cross-site-scripting-in-chatwoot-d3443e3a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12246%3A%20Cross%20Site%20Scripting%20in%20chatwoot&amp;severity=medium&amp;id=68ff24083fb824cb8cde2125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12245-origin-validation-error-in-chatwoot-8578d8cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12245%3A%20Origin%20Validation%20Error%20in%20chatwoot&amp;severity=medium&amp;id=68ff24083fb824cb8cde211f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12244-cross-site-scripting-in-code-projec-6f2c1302</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12244%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20E-Banking%20System&amp;severity=medium&amp;id=68ff24083fb824cb8cde2118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-atlas-browser-can-be-tricked-by-fake-urls--61e7d615</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChatGPT%20Atlas%20Browser%20Can%20Be%20Tricked%20by%20Fake%20URLs%20into%20Executing%20Hidden%20Commands&amp;severity=medium&amp;id=68ff6e72ba6dffc5e2f95f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12243-sql-injection-in-code-projects-clie-6daa66fa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12243%3A%20SQL%20Injection%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff24083fb824cb8cde2139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12242-sql-injection-in-codeastro-gym-mana-8cac826c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12242%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68ff24083fb824cb8cde2132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12241-stack-based-buffer-overflow-in-toto-d045e579</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12241%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff24083fb824cb8cde212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12055-cwe-22-improper-limitation-of-a-pat-c5f9e325</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12055%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MPDV%20Mikrolab%20GmbH%20MIP%202&amp;severity=high&amp;id=68ff17d045f6dd1a506a0db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12240-buffer-overflow-in-totolink-a3300r-4ea3e5be</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12240%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff17d045f6dd1a506a0dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12239-buffer-overflow-in-totolink-a3300r-4faf0f76</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12239%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff17d045f6dd1a506a0dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12238-sql-injection-in-code-projects-auto-865364d0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12238%3A%20SQL%20Injection%20in%20code-projects%20Automated%20Voting%20System&amp;severity=medium&amp;id=68ff17d045f6dd1a506a0db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12237-sql-injection-in-projectworlds-adva-0f230df9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12237%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=68ff1b307e25bac6d3f8f116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12236-buffer-overflow-in-tenda-ch22-8b2ef6be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12236%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12235-buffer-overflow-in-tenda-ch22-25e20edc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12235%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12234-buffer-overflow-in-tenda-ch22-554c77c6</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12234%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12233-buffer-overflow-in-tenda-ch22-0503470d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12233%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12232-buffer-overflow-in-tenda-ch22-c08fd25b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12232%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12231-cross-site-scripting-in-projectworl-f3e2101b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12231%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Expense%20Management%20System&amp;severity=medium&amp;id=68ff0bad4c2556d99606b1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12230-cross-site-scripting-in-projectworl-594ed5bd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12230%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Expense%20Management%20System&amp;severity=medium&amp;id=68ff0bad4c2556d99606b1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11154-cwe-862-missing-authorization-in-id-f208f23b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11154%3A%20CWE-862%20Missing%20Authorization%20in%20IDonate&amp;severity=medium&amp;id=68ff0bad4c2556d99606b1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12229-cross-site-scripting-in-projectworl-cc2ff137</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12229%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Expense%20Management%20System&amp;severity=medium&amp;id=68ff0690748f7c5f7ca8c161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12228-cross-site-scripting-in-projectworl-e50f0a79</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12228%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Expense%20Management%20System&amp;severity=medium&amp;id=68ff0690748f7c5f7ca8c15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12227-cross-site-scripting-in-projectworl-a0b15e5c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12227%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Gate%20Pass%20Management%20System&amp;severity=medium&amp;id=68ff0690748f7c5f7ca8c155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12226-sql-injection-in-sourcecodester-bes-a8427e10</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12226%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=68feff90748f7c5f7c9b0427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12225-stack-based-buffer-overflow-in-tend-0ad87a0b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12225%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=68feff90748f7c5f7c9b0420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12224-cross-site-scripting-in-iqbolshoh-p-a3df1387</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12224%3A%20Cross%20Site%20Scripting%20in%20Iqbolshoh%20php-business-website&amp;severity=medium&amp;id=68ff0129748f7c5f7c9e45bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12223-unrestricted-upload-in-bdtask-fligh-cef5830d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12223%3A%20Unrestricted%20Upload%20in%20Bdtask%20Flight%20Booking%20Software&amp;severity=medium&amp;id=68ff0129748f7c5f7c9e45b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12222-unrestricted-upload-in-bdtask-fligh-42c3e97c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12222%3A%20Unrestricted%20Upload%20in%20Bdtask%20Flight%20Booking%20Software&amp;severity=medium&amp;id=68ff0129748f7c5f7c9e45b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12215-sql-injection-in-projectworlds-onli-847f26c4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12215%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Shopping%20System&amp;severity=medium&amp;id=68fef1ce79a7bb5513bbd8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12214-stack-based-buffer-overflow-in-tend-51b2371e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12214%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68fef1ce79a7bb5513bbd8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12213-stack-based-buffer-overflow-in-tend-5061791d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12213%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68fef1ce79a7bb5513bbd8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/globalcve-opensource-unified-cve-data-from-around--8cb9a2a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlobalCVE%20%E2%80%94%20OpenSource%20Unified%20CVE%20Data%20from%20Around%20the%20World&amp;severity=medium&amp;id=68feec4623a7bbed3251185f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12212-stack-based-buffer-overflow-in-tend-ae4ac0c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12212%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68feefec79a7bb5513b9db66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12211-stack-based-buffer-overflow-in-tend-7637e1c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12211%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68feefec79a7bb5513b9db5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12210-stack-based-buffer-overflow-in-tend-de540c6b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12210%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68fee1ba23a7bbed324e8bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12209-stack-based-buffer-overflow-in-tend-2a5adfe4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12209%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68fee1ba23a7bbed324e8bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12208-sql-injection-in-sourcecodester-bes-0f41bfb4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12208%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=68fee1ba23a7bbed324e8bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12207-null-pointer-dereference-in-kamaili-0be4da41</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12207%3A%20NULL%20Pointer%20Dereference%20in%20Kamailio&amp;severity=medium&amp;id=68fee1ba23a7bbed324e8bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12206-null-pointer-dereference-in-kamaili-c00be081</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12206%3A%20NULL%20Pointer%20Dereference%20in%20Kamailio&amp;severity=medium&amp;id=68fee1ba23a7bbed324e8ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12205-use-after-free-in-kamailio-5b7d0b93</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12205%3A%20Use%20After%20Free%20in%20Kamailio&amp;severity=medium&amp;id=68fee1ba23a7bbed324e8ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48088-cwe-79-improper-neutralization-of-i-6f736b56</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm_Force%20Ultimate%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=68fedab123a7bbed324d60d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58918-cwe-352-cross-site-request-forgery--44b0df49</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58918%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Waituk%20Entrada&amp;severity=medium&amp;id=68fedab123a7bbed324d60d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12204-heap-based-buffer-overflow-in-kamai-6fccc870</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12204%3A%20Heap-based%20Buffer%20Overflow%20in%20Kamailio&amp;severity=medium&amp;id=68fedab123a7bbed324d60d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12203-path-traversal-in-givanz-vvveb-adeae2e5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12203%3A%20Path%20Traversal%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68fedab123a7bbed324d60c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62988-server-side-request-forgery-ssrf-in-226e8d31</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62988%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Codeless%20Slider%20Templates&amp;severity=medium&amp;id=68fed03623a7bbed324accd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62987-improper-neutralization-of-input-du-b9b3e38a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62987%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Builderall%20Builderall%20Builder%20for%20WordPress&amp;severity=medium&amp;id=68fed03623a7bbed324acccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62986-cross-site-request-forgery-csrf-in--1529806b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62986%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FanBridge%20FanBridge%20signup&amp;severity=high&amp;id=68fed03623a7bbed324acccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62985-improper-neutralization-of-input-du-70fe6fdf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62985%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20llamaman%20Simple%20Pull%20Quote&amp;severity=medium&amp;id=68fed03623a7bbed324accc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62984-improper-neutralization-of-input-du-53f6b178</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPeka%20WP%20AdCenter&amp;severity=medium&amp;id=68fed03623a7bbed324accc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62983-improper-neutralization-of-input-du-193b49c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sudar%20Muthu%20Posts%20By%20Tag&amp;severity=medium&amp;id=68fed03623a7bbed324accc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62982-improper-neutralization-of-input-du-535d93eb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sarah%20Giles%20Dynamic%20User%20Directory&amp;severity=medium&amp;id=68fed03623a7bbed324accc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62981-url-redirection-to-untrusted-site-o-13d7833f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62981%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Zoho%20CRM%20and%20Bigin&amp;severity=medium&amp;id=68fed03623a7bbed324accbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62980-missing-authorization-in-mdz-persia-07d61d0f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62980%3A%20Missing%20Authorization%20in%20MDZ%20Persian%20Admnin%20Fonts&amp;severity=medium&amp;id=68fed03623a7bbed324accba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62979-insertion-of-sensitive-information--da9ef522</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62979%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20airesvsg%20ACF%20to%20REST%20API&amp;severity=medium&amp;id=68fed03523a7bbed324accad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62978-missing-authorization-in-kiotviet-k-879d79d3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62978%3A%20Missing%20Authorization%20in%20Kiotviet%20KiotViet%20Sync&amp;severity=medium&amp;id=68fed03523a7bbed324accaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62977-missing-authorization-in-seobing-0b1a43e3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62977%3A%20Missing%20Authorization%20in%20%E7%99%BE%E5%BA%A6%E7%AB%99%E9%95%BFSEO%E5%90%88%E9%9B%86(%E6%94%AF%E6%8C%81%E7%99%BE%E5%BA%A6%2F%E7%A5%9E%E9%A9%AC%2FBing%2F%E5%A4%B4%E6%9D%A1%E6%8E%A8%E9%80%81)&amp;severity=medium&amp;id=68fed03523a7bbed324acca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62976-missing-authorization-in-joovii-sen-e8b84f75</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62976%3A%20Missing%20Authorization%20in%20Joovii%20Sendle%20Shipping&amp;severity=medium&amp;id=68fed03523a7bbed324acca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62974-improper-neutralization-of-input-du-7290b3d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62974%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoSchedule%20Headline%20Analyzer&amp;severity=medium&amp;id=68fed03523a7bbed324acca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62973-missing-authorization-in-themekraft-48a470a2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62973%3A%20Missing%20Authorization%20in%20Themekraft%20BuddyForms&amp;severity=medium&amp;id=68fed03523a7bbed324acc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62972-missing-authorization-in-wpwebinars-4a3db737</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62972%3A%20Missing%20Authorization%20in%20WPWebinarSystem%20WebinarPress&amp;severity=medium&amp;id=68fed03523a7bbed324acc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62971-improper-neutralization-of-input-du-57d7362d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CrestaProject%20Attesa%20Extra&amp;severity=medium&amp;id=68fed03523a7bbed324acc98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62970-missing-authorization-in-spencer-ha-92fa4573</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62970%3A%20Missing%20Authorization%20in%20Spencer%20Haws%20Link%20Whisper%20Free&amp;severity=medium&amp;id=68fed03523a7bbed324acc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62969-improper-neutralization-of-input-du-97a27164</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62969%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20XLPlugins%20NextMove%20Lite&amp;severity=medium&amp;id=68fed03523a7bbed324acc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62968-improper-neutralization-of-input-du-9cf9623d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62968%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sayan%20Datta%20WP%20Last%20Modified%20Info&amp;severity=medium&amp;id=68fed03423a7bbed324acc85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62967-improper-neutralization-of-input-du-bb8a5bc5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62967%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=68fed03423a7bbed324acc82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62966-missing-authorization-in-apiki-goca-07ddd724</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62966%3A%20Missing%20Authorization%20in%20Apiki%20GoCache&amp;severity=medium&amp;id=68fed03423a7bbed324acc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62965-missing-authorization-in-wpseek-adm-e1312e80</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62965%3A%20Missing%20Authorization%20in%20wpseek%20Admin%20Management%20Xtended&amp;severity=medium&amp;id=68fed03423a7bbed324acc7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62964-missing-authorization-in-realmag777-931fcbf3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62964%3A%20Missing%20Authorization%20in%20RealMag777%20MDTF&amp;severity=medium&amp;id=68fed03423a7bbed324acc79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62962-cross-site-request-forgery-csrf-in--5d506231</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62962%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Andrea%20Landonio%20CloudSearch&amp;severity=high&amp;id=68fed03423a7bbed324acc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62959-improper-control-of-generation-of-c-b2066890</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62959%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20videowhisper%20Paid%20Videochat%20Turnkey%20Site&amp;severity=critical&amp;id=68fed03423a7bbed324acc73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62958-cross-site-request-forgery-csrf-in--68e56aa6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62958%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Clifton%20Griffin%20Simple%20Content%20Templates%20for%20Blog%20Posts%20%26%20Pages&amp;severity=medium&amp;id=68fed03423a7bbed324acc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62957-cross-site-request-forgery-csrf-in--5d4d9729</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62957%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NikanWP%20NikanWP%20WooCommerce%20Reporting&amp;severity=high&amp;id=68fed03423a7bbed324acc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62956-cross-site-request-forgery-csrf-in--1f76cfe1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62956%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20iseremet%20Reloadly&amp;severity=high&amp;id=68fed03423a7bbed324acc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62954-missing-authorization-in-codeinwp-r-e36df88c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62954%3A%20Missing%20Authorization%20in%20rsocial%20Revive%20Old%20Posts&amp;severity=medium&amp;id=68fed03323a7bbed324acc5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62953-missing-authorization-in-nanbu-welc-73c5015c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62953%3A%20Missing%20Authorization%20in%20info%40welcart%20Welcart%20e-Commerce&amp;severity=medium&amp;id=68fed03323a7bbed324acc5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62952-missing-authorization-in-quantumclo-4988b1d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62952%3A%20Missing%20Authorization%20in%20QuantumCloud%20ChatBot&amp;severity=medium&amp;id=68fed03323a7bbed324acc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62951-improper-neutralization-of-input-du-d74555f6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icc0rz%20H5P&amp;severity=medium&amp;id=68fed03323a7bbed324acc54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62949-improper-neutralization-of-input-du-a5fa908b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddyDev%20Activity%20Plus%20Reloaded%20for%20BuddyPress&amp;severity=medium&amp;id=68fed03323a7bbed324acc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62948-improper-neutralization-of-input-du-89f557ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62948%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Konstantin%20Pankratov%20Date%20counter&amp;severity=medium&amp;id=68fed03323a7bbed324acc4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62946-missing-authorization-in-everestthe-34eb943f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62946%3A%20Missing%20Authorization%20in%20everestthemes%20Everest%20Backup&amp;severity=medium&amp;id=68fed03323a7bbed324acc4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62945-cross-site-request-forgery-csrf-in--6385d974</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62945%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eduard%20Pinuaga%20Linares%20Did%20Prestashop%20Display&amp;severity=high&amp;id=68fed03323a7bbed324acc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62944-missing-authorization-in-mark-odonn-d56cf597</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62944%3A%20Missing%20Authorization%20in%20Mark%20O&apos;Donnell%20MSTW%20CSV%20EXPORTER&amp;severity=medium&amp;id=68fed03323a7bbed324acc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62943-improper-neutralization-of-input-du-c5b80cc5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matt%20McInvale%20Next%20Page%2C%20Not%20Next%20Post&amp;severity=medium&amp;id=68fed03323a7bbed324acc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62942-improper-neutralization-of-input-du-41b9e7bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62942%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tempranova%20WP%20Mapbox%20GL%20JS%20Maps&amp;severity=medium&amp;id=68fed03223a7bbed324acc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62941-improper-neutralization-of-input-du-d2fbfba9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62941%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dFactory%20Events%20Maker%20by%20dFactory&amp;severity=medium&amp;id=68fed03223a7bbed324acc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62940-improper-neutralization-of-input-du-d82e2e00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62940%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nick%20Diego%20Blox%20Lite&amp;severity=medium&amp;id=68fed03223a7bbed324acc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62939-improper-neutralization-of-input-du-9f959e70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Open%20Currency%20Converter&amp;severity=medium&amp;id=68fed03223a7bbed324acc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62938-missing-authorization-in-reoon-tech-7aa417c7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62938%3A%20Missing%20Authorization%20in%20Reoon%20Technology%20Reoon%20Email%20Verifier&amp;severity=medium&amp;id=68fed03223a7bbed324acc11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62937-improper-neutralization-of-input-du-523b0769</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62937%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Johnny%20Post%20List%20Featured%20Image&amp;severity=medium&amp;id=68fed03223a7bbed324acc0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62936-improper-neutralization-of-script-r-708e9c45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62936%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Jthemes%20xSmart&amp;severity=medium&amp;id=68fed03223a7bbed324acc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62935-missing-authorization-in-ilmosys-op-891870f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62935%3A%20Missing%20Authorization%20in%20StackWC%20Open%20Close%20WooCommerce%20Store&amp;severity=medium&amp;id=68fed03223a7bbed324acc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62934-cross-site-request-forgery-csrf-in--ca610a8d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62934%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mejar%20WP%20Business%20Hours&amp;severity=high&amp;id=68fed03223a7bbed324acc05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62933-cross-site-request-forgery-csrf-in--df61abb7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62933%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Prakash%20Awesome%20Testimonials&amp;severity=high&amp;id=68fed03223a7bbed324acc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62932-missing-authorization-in-wprio-tabl-0c184cd0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62932%3A%20Missing%20Authorization%20in%20wprio%20Table%20Block%20by%20RioVizual&amp;severity=medium&amp;id=68fed03123a7bbed324acbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62931-missing-authorization-in-microsofts-674d8242</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62931%3A%20Missing%20Authorization%20in%20microsoftstart%20MSN%20Partner%20Hub&amp;severity=medium&amp;id=68fed03123a7bbed324acbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62930-improper-neutralization-of-input-du-69983315</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RomanCode%20MapSVG&amp;severity=medium&amp;id=68fed03123a7bbed324acbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62929-missing-authorization-in-pickplugin-92795d43</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62929%3A%20Missing%20Authorization%20in%20PickPlugins%20Testimonial%20Slider&amp;severity=medium&amp;id=68fed03123a7bbed324acbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62928-missing-authorization-in-joby-josep-52246db1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62928%3A%20Missing%20Authorization%20in%20Joby%20Joseph%20SEO%20Meta%20Description%20Updater&amp;severity=medium&amp;id=68fed03123a7bbed324acbe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62927-missing-authorization-in-nelio-soft-9e959958</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62927%3A%20Missing%20Authorization%20in%20Nelio%20Software%20Nelio%20Content&amp;severity=medium&amp;id=68fed03123a7bbed324acbe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62925-missing-authorization-in-conversios-37e991b4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62925%3A%20Missing%20Authorization%20in%20Conversios%20Conversios.io&amp;severity=medium&amp;id=68fed03123a7bbed324acbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62924-missing-authorization-in-pickplugin-8b4ac23d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62924%3A%20Missing%20Authorization%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=medium&amp;id=68fed03123a7bbed324acbe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62923-improper-neutralization-of-input-du-b2bf3591</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Debuggers%20Studio%20Marquee%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68fed03123a7bbed324acbdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62922-missing-authorization-in-shambhu-pa-f2312bb5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62922%3A%20Missing%20Authorization%20in%20Shambhu%20Patnaik%20Export%20Categories&amp;severity=medium&amp;id=68fed03123a7bbed324acbda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62921-improper-neutralization-of-input-du-7be0151a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62921%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pagup%20Bulk%20Auto%20Image%20Title%20Attribute&amp;severity=medium&amp;id=68fed03023a7bbed324acbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62920-improper-neutralization-of-input-du-b71097ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webnique%20USERCENTRICS%20CMP&amp;severity=medium&amp;id=68fed03023a7bbed324acbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62919-missing-authorization-in-themeshopy-88384875</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62919%3A%20Missing%20Authorization%20in%20themeshopy%20TS%20Demo%20Importer&amp;severity=medium&amp;id=68fed03023a7bbed324acbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62918-missing-authorization-in-ignitionwp-09d3c763</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62918%3A%20Missing%20Authorization%20in%20ignitionwp%20IgnitionDeck&amp;severity=medium&amp;id=68fed03023a7bbed324acbc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62917-improper-neutralization-of-input-du-da5b5635</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jamel.Z%20Tooltipy&amp;severity=medium&amp;id=68fed03023a7bbed324acbc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62916-missing-authorization-in-adivaha-fl-0e6630ad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62916%3A%20Missing%20Authorization%20in%20Travon%20WP%20Flights%20%26%20Hotels%20Booking%20WP%20Plugin&amp;severity=medium&amp;id=68fed03023a7bbed324acbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62915-missing-authorization-in-clicksend--24b98750</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62915%3A%20Missing%20Authorization%20in%20clicksend%20SMS%20Contact%20Form%207%20Notifications%20by%20ClickSend&amp;severity=medium&amp;id=68fed03023a7bbed324acbbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62913-improper-neutralization-of-input-du-2153671a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62913%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpopal%20Opal%20Service&amp;severity=medium&amp;id=68fed03023a7bbed324acbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62912-improper-neutralization-of-input-du-185b3c1b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SiteGround%20SiteGround%20Email%20Marketing&amp;severity=medium&amp;id=68fed03023a7bbed324acbb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62911-improper-neutralization-of-input-du-2921bf02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rock%20Content%20Rock%20Convert&amp;severity=medium&amp;id=68fed03023a7bbed324acbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62910-improper-neutralization-of-input-du-006fc555</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62910%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deshine%20Video%20Gallery%20by%20Huzzaz&amp;severity=medium&amp;id=68fed02f23a7bbed324acb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62909-missing-authorization-in-mrityunjay-efab0dba</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62909%3A%20Missing%20Authorization%20in%20mrityunjay%20Smart%20WeTransfer&amp;severity=medium&amp;id=68fed02f23a7bbed324acb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62908-missing-authorization-in-gerritvana-d1652fc4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62908&amp;severity=critical&amp;id=68fed02f23a7bbed324acb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62907-improper-neutralization-of-input-du-f7f1dd72</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62907%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aviplugins.com%20Custom%20Post%20Type%20Attachment&amp;severity=medium&amp;id=68fed02f23a7bbed324acb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62906-missing-authorization-in-epiphanyit-fb25270c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62906%3A%20Missing%20Authorization%20in%20epiphanyit321%20Referral%20Link%20Tracker&amp;severity=medium&amp;id=68fed02f23a7bbed324acb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62905-improper-neutralization-of-input-du-ba75d48f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Justin%20Tadlock%20Query%20Posts&amp;severity=medium&amp;id=68fed02f23a7bbed324acb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62904-improper-neutralization-of-input-du-7deb6a2b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ben%20Huson%20WP%20Geo&amp;severity=medium&amp;id=68fed02f23a7bbed324acb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62903-improper-neutralization-of-input-du-7441aced</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPClever%20WPC%20Smart%20Messages%20for%20WooCommerce&amp;severity=medium&amp;id=68fed02f23a7bbed324acb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62902-exposure-of-sensitive-system-inform-5dd31129</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62902%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ThemeHunk%20WP%20Popup%20Builder&amp;severity=medium&amp;id=68fed02f23a7bbed324acb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62900-improper-neutralization-of-input-du-e5722c87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62900%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WeblineIndia%20Popular%20Posts%20by%20Webline&amp;severity=medium&amp;id=68fed02f23a7bbed324acb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62899-improper-neutralization-of-input-du-117341c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62899%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20THRIVE%20-%20Web%20Design%20Gold%20Coast%20Photospace%20Responsive&amp;severity=medium&amp;id=68fed02e23a7bbed324acb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62898-improper-neutralization-of-input-du-cd2b0734</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maarten%20Links%20shortcode&amp;severity=medium&amp;id=68fed02e23a7bbed324acb58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62897-improper-neutralization-of-script-r-ec0a36e9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62897%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Brecht%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=68fed02e23a7bbed324acb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62896-cross-site-request-forgery-csrf-in--b63f7d12</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62896%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digitaldonkey%20Multilang%20Contact%20Form&amp;severity=high&amp;id=68fed02e23a7bbed324acb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62895-insertion-of-sensitive-information--f6305b7e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62895%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=68fed02e23a7bbed324acb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62894-improper-neutralization-of-input-du-3e06604e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62894%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magicoders%20ACF%20Recent%20Posts%20Widget&amp;severity=medium&amp;id=68fed02e23a7bbed324acb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62893-authorization-bypass-through-user-c-f237aa6a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62893&amp;severity=null&amp;id=68fed02e23a7bbed324acb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62892-missing-authorization-in-sunshineph-50a5c653</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62892%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=medium&amp;id=68fed02e23a7bbed324acb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62891-cross-site-request-forgery-csrf-in--09d9573c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62891%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jory%20Hogeveen%20Off-Canvas%20Sidebars%20%26%20Menus%20(Slidebars)&amp;severity=medium&amp;id=68fed02e23a7bbed324acb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62890-cross-site-request-forgery-csrf-in--ff9b2620</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62890%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Premmerce%20Premmerce%20Brands%20for%20WooCommerce&amp;severity=medium&amp;id=68fed02e23a7bbed324acb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62889-missing-authorization-in-kingaddons-61ca6730</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62889%3A%20Missing%20Authorization%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68fed02d23a7bbed324acb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62887-improper-neutralization-of-input-du-c9ca9ba1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68fed02d23a7bbed324acb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62886-cross-site-request-forgery-csrf-in--76abdd10</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62886%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpdevart%20Pricing%20Table%20builder&amp;severity=high&amp;id=68fed02d23a7bbed324acb2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62885-improper-neutralization-of-input-du-14795a70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62885%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RexTheme%20WP%20VR&amp;severity=medium&amp;id=68fed02d23a7bbed324acb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62884-missing-authorization-in-elliot-sow-2edd4f3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62884%3A%20Missing%20Authorization%20in%20Elliot%20Sowersby%20%2F%20RelyWP%20Coupon%20Affiliates&amp;severity=medium&amp;id=68fed02d23a7bbed324acb27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62883-missing-authorization-in-premmerce--35cbc8e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62883%3A%20Missing%20Authorization%20in%20Premmerce%20Premmerce%20User%20Roles&amp;severity=medium&amp;id=68fed02d23a7bbed324acb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62882-missing-authorization-in-craig-hewi-633bd11e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62882%3A%20Missing%20Authorization%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=68fed02d23a7bbed324acb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62881-missing-authorization-in-wp-lab-wp--05b88413</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62881%3A%20Missing%20Authorization%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20eBay&amp;severity=medium&amp;id=68fed02d23a7bbed324acb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12202-cross-site-request-forgery-in-ajayr-76beddd0</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12202%3A%20Cross-Site%20Request%20Forgery%20in%20ajayrandhawa%20User-Management-PHP-MYSQL%20web&amp;severity=medium&amp;id=68fed02d23a7bbed324acb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12201-unrestricted-upload-in-ajayrandhawa-fe14b4fc</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12201%3A%20Unrestricted%20Upload%20in%20ajayrandhawa%20User-Management-PHP-MYSQL&amp;severity=medium&amp;id=68fed02d23a7bbed324acb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12200-null-pointer-dereference-in-dnsmasq-db79851f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12200&amp;severity=null&amp;id=68fec91d23a7bbed324576ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12199-null-pointer-dereference-in-dnsmasq-70b08edf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12199&amp;severity=null&amp;id=68fec91d23a7bbed324576a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12198-heap-based-buffer-overflow-in-dnsma-c0eb5f5f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12198&amp;severity=null&amp;id=68fec91d23a7bbed3245769f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-27-9162ce75</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-27&amp;severity=medium&amp;id=69000944ba6dffc5e21a945f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61102-na-7fb5356f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61102%3A%20n%2Fa&amp;severity=high&amp;id=68ffd110ba6dffc5e20b749d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61105-na-8cfdf762</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61105%3A%20n%2Fa&amp;severity=high&amp;id=68ffca08ba6dffc5e20a0007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61101-na-0484b4c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61101%3A%20n%2Fa&amp;severity=high&amp;id=68ffca08ba6dffc5e20a0001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61100-na-270345a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61100%3A%20n%2Fa&amp;severity=high&amp;id=68ffc300ba6dffc5e2087c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61099-na-1e69e751</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61099%3A%20n%2Fa&amp;severity=high&amp;id=68ffbf81ba6dffc5e207e33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60983-na-4c14f908</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60983%3A%20n%2Fa&amp;severity=medium&amp;id=68ffb16eba6dffc5e205a2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60982-na-aaa241ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60982%3A%20n%2Fa&amp;severity=medium&amp;id=68ffb16eba6dffc5e205a2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54965-na-daeb9b57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54965%3A%20n%2Fa&amp;severity=medium&amp;id=68ffadeaba6dffc5e2050680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61385-na-0df91256</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61385%3A%20n%2Fa&amp;severity=critical&amp;id=68ffadeaba6dffc5e2050679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54970-na-4d42913e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54970%3A%20n%2Fa&amp;severity=medium&amp;id=68ffa364ba6dffc5e202ccfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27225-na-fe629335</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27225%3A%20n%2Fa&amp;severity=high&amp;id=68ffa364ba6dffc5e202ccf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27224-na-260f14b7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27224%3A%20n%2Fa&amp;severity=critical&amp;id=68ffa364ba6dffc5e202ccf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54969-na-0c722094</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54969%3A%20n%2Fa&amp;severity=medium&amp;id=68ffa364ba6dffc5e202ccdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54968-na-d2356e8e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54968%3A%20n%2Fa&amp;severity=high&amp;id=68ffa364ba6dffc5e202ccd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54967-na-42db0a14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54967%3A%20n%2Fa&amp;severity=medium&amp;id=68ff9fd9ba6dffc5e20240f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27223-na-f88eb5e7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27223%3A%20n%2Fa&amp;severity=high&amp;id=68ff9fd9ba6dffc5e20240ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27222-na-813b04ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27222%3A%20n%2Fa&amp;severity=high&amp;id=68ff9fd9ba6dffc5e20240e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60791-na-76de6d51</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60791%3A%20n%2Fa&amp;severity=medium&amp;id=68ff98e5ba6dffc5e2013511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49440-na-ff1b4d4d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49440%3A%20n%2Fa&amp;severity=high&amp;id=68ff954cba6dffc5e200a747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60424-na-913192f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60424%3A%20n%2Fa&amp;severity=high&amp;id=68ff91d3ba6dffc5e2000d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37749-na-bc27e7fb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37749%3A%20n%2Fa&amp;severity=medium&amp;id=68ff91d3ba6dffc5e2000d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60425-na-a1b8ac54</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60425%3A%20n%2Fa&amp;severity=high&amp;id=68ff91d3ba6dffc5e2000d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61247-na-e79795af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61247%3A%20n%2Fa&amp;severity=high&amp;id=68ff8e44ba6dffc5e2ff0b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61482-na-a50536cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61482%3A%20n%2Fa&amp;severity=high&amp;id=68ff83b8ba6dffc5e2fcfce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52268-na-e33c3e97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52268%3A%20n%2Fa&amp;severity=high&amp;id=68ff8033ba6dffc5e2fca3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52264-na-647a03d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52264%3A%20n%2Fa&amp;severity=high&amp;id=68ff8033ba6dffc5e2fca3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61481-na-31ea4533</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61481%3A%20n%2Fa&amp;severity=critical&amp;id=68ff7cafba6dffc5e2fbe7a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52263-na-8292bdcc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52263%3A%20n%2Fa&amp;severity=high&amp;id=68ff7cafba6dffc5e2fbe79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60291-na-b2c9e1dd</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60291%3A%20n%2Fa&amp;severity=critical&amp;id=68ff75d1ba6dffc5e2fab9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/safepay-ransomware-group-claims-the-hack-of-profes-d3862f29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Safepay%20ransomware%20group%20claims%20the%20hack%20of%20professional%20video%20surveillance%20provider%20Xortec&amp;severity=medium&amp;id=68fe8eeba0e43e902b0ef7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-says-it-stole-15-million-dublin-c2392495</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Says%20It%20Stole%201.5%20Million%20Dublin%20Airport%20Passenger%20Records%20and%2018%2C000%20Air%20Arabia%20Employee%20Data&amp;severity=medium&amp;id=68fe78b79c27a1610cf281d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12285-cwe-20-improper-input-validation-in-af8754dd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12285%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fe4e4702add13148482e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12284-cwe-20-improper-input-validation-in-f1e51e1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12284%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68fe4e4702add13148482e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12275-cwe-20-improper-input-validation-in-0ba39d72</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12275%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fe513db833b4e939da9c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12278-cwe-20-improper-input-validation-in-e19329d3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12278%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68fe513db833b4e939da9c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tesla-fsd-shows-ai-getting-worse-over-time-5f1b99d5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tesla%20FSD%20Shows%20AI%20Getting%20Worse%20Over%20Time&amp;severity=medium&amp;id=68fe31493279c2433b74b8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-edr-redir-to-break-edr-via-bind-link-and-clo-edc3879b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20EDR-Redir%20To%20Break%20EDR%20Via%20Bind%20Link%20and%20Cloud%20Filter&amp;severity=medium&amp;id=68fe2c5fcf01b13a1864bb87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-in-plain-sight-how-we-followed-one-maliciou-70ab338d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20in%20Plain%20Sight%3A%20How%20we%20followed%20one%20malicious%20extension%20to%20uncover%20a%20multi-extension%E2%80%A6&amp;severity=high&amp;id=68fe12e4925c27e1cd3c6402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-the-world-poker-tour-inside-clubwpt-golds--2ed4ccc7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20the%20World%20Poker%20Tour%3A%20Inside%20ClubWPT%20Gold%E2%80%99s%20Back%20Office&amp;severity=medium&amp;id=68fe0a673c975fd57d80eee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8709-cwe-89-improper-neutralization-of-sp-b531fe8b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8709%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20langchain-ai%20langchain-ai%2Flangchain&amp;severity=high&amp;id=68fdb65d9f5d064e8728d1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-26-0c569d29</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-26&amp;severity=medium&amp;id=68feb97f1b250a83dcfad996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-cophish-attack-steals-oauth-tokens-via-copilot-266ec823</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20CoPhish%20attack%20steals%20OAuth%20tokens%20via%20Copilot%20Studio%20agents&amp;severity=high&amp;id=68fd35f5bfa5fb493c427170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-rosselkhoznadzor-hit-by-ddos-attack-food-s-01253072</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Rosselkhoznadzor%20hit%20by%20DDoS%20attack%2C%20food%20shipments%20across%20Russia%20delayed&amp;severity=medium&amp;id=68fd35f5bfa5fb493c427174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55757-cwe-79-improper-neutralization-of-i-97286c4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20virtuemart.net%20Virtuemart%20component%20for%20Joomla&amp;severity=medium&amp;id=68fd19d5bfa5fb493c3f08d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12221-cwe-16-common-vulnerabilities-in-so-2dedc981</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12221%3A%20CWE-16%3A%20Common%20Vulnerabilities%20in%20Software%20Configuration%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=low&amp;id=68fcf6aebfa5fb493c3aeb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12220-cwe-1395-dependency-on-vulnerable-t-3f7348e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12220%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fcf32abfa5fb493c3aa01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12219-cwe-1395-dependency-on-vulnerable-t-f587a9f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12219%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fcf32abfa5fb493c3aa01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12218-cwe-1392-use-of-default-credentials-f5630d65</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12218%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fcf32abfa5fb493c3aa018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12217-cwe-1392-use-of-default-credentials-ea5afb06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12217%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68fd989f05a4076d11f4e3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12216-cwe-1301-insufficient-or-incomplete-6985dd77</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12216%3A%20CWE-1301%3A%20Insufficient%20or%20Incomplete%20Data%20Removal%20within%20Hardware%20Component%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fcefa6bfa5fb493c39fa3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11897-cwe-79-improper-neutralization-of-i-52720fe1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dream-Theme%20The7%20%E2%80%94%20Website%20and%20eCommerce%20Builder%20for%20WordPress&amp;severity=medium&amp;id=68fcc57ebfa5fb493c33d06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1m-whatsapp-hack-flops-only-low-risk-bugs-disclose-73328d5a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%241M%20WhatsApp%20Hack%20Flops%3A%20Only%20Low-Risk%20Bugs%20Disclosed%20to%20Meta%20After%20Pwn2Own%20Withdrawal&amp;severity=low&amp;id=68fcb763bfa5fb493c32522f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-atlas-omnibox-is-vulnerable-to-jailbreaks-61c0f4ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Atlas%20Omnibox%20Is%20Vulnerable%20to%20Jailbreaks&amp;severity=medium&amp;id=68fcb764bfa5fb493c32523b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11875-cwe-79-improper-neutralization-of-i-f6d599a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dr-thomas-fuessl%20SpendeOnline.org&amp;severity=medium&amp;id=68fc745855d697d32d439075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11976-cwe-352-cross-site-request-forgery--b0264535</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11976%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fusewp%20FuseWP%20%E2%80%93%20WordPress%20User%20Sync%20to%20Email%20List%20%26%20Marketing%20Automation%20(Mailchimp%2C%20Constant%20Contact%2C%20ActiveCampaign%20etc.)&amp;severity=medium&amp;id=68fc745955d697d32d439083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8416-cwe-89-improper-neutralization-of-sp-840bd934</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8416%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20woobewoo%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=high&amp;id=68fc745a55d697d32d4390d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4203-cwe-89-improper-neutralization-of-sp-fb9d1208</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4203%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=68fc745955d697d32d43908c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10637-cwe-862-missing-authorization-in-qu-f2e2efbb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10637%3A%20CWE-862%20Missing%20Authorization%20in%20quadlayers%20Social%20Feed%20Gallery&amp;severity=medium&amp;id=68fc745855d697d32d438ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8483-cwe-94-improper-control-of-generatio-6d94034a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8483%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20marketingfire%20Discussion%20Board%20%E2%80%93%20WordPress%20Forum%20Plugin&amp;severity=medium&amp;id=68fc745a55d697d32d4390d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9322-cwe-89-improper-neutralization-of-sp-0fd782d2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9322%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeisle%20Stripe%20Payment%20Forms%20by%20WP%20Full%20Pay%20%E2%80%93%20Accept%20Credit%20Card%20Payments%2C%20Donations%20%26%20Subscriptions&amp;severity=high&amp;id=68fc745a55d697d32d4390da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10580-cwe-79-improper-neutralization-of-i-11e041b5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10580%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marketingfire%20Widget%20Options%20%E2%80%93%20Advanced%20Conditional%20Visibility%20for%20Gutenberg%20Blocks%20%26%20Classic%20Widgets&amp;severity=medium&amp;id=68fc745855d697d32d438fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11255-cwe-862-missing-authorization-in-cy-28be2aa6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11255%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20Password%20Policy%20Manager%20%7C%20Password%20Manager&amp;severity=medium&amp;id=68fc745855d697d32d43906a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11497-cwe-20-improper-input-validation-in-72988d71</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11497%3A%20CWE-20%20Improper%20Input%20Validation%20in%20symptote%20Advanced%20Database%20Cleaner%20%E2%80%93%20Optimize%20%26%20Clean%20Database%20to%20Speed%20Up%20Site%20Performance&amp;severity=medium&amp;id=68fc745855d697d32d439071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11893-cwe-89-improper-neutralization-of-s-98fbf1d7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11893%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smub%20Charitable%20%E2%80%93%20Donation%20Plugin%20for%20WordPress%20%E2%80%93%20Fundraising%20with%20Recurring%20Donations%20%26%20More&amp;severity=medium&amp;id=68fc745955d697d32d43907b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10488-cwe-22-improper-limitation-of-a-pat-0c7a580c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10488%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpwax%20Directorist%3A%20AI-Powered%20Business%20Directory%2C%20Listings%20%26%20Classified%20Ads&amp;severity=high&amp;id=68fc745855d697d32d438f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12034-cwe-79-improper-neutralization-of-i-c7d3e1ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12034%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alignak%20Fast%20Velocity%20Minify&amp;severity=medium&amp;id=68fc745955d697d32d439087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12095-cwe-352-cross-site-request-forgery--b5a03db9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12095%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20astoundify%20Simple%20Registration%20for%20WooCommerce&amp;severity=high&amp;id=68fc626907185a1a52fd761c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12005-cwe-285-improper-authorization-in-r-8dcfa872</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12005%3A%20CWE-285%20Improper%20Authorization%20in%20rextheme%20WP%20VR%20%E2%80%93%20360%20Panorama%20and%20Free%20Virtual%20Tour%20Builder%20For%20WordPress&amp;severity=medium&amp;id=68fc626907185a1a52fd7617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10694-cwe-862-missing-authorization-in-sm-e50a62b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10694%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20UserFeedback%20%E2%80%93%20Create%20Interactive%20Feedback%20Form%2C%20User%20Surveys%2C%20and%20Polls%20in%20Seconds&amp;severity=medium&amp;id=68fc626907185a1a52fd75f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6639-cwe-285-improper-authorization-in-th-9d4511a2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6639%3A%20CWE-285%20Improper%20Authorization%20in%20themeum%20Tutor%20LMS%20Pro&amp;severity=medium&amp;id=68fc626a07185a1a52fd762b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11888-cwe-863-incorrect-authorization-in--a116156d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11888%3A%20CWE-863%20Incorrect%20Authorization%20in%20roxnor%20ShopEngine%20Elementor%20WooCommerce%20Builder%20Addon%20%E2%80%93%20All%20in%20One%20WooCommerce%20Solution&amp;severity=low&amp;id=68fc626907185a1a52fd7613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10737-cwe-79-improper-neutralization-of-i-0687ab32</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StudioPress%20Open%20Source%20Genesis%20Framework&amp;severity=medium&amp;id=68fc626907185a1a52fd75f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11879-cwe-285-improper-authorization-in-e-cf841b43</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11879%3A%20CWE-285%20Improper%20Authorization%20in%20edge22%20GenerateBlocks&amp;severity=medium&amp;id=68fc626907185a1a52fd760d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8588-cwe-79-improper-neutralization-of-in-0235a16e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20publishpress%20PublishPress%20Blocks%20%E2%80%93%20Block%20Controls%2C%20Block%20Visibility%2C%20Block%20Permissions&amp;severity=medium&amp;id=68fc626a07185a1a52fd7637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11244-cwe-285-improper-authorization-in-s-c5141c55</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11244%3A%20CWE-285%20Improper%20Authorization%20in%20saadiqbal%20Password%20Protected%20%E2%80%94%20Lock%20Entire%20Site%2C%20Pages%2C%20Posts%2C%20Categories%2C%20and%20Partial%20Content&amp;severity=low&amp;id=68fc626907185a1a52fd75ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11564-cwe-862-missing-authorization-in-th-01782b6a</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11564%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=68fc626907185a1a52fd7609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8666-cwe-79-improper-neutralization-of-in-90bfa779</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uapp%20Testimonial%20Carousel%20For%20Elementor&amp;severity=medium&amp;id=68fc626a07185a1a52fd763c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6680-cwe-284-improper-access-control-in-t-3f659073</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6680%3A%20CWE-284%20Improper%20Access%20Control%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=68fc626a07185a1a52fd762f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8413-cwe-79-improper-neutralization-of-in-3712ba28</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8413%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20Listeo%20-%20Directory%20%26%20Listings%20With%20Booking%20-%20WordPress%20Theme&amp;severity=medium&amp;id=68fc626a07185a1a52fd7633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11238-cwe-79-improper-neutralization-of-i-57d0e0aa</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasunsen%20Watu%20Quiz&amp;severity=high&amp;id=68fc626907185a1a52fd75fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11269-cwe-862-missing-authorization-in-wo-f9799e7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11269%3A%20CWE-862%20Missing%20Authorization%20in%20woobewoo%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=medium&amp;id=68fc626907185a1a52fd7604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11823-cwe-80-improper-neutralization-of-s-17fa3174</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11823%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=medium&amp;id=68fc525a9a6ac51d5490d294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10579-cwe-862-missing-authorization-in-wp-180bfe17</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10579%3A%20CWE-862%20Missing%20Authorization%20in%20wp_media%20BackWPup%20%E2%80%93%20WordPress%20Backup%20%26%20Restore%20Plugin&amp;severity=medium&amp;id=68fc525a9a6ac51d5490d28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11760-cwe-200-exposure-of-sensitive-infor-101447ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11760%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20digitalmeactivecampaign%20eRoom%20%E2%80%93%20Webinar%20%26%20Meeting%20Plugin%20for%20Zoom%2C%20Google%20Meet%2C%20Microsoft%20Teams&amp;severity=medium&amp;id=68fc33f2f816635dda09c014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-25-12ce565f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-25&amp;severity=medium&amp;id=68fd6728bfa5fb493c4932b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34503-cwe-347-improper-verification-of-cr-7f1518f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34503%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Light%20%26%20Wonder%2C%20Inc.%20%2F%20SHFL%20Entertainment%2C%20Inc.%20%2F%20Shuffle%20Master%2C%20Inc.%20Deck%20Mate%201&amp;severity=high&amp;id=68fc09d0f816635ddaf339e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34502-cwe-1326-missing-immutable-root-of--fe950508</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34502%3A%20CWE-1326%20Missing%20Immutable%20Root%20of%20Trust%20in%20Hardware%20in%20Light%20%26%20Wonder%2C%20Inc.%20%2F%20SHFL%20Entertainment%2C%20Inc.%20%2F%20Shuffle%20Master%2C%20Inc.%20Deck%20Mate%202&amp;severity=high&amp;id=68fc09d0f816635ddaf339e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34500-cwe-321-use-of-hard-coded-cryptogra-6cec96a2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34500%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Light%20%26%20Wonder%2C%20Inc.%20%2F%20SHFL%20Entertainment%2C%20Inc.%20%2F%20Shuffle%20Master%2C%20Inc.%20Deck%20Mate%202&amp;severity=high&amp;id=68fc063ff816635ddaf2f2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12194-cwe-400-uncontrolled-resource-consu-3223442c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12194%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20Bouncy%20Castle%20for%20Java%20FIPS&amp;severity=medium&amp;id=68fc063ff816635ddaf2f2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62711-cwe-755-improper-handling-of-except-11d9b6e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62711%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=68fbf839f816635ddaf181e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4106-cwe-489-active-debug-code-in-watchgu-8e14f689</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4106%3A%20CWE-489%20Active%20Debug%20Code%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=68fbf126f816635ddaf05ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34293-cwe-639-authorization-bypass-throug-dbe8ff0f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34293%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Naviga%20Global%20%2F%20Miles%2033%20GN4%20Publishing%20System&amp;severity=high&amp;id=68fbedaaf816635ddaeff541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62723-cwe-772-missing-release-of-resource-288663a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62723%3A%20CWE-772%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20halfgaar%20FlashMQ&amp;severity=medium&amp;id=68fbe316f816635ddaee62b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pentesting-nextjs-server-actions-a1fcb3bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pentesting%20Next.js%20Server%20Actions&amp;severity=high&amp;id=68fbdf97f816635ddaedfc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62716-cwe-79-improper-neutralization-of-i-5000e19c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62716%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20makeplane%20plane&amp;severity=high&amp;id=68fbdf95f816635ddaedfbd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smishing-triad-linked-to-194000-malicious-domains--abea59af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Smishing%20Triad%20Linked%20to%20194%2C000%20Malicious%20Domains%20in%20Global%20Phishing%20Operation&amp;severity=high&amp;id=68fbdc0df816635ddaed99d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-launch-mass-attacks-exploiting-outdated-wo-c24bd372</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20launch%20mass%20attacks%20exploiting%20outdated%20WordPress%20plugins&amp;severity=high&amp;id=68fbdc0df816635ddaed99cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-issues-emergency-patch-for-critical-wind-34dc1837</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Issues%20Emergency%20Patch%20for%20Critical%20Windows%20Server%20Bug&amp;severity=critical&amp;id=68fc64e207185a1a52fe2bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mozilla-new-firefox-extensions-must-disclose-data--ff0e13a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mozilla%3A%20New%20Firefox%20extensions%20must%20disclose%20data%20collection%20practices&amp;severity=high&amp;id=68fbbc69f816635ddae90c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt36-targets-indian-government-with-golang-based--10fe43ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT36%20Targets%20Indian%20Government%20with%20Golang-Based%20DeskRAT%20Malware%20Campaign&amp;severity=high&amp;id=68fbbc69f816635ddae90c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-lastpass-death-claims-used-to-breach-password-22480ce0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20LastPass%20death%20claims%20used%20to%20breach%20password%20vaults&amp;severity=high&amp;id=68fbbc69f816635ddae90c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-cisa-layoffs-weaken-civilian-cyber-defense-41ef79dc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20CISA%20Layoffs%20Weaken%20Civilian%20Cyber%20Defense&amp;severity=medium&amp;id=68fc64e207185a1a52fe2bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-claims-att-careers-breach-with--473f02c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Claims%20AT%26T%20Careers%20Breach%20with%20576%2C000%20Records&amp;severity=high&amp;id=68fbb8eff816635ddae567da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-issues-emergency-patch-for-actively-expl-5cb364dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Patched%20Critical%20Microsoft%20WSUS%20Flaw%20Comes%20Under%20Active%20Exploitation&amp;severity=critical&amp;id=68fbc58bf816635ddaea4365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shutdown-sparks-85-increase-in-us-government-cyber-1685f38a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shutdown%20Sparks%2085%25%20Increase%20in%20US%20Government%20Cyberattacks&amp;severity=medium&amp;id=68fc64e207185a1a52fe2bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privacy-rankings-of-popular-messaging-apps-in-2025-15ed1bb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privacy%20rankings%20of%20popular%20messaging%20apps%20in%202025%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68fba6d444c617250775d1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12176-cwe-1242-inclusion-of-undocumented--6c13ea97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12176%3A%20CWE-1242%3A%20Inclusion%20of%20Undocumented%20Features%20or%20Chicken%20Bits%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fba47553dd06bf204856d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62714-cwe-862-missing-authorization-in-ka-011b8bf2</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62714%3A%20CWE-862%3A%20Missing%20Authorization%20in%20karmada-io%20dashboard&amp;severity=high&amp;id=68fba0f053dd06bf20425529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-windows-server-wsus-vulnerability-exploit-cfb4e058</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Windows%20Server%20WSUS%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=68fb9135b0116405c2a4ced3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11145-cwe-203-observable-discrepancy-in-c-04b51405</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11145%3A%20CWE-203%20Observable%20Discrepancy%20in%20CBK%20Soft%20Software%20Hardware%20Electronic%20Computer%20Systems%20Industry%20and%20Trade%20Inc.%20enVision&amp;severity=high&amp;id=68fb9152b0116405c2a4da20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8536-cwe-89-improper-neutralization-of-sp-d5c02924</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8536%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=critical&amp;id=68fb9152b0116405c2a4da1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43994-cwe-306-missing-authentication-for--9e8af551</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43994%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Dell%20Dell%20Storage%20Manager&amp;severity=high&amp;id=68fb93e23b281b3632d40dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43995-cwe-287-improper-authentication-in--5f7681b1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43995%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20Dell%20Storage%20Manager&amp;severity=critical&amp;id=68fb956d3b281b3632d6adf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46425-cwe-611-improper-restriction-of-xml-cdf6bdad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46425%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20Dell%20Storage%20Manager&amp;severity=medium&amp;id=68fb8a56b0116405c29b03ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-perplexity-comet-browser-users-bea24928</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20Perplexity%20Comet%20Browser%20Users&amp;severity=medium&amp;id=68fb884fecfa37776dced118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-aim-at-european-drone-compani-337e37f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Aim%20at%20European%20Drone%20Companies&amp;severity=medium&amp;id=68fb7f59a4ecdcc9296547ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-ios-26-deletes-spyware-evidence-shad-4a08df82</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20iOS%2026%20Deletes%20Spyware%20Evidence%2C%20Shadow%20Escape%20Attack%2C%20Cyber%20Exec%20Sold%20Secrets%20to%20Russia&amp;severity=medium&amp;id=68fb75fc65a68e4110999d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11576-cwe-1236-improper-neutralization-of-10b57814</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11576%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20newcodebyte%20AI%20Chatbot%20Free%20Models%20%E2%80%93%20Customer%20Support%2C%20Live%20Chat%2C%20Virtual%20Assistant&amp;severity=medium&amp;id=68fb728365a68e4110938108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3000-youtube-videos-exposed-as-malware-traps-in-ma-95227076</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3%2C000%20YouTube%20Videos%20Exposed%20as%20Malware%20Traps%20in%20Massive%20Ghost%20Network%20Operation&amp;severity=high&amp;id=68fb6f0665a68e41108eaf27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toys-r-us-canada-warns-customers-info-leaked-in-da-145c7d1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Toys%20%E2%80%9CR%E2%80%9D%20Us%20Canada%20warns%20customers&apos;%20info%20leaked%20in%20data%20breach&amp;severity=high&amp;id=68fb6f0665a68e41108eaf23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-earn-1024750-for-73-zero-days-at-pwn2own-i-f8f061f2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20earn%20%241%2C024%2C750%20for%2073%20zero-days%20at%20Pwn2Own%20Ireland&amp;severity=high&amp;id=68fb6f0665a68e41108eaf2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-server-emergency-patches-fix-wsus-bug-with-4c43c143</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Server%20emergency%20patches%20fix%20WSUS%20bug%20with%20PoC%20exploit&amp;severity=critical&amp;id=68fb6cbde72abe49433d7dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10861-cwe-918-server-side-request-forgery-eef41d53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10861%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=high&amp;id=68fb65c0e72abe4943328fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-smishing-deluge-china-based-campaign-flooding--646edf86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Smishing%20Deluge%3A%20China-Based%20Campaign%20Flooding%20Global%20Text%20Messages&amp;severity=medium&amp;id=68fb62139505544a4c4d54fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toys-r-us-canada-customer-information-leaked-onlin-eae39eaf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Toys%20%E2%80%98R%E2%80%99%20Us%20Canada%20Customer%20Information%20Leaked%20Online&amp;severity=medium&amp;id=68fb62089505544a4c4d5394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-cybersecurity-perception-gap-why-executives-an-50951c87</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Cybersecurity%20Perception%20Gap%3A%20Why%20Executives%20and%20Practitioners%20See%20Risk%20Differently&amp;severity=medium&amp;id=68fbc58bf816635ddaea436b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-spotted-baohuo-android-backdoor-is-hijacking-243c0662</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Spotted%20Baohuo%20Android%20Backdoor%20Is%20Hijacking%20Telegram%20Accounts%20Through%20Fake%20Telegram%20X%20App&amp;severity=medium&amp;id=68fb5e8e9505544a4c484bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5605-vulnerability-in-wso2-wso2-identity--b223b425</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5605%3A%20Vulnerability%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=68fb50f0c5193890929c8395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5350-cwe-918-server-side-request-forgery--ee5374ed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5350%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=68fb50f0c5193890929c8392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-disables-downloaded-file-previews-to-blo-419ee883</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Disables%20Downloaded%20File%20Previews%20to%20Block%20NTLM%20Hash%20Leaks&amp;severity=medium&amp;id=68fb4f21c8f3a4177c5d3c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36361-missing-authorization-in-ibm-app-co-e4c07416</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36361%3A%20CWE-862%20Missing%20Authorization%20in%20IBM%20App%20Connect%20Enterprise&amp;severity=medium&amp;id=68fb4ba8c8f3a4177c54ac99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12134-cwe-862-missing-authorization-in-bd-82ee9698</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12134%3A%20CWE-862%20Missing%20Authorization%20in%20bdthemes%20ZoloBlocks%20%E2%80%93%20Gutenberg%20Block%20Editor%20Plugin%20with%20Advanced%20Blocks%2C%20Dynamic%20Content%2C%20Templates%20%26%20Patterns&amp;severity=medium&amp;id=68fb482ec8f3a4177c4fd797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12136-cwe-918-server-side-request-forgery-a137d54f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12136%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20devowl%20Real%20Cookie%20Banner%3A%20GDPR%20%26%20ePrivacy%20Cookie%20Consent&amp;severity=medium&amp;id=68fb482ec8f3a4177c4fd79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jewelbug-chinese-apt-group-widens-reach-to-russia-63a80dac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jewelbug%3A%20Chinese%20APT%20Group%20Widens%20Reach%20to%20Russia&amp;severity=medium&amp;id=68fb4682df38e44162dd7192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11253-cwe-89-improper-neutralization-of-s-697280a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11253%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aksis%20Technology%20Inc.%20Netty%20ERP&amp;severity=critical&amp;id=68fb3da20691a1b5991c5184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10749-cwe-862-missing-authorization-in-10-d11ff0a8</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10749%3A%20CWE-862%20Missing%20Authorization%20in%2010up%20Microsoft%20Azure%20Storage%20for%20WordPress&amp;severity=medium&amp;id=68fb3a1e0691a1b599160705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12017-cwe-79-improper-neutralization-of-i-08f2d7f7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12017%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teyldoan%20VNPAY%20Payment%20gateway&amp;severity=medium&amp;id=68fb3a1f0691a1b59916073e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11172-cwe-862-missing-authorization-in-pl-7a0c8f14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11172%3A%20CWE-862%20Missing%20Authorization%20in%20plagiarismchecker%20Check%20Plagiarism&amp;severity=medium&amp;id=68fb3a1e0691a1b599160712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10901-cwe-862-missing-authorization-in-or-fec8e4fe</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10901%3A%20CWE-862%20Missing%20Authorization%20in%20originalityai%20Originality.ai%20AI%20Checker&amp;severity=medium&amp;id=68fb3a1e0691a1b59916070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10902-cwe-285-improper-authorization-in-o-7b4cd60e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10902%3A%20CWE-285%20Improper%20Authorization%20in%20originalityai%20Originality.ai%20AI%20Checker&amp;severity=medium&amp;id=68fb3a1e0691a1b59916070e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12014-cwe-862-missing-authorization-in-ge-115206c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12014%3A%20CWE-862%20Missing%20Authorization%20in%20getclouder%20NGINX%20Cache%20Optimizer&amp;severity=medium&amp;id=68fb3a1f0691a1b599160736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11889-cwe-434-unrestricted-upload-of-file-83928661</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11889%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20edgarrojas%20AIO%20Forms%20%E2%80%93%20Craft%20Complex%20Forms%20Easily&amp;severity=high&amp;id=68fb3a1f0691a1b59916072e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11257-cwe-862-missing-authorization-in-li-4984cf4d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11257%3A%20CWE-862%20Missing%20Authorization%20in%20limelightmarketing%20LLM%20Hubspot%20Blog%20Import&amp;severity=medium&amp;id=68fb3a1e0691a1b599160716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12096-cwe-79-improper-neutralization-of-i-8b8ffc95</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12096%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prawas%20Simple%20Excel%20Pricelist%20for%20WooCommerce&amp;severity=medium&amp;id=68fb3a1f0691a1b59916074c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11504-cwe-532-insertion-of-sensitive-info-325ea0cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11504%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20quickcreator%20Quickcreator%20%E2%80%93%20AI%20Blog%20Writer&amp;severity=high&amp;id=68fb3a1e0691a1b59916071a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10748-cwe-89-improper-neutralization-of-s-2238b942</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10748%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20onlinediagnosticbd%20RapidResult&amp;severity=medium&amp;id=68fb3a1e0691a1b599160701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12028-cwe-352-cross-site-request-forgery--73da3966</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12028%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20indieweb%20IndieAuth&amp;severity=high&amp;id=68fb3a1f0691a1b599160742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10701-cwe-79-improper-neutralization-of-i-3ffc61e4</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottpaterson%20Time%20Clock%20%E2%80%93%20A%20WordPress%20Employee%20%26%20Volunteer%20Time%20Clock%20Plugin&amp;severity=medium&amp;id=68fb3a1e0691a1b5991606f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11887-cwe-862-missing-authorization-in-ti-61b03fc7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11887%3A%20CWE-862%20Missing%20Authorization%20in%20tiagohillebrandt%20Supervisor&amp;severity=medium&amp;id=68fb3a1e0691a1b59916071e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10740-cwe-89-improper-neutralization-of-s-785ac503</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10740%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rupok98%20URL%20Shortener%20Plugin%20For%20WordPress&amp;severity=medium&amp;id=68fb3a1e0691a1b5991606fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12072-cwe-352-cross-site-request-forgery--9c18d1b1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12072%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mynamevenu24%20Disable%20Content%20Editor%20For%20Specific%20Template&amp;severity=medium&amp;id=68fb3a1f0691a1b599160748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11992-cwe-80-improper-neutralization-of-s-78ac763a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11992%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20cnaveenkumar%20Multi%20Item%20Responsive%20Slider&amp;severity=medium&amp;id=68fb3a1f0691a1b599160732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12016-cwe-79-improper-neutralization-of-i-058bef98</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12016%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20muniyandibg%20qnotsquiz&amp;severity=medium&amp;id=68fb3a1f0691a1b59916073a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwn2own-whatsapp-hacker-says-exploit-privately-rep-407be76f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwn2Own%20WhatsApp%20Hacker%20Says%20Exploit%20Privately%20Disclosed%20to%20Meta&amp;severity=medium&amp;id=68fb350e5d093e3bcff6dc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62868-cwe-98-improper-control-of-filename-23df7f45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62868%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Edge%20CPT&amp;severity=high&amp;id=68fb31975d093e3bcfef2e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6440-cwe-434-unrestricted-upload-of-file--7ab8e512</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6440%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20JMA%20Plugins%20WooCommerce%20Designer%20Pro&amp;severity=critical&amp;id=68fb2c431dfaf394b9f9a8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-spreading-glassworm-infects-vs-code-extension-7950b3ae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-Spreading%20&apos;GlassWorm&apos;%20Infects%20VS%20Code%20Extensions%20in%20Widespread%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=68fbc58bf816635ddaea4371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9158-cwe-79-improper-neutralization-of-in-3d977a2d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9158%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Best%20Practical%20Request%20Tracker&amp;severity=medium&amp;id=68fb1ac81658c9c3946ecbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9978-cwe-79-cross-site-scripting-xss-in-j-90e5fe26</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9978%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Jeg%20Kit%20for%20Elementor&amp;severity=medium&amp;id=68fb1ac81658c9c3946ecbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10874-cwe-918-server-side-request-forgery-3f851184</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10874%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Orbit%20Fox%3A%20Duplicate%20Page%2C%20Menu%20Icons%2C%20SVG%20Support%2C%20Cookie%20Notice%2C%20Custom%20Fonts%20%26%20More&amp;severity=medium&amp;id=68fb1ac81658c9c3946ecbc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10723-cwe-22-improper-limitation-of-a-pat-6e959d61</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10723%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PixelYourSite&amp;severity=low&amp;id=68fb1ac81658c9c3946ecbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61931-cross-site-scripting-xss-in-implem--ac7d5524</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61931%3A%20Cross-site%20scripting%20(XSS)%20in%20Implem%20Inc.%20Pleasanter&amp;severity=medium&amp;id=68fb0eacd0b277ca6d24c228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58070-cross-site-scripting-xss-in-implem--7731de11</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58070%3A%20Cross-site%20scripting%20(XSS)%20in%20Implem%20Inc.%20Pleasanter&amp;severity=medium&amp;id=68fb0eacd0b277ca6d24c224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-is-attempting-a-comeback-as-a-new-ransomwa-fcf647a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%20is%20attempting%20a%20comeback%20as%20a%20new%20ransomware%20variant%20%22ChuongDong%22%20targeting%20Windows%2C%20Linux%2C%20and%20ESXi&amp;severity=medium&amp;id=68faf36e00e9e97283b9a298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-crypto-bust-offers-hope-in-battle-against-cyber-0b78c9b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Crypto%20Bust%20Offers%20Hope%20in%20Battle%20Against%20Cybercrime%20Syndicates&amp;severity=medium&amp;id=68fade4400e9e97283b3df02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-cloud-account-for-information-thu-oct-23r-39696158</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Cloud%20Account%20for%20Information%2C%20(Thu%2C%20Oct%2023rd)&amp;severity=medium&amp;id=68faccc100e9e97283ae5144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-24-f5dc1d1e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-24&amp;severity=medium&amp;id=68fc143ef816635ddaf4dc93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60954-na-f9107b26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60954%3A%20n%2Fa&amp;severity=high&amp;id=68fbe316f816635ddaee62ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52099-na-893fb4f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52099&amp;severity=null&amp;id=68fbe316f816635ddaee62b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60419-na-984f9b0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60419%3A%20n%2Fa&amp;severity=medium&amp;id=68fbd88af816635ddaed1bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60730-na-c703a3c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60730%3A%20n%2Fa&amp;severity=high&amp;id=68fbbfeff816635ddae95b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60735-na-e1013000</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60735%3A%20n%2Fa&amp;severity=high&amp;id=68fbbc9cf816635ddae913b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60731-na-e8cace3d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60731%3A%20n%2Fa&amp;severity=high&amp;id=68fbbc9cf816635ddae913b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60729-na-8d656ffe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60729%3A%20n%2Fa&amp;severity=medium&amp;id=68fbbc9cf816635ddae913ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60561-na-89d06c3e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60561%3A%20n%2Fa&amp;severity=high&amp;id=68fba6ca44c617250775a793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60559-na-30f10c73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60559%3A%20n%2Fa&amp;severity=high&amp;id=68fba6ca44c617250775a790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60803-na-755648fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60803%3A%20n%2Fa&amp;severity=critical&amp;id=68fba47653dd06bf20485769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60552-na-51a759a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60552%3A%20n%2Fa&amp;severity=high&amp;id=68fba47653dd06bf20485766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60551-na-1153cba4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60551%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf20485711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60550-na-a1a0c3d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60550%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf2048570e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60549-na-0288829a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60549%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf2048570b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60564-na-ea8e2f67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60564%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf20485708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60563-na-f2ea1fc2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60563%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf20485704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60562-na-1fd806b1</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60562%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf20485701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60553-na-b5590e09</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60553%3A%20n%2Fa&amp;severity=critical&amp;id=68fba47553dd06bf204856fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60548-na-5ca89883</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60548%3A%20n%2Fa&amp;severity=critical&amp;id=68fba47553dd06bf204856fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60547-na-bac5dfb8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60547%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf204856f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60558-na-3234c5a1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60558%3A%20n%2Fa&amp;severity=high&amp;id=68fba0f053dd06bf20425526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60557-na-60b907ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60557%3A%20n%2Fa&amp;severity=high&amp;id=68fba0f053dd06bf20425523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60556-na-bb5b24f9</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60556%3A%20n%2Fa&amp;severity=high&amp;id=68fba0f053dd06bf20425520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60555-na-412cd212</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60555%3A%20n%2Fa&amp;severity=high&amp;id=68fba0f053dd06bf2042551d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60554-na-f30e070e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60554%3A%20n%2Fa&amp;severity=critical&amp;id=68fba0f053dd06bf2042551a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60801-na-1b83e602</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60801%3A%20n%2Fa&amp;severity=high&amp;id=68fb9d7b53dd06bf203dab00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60566-na-d5344691</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60566%3A%20n%2Fa&amp;severity=high&amp;id=68fb9d7b53dd06bf203daafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60565-na-e7ac0d06</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60565%3A%20n%2Fa&amp;severity=high&amp;id=68fb9d7b53dd06bf203daafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56438-na-9b6baa6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56438%3A%20n%2Fa&amp;severity=medium&amp;id=68fb975e3b281b3632d8256f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60938-na-0037679b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60938%3A%20n%2Fa&amp;severity=high&amp;id=68fb956d3b281b3632d6adfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60936-na-df3b04fd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60936%3A%20n%2Fa&amp;severity=medium&amp;id=68fb956d3b281b3632d6adfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60570-na-162d34b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60570%3A%20n%2Fa&amp;severity=high&amp;id=68fb93e23b281b3632d40dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60569-na-6fa93d41</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60569%3A%20n%2Fa&amp;severity=high&amp;id=68fb93e23b281b3632d40dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60568-na-06b5f253</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60568%3A%20n%2Fa&amp;severity=high&amp;id=68fb93e23b281b3632d40dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61430-na-2152dfea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61430%3A%20n%2Fa&amp;severity=medium&amp;id=68fb9152b0116405c2a4da23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60572-na-7d629312</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60572%3A%20n%2Fa&amp;severity=high&amp;id=68fb9152b0116405c2a4da19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60571-na-750c6cfb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60571%3A%20n%2Fa&amp;severity=high&amp;id=68fb9152b0116405c2a4da16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46185-na-487c379a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46185%3A%20n%2Fa&amp;severity=medium&amp;id=68fb8a56b0116405c29b03a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46183-na-5ea9f7eb</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46183%3A%20n%2Fa&amp;severity=high&amp;id=68fb886cecfa37776dcfb8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7730-cwe-79-improper-neutralization-of-in-34540007</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7730%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=68faafd950358b89bd7bfd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60023-cwe-23-in-automationdirect-producti-3cd44c14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60023%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=medium&amp;id=68faafd950358b89bd7bfd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59776-cwe-23-in-automationdirect-producti-276eaa44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59776%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=medium&amp;id=68faac5550358b89bd740d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62254-cwe-22-improper-limitation-of-a-pat-691acb94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62254%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68faac5550358b89bd740d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58429-cwe-23-in-automationdirect-producti-211f46c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58429%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faac5550358b89bd740d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58078-cwe-23-in-automationdirect-producti-0577a3f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58078%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faa8db50358b89bd6f0362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58456-cwe-23-in-automationdirect-producti-b3197443</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58456%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faa8db50358b89bd6f0368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61934-cwe-1327-in-automationdirect-produc-1d9e035a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61934%3A%20CWE-1327%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=critical&amp;id=68faa76d436a4ae5df819867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62688-cwe-732-in-automationdirect-product-3d64145f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62688%3A%20CWE-732%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=medium&amp;id=68faa76d436a4ae5df81986d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61977-cwe-640-in-automationdirect-product-d357dedb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61977%3A%20CWE-640%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faa76d436a4ae5df819873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/help-wanted-vietnamese-actors-using-fake-job-posti-b7d16ca8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Help%20Wanted%3A%20Vietnamese%20Actors%20Using%20Fake%20Job%20Posting%20Campaigns%20to%20Deliver%20Malware%20and%20Steal%20Credentials&amp;severity=medium&amp;id=68fb42fddf38e44162d5bae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transparenttribe-targets-indian-military-with-desk-bd6f2394</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TransparentTribe%20Targets%20Indian%20Military%20with%20DeskRAT%20Malware&amp;severity=medium&amp;id=68fb42fddf38e44162d5baf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62498-cwe-23-in-automationdirect-producti-938f2593</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62498%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faa3e9436a4ae5df797f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fear-the-sessionreaper-adobe-commerce-flaw-under-a-4ca43c60</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fear%20the%20&apos;SessionReaper&apos;%3A%20Adobe%20Commerce%20Flaw%20Under%20Attack&amp;severity=critical&amp;id=68fad07600e9e97283b1707b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59503-cwe-918-server-side-request-forgery-8b007bb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59503%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Compute%20Resource%20Provider&amp;severity=critical&amp;id=68fa9f43ff7543f249ea8df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59273-cwe-284-improper-access-control-in--4308bfe1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59273%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Event%20Grid%20System&amp;severity=high&amp;id=68fa9f42ff7543f249ea8df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59500-cwe-284-improper-access-control-in--7c264155</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59500%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Notification%20Service&amp;severity=high&amp;id=68fa9bb9ff7543f249e2ee0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12100-cwe-276-incorrect-default-permissio-ba3d994a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12100%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20MongoDB%20BI%20Connector%20ODBC%20driver&amp;severity=high&amp;id=68fa99bbff7543f249e1540f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/my-aws-account-got-hacked-here-is-what-happened-2154829d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=My%20AWS%20Account%20Got%20Hacked%20-%20Here%20Is%20What%20Happened&amp;severity=medium&amp;id=68fa983eff7543f249de820a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tired-of-unpaid-toll-texts-blame-the-smishing-tria-a2e1241a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tired%20of%20Unpaid%20Toll%20Texts%3F%20Blame%20the%20&apos;Smishing%20Triad&apos;&amp;severity=high&amp;id=68fad07600e9e97283b1707e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57848-incorrect-default-permissions-in-re-60d7dc8e</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57848%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Virtualization%204&amp;severity=medium&amp;id=68fa8e34326f59cb11ee3240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62517-cwe-1321-improperly-controlled-modi-641442dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62517%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20rollbar%20rollbar.js&amp;severity=medium&amp;id=68fa8fc31a753c8dfc003b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58428-cwe-77-improper-neutralization-of-s-c25d3ee8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58428%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Veeder-Root%20TLS4B%20Automatic%20Tank%20Gauge%20System&amp;severity=critical&amp;id=68fa8736326f59cb11e0f20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55067-cwe-190-integer-overflow-or-wraparo-1f384240</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55067%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Veeder-Root%20TLS4B%20Automatic%20Tank%20Gauge%20System&amp;severity=high&amp;id=68fa85e2a3a2e7083d940cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-a-way-to-use-a-computer-mouse-for-2f1dd309</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20find%20a%20way%20to%20use%20a%20computer%20mouse%20for%20eavesdropping&amp;severity=low&amp;id=68fa85f0a3a2e7083d940ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62236-cwe-204-observable-response-discrep-10a1e0c1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62236%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Frontier%20Airlines%20flyfrontier.com&amp;severity=medium&amp;id=68fa85e2a3a2e7083d940cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusa-ransomware-leaks-834-gb-of-comcast-data-aft-c7175c97</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medusa%20Ransomware%20Leaks%20834%20GB%20of%20Comcast%20Data%20After%20%241.2%20Million%20Ransom%20Demand&amp;severity=medium&amp;id=68fa85cfa3a2e7083d93e9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12044-cwe-770-allocation-of-resources-wit-3b1e9a44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12044%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=68fa824ea3a2e7083d8baf09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11621-cwe-288-authentication-bypass-using-690b69bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11621%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=68fa7ed3a3a2e7083d87191c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6978-cwe-78-improper-neutralization-of-sp-32aedff1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6978%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Arista%20Networks%20Arista%20Edge%20Threat%20Management%20-%20Arista%20Next%20Generation%20Firewall&amp;severity=high&amp;id=68fa7cdd3832d3f145b8bf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62255-cwe-79-improper-neutralization-of-i-11a4e110</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62255%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=low&amp;id=68fa7cdd3832d3f145b8bf12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6979-cwe-287-improper-authentication-in-a-30933e7b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6979%3A%20CWE-287%20Improper%20Authentication%20in%20Arista%20Networks%20Arista%20Edge%20Threat%20Management%20-%20Arista%20Next%20Generation%20Firewall&amp;severity=high&amp;id=68fa7cdd3832d3f145b8bf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6980-cwe-200-exposure-of-sensitive-inform-032afac5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6980%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Arista%20Networks%20Arista%20Edge%20Threat%20Management%20-%20Arista%20Next%20Generation%20Firewall&amp;severity=high&amp;id=68fa7cdd3832d3f145b8bf1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23352-cwe-824-access-of-uninitialized-poi-20eb5fef</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23352%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20NVIDIA%20Virtual%20GPU%20Manager&amp;severity=high&amp;id=68fa7cdd3832d3f145b8bf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23347-cwe-276-incorrect-default-permissio-ed918689</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23347%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=68fa73f6bf11aeb6491dbf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23345-cwe-125-out-of-bounds-read-in-nvidi-8d9c7c75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23345%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20GeForce&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23332-cwe-476-null-pointer-dereference-in-48e9cf1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23332%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20Virtual%20GPU%20Manager&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23330-cwe-476-null-pointer-dereference-in-f56d74ab</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23330%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20GeForce&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10937-cwe-754-improper-check-for-unusual--c39503c2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10937%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Oxford%20Nano%20Technologies%20MinKNOW&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23300-cwe-476-null-pointer-dereference-in-31c3b95f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23300%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20Virtual%20GPU%20Manager&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54808-cwe-522-insufficiently-protected-cr-c4e34744</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54808%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Oxford%20Nano%20Technologies%20MinKNOW&amp;severity=high&amp;id=68fa73f6bf11aeb6491dbf97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shadow-escape-0-click-attack-in-ai-assistants--b7e3857a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Shadow%20Escape%200-Click%20Attack%20in%20AI%20Assistants%20Puts%20Trillions%20of%20Records%20at%20Risk&amp;severity=medium&amp;id=68fa680a9122777b72f8cee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34156-cwe-497-exposure-of-sensitive-syste-26ef4f26</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34156%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Tibbo%20Systems%20AggreGate%20Network%20Manager&amp;severity=medium&amp;id=68fa5a8d2f85fa8bca6362c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34155-cwe-204-observable-response-discrep-b65226e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34155%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Tibbo%20Systems%20AggreGate%20Network%20Manager&amp;severity=medium&amp;id=68fa5a8d2f85fa8bca6362c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62169-cwe-287-improper-authentication-in--860ec987</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62169%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WildRikku%20OctoPrint-SpoolManager&amp;severity=high&amp;id=68fa55172f85fa8bca58f7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privescing-a-laptop-with-bitlocker-pin-cc796d59</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privescing%20a%20Laptop%20with%20BitLocker%20%2B%20PIN&amp;severity=medium&amp;id=68fa4e950fcf0b81396757df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12114-cwe-1191-on-chip-debug-and-test-int-8c011b7a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12114%3A%20CWE-1191%3A%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68fa4ca10fcf0b8139659480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-lure-defense-engineers-with-f-9daef1cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Lure%20Defense%20Engineers%20With%20Fake%20Jobs%20to%20Steal%20Drone%20Secrets&amp;severity=medium&amp;id=68facf9f00e9e97283b112e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59048-cwe-863-incorrect-authorization-in--407aa5bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59048%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20openbao%20openbao-plugins&amp;severity=high&amp;id=68fa49d81a6be256cbb1964f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-government-now-actively-managing-cybercrim-6b63a856</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Government%20Now%20Actively%20Managing%20Cybercrime%20Groups%3A%20Security%20Firm&amp;severity=medium&amp;id=68fa40a0958c70c1028a71f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12110-insufficient-session-expiration-in--7b1abdc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12110%3A%20Insufficient%20Session%20Expiration%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=68fa3b37958c70c10281cfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11429-insufficient-session-expiration-in--d01122fb</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11429%3A%20Insufficient%20Session%20Expiration%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=68fa382cf7adcc2ea5025029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/modding-and-distributing-mobile-apps-with-frida-e78e7cc2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Modding%20And%20Distributing%20Mobile%20Apps%20with%20Frida&amp;severity=medium&amp;id=68fa382ff7adcc2ea502504f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leveraging-machine-learning-to-enhance-acoustic-ea-ae3d9c66</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leveraging%20Machine%20Learning%20to%20Enhance%20Acoustic%20Eavesdropping%20Attacks%20(Blog%20Series)&amp;severity=medium&amp;id=68fa34acf7adcc2ea5f9d3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1679-cwe-79-improper-neutralization-of-in-bb28313e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1679%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Moxa%20TN-4500A%20Series&amp;severity=medium&amp;id=68fa34abf7adcc2ea5f9d398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gotta-fly-lazarus-targets-the-uav-sector-e9ac2223</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gotta%20fly%3A%20Lazarus%20targets%20the%20UAV%20sector&amp;severity=medium&amp;id=68fb5e869505544a4c48472d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-youtubes-malware-distribution-network-9f709208</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20YouTube&apos;s%20Malware%20Distribution%20Network&amp;severity=medium&amp;id=68fb62139505544a4c4d5526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/agenda-ransomware-deploys-linux-variant-on-windows-72d5fb88</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Agenda%20Ransomware%20Deploys%20Linux%20Variant%20on%20Windows%20Systems%20Through%20Remote%20Management%20Tools%20and%20BYOVD%20Techniques&amp;severity=medium&amp;id=690891465abee5c7f36b3228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62256-cwe-862-missing-authorization-in-li-4c6ce82a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62256%3A%20CWE-862%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68fa34abf7adcc2ea5f9d3a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53701-cwe-79-improper-neutralization-of-i-0b0d0f3c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vilar%20VS-IPC1002&amp;severity=medium&amp;id=68fa34abf7adcc2ea5f9d39c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53702-cwe-755-improper-handling-of-except-d1078036</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53702%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Vilar%20VS-IPC1002&amp;severity=high&amp;id=68fa34abf7adcc2ea5f9d39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-sidebar-spoofing-puts-chatgpt-atlas-perplexity--ecfa21e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Sidebar%20Spoofing%20Puts%20ChatGPT%20Atlas%2C%20Perplexity%20Comet%20and%20Other%20Browsers%20at%20Risk&amp;severity=medium&amp;id=68fa289b4ebc55e8a8379c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-youtubes-malware-distribution-network-bcfe546b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20YouTube%E2%80%99s%20Malware%20Distribution%20Network&amp;severity=medium&amp;id=68fa270e60d00e69dc99facd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10705-cwe-918-server-side-request-forgery-d217f5db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10705%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20mxchat%20MxChat%20%E2%80%93%20AI%20Chatbot%20%26%20Content%20Generation%20for%20WordPress&amp;severity=medium&amp;id=68fa270860d00e69dc99f587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11128-cwe-918-server-side-request-forgery-176e8037</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11128%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20themeisle%20RSS%20Aggregator%20by%20Feedzy%20%E2%80%93%20Feed%20to%20Post%2C%20Autoblogging%2C%20News%20%26%20YouTube%20Video%20Feeds%20Aggregator&amp;severity=medium&amp;id=68fa270960d00e69dc99fa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8427-cwe-79-improper-neutralization-of-in-d7a5bda3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20Beaver%20Builder%20Team%20Beaver%20Builder%20Plugin%20(Starter%20Version)&amp;severity=medium&amp;id=68fa270960d00e69dc99fa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11023-cwe-829-inclusion-of-functionality--095c680d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11023%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20ArkSigner%20Software%20and%20Hardware%20Inc.%20AcBakImzala&amp;severity=critical&amp;id=68fa270860d00e69dc99f5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/183-million-synthient-stealer-credentials-added-to-9ead0342</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=183%20Million%20Synthient%20Stealer%20Credentials%20Added%20to%20Have%20I%20Been%20Pwned&amp;severity=medium&amp;id=68fa238b60d00e69dc91d411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-targeting-android-devices-thu-oct-23rd-50719d6a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20Targeting%20Android%20Devices%2C%20(Thu%2C%20Oct%2023rd)&amp;severity=medium&amp;id=68fa1e1cfd7c94938af099d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/secure-ai-at-scale-and-speed-learn-the-framework-i-eb90ad5c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Secure%20AI%20at%20Scale%20and%20Speed%20%E2%80%94%20Learn%20the%20Framework%20in%20this%20Free%20Webinar&amp;severity=medium&amp;id=68facf9f00e9e97283b112e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-176m-crypto-fine-hacking-formu-edb56137</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20%24176M%20Crypto%20Fine%2C%20Hacking%20Formula%201%2C%20Chromium%20Vulns%2C%20AI%20Hijack%20%26%20More&amp;severity=high&amp;id=68facf9f00e9e97283b112e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62401-improper-authorization-448cd1e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62401%3A%20Improper%20Authorization&amp;severity=medium&amp;id=68fa15ae457d6b06b51715ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62395-improper-access-control-0125e526</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62395%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=68fa15ae457d6b06b51715d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62400-exposure-of-sensitive-information-t-3f2c83da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62400%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=68fa15ae457d6b06b51715ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62399-improper-restriction-of-excessive-a-13554b4f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62399%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts&amp;severity=high&amp;id=68fa15ae457d6b06b51715e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62398-improper-authentication-8c81a77e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62398%3A%20Improper%20Authentication&amp;severity=medium&amp;id=68fa15ae457d6b06b51715e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62397-generation-of-error-message-contain-78f436af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62397%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information&amp;severity=medium&amp;id=68fa15ae457d6b06b51715de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62396-exposure-of-information-through-dir-c035d8cc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62396%3A%20Exposure%20of%20Information%20Through%20Directory%20Listing&amp;severity=medium&amp;id=68fa15ae457d6b06b51715da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62394-incorrect-authorization-43727613</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62394%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=68fa15ae457d6b06b51715d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62393-improper-access-control-43fc1251</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62393%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=68fa15ae457d6b06b51715ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantomcaptcha-rat-attack-targets-aid-groups-suppo-7c17bb47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhantomCaptcha%20RAT%20Attack%20Targets%20Aid%20Groups%20Supporting%20Ukraine&amp;severity=medium&amp;id=68fa1221457d6b06b50f1451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10355-cwe-601-url-redirection-to-untruste-3ffbcc0e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10355%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20MOLGENIS%20MOLGENIS%20EMX2&amp;severity=medium&amp;id=68fa18a8fd7c94938ae69a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-codings-real-problem-isnt-bugsits-judgment-17728542</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vibe%20Coding%E2%80%99s%20Real%20Problem%20Isn%E2%80%99t%20Bugs%E2%80%94It%E2%80%99s%20Judgment&amp;severity=low&amp;id=68fad14a00e9e97283b1a878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-critical-adobe-commerce-flaw-puts--74131384</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Critical%20Adobe%20Commerce%20Flaw%20Puts%20Many%20eCommerce%20Sites%20at%20Risk&amp;severity=critical&amp;id=68fa0d2f551b7103c484092f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-organizations-are-abandoning-static-secrets-fo-f8e7ccc3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Organizations%20Are%20Abandoning%20Static%20Secrets%20for%20Managed%20Identities&amp;severity=medium&amp;id=68fa0d19551b7103c483f168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unseeable-prompt-injections-in-screenshots-more-vu-6db4bd4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unseeable%20prompt%20injections%20in%20screenshots%3A%20more%20vulnerabilities%20in%20Comet%20and%20other%20AI%20browsers%20%7C%20Brave&amp;severity=medium&amp;id=68fa0d4d551b7103c4840b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41073-cwe-22-improper-limitation-of-a-pat-685565bf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41073%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=68fa0d4a551b7103c4840ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40643-cwe-79-improper-neutralization-of-i-717361c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Status%20Tracker%20Energy%20CRM&amp;severity=medium&amp;id=68fa09a5551b7103c47b3236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-propagating-glassworm-malware-targets-develop-4e1327e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self%20Propagating%20GlassWorm%20Malware%20Targets%20Developers%20Through%20OpenVSX%20Marketplace&amp;severity=medium&amp;id=68fa047bd2c9d59cd47fb9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bind-updates-address-high-severity-cache-poisoning-9c888792</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BIND%20Updates%20Address%20High-Severity%20Cache%20Poisoning%20Flaws&amp;severity=high&amp;id=68fa00ecd2c9d59cd477a34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-lanscope-endpoint-manager-bug-exploited-i-fdd6aa12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Lanscope%20Endpoint%20Manager%20Bug%20Exploited%20in%20Ongoing%20Cyberattacks%2C%20CISA%20Confirms&amp;severity=critical&amp;id=68f9fd99d2c9d59cd4735ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lanscope-endpoint-manager-zero-day-exploited-in-th-637e74c2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lanscope%20Endpoint%20Manager%20Zero-Day%20Exploited%20in%20the%20Wild&amp;severity=medium&amp;id=68f9fd7fd2c9d59cd472dda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-250-magento-stores-hit-overnight-as-hackers-e-63dcd28c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20250%20Magento%20Stores%20Hit%20Overnight%20as%20Hackers%20Exploit%20New%20Adobe%20Commerce%20Flaw&amp;severity=high&amp;id=68f9fd99d2c9d59cd4735ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jingle-thief-hackers-exploit-cloud-infrastructure--3cd64a6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CJingle%20Thief%E2%80%9D%20Hackers%20Exploit%20Cloud%20Infrastructure%20to%20Steal%20Millions%20in%20Gift%20Cards&amp;severity=high&amp;id=68f9fbee3c8ea3a7c444b197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9981-cwe-79-improper-neutralization-of-in-0f7e25e0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9981%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68f9f86d3c8ea3a7c43ca072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9980-cwe-79-improper-neutralization-of-in-7c295aa5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9980%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68f9f86d3c8ea3a7c43ca06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-security-verizon-says-attacks-soar-ai-power-6de30997</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20Security%3A%20Verizon%20Says%20Attacks%20Soar%2C%20AI-Powered%20Threats%20Raise%20Alarm&amp;severity=medium&amp;id=68f9f4e43c8ea3a7c4381c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12105-use-after-free-in-red-hat-red-hat-e-793ac9a8</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12105%3A%20Use%20After%20Free%20in%20GNOME%20libsoup&amp;severity=high&amp;id=68f9f347eae24e6f559392cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10914-cwe-79-improper-neutralization-of-i-d60a4c3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proliz%20Software%20Ltd.%20Co.%20OBS%20(Student%20Affairs%20Information%20System)&amp;severity=high&amp;id=68f9ea97c5ff90d17f9c4f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10727-cwe-79-improper-neutralization-of-i-f5a20b7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ArkSigner%20Software%20and%20Hardware%20Inc.%20AcBakImzala&amp;severity=medium&amp;id=68f9edcdeae24e6f5589b0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jingle-thief-hackers-exploit-cloud-infrastructure--7b5d1412</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Jingle%20Thief&apos;%20Hackers%20Exploit%20Cloud%20Infrastructure%20to%20Steal%20Millions%20in%20Gift%20Cards&amp;severity=medium&amp;id=68facf9f00e9e97283b112ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mideast-african-hackers-target-govts-banks-small-r-03dc4a40</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mideast%2C%20African%20Hackers%20Target%20Gov&apos;ts%2C%20Banks%2C%20Small%20Retailers&amp;severity=medium&amp;id=68f9c4b24e1be15805b4dd32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-250-magento-stores-hit-overnight-as-hackers-e-c68791e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20250%20Magento%20Stores%20Hit%20Overnight%20as%20Hackers%20Exploit%20New%20Adobe%20Commerce%20Flaw&amp;severity=critical&amp;id=68f9c49e4e1be15805b4c918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-lanscope-endpoint-manager-bug-exploited-i-5750d6df</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Lanscope%20Endpoint%20Manager%20Bug%20Exploited%20in%20Ongoing%20Cyberattacks%2C%20CISA%20Confirms&amp;severity=critical&amp;id=68facf9f00e9e97283b112ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61865-unquoted-search-path-or-element-in--9158600e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61865%3A%20Unquoted%20search%20path%20or%20element%20in%20I-O%20DATA%20DEVICE%2C%20INC.%20NarSuS%20App&amp;severity=medium&amp;id=68f9af5e102015466a3d3402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54806-cross-site-scripting-xss-in-growi-i-f1f520aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54806%3A%20Cross-site%20scripting%20(XSS)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=68f9af5e102015466a3d33f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62499-cross-site-scripting-xss-in-six-apa-02607c96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62499%3A%20Cross-site%20scripting%20(XSS)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=68f9af5e102015466a3d3406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54856-cross-site-scripting-xss-in-six-apa-4987ac0e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54856%3A%20Cross-site%20scripting%20(XSS)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=68f9af5e102015466a3d33fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-hunts-european-drone-manufacturing-d-e31792f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20Hunts%20European%20Drone%20Manufacturing%20Data&amp;severity=medium&amp;id=68f9abcb102015466a3513b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12104-cwe-1104-use-of-unmaintained-third--a70890e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12104%3A%20CWE-1104%3A%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68f9a9e6102015466a330fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48430-cwe-248-uncaught-exception-in-galla-decbc686</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48430%3A%20CWE-248%20Uncaught%20Exception%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=68f9a9e6102015466a331000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48428-cwe-312-cleartext-storage-of-sensit-8083aea0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48428%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=68f9a9e6102015466a330ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47699-cwe-497-exposure-of-sensitive-syste-5df26031</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47699%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=critical&amp;id=68f9a9e6102015466a330ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41402-cwe-602-client-side-enforcement-of--17a7f9a6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41402%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=68f9a9e6102015466a330ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35981-cwe-359-exposure-of-private-persona-74657a96</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35981%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=68f9a9e6102015466a330ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11575-cwe-276-incorrect-default-permissio-d7416d16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11575%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20MongoDB%20Atlas%20SQL%20ODBC%20driver&amp;severity=high&amp;id=68f97a0b93bcde9f320064af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-23-361e19b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-23&amp;severity=medium&amp;id=68fac5a500e9e97283a8ae65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54963-na-94c6248b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54963%3A%20n%2Fa&amp;severity=medium&amp;id=68fa8e34326f59cb11ee323c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54966-na-283c71dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54966%3A%20n%2Fa&amp;severity=medium&amp;id=68fa8ab1326f59cb11e6286d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54964-na-17f464c2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54964%3A%20n%2Fa&amp;severity=high&amp;id=68fa8ab1326f59cb11e62869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60859-na-766eb2ee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60859%3A%20n%2Fa&amp;severity=medium&amp;id=68fa805aa3a2e7083d89a8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60837-na-3be9713a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60837%3A%20n%2Fa&amp;severity=medium&amp;id=68fa805aa3a2e7083d89a8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61413-na-c2b37c29</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61413%3A%20n%2Fa&amp;severity=medium&amp;id=68fa681d9122777b72f8df3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57240-na-15529262</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57240%3A%20n%2Fa&amp;severity=medium&amp;id=68fa681d9122777b72f8df39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61464-na-3f777462</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61464%3A%20n%2Fa&amp;severity=medium&amp;id=68fa681d9122777b72f8df35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50951-na-b3d1aa67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50951%3A%20n%2Fa&amp;severity=medium&amp;id=68fa4e920fcf0b8139674ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50950-na-535fa866</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50950%3A%20n%2Fa&amp;severity=high&amp;id=68fa49d81a6be256cbb1964c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50949-na-468022bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50949%3A%20n%2Fa&amp;severity=medium&amp;id=68fa49d81a6be256cbb19649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61132-na-f2702853</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61132%3A%20n%2Fa&amp;severity=high&amp;id=68fa46541a6be256cba9872d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61136-na-fb27f586</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61136%3A%20n%2Fa&amp;severity=high&amp;id=68fa44661a6be256cba791e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56009-na-0eb16cea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56009%3A%20n%2Fa&amp;severity=medium&amp;id=68fa3d2c958c70c10283cd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56008-na-16987524</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56008%3A%20n%2Fa&amp;severity=medium&amp;id=68fa3d2c958c70c10283cd13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56007-na-a8a8ea75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56007%3A%20n%2Fa&amp;severity=medium&amp;id=68fa3d2c958c70c10283cd0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60852-na-4ba12307</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60852%3A%20n%2Fa&amp;severity=medium&amp;id=68fa34abf7adcc2ea5f9d3a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62820-cwe-420-unprotected-alternate-chann-d80d62e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62820%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Slack%20Nebula&amp;severity=medium&amp;id=68f9a9e6102015466a330ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62813-cwe-158-improper-neutralization-of--393cd73e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62813&amp;severity=null&amp;id=68f9a43693bcde9f3214157f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-aid-groups-targeted-through-fake-zoom-meet-f22a18fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20Aid%20Groups%20Targeted%20Through%20Fake%20Zoom%20Meetings%20and%20Weaponized%20PDF%20Files&amp;severity=high&amp;id=68f95d53505c7fab67fda400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-muddywater-targets-100-organisations-i-49c83235</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20MuddyWater%20Targets%20100%2B%20Organisations%20in%20Global%20Espionage%20Campaign&amp;severity=high&amp;id=68f95d53505c7fab67fda3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canada-fines-cybercrime-friendly-cryptomus-176m-07f01da5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canada%20Fines%20Cybercrime%20Friendly%20Cryptomus%20%24176M&amp;severity=high&amp;id=68f95d53505c7fab67fda404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploiting-critical-sessionreaper-flaw-in--036d97d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploiting%20critical%20%22SessionReaper%22%20flaw%20in%20Adobe%20Magento&amp;severity=critical&amp;id=68f95d53505c7fab67fda3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwn2own-day-2-hackers-exploit-56-zero-days-for-790-50167eef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwn2Own%20Day%202%3A%20Hackers%20exploit%2056%20zero-days%20for%20%24790%2C000&amp;severity=high&amp;id=68f95d53505c7fab67fda3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwn2own-underscores-secure-development-concerns-fb9c2e0a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwn2Own%20Underscores%20Secure%20Development%20Concerns&amp;severity=high&amp;id=68fad07600e9e97283b17081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62710-cwe-337-predictable-seed-in-pseudo--59da75f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62710%3A%20CWE-337%3A%20Predictable%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20sakaiproject%20sakai&amp;severity=medium&amp;id=68f96334884d3b6631feb0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-best-end-user-security-awareness-programs-aren-a86b7cdc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Best%20End%20User%20Security%20Awareness%20Programs%20Aren&apos;t%20About%20Awareness%20Anymore&amp;severity=medium&amp;id=68fad07600e9e97283b17084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62708-cwe-409-improper-handling-of-highly-3c9f2426</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62708%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=68f95300066c59488c99ac1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62707-cwe-834-excessive-iteration-in-py-p-eaa72a5a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62707%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=68f95300066c59488c99ac15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62614-cwe-862-missing-authorization-in-bo-bb4906f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62614%3A%20CWE-862%3A%20Missing%20Authorization%20in%20booklore-app%20booklore&amp;severity=high&amp;id=68f9488fb5ec6c3fed4b87a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62613-cwe-79-improper-neutralization-of-i-6a4a61b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62613%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20steveseguin%20vdo.ninja&amp;severity=medium&amp;id=68f9472e5256beec8efc5608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62612-cwe-918-server-side-request-forgery-d4b5943b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62612%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=68f943aa5256beec8ef3de6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/it-takes-only-250-documents-to-poison-any-ai-model-7a63db6c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=It%20Takes%20Only%20250%20Documents%20to%20Poison%20Any%20AI%20Model&amp;severity=medium&amp;id=68f9841f93bcde9f320ce1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/too-many-secrets-attackers-pounce-on-sensitive-dat-b8b4694d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Too%20Many%20Secrets%3A%20Attackers%20Pounce%20on%20Sensitive%20Data%20Sprawl&amp;severity=medium&amp;id=68f9841f93bcde9f320ce1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multi-stage-websocket-rat-targets-ukraine-in-singl-c0aa85d8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhantomCaptcha%3A%20Multi-Stage%20WebSocket%20RAT%20Targets%20Ukraine%20in%20Single-Day%20Spearphishing%20Operation&amp;severity=medium&amp;id=68f9361b62bc771d0f55e424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62611-cwe-73-external-control-of-file-nam-0b51fb2a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62611%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20aio-libs%20aiomysql&amp;severity=high&amp;id=68f932a662bc771d0f4e4a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62247-cwe-862-missing-authorization-in-li-f5e428f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62247%3A%20CWE-862%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=low&amp;id=68f932a662bc771d0f4e4aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62610-cwe-285-improper-authorization-in-h-b7c008eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62610%3A%20CWE-285%3A%20Improper%20Authorization%20in%20honojs%20hono&amp;severity=high&amp;id=68f932a662bc771d0f4e4aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62248-cwe-79-improper-neutralization-of-i-98160480</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62248%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68f92df1491c54bae897dd3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-python-rat-targets-gamers-via-minecraft-f2248658</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Python%20RAT%20Targets%20Gamers%20via%20Minecraft&amp;severity=medium&amp;id=68f9361b62bc771d0f55e481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iis-servers-owned-by-rudepanda-like-its-2003-7eea466b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IIS%20servers%20owned%20by%20RudePanda%20like%20it&apos;s%202003&amp;severity=medium&amp;id=68f9361b62bc771d0f55e442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitter-apt-exploiting-old-winrar-vulnerability-and-c6a6ee86</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitter%20APT%20Exploiting%20Old%20WinRAR%20Vulnerability%20and%20Office%20Files%20in%20New%20Backdoor%20Attacks&amp;severity=medium&amp;id=68f92a68491c54bae88fa338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58712-incorrect-default-permissions-in-re-65f23d62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58712%3A%20Incorrect%20Default%20Permissions%20in%20apache%20activemq-artemis&amp;severity=medium&amp;id=68f92183732d1470b7fcdfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-secures-ban-on-nso-group-after-6-year-leg-0eafb927</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Secures%20Ban%20on%20NSO%20Group%20After%206-Year%20Legal%20Battle&amp;severity=medium&amp;id=68f9194c2887d40ca3b9ce4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-nethereum-nuget-package-used-homoglyph-trick--d32190c3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Nethereum%20NuGet%20Package%20Used%20Homoglyph%20Trick%20to%20Steal%20Crypto%20Wallet%20Keys&amp;severity=high&amp;id=68f913f4519b403272389dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-muddywater-targets-100-organisations-i-fffaf094</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20MuddyWater%20Targets%20100%2B%20Organisations%20in%20Global%20Espionage%20Campaign&amp;severity=high&amp;id=68f9831e93bcde9f320bfbd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tarmageddon-flaw-in-async-tar-rust-library-allows--41bbfade</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TARmageddon%20flaw%20in%20Async-Tar%20Rust%20library%20allows%20to%20smuggle%20extra%20archives%20when%20the%20library%20is%20processing%20nested%20TAR%20files&amp;severity=medium&amp;id=68f913f4519b403272389dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11957-cwe-639-authorization-bypass-throug-8e06826e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11957%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Devolutions%20Server&amp;severity=critical&amp;id=68f9120a519b40327236e527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11958-cwe-20-improper-input-validation-in-88a22836</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11958%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Devolutions%20Server&amp;severity=medium&amp;id=68f9120a519b40327236e52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-aid-groups-targeted-through-fake-zoom-meet-f46270bb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20Aid%20Groups%20Targeted%20Through%20Fake%20Zoom%20Meetings%20and%20Weaponized%20PDF%20Files&amp;severity=medium&amp;id=68f9831e93bcde9f320bfbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22178-improper-authorization-in-atlassian-f98929e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22178%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3c99c688c2fb43c67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22169-improper-authorization-in-atlassian-8c691bbd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22169%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22173-improper-authorization-in-atlassian-34a2b2ad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22173%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22170-improper-authorization-in-atlassian-cecb089a</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22170%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22174-improper-authorization-in-atlassian-71101333</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22174%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22172-improper-authorization-in-atlassian-44d49049</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22172%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22176-improper-authorization-in-atlassian-124acd9c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22176%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c64c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22171-improper-authorization-in-atlassian-711e1b7d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22171%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22168-improper-authorization-in-atlassian-a1b0c6aa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22168%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22177-improper-authorization-in-atlassian-762ab795</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22177%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22175-improper-authorization-in-atlassian-2a6c756b</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22175%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rival-hackers-dox-alleged-operators-of-lumma-steal-54acfe41</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rival%20Hackers%20Dox%20Alleged%20Operators%20of%20Lumma%20Stealer&amp;severity=medium&amp;id=68f9008aa70370bc87f7fc98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40780-cwe-341-predictable-from-observable-f5cc22c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40780%3A%20CWE-341%20Predictable%20from%20Observable%20State%20in%20ISC%20BIND%209&amp;severity=high&amp;id=68f8ffa56e01a0ac47e2cb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40778-cwe-349-acceptance-of-extraneous-un-761b2f0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40778%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20ISC%20BIND%209&amp;severity=high&amp;id=68f8ffa56e01a0ac47e2cb6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8677-cwe-405-asymmetric-resource-consumpt-118c69a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8677%3A%20CWE-405%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20ISC%20BIND%209&amp;severity=high&amp;id=68f8ffa56e01a0ac47e2cb6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62607-cwe-306-missing-authentication-for--91b1a6d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62607%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20nautobot%20nautobot-app-ssot&amp;severity=medium&amp;id=68f8fc246e01a0ac47db56a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62659-cwe-79-improper-neutralization-of-i-85f045c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62659%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20CookieConsent%20extension&amp;severity=low&amp;id=68f8fa3f6e01a0ac47d8a3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23299-cwe-787-out-of-bounds-write-in-nvid-aec4eb14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23299%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20BlueField%20GA&amp;severity=medium&amp;id=68f8f7aea2d588d2bde2ff2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62606-cwe-89-improper-neutralization-of-s-6cf35fb1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62606%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20My-Little-Forum%20mylittleforum&amp;severity=high&amp;id=68f8f43ba2d588d2bddb93c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tarmageddon-flaw-in-popular-rust-library-leads-to--9c451573</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TARmageddon%20Flaw%20in%20Popular%20Rust%20Library%20Leads%20to%20RCE&amp;severity=low&amp;id=68f8f420a2d588d2bddb2712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11965-cwe-552-files-or-directories-access-c199d529</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11965%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Eclipse%20Foundation%20Vert.x&amp;severity=medium&amp;id=68f8f0b1a2d588d2bdd5f4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11966-cwe-79-improper-neutralization-of-i-2d4bf23e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11966%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Eclipse%20Foundation%20Vert.x&amp;severity=low&amp;id=68f8f249a2d588d2bdd990e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62073-missing-authorization-in-sovlix-mee-7d327abb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62073%3A%20Missing%20Authorization%20in%20Sovlix%20MeetingHub&amp;severity=medium&amp;id=68f8effb04677bbd79439bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62072-missing-authorization-in-rustaurius-d2884e51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62072%3A%20Missing%20Authorization%20in%20Rustaurius%20Front%20End%20Users&amp;severity=medium&amp;id=68f8effb04677bbd79439bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62071-missing-authorization-in-repuso-soc-2cad2518</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62071%3A%20Missing%20Authorization%20in%20Repuso%20Social%20proof%20testimonials%20and%20reviews%20by%20Repuso&amp;severity=medium&amp;id=68f8effb04677bbd79439bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62070-missing-authorization-in-wpxpo-wowr-3e60771d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62070%3A%20Missing%20Authorization%20in%20WPXPO%20WowRevenue&amp;severity=medium&amp;id=68f8effb04677bbd79439ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62069-improper-neutralization-of-input-du-b3b0ce63</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62069%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20MDTF&amp;severity=medium&amp;id=68f8effb04677bbd79439ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62063-improper-neutralization-of-input-du-d965e1c1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62063%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Travel%20WP%20Travel%20Gutenberg%20Blocks&amp;severity=medium&amp;id=68f8effb04677bbd79439ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62062-insertion-of-sensitive-information--7abc9c29</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62062%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ThemeRuby%20Easy%20Post%20Submission&amp;severity=medium&amp;id=68f8effb04677bbd79439b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62061-cross-site-request-forgery-csrf-in--be02ba2e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62061%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20impleCode%20Product%20Catalog%20Simple&amp;severity=medium&amp;id=68f8effb04677bbd79439b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62060-improper-neutralization-of-input-du-a0bb517b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62060%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Tab%20Ultimate&amp;severity=medium&amp;id=68f8effb04677bbd79439b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62058-improper-neutralization-of-input-du-12ee61e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62058%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=medium&amp;id=68f8effb04677bbd79439b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62054-improper-control-of-filename-for-in-42e9f77a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62054%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=high&amp;id=68f8eff904677bbd79439b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62052-missing-authorization-in-horea-radu-0fde957c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62052%3A%20Missing%20Authorization%20in%20Horea%20Radu%20One%20Page%20Express%20Companion&amp;severity=medium&amp;id=68f8eff904677bbd79439b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62048-missing-authorization-in-wpmu-dev-y-8431bd18</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62048%3A%20Missing%20Authorization%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20SmartCrawl&amp;severity=medium&amp;id=68f8eff904677bbd79439b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62042-improper-neutralization-of-input-du-7e162b55</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Event%20post&amp;severity=medium&amp;id=68f8eff904677bbd79439b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62029-improper-control-of-filename-for-in-d0798786</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62029%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themesion%20Grevo&amp;severity=high&amp;id=68f8eff904677bbd79439b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62027-missing-authorization-in-stellarwp--39d45c84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62027%3A%20Missing%20Authorization%20in%20StellarWP%20Event%20Tickets&amp;severity=medium&amp;id=68f8eff904677bbd79439b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62025-deserialization-of-untrusted-data-i-a449fa84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62025%3A%20Deserialization%20of%20Untrusted%20Data%20in%20eyecix%20JobSearch&amp;severity=critical&amp;id=68f8eff904677bbd79439b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62024-improper-neutralization-of-input-du-69e593cb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62024%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonathan%20Jernigan%20Pie%20Calendar&amp;severity=medium&amp;id=68f8eff904677bbd79439b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62023-improper-control-of-generation-of-c-63f6b24b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62023%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cristi%C3%A1n%20L%C3%A1vaque%20s2Member&amp;severity=critical&amp;id=68f8eff904677bbd79439b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62021-missing-authorization-in-made-neat--bceff550</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62021%3A%20Missing%20Authorization%20in%20Made%20Neat%20Acknowledgify&amp;severity=medium&amp;id=68f8eff904677bbd79439b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62020-improper-neutralization-of-input-du-0b83f449</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infomaniak%20Network%20VOD%20Infomaniak&amp;severity=high&amp;id=68f8eff804677bbd79439b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62019-missing-authorization-in-wpzoom-rec-6ce7607d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62019%3A%20Missing%20Authorization%20in%20WPZOOM%20Recipe%20Card%20Blocks%20for%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=68f8eff804677bbd79439b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62015-improper-neutralization-of-special--641be62d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62015%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Josh%20Kohlbach%20Advanced%20Coupons%20for%20WooCommerce%20Coupons&amp;severity=high&amp;id=68f8eff804677bbd79439b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62013-missing-authorization-in-posimyth-u-f6c4199f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62013%3A%20Missing%20Authorization%20in%20POSIMYTH%20UiChemy&amp;severity=medium&amp;id=68f8eff804677bbd79439b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62009-cross-site-request-forgery-csrf-in--0870ef70</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62009%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20UPC%2FEAN%2FGTIN%20Code%20Generator&amp;severity=medium&amp;id=68f8eff804677bbd79439b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62008-deserialization-of-untrusted-data-i-586fb42c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62008%3A%20Deserialization%20of%20Untrusted%20Data%20in%20acowebs%20Product%20Table%20For%20WooCommerce&amp;severity=high&amp;id=68f8eff804677bbd79439b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62007-incorrect-privilege-assignment-in-b-1ffe391e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62007%3A%20Incorrect%20Privilege%20Assignment%20in%20bPlugins%20Voice%20Feedback&amp;severity=high&amp;id=68f8eff804677bbd79439b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62006-missing-authorization-in-veronalabs-bdaee1ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62006%3A%20Missing%20Authorization%20in%20VeronaLabs%20WP%20SMS&amp;severity=medium&amp;id=68f8eff804677bbd79439b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62005-cross-site-request-forgery-csrf-in--ffccadcc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62005%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FantasticPlugins%20SUMO%20Memberships%20for%20WooCommerce&amp;severity=high&amp;id=68f8eff804677bbd79439b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60246-improper-neutralization-of-input-du-fc3f97d4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60246%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weissmike%20Simple%20Finance%20Calculator&amp;severity=high&amp;id=68f8eff804677bbd79439afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60234-deserialization-of-untrusted-data-i-6d699473</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60234%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Single%20Property&amp;severity=high&amp;id=68f8eff704677bbd79439add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60232-deserialization-of-untrusted-data-i-737799aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60232%3A%20Deserialization%20of%20Untrusted%20Data%20in%20quantumcloud%20KBx%20Pro%20Ultimate&amp;severity=critical&amp;id=68f8eff704677bbd79439ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60228-deserialization-of-untrusted-data-i-4e30c275</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60228%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Knowledge%20Base&amp;severity=high&amp;id=68f8eff704677bbd79439ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60227-improper-limitation-of-a-pathname-t-e83f99aa</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60227%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ThimPress%20WP%20Pipes&amp;severity=high&amp;id=68f8eff704677bbd79439ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60226-deserialization-of-untrusted-data-i-4b790ea4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60226%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20White%20Rabbit&amp;severity=critical&amp;id=68f8eff704677bbd79439ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60225-deserialization-of-untrusted-data-i-734d4821</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60225%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20BugsPatrol&amp;severity=critical&amp;id=68f8eff704677bbd79439ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60224-deserialization-of-untrusted-data-i-b2b6fc34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60224%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpshuffle%20Subscribe%20to%20Download&amp;severity=critical&amp;id=68f8eff704677bbd79439acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60222-incorrect-privilege-assignment-in-f-a9928163</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60222%3A%20Incorrect%20Privilege%20Assignment%20in%20FantasticPlugins%20SUMO%20Memberships%20for%20WooCommerce&amp;severity=high&amp;id=68f8eff704677bbd79439ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60221-deserialization-of-untrusted-data-i-c88e42ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60221%3A%20Deserialization%20of%20Untrusted%20Data%20in%20captivateaudio%20Captivate%20Sync&amp;severity=critical&amp;id=68f8eff704677bbd79439ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60220-incorrect-privilege-assignment-in-p-25a25ff6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60220%3A%20Incorrect%20Privilege%20Assignment%20in%20pebas%20CouponXxL&amp;severity=critical&amp;id=68f8eff704677bbd79439ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60217-improper-limitation-of-a-pathname-t-e174702d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60217%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ypromo%20PT%20Luxa%20Addons&amp;severity=high&amp;id=68f8eff704677bbd79439ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60216-deserialization-of-untrusted-data-i-29aa4869</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60216%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Addison&amp;severity=critical&amp;id=68f8eff604677bbd79439ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60215-deserialization-of-untrusted-data-i-33428adf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60215%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Kriya&amp;severity=high&amp;id=68f8eff604677bbd79439aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60214-deserialization-of-untrusted-data-i-bec92f6c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60214%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Goldenblatt&amp;severity=critical&amp;id=68f8eff604677bbd79439aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60213-deserialization-of-untrusted-data-i-18b66c85</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60213%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Whitebox-Studio%20Scape&amp;severity=critical&amp;id=68f8eff604677bbd79439aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60212-deserialization-of-untrusted-data-i-f5c0d1fc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60212%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20VEDA&amp;severity=high&amp;id=68f8eff604677bbd79439aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60211-incorrect-privilege-assignment-in-e-eae879b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60211%3A%20Incorrect%20Privilege%20Assignment%20in%20extendons%20WooCommerce%20Registration%20Fields%20Plugin%20-%20Custom%20Signup%20Fields&amp;severity=high&amp;id=68f8eff604677bbd79439aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60210-deserialization-of-untrusted-data-i-d23e97da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60210%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpeverest%20Everest%20Forms%20-%20Frontend%20Listing&amp;severity=critical&amp;id=68f8eff604677bbd79439aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60209-deserialization-of-untrusted-data-i-60dfb540</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60209%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20Connector%20for%20Gravity%20Forms%20and%20Google%20Sheets&amp;severity=critical&amp;id=68f8eff604677bbd79439a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60208-cross-site-request-forgery-csrf-in--b1e897f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60208%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tusko%20Trush%20Advanced%20Custom%20Fields%20%3A%20CPT%20Options%20Pages&amp;severity=high&amp;id=68f8eff604677bbd79439a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60206-improper-control-of-generation-of-c-8a470208</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60206%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Beplusthemes%20Alone&amp;severity=critical&amp;id=68f8eff504677bbd79439a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60176-improper-neutralization-of-input-du-560283f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60176%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tattersoftware%20WP%20Tesseract&amp;severity=medium&amp;id=68f8eff504677bbd79439a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60168-cross-site-request-forgery-csrf-in--a5ff62e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60168%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20integrationshotelrunner%20HotelRunner%20Booking%20Widget&amp;severity=high&amp;id=68f8eff504677bbd79439a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60151-url-redirection-to-untrusted-site-o-98fbb7c8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60151%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20HubSpot&amp;severity=medium&amp;id=68f8eff504677bbd79439a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60135-improper-neutralization-of-input-du-b79fb6be</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NIKITAS%20GEORGOPOULOS%20WeShare%20Buttons&amp;severity=medium&amp;id=68f8eff504677bbd79439a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60134-cross-site-request-forgery-csrf-in--747e8722</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60134%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20John%20James%20Jacoby%20WP%20Media%20Categories&amp;severity=medium&amp;id=68f8eff504677bbd79439a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60132-cross-site-request-forgery-csrf-in--cf852300</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60132%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20johnh10%20Video%20Blogster%20Lite&amp;severity=high&amp;id=68f8eff504677bbd79439a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60131-improper-neutralization-of-input-du-8b8fd21d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60131%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zoefff%20Werk%20aan%20de%20Muur&amp;severity=medium&amp;id=68f8eff504677bbd79439a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60041-authentication-bypass-using-an-alte-6f36d74f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60041%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Iulia%20Cazan%20Emails%20Catch%20All&amp;severity=high&amp;id=68f8eff504677bbd79439a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60039-deserialization-of-untrusted-data-i-4c1d5b78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60039%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Noisa&amp;severity=critical&amp;id=68f8eff504677bbd79439a69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59593-improper-neutralization-of-input-du-d4374129</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Extend%20Themes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=68f8eff504677bbd79439a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59580-incorrect-privilege-assignment-in-g-7e1e998e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59580%3A%20Incorrect%20Privilege%20Assignment%20in%20GoodLayers%20Goodlayers%20Core&amp;severity=high&amp;id=68f8eff504677bbd79439a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59579-insertion-of-sensitive-information--39dc72d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59579%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20PressTigers%20Simple%20Job%20Board&amp;severity=high&amp;id=68f8eff504677bbd79439a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59578-insertion-of-sensitive-information--4454a299</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59578%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20wpdesk%20ShopMagic&amp;severity=medium&amp;id=68f8eff504677bbd79439a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59575-exposure-of-sensitive-system-inform-a06d3e28</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59575%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=medium&amp;id=68f8eff504677bbd79439a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59571-improper-neutralization-of-input-du-4fddcaae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59571%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20WorkScout-Core&amp;severity=high&amp;id=68f8eff504677bbd79439a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59566-improper-limitation-of-a-pathname-t-1c1c7035</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59566%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AmentoTech%20Workreap%20(theme&apos;s%20plugin)&amp;severity=high&amp;id=68f8eff504677bbd79439a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59564-improper-control-of-filename-for-in-72ae8ff3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59564%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20EduMall&amp;severity=high&amp;id=68f8eff504677bbd79439a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59558-improper-control-of-filename-for-in-a5b12f45</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59558%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Billey&amp;severity=high&amp;id=68f8eff504677bbd79439a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59557-improper-neutralization-of-special--ebf4aeec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59557%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ThemeMove%20Learts%20Addons&amp;severity=critical&amp;id=68f8eff504677bbd79439a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59555-improper-control-of-filename-for-in-ea0b42a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59555%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Medizin&amp;severity=high&amp;id=68f8eff404677bbd79439a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59550-improper-control-of-filename-for-in-6eecd681</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59550%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20designervily%20Xcare&amp;severity=high&amp;id=68f8eff404677bbd79439a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59007-deserialization-of-untrusted-data-i-bb9a1ace</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59007%3A%20Deserialization%20of%20Untrusted%20Data%20in%20themesflat%20TF%20Woo%20Product%20Grid%20Addon%20For%20Elementor&amp;severity=critical&amp;id=68f8eff404677bbd79439a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59006-improper-neutralization-of-input-du-b2084ec9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themebon%20Easy%20Woocommerce%20Customizer&amp;severity=high&amp;id=68f8eff404677bbd79439a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59004-improper-neutralization-of-input-du-754b6123</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pco_58%20WC%20Return%20products&amp;severity=high&amp;id=68f8eff404677bbd79439a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58971-improper-neutralization-of-input-du-f52360c6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AmentoTech%20Doctreat&amp;severity=high&amp;id=68f8eff404677bbd79439a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58970-improper-neutralization-of-script-r-aa41ace7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58970%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20AmentoTech%20Doctreat&amp;severity=medium&amp;id=68f8eff404677bbd79439a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58967-improper-control-of-filename-for-in-2d511584</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58967%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Businext&amp;severity=high&amp;id=68f8eff404677bbd79439a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58966-improper-neutralization-of-input-du-ad8823f3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58966%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basix%20NEX-Forms%20LITE&amp;severity=high&amp;id=68f8eff404677bbd79439a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58963-unrestricted-upload-of-file-with-da-ce45f313</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58963%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%207oroof%20Medcity&amp;severity=critical&amp;id=68f8eff404677bbd79439a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58961-improper-neutralization-of-input-du-8aa7fc2b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58961%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kamleshyadav%20CF7%20Auto%20Responder%20Addon&amp;severity=high&amp;id=68f8eff304677bbd794399f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58959-improper-limitation-of-a-pathname-t-b486dca6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58959%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AmentoTech%20Taskbot&amp;severity=high&amp;id=68f8eff304677bbd794399f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58958-improper-control-of-filename-for-in-9d8f14a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58958%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20SmilePure&amp;severity=high&amp;id=68f8eff304677bbd794399f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58955-improper-control-of-filename-for-in-b73f9a6c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58955%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20designervily%20Karzo&amp;severity=high&amp;id=68f8eff304677bbd794399ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58921-improper-neutralization-of-input-du-cbfa2bc3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58921%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arevico%20WP%20Tactical%20Popup&amp;severity=high&amp;id=68f8eff304677bbd794399ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58916-improper-neutralization-of-input-du-07031c09</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58916%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Munzir%20Author%3A%20Munzir&amp;severity=high&amp;id=68f8eff304677bbd794399e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53428-incorrect-privilege-assignment-in-n-686b2067</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53428%3A%20Incorrect%20Privilege%20Assignment%20in%20N-Media%20Simple%20User%20Registration&amp;severity=high&amp;id=68f8eff304677bbd794399e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53427-improper-neutralization-of-input-du-3fadf8ac</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53427%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chibueze%20Okechukwu%20SEO%20Pyramid&amp;severity=high&amp;id=68f8eff304677bbd794399e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53426-improper-neutralization-of-input-du-b2fb78f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53426%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Likert%20Survey%20Master&amp;severity=high&amp;id=68f8eff304677bbd794399dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53425-incorrect-privilege-assignment-in-d-035f710b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53425%3A%20Incorrect%20Privilege%20Assignment%20in%20Dokan%2C%20Inc.%20Dokan&amp;severity=high&amp;id=68f8eff204677bbd794399c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53424-missing-authorization-in-vanquish-w-d912d86e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53424%3A%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Orders%20%26%20Customers%20Exporter&amp;severity=medium&amp;id=68f8eff204677bbd794399c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53423-improper-neutralization-of-input-du-c172c180</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53423%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20Triss&amp;severity=high&amp;id=68f8eff204677bbd794399bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53422-improper-neutralization-of-input-du-fafb5e41</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53422%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeWarriors%20WhatsApp%20Chat%20for%20WordPress%20and%20WooCommerce&amp;severity=high&amp;id=68f8eff204677bbd794399bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53421-missing-authorization-in-pickplugin-ef4c9d02</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53421%3A%20Missing%20Authorization%20in%20PickPlugins%20Accordion&amp;severity=medium&amp;id=68f8eff204677bbd794399b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53420-improper-neutralization-of-input-du-54c61171</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53420%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=high&amp;id=68f8eff204677bbd794399b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53352-improper-neutralization-of-input-du-aa25bf29</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Grid%20Plus&amp;severity=high&amp;id=68f8eff204677bbd794399b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53351-improper-neutralization-of-input-du-cab0b1c3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fidelo%20Software%20GmbH%20Fidelo%20Snippet&amp;severity=high&amp;id=68f8eff204677bbd794399b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53350-improper-neutralization-of-input-du-68cac151</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webjunk%20Calendar%20Plus&amp;severity=high&amp;id=68f8eff204677bbd794399ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53297-improper-neutralization-of-input-du-d199680b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53297%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AA-Team%20Woocommerce%20Envato%20Affiliates&amp;severity=high&amp;id=68f8eff204677bbd794399aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53238-improper-neutralization-of-input-du-7d8e694b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53238%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Toast%20Plugins%20Toast%20Mobile%20Menu&amp;severity=high&amp;id=68f8eff104677bbd7943998b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53236-missing-authorization-in-andondesig-3b3f859c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53236%3A%20Missing%20Authorization%20in%20AndonDesign%20UDesign%20Core&amp;severity=medium&amp;id=68f8eff104677bbd79439986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53234-improper-neutralization-of-input-du-cb9a0aef</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53234%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AndonDesign%20UDesign%20Core&amp;severity=high&amp;id=68f8eff104677bbd79439980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53232-insertion-of-sensitive-information--534d2652</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53232%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20inkthemes%20WP%20Gmail%20SMTP&amp;severity=medium&amp;id=68f8eff104677bbd7943997c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53229-improper-neutralization-of-input-du-3af5f375</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53229%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kamleshyadav%20RockON%20DJ&amp;severity=high&amp;id=68f8eff104677bbd79439979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53218-insertion-of-sensitive-information--8b47cc1c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53218%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Saad%20Iqbal%20AppExperts&amp;severity=medium&amp;id=68f8eff104677bbd79439976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52770-improper-neutralization-of-input-du-d1768e87</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52770%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appscreo%20Hello%20Followers&amp;severity=high&amp;id=68f8eff104677bbd79439973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52763-improper-neutralization-of-input-du-9c93571a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52763%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NickDuncan%20Nifty%20Backups&amp;severity=high&amp;id=68f8eff104677bbd79439970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52760-improper-neutralization-of-input-du-4b541149</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52760%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Globalis%20MultiSite%20Clone%20Duplicator&amp;severity=high&amp;id=68f8eff104677bbd7943996d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52758-unrestricted-upload-of-file-with-da-8df40abc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52758%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Gesundheit%20Bewegt%20GmbH%20Zippy&amp;severity=critical&amp;id=68f8eff104677bbd7943996a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52757-missing-authorization-in-fantasticp-59fb877c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52757%3A%20Missing%20Authorization%20in%20FantasticPlugins%20SUMO%20Memberships%20for%20WooCommerce&amp;severity=medium&amp;id=68f8eff004677bbd79439914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52756-improper-control-of-generation-of-c-e09b0395</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52756%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Sayan%20Datta%20WP%20Last%20Modified%20Info&amp;severity=high&amp;id=68f8eff004677bbd79439911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52755-improper-neutralization-of-input-du-8eb9640e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52755%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Taylor%20Child%20Themes&amp;severity=high&amp;id=68f8eff004677bbd7943990e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52754-improper-neutralization-of-input-du-2b6d6d39</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52754%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20selloio%20Sello%20ChannelConnector&amp;severity=high&amp;id=68f8eff004677bbd7943990b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52753-improper-neutralization-of-input-du-c7c36ddb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52753%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supsystic%20Contact%20Form%20by%20Supsystic&amp;severity=high&amp;id=68f8eff004677bbd79439908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52752-exposure-of-sensitive-system-inform-0ae7caa1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52752%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ThemeAtelier%20IDonatePro&amp;severity=medium&amp;id=68f8eff004677bbd79439905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52751-improper-neutralization-of-input-du-624fb37e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52751%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20colome%20Slide%20Puzzle&amp;severity=high&amp;id=68f8eff004677bbd79439902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52750-improper-neutralization-of-input-du-c8e8f0f2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52750%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Juergen%20Schulze%20Emu2&amp;severity=high&amp;id=68f8eff004677bbd794398ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52749-improper-neutralization-of-input-du-11410a9d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Activity%20Track%20Uji%20Countdown&amp;severity=high&amp;id=68f8eff004677bbd794398fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52748-improper-neutralization-of-input-du-74beab4e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Directory%20Pro&amp;severity=high&amp;id=68f8eff004677bbd794398f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52743-improper-neutralization-of-input-du-a98fa698</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobbingwide%20oik-privacy-policy&amp;severity=high&amp;id=68f8efef04677bbd794398de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52742-improper-neutralization-of-input-du-cf7d3e2d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52742%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Igor%20Benic%20Pets&amp;severity=high&amp;id=68f8efef04677bbd794398db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52741-improper-neutralization-of-input-du-5ff8ee78</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52741%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Barry%20Kooij%20Post%20Connector&amp;severity=high&amp;id=68f8efef04677bbd794398d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52740-deserialization-of-untrusted-data-i-859dc604</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52740%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hernan%20Villanueva%20Boldermail&amp;severity=high&amp;id=68f8efef04677bbd794398d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52738-missing-authorization-in-wikimedia--42d19275</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52738%3A%20Missing%20Authorization%20in%20Wikimedia%20Foundation%20Wikipedia%20Preview&amp;severity=medium&amp;id=68f8efef04677bbd794398d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52737-deserialization-of-untrusted-data-i-ad67f52a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52737%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tijmen%20Smit%20WP%20Store%20Locator&amp;severity=high&amp;id=68f8efef04677bbd794398cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52736-improper-neutralization-of-input-du-9251d9a9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52736%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daman%20Jeet%20Finale%20Lite&amp;severity=high&amp;id=68f8efef04677bbd794398cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52735-improper-neutralization-of-input-du-5c13a3e5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52735%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20XLPlugins%20NextMove%20Lite&amp;severity=high&amp;id=68f8efef04677bbd794398c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52734-improper-neutralization-of-input-du-e7699294</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ERA404%20CropRefine&amp;severity=high&amp;id=68f8efef04677bbd794398c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49992-improper-neutralization-of-input-du-86be53f5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49992%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20LearnPress%20Export%20Import&amp;severity=high&amp;id=68f8efef04677bbd794398c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49963-improper-neutralization-of-input-du-51d17239</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49963%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20growniche%20Simple%20Stripe%20Checkout&amp;severity=high&amp;id=68f8efee04677bbd794398b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49962-improper-neutralization-of-input-du-2e913cda</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49962%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20useStrict%20bbPress%20Notify&amp;severity=high&amp;id=68f8efee04677bbd794398b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49961-missing-authorization-in-breeze-tea-1a897630</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49961%3A%20Missing%20Authorization%20in%20Breeze%20Team%20Breeze%20Checkout&amp;severity=medium&amp;id=68f8efee04677bbd794398b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49960-improper-neutralization-of-input-du-2e35fbed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49960%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leadbi%20LeadBI%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=68f8efee04677bbd794398ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49959-improper-neutralization-of-input-du-cc9a7f5a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49959%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pascal%20Casier%20bbPress%20Move%20Topics&amp;severity=high&amp;id=68f8efee04677bbd794398aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49958-improper-neutralization-of-input-du-61bd81ca</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49958%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robokassa%20Robokassa%20payment%20gateway%20for%20Woocommerce&amp;severity=high&amp;id=68f8efee04677bbd794398a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49957-improper-neutralization-of-input-du-c6e72013</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49957%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Weboccult%20Technologies%20Pvt%20Ltd%20Email%20Attachment%20by%20Order%20Status%20%26%20Products&amp;severity=high&amp;id=68f8efee04677bbd794398a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49956-improper-neutralization-of-input-du-7e8c3887</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49956%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anandaraj%20Balu%20Fade%20Slider&amp;severity=high&amp;id=68f8efee04677bbd794398a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49955-improper-neutralization-of-input-du-d930fbf7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49955%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rajan%20Vijayan%20WP%20Smart%20Flexslider&amp;severity=high&amp;id=68f8efee04677bbd7943989e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49954-improper-neutralization-of-input-du-c336736f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49954%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mithra62%20WP-Click-Tracker&amp;severity=high&amp;id=68f8efee04677bbd7943989b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49953-improper-neutralization-of-input-du-bbcc9968</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49953%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeinity%20ShareBang%2C%20Ultimate%20Social%20Share%20Buttons%20for%20WordPress&amp;severity=high&amp;id=68f8efed04677bbd7943988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49952-authorization-bypass-through-user-c-c9d3c1cb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49952%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20favethemes%20Houzez&amp;severity=medium&amp;id=68f8efed04677bbd7943988b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49951-improper-neutralization-of-input-du-4642d16a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcrunch%20gAppointments&amp;severity=high&amp;id=68f8efed04677bbd79439888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49950-missing-authorization-in-billingo-o-2b00827d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49950%3A%20Missing%20Authorization%20in%20billingo%20Official%20Integration%20for%20Billingo&amp;severity=high&amp;id=68f8efed04677bbd79439885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49948-improper-neutralization-of-input-du-5d9b8be6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49948%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ahmad%20Awais%20WP%20Super%20Edit&amp;severity=high&amp;id=68f8efed04677bbd79439882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49947-improper-neutralization-of-input-du-385dd9eb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49947%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendons%20WooCommerce%20Registration%20Fields%20Plugin%20-%20Custom%20Signup%20Fields&amp;severity=high&amp;id=68f8efed04677bbd7943987f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49946-improper-neutralization-of-input-du-91d74910</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49946%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cynob%20IT%20Consultancy%20Auto%20Login%20After%20Registration&amp;severity=high&amp;id=68f8efed04677bbd7943987c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49945-improper-neutralization-of-input-du-b81828b2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49945%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kylegetson%20Shortcode%20Generator&amp;severity=high&amp;id=68f8efed04677bbd79439879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49944-improper-neutralization-of-input-du-3f8c8501</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49944%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonatan%20Jumbert%20WPCode%20Content%20Ratio&amp;severity=high&amp;id=68f8efed04677bbd79439876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49940-improper-neutralization-of-input-du-2a97d50d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49940%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=68f8efed04677bbd79439873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49939-improper-neutralization-of-input-du-10c3d3f8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=medium&amp;id=68f8efec04677bbd79439866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49938-improper-neutralization-of-input-du-163a04a8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=medium&amp;id=68f8efec04677bbd79439863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49937-missing-authorization-in-syed-balkh-a18e95c9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49937%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Smash%20Balloon%20Social%20Post%20Feed&amp;severity=medium&amp;id=68f8efec04677bbd79439860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49936-improper-neutralization-of-input-du-ee6fe639</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49936%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xtemos%20WoodMart&amp;severity=medium&amp;id=68f8efec04677bbd7943985d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49935-improper-control-of-filename-for-in-ad009b1d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49935%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20xtemos%20WoodMart&amp;severity=high&amp;id=68f8efec04677bbd7943985a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49934-improper-neutralization-of-input-du-c4483961</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49934%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlocks%20For%20Elementor&amp;severity=medium&amp;id=68f8efec04677bbd79439857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49933-improper-neutralization-of-input-du-8752728d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49933%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlog&amp;severity=medium&amp;id=68f8efec04677bbd79439854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49932-improper-neutralization-of-input-du-7d03d48d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49932%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlog&amp;severity=medium&amp;id=68f8efec04677bbd79439851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49931-improper-neutralization-of-special--7c8c04d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49931%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=critical&amp;id=68f8efec04677bbd7943984e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49930-improper-neutralization-of-input-du-ffcbefe0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=high&amp;id=68f8efec04677bbd7943984b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49928-improper-neutralization-of-input-du-e836b6c9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetWooBuilder&amp;severity=medium&amp;id=68f8efeb04677bbd7943980f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49927-improper-neutralization-of-input-du-a41c8da2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49927%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetWooBuilder&amp;severity=medium&amp;id=68f8efeb04677bbd7943980c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49926-improper-control-of-generation-of-c-6ab5318e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49926%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Laborator%20Kalium&amp;severity=high&amp;id=68f8efeb04677bbd79439809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49925-missing-authorization-in-vibethemes-374fe6bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49925%3A%20Missing%20Authorization%20in%20VibeThemes%20WPLMS&amp;severity=high&amp;id=68f8efeb04677bbd79439806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49924-incorrect-privilege-assignment-in-j-44791b6c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49924%3A%20Incorrect%20Privilege%20Assignment%20in%20Josh%20Kohlbach%20Wholesale%20Suite&amp;severity=high&amp;id=68f8efeb04677bbd79439803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49923-improper-neutralization-of-input-du-5e6ba82f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=68f8efeb04677bbd79439800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49922-missing-authorization-in-etruel-wpe-62eb03bf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49922%3A%20Missing%20Authorization%20in%20etruel%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=medium&amp;id=68f8efeb04677bbd794397fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49921-improper-control-of-filename-for-in-d8712cec</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49921%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Crocoblock%20JetReviews&amp;severity=high&amp;id=68f8efeb04677bbd794397fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49920-missing-authorization-in-accessibe--b6933120</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49920%3A%20Missing%20Authorization%20in%20accessiBe%20Web%20Accessibility%20By%20accessiBe&amp;severity=medium&amp;id=68f8efeb04677bbd794397f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49917-server-side-request-forgery-ssrf-in-dcad35dc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49917%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Icegram%20Icegram%20Express%20Pro&amp;severity=medium&amp;id=68f8efeb04677bbd794397f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49915-improper-neutralization-of-special--d10a9e1f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49915%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=critical&amp;id=68f8efea04677bbd794397c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49912-improper-neutralization-of-input-du-e2b9c72a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nks%20Email%20Subscription%20Popup&amp;severity=medium&amp;id=68f8efea04677bbd794397c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49911-improper-neutralization-of-input-du-3a3a3282</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpinstinct%20WooCommerce%20Vehicle%20Parts%20Finder&amp;severity=high&amp;id=68f8efea04677bbd794397c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49910-missing-authorization-in-amentotech-7ee4ab94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49910%3A%20Missing%20Authorization%20in%20AmentoTech%20Private%20Limited%20WPGuppy&amp;severity=high&amp;id=68f8efea04677bbd794397be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49908-improper-neutralization-of-input-du-20369c20</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49908%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPClever%20WPC%20Countdown%20Timer%20for%20WooCommerce&amp;severity=medium&amp;id=68f8efea04677bbd794397bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49907-missing-authorization-in-realmag777-7d293354</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49907%3A%20Missing%20Authorization%20in%20RealMag777%20MDTF&amp;severity=medium&amp;id=68f8efea04677bbd794397b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49906-missing-authorization-in-stellarwp--370654d5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49906%3A%20Missing%20Authorization%20in%20StellarWP%20WPComplete&amp;severity=medium&amp;id=68f8efea04677bbd794397b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49903-missing-authorization-in-bdthemes-z-858fe8db</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49903%3A%20Missing%20Authorization%20in%20bdthemes%20ZoloBlocks&amp;severity=medium&amp;id=68f8efea04677bbd794397b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49901-authentication-bypass-using-an-alte-000d706e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49901%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=critical&amp;id=68f8efea04677bbd794397af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49899-missing-authorization-in-jjlemstra--b655d126</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49899%3A%20Missing%20Authorization%20in%20jjlemstra%20Whydonate&amp;severity=medium&amp;id=68f8efea04677bbd794397ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49380-deserialization-of-untrusted-data-i-3f8f7dbb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49380%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpinstinct%20WooCommerce%20Vehicle%20Parts%20Finder&amp;severity=critical&amp;id=68f8efe904677bbd79439797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49378-improper-neutralization-of-special--a71edfd8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49378%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themefic%20Hydra%20Booking&amp;severity=high&amp;id=68f8efe904677bbd79439794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49377-missing-authorization-in-themefic-h-dd934b94</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49377%3A%20Missing%20Authorization%20in%20Themefic%20Hydra%20Booking&amp;severity=medium&amp;id=68f8efe904677bbd79439791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49376-missing-authorization-in-delucks-de-b0acff8e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49376%3A%20Missing%20Authorization%20in%20DELUCKS%20DELUCKS%20SEO&amp;severity=medium&amp;id=68f8efe904677bbd7943978e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49060-unrestricted-upload-of-file-with-da-63678d3a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49060%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CMSSuperHeroes%20Wastia&amp;severity=critical&amp;id=68f8efe904677bbd7943978b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48338-improper-control-of-filename-for-in-d7195aa0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48338%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Kevon%20Adonis%20WP%20Abstracts&amp;severity=high&amp;id=68f8efe904677bbd79439788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48106-unrestricted-upload-of-file-with-da-d250c5bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48106%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CMSSuperHeroes%20Clanora&amp;severity=critical&amp;id=68f8efe904677bbd79439785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48099-cross-site-request-forgery-csrf-in--dcb2be1a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48099%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Code%20Amp%20Search%20%26%20Filter&amp;severity=medium&amp;id=68f8efe904677bbd79439782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48098-improper-neutralization-of-input-du-e36f9886</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48098%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=high&amp;id=68f8efe904677bbd7943977f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48097-improper-neutralization-of-input-du-8f37fe32</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48097%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shiva%20WSAnalytics&amp;severity=high&amp;id=68f8efe904677bbd7943977c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48096-missing-authorization-in-freshface--234f5c42</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48096%3A%20Missing%20Authorization%20in%20FRESHFACE%20Custom%20CSS&amp;severity=medium&amp;id=68f8efe804677bbd79439745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48095-improper-neutralization-of-input-du-5bbabecd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48095%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=medium&amp;id=68f8efe804677bbd79439742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48093-improper-neutralization-of-input-du-9fcbae2f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48093%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Calvaweb%20Password%20only%20login&amp;severity=high&amp;id=68f8efe804677bbd7943973f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48092-improper-neutralization-of-input-du-f9734beb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jurajpuchky%20Fix%20Multiple%20Redirects&amp;severity=high&amp;id=68f8efe804677bbd7943973c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48091-improper-neutralization-of-special--3ffc37ce</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48091%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Alexander%20AnyComment&amp;severity=high&amp;id=68f8efe804677bbd79439739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39534-improper-neutralization-of-input-du-b54ccadc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39534%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Somonator%20Terms%20Dictionary&amp;severity=high&amp;id=68f8efe804677bbd79439736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32657-improper-control-of-filename-for-in-b0708ff2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32657%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Testimonial%20Slider%20And%20Showcase%20Pro&amp;severity=high&amp;id=68f8efe804677bbd79439733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32283-deserialization-of-untrusted-data-i-db727760</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32283%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Solar%20Energy&amp;severity=high&amp;id=68f8efe804677bbd79439730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31634-deserialization-of-untrusted-data-i-1a7fcecf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31634%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Insurance&amp;severity=high&amp;id=68f8efe804677bbd7943972d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30944-missing-authorization-in-essekia-ta-3d1778e7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30944%3A%20Missing%20Authorization%20in%20Essekia%20Tablesome%20Table%20Premium&amp;severity=high&amp;id=68f8efe804677bbd7943972a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57870-cwe-89-improper-neutralization-of-s-52468760</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57870%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=critical&amp;id=68f8eff304677bbd794399e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webctrlcgiblue-angel-software-suite-exploit-attemp-2639e953</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=webctrl.cgi%2FBlue%20Angel%20Software%20Suite%20Exploit%20Attempts.%20Maybe%20CVE-2025-34033%20Variant%26%23x3f%3B%2C%20(Wed%2C%20Oct%2022nd)&amp;severity=medium&amp;id=68f9856a93bcde9f320d1cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/socgholish-malware-using-compromised-sites-and-fak-b6ee9fd2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SocGholish%20Malware%20Using%20Compromised%20Sites%20and%20Fake%20Software%20Updates%20to%20Deliver%20Ransomware&amp;severity=medium&amp;id=68f8e7f537b5c18bc8279a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-pivots-cracks-down-on-low-level-hackers-b5e786d6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20Pivots%2C%20Cracks%20Down%20on%20Resident%20Hackers&amp;severity=medium&amp;id=68f8e46737b5c18bc8200478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-path-traversal-to-supply-chain-compromise-bre-161bc713</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Path%20Traversal%20to%20Supply%20Chain%20Compromise%3A%20Breaking%20MCP%20Server%20Hosting&amp;severity=medium&amp;id=68f8e49737b5c18bc820e4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8848-cwe-94-improper-control-of-generatio-ec36af05</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8848%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=68f8e49237b5c18bc820c5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerabilities-patched-in-tp-links-omada-9fdedc17</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerabilities%20Patched%20in%20TP-Link%E2%80%99s%20Omada%20Gateways&amp;severity=critical&amp;id=68f8e01d2e6b0a7b0dd18d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-targets-100-gov-entities-in-mea-with-ph-9e431c60</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20Targets%20100%2B%20Gov%20Entities%20in%20MEA%20With%20Phoenix%20Backdoor&amp;severity=medium&amp;id=68f9841f93bcde9f320ce1e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11844-cwe-643-improper-neutralization-of--02fb03fe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11844%3A%20CWE-643%20Improper%20Neutralization%20of%20Data%20within%20XPath%20Expressions%20in%20huggingface%20huggingface%2Fsmolagents&amp;severity=medium&amp;id=68f8dca32e6b0a7b0dc9bfb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11750-cwe-544-missing-standardized-error--569abda6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11750%3A%20CWE-544%20Missing%20Standardized%20Error%20Handling%20Mechanism%20in%20langgenius%20langgenius%2Fdify&amp;severity=medium&amp;id=68f8dca32e6b0a7b0dc9bfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-threat-actors-exploit-toolshell-sharepoint-2f425f77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Threat%20Actors%20Exploit%20ToolShell%20SharePoint%20Flaw%20Weeks%20After%20Microsoft&apos;s%20July%20Patch&amp;severity=medium&amp;id=68f9831e93bcde9f320bfbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-security-paradox-of-local-llms-f614d401</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20security%20paradox%20of%20local%20LLMs&amp;severity=medium&amp;id=68f8d4ae79108345beae04be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-time-is-itx3f-accuracy-of-poolntporg-tue-oct--94972b3e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20time%20is%20it%26%23x3f%3B%20Accuracy%20of%20pool.ntp.org.%2C%20(Tue%2C%20Oct%2021st)&amp;severity=medium&amp;id=68f78c23a08cdec9506cd8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11411-cwe-349-acceptance-of-extraneous-un-0a5bf447</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11411%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20NLnet%20Labs%20Unbound&amp;severity=medium&amp;id=68f8d2c779108345beab68dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-switches-to-new-backdoor-after-malware-cd849e43</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20Switches%20to%20New%20Backdoor%20After%20Malware%20Exposed%20by%20Researchers&amp;severity=medium&amp;id=68f8c847c46ffb59836826e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bridging-the-remediation-gap-introducing-pentera-r-0c2edfa6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bridging%20the%20Remediation%20Gap%3A%20Introducing%20Pentera%20Resolve&amp;severity=critical&amp;id=68f9831e93bcde9f320bfbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-nethereum-nuget-package-used-homoglyph-trick--1830795d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Nethereum%20NuGet%20Package%20Used%20Homoglyph%20Trick%20to%20Steal%20Crypto%20Wallet%20Keys&amp;severity=medium&amp;id=68f9831e93bcde9f320bfbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11086-cwe-269-improper-privilege-manageme-b9d4c655</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11086%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20academylms%20Academy%20LMS%20Pro&amp;severity=high&amp;id=68f8c035f0152f21d78f1008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jingle-thief-inside-a-cloud-based-gift-card-fraud--edef2e6f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jingle%20Thief%3A%20Inside%20a%20Cloud-Based%20Gift%20Card%20Fraud%20Campaign&amp;severity=medium&amp;id=68f8efcd04677bbd79438542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fencing-and-pet-company-jewett-cameron-hit-by-rans-f657e0f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fencing%20and%20Pet%20Company%20Jewett-Cameron%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=68f8c01bf0152f21d78f0166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-releases-october-2025-patches-48725978</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Releases%20October%202025%20Patches&amp;severity=critical&amp;id=68f8ac89d137066578396fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/verizon-mobile-blindspot-leads-to-needless-data-br-cd23a84f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Verizon%3A%20Mobile%20Blindspot%20Leads%20to%20Needless%20Data%20Breaches&amp;severity=medium&amp;id=68f8ac7bd137066578390b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-you-should-swap-passwords-for-passphrases-f2cffa3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20You%20Should%20Swap%20Passwords%20for%20Passphrases&amp;severity=low&amp;id=68f9831e93bcde9f320bfbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6833-cwe-639-authorization-bypass-through-b45949b6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6833%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codebangers%20All%20in%20One%20Time%20Clock%20Lite%20%E2%80%93%20Tracking%20Employee%20Time%20Has%20Never%20Been%20Easier&amp;severity=medium&amp;id=68f8a807ce3bbdd80f3596fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-34-zero-days-on-first-day-of-pwn2o-495657af</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploit%2034%20zero-days%20on%20first%20day%20of%20Pwn2Own%20Ireland&amp;severity=high&amp;id=68f8a479ce3bbdd80f2cd005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cursor-windsurf-ides-riddled-with-94-n-day-chromiu-bb4d731d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cursor%2C%20Windsurf%20IDEs%20riddled%20with%2094%2B%20n-day%20Chromium%20vulnerabilities&amp;severity=high&amp;id=68f8a479ce3bbdd80f2cd015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vidar-stealer-20-adds-multi-threaded-data-theft-be-44957d78</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vidar%20Stealer%202.0%20adds%20multi-threaded%20data%20theft%2C%20better%20evasion&amp;severity=high&amp;id=68f8a479ce3bbdd80f2cd011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-four-omada-gateway-flaws-two-allow-2c9a85fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20Four%20Omada%20Gateway%20Flaws%2C%20Two%20Allow%20Remote%20Code%20Execution&amp;severity=high&amp;id=68f8a479ce3bbdd80f2cd00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11915-cwe-444-inconsistent-interpretation-3cf55591</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11915%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Google%20Cloud%20Vertex%20AI%3A%20Partner%20Models%20for%20MaaS&amp;severity=medium&amp;id=68f8a4c3ce3bbdd80f2df544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-identify-passiveneuron-apt-using-neurs-760e4c0b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Identify%20PassiveNeuron%20APT%20Using%20Neursite%20and%20NeuralExecutor%20Malware&amp;severity=medium&amp;id=68f89fcadd2148b88894b0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11825-cwe-79-improper-neutralization-of-i-addd1d96</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11825%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pedrolaxe%20Playerzbr&amp;severity=medium&amp;id=68f897b0d59611fbd969791b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10047-cwe-89-improper-neutralization-of-s-5301ca8a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10047%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pmbaldha%20Email%20Tracker&amp;severity=medium&amp;id=68f897afd59611fbd96978c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11883-cwe-79-improper-neutralization-of-i-d49195b5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11883%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rene-puchinger%20Responsive%20Progress%20Bar&amp;severity=medium&amp;id=68f897b2d59611fbd9697951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11817-cwe-79-improper-neutralization-of-i-309453ac</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11817%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20garyhukkeri%20Simple%20Tableau%20Viz&amp;severity=medium&amp;id=68f897afd59611fbd96978ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11870-cwe-79-improper-neutralization-of-i-1992682f</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11870%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dmbarber%20Simple%20Business%20Data&amp;severity=medium&amp;id=68f897b1d59611fbd9697935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11867-cwe-79-improper-neutralization-of-i-116e6ce2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vbog%20Bg%20Book%20Publisher&amp;severity=medium&amp;id=68f897b1d59611fbd9697931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11819-cwe-79-improper-neutralization-of-i-c43438f2</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11819%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robocasters%20WP-Thumbnail&amp;severity=medium&amp;id=68f897b0d59611fbd9697911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11824-cwe-79-improper-neutralization-of-i-b8722ee3</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20madebycinza%20Cinza%20Grid&amp;severity=medium&amp;id=68f897b0d59611fbd9697916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11866-cwe-79-improper-neutralization-of-i-0f7bab03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aurelienpierre%20Photographers%20galleries&amp;severity=medium&amp;id=68f897b1d59611fbd969792d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11830-cwe-79-improper-neutralization-of-i-b93f8d94</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdrift%20WP%20Restaurant%20Listings&amp;severity=medium&amp;id=68f897b0d59611fbd9697925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11880-cwe-79-improper-neutralization-of-i-fb7f3806</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11880%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sierramike%20SM%20CountDown%20Widget&amp;severity=medium&amp;id=68f897b2d59611fbd969794d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11811-cwe-79-improper-neutralization-of-i-afa3d0bd</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11811%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matthewmarichiba%20Simple%20Youtube%20Shortcode&amp;severity=medium&amp;id=68f897afd59611fbd96978e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11813-cwe-79-improper-neutralization-of-i-3f34769a</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pressmaninc%20Responsive%20iframe%20GoogleMap&amp;severity=medium&amp;id=68f897afd59611fbd96978e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11810-cwe-79-improper-neutralization-of-i-07b6ecfd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chrishurst%20Name%3A%20Print%20Button%20Shortcode&amp;severity=medium&amp;id=68f897afd59611fbd96978df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11818-cwe-79-improper-neutralization-of-i-e96e787d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11818%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vobi%20WP%20Responsive%20Meet%20The%20Team&amp;severity=medium&amp;id=68f897afd59611fbd96978f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11807-cwe-79-improper-neutralization-of-i-beb4491c</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrgeorgegray%20Mixlr%20Shortcode&amp;severity=medium&amp;id=68f897afd59611fbd96978d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10138-cwe-79-improper-neutralization-of-i-e406bfc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10138%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andrex84%20This-or-That&amp;severity=medium&amp;id=68f897afd59611fbd96978cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11827-cwe-79-improper-neutralization-of-i-969cfe2c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11827%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oboxgroup%20Oboxmedia%20Ads&amp;severity=medium&amp;id=68f897b0d59611fbd9697920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11878-cwe-79-improper-neutralization-of-i-5ffa44ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beautifultemplates%20ST%20Categories%20Widget&amp;severity=medium&amp;id=68f897b2d59611fbd9697949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11809-cwe-79-improper-neutralization-of-i-fa1d556d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nazakatali32%20WP-Force%20Images%20Download&amp;severity=medium&amp;id=68f897afd59611fbd96978db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11872-cwe-79-improper-neutralization-of-i-1e25f405</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11872%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mcostales84%20Material%20Design%20Iconic%20Font%20Integration&amp;severity=medium&amp;id=68f897b1d59611fbd9697939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11804-cwe-79-improper-neutralization-of-i-ebfcd22a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jobair%20JB%20News%20Ticker&amp;severity=medium&amp;id=68f897afd59611fbd96978d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11834-cwe-79-improper-neutralization-of-i-3544d69c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11834%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wiellyam%20WP%20AD%20Gallery&amp;severity=medium&amp;id=68f897b0d59611fbd9697929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11952-cwe-79-improper-neutralization-of-i-f1429ea3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11952%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Oct8ne%20Chatbot&amp;severity=medium&amp;id=68f897b2d59611fbd9697956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41110-cwe-287-improper-authentication-in--cc8ecdda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41110%3A%20CWE-287%20Improper%20Authentication%20in%20Ghost%20Robotics%20Vision%2060&amp;severity=high&amp;id=68f8942bd59611fbd95e6918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41109-cwe-798-use-of-hard-coded-credentia-49266820</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41109%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Ghost%20Robotics%20Vision%2060&amp;severity=high&amp;id=68f8942ad59611fbd95e690a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41108-cwe-287-improper-authentication-in--fef464fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41108%3A%20CWE-287%20Improper%20Authentication%20in%20Ghost%20Robotics%20Vision%2060&amp;severity=critical&amp;id=68f89429d59611fbd95e68ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-earn-over-520000-on-first-day-of-pwn2own-i-95252bc1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Earn%20Over%20%24520%2C000%20on%20First%20Day%20of%20Pwn2Own%20Ireland%202025&amp;severity=medium&amp;id=68f88c10e21654ab74afd1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tarmageddon-flaw-in-async-tar-rust-library-could-e-e0b926a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TARmageddon%20Flaw%20in%20Async-Tar%20Rust%20Library%20Could%20Enable%20Remote%20Code%20Execution&amp;severity=critical&amp;id=68f9831e93bcde9f320bfbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41724-cwe-239failure-to-handle-incomplete-f0cddbc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41724%3A%20CWE-239%3AFailure%20to%20Handle%20Incomplete%20Element%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=high&amp;id=68f886d515c9ea51bb7190c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41723-cwe-35path-traversal-in-sauter-modu-7719e10e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41723%3A%20CWE-35%3APath%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=critical&amp;id=68f886d515c9ea51bb7190c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41722-cwe-798-use-of-hard-coded-credentia-bb25f452</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41722%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=high&amp;id=68f8835515c9ea51bb6854f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41721-cwe-77improper-neutralization-of-sp-5efa09b0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41721%3A%20CWE-77%3AImproper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=low&amp;id=68f8835515c9ea51bb6854f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41720-cwe-646reliance-on-file-name-or-ext-dd42a7ce</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41720%3A%20CWE-646%3AReliance%20on%20File%20Name%20or%20Extension%20of%20Externally-Supplied%20File%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=medium&amp;id=68f8816c15c9ea51bb64fa28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41719-cwe-1286improper-validation-of-synt-0718017a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41719%3A%20CWE-1286%3AImproper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=high&amp;id=68f8816c15c9ea51bb64fa25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10570-cwe-639-authorization-bypass-throug-4975db7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10570%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpdesk%20Flexible%20Refund%20and%20Return%20Order%20for%20WooCommerce&amp;severity=medium&amp;id=68f87dba01fe9fee6c20e446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12033-cwe-79-improper-neutralization-of-i-85567379</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12033%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rpetersen29%20Simple%20Banner%20%E2%80%93%20Easily%20add%20multiple%20Banners%2FBars%2FNotifications%2FAnnouncements%20to%20the%20top%20or%20bottom%20of%20your%20website&amp;severity=medium&amp;id=68f87dba01fe9fee6c20e44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10588-cwe-352-cross-site-request-forgery--ba016e8a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10588%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pixelyoursite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20%26%20API%20Manager&amp;severity=medium&amp;id=68f87dba01fe9fee6c20e44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5983-cwe-601-url-redirection-to-untrusted-ea0a8fa7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5983%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Meta%20Tag%20Manager&amp;severity=medium&amp;id=68f875a3431d95e35de16147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10638-cwe-862-missing-authorization-in-ns-b198ef91</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10638%3A%20CWE-862%20Missing%20Authorization%20in%20NS%20Maintenance%20Mode%20for%20WP&amp;severity=medium&amp;id=68f875a3431d95e35de16144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unlocking-free-wifi-on-british-airways-2e558a3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unlocking%20free%20WiFi%20on%20British%20Airways&amp;severity=medium&amp;id=68f86e89431d95e35dd02a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10651-cwe-79-improper-neutralization-of-i-8f62059a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10651%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uscnanbu%20Welcart%20e-Commerce&amp;severity=medium&amp;id=68f86dad5aedc7cf04246c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-four-omada-gateway-flaws-two-allow-b15bc3da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20Four%20Omada%20Gateway%20Flaws%2C%20Two%20Allow%20Remote%20Code%20Execution&amp;severity=critical&amp;id=68f9831e93bcde9f320bfbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brazilian-caminho-loader-employs-lsb-steganography-a13f600a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brazilian%20Caminho%20Loader%20Employs%20LSB%20Steganography%20and%20Fileless%20Execution%20to%20Deliver%20Multiple%20Malware%20Families%20Across%20South%20America%2C%20Africa%2C%20and%20Eastern%20Europe&amp;severity=medium&amp;id=68f8c95f88c5cfbf96a22627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22167-path-traversal-arbitrary-readwrite--3042529d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22167%3A%20Path%20Traversal%20(Arbitrary%20Read%2FWrite)%20in%20Atlassian%20Jira%20Software%20Data%20Center&amp;severity=high&amp;id=68f8307187e9a01451ebf3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asian-nations-ramp-up-pressure-on-cybercrime-scam--feca4a4e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asian%20Nations%20Ramp%20Up%20Pressure%20on%20Cybercrime%20&apos;Scam%20Factories&apos;&amp;severity=medium&amp;id=68f9841f93bcde9f320ce1e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-22-89aa788e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-22&amp;severity=medium&amp;id=68f97123a68f163431ee7400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60343-na-d54e1a5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60343%3A%20n%2Fa&amp;severity=high&amp;id=68f91cdf2887d40ca3c19bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60342-na-5e09a8f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60342%3A%20n%2Fa&amp;severity=high&amp;id=68f91cdf2887d40ca3c19bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60341-na-e1d049da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60341%3A%20n%2Fa&amp;severity=high&amp;id=68f919682887d40ca3ba54fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60340-na-354723cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60340%3A%20n%2Fa&amp;severity=high&amp;id=68f915e12887d40ca3b4b713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60339-na-8888ea39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60339%3A%20n%2Fa&amp;severity=high&amp;id=68f915e12887d40ca3b4b710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60337-na-19eafbc3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60337%3A%20n%2Fa&amp;severity=high&amp;id=68f91416519b403272390e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60336-na-a36c53f8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60336%3A%20n%2Fa&amp;severity=high&amp;id=68f91416519b403272390e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60338-na-bb77ac72</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60338%3A%20n%2Fa&amp;severity=high&amp;id=68f8fc246e01a0ac47db56a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60335-na-6889e0c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60335%3A%20n%2Fa&amp;severity=high&amp;id=68f8fa3f6e01a0ac47d8a3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60334-na-bbbddb20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60334%3A%20n%2Fa&amp;severity=high&amp;id=68f8f7aea2d588d2bde2ff37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60333-na-5477565e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60333%3A%20n%2Fa&amp;severity=high&amp;id=68f8f7aea2d588d2bde2ff34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60331-na-58c93695</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60331%3A%20n%2Fa&amp;severity=high&amp;id=68f8f43ba2d588d2bddb93c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60332-na-3141d43f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60332%3A%20n%2Fa&amp;severity=high&amp;id=68f8f249a2d588d2bdd990e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56447-na-c35cb2a0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56447%3A%20n%2Fa&amp;severity=critical&amp;id=68f8e80537b5c18bc8279b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61035-na-1d9ef3fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61035%3A%20n%2Fa&amp;severity=high&amp;id=68f8e49237b5c18bc820c5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58274-cwe-78-improper-neutralization-of-s-1a40631c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58274%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hikvision%20CSMP%20iSecure%20Center&amp;severity=high&amp;id=68f856df8c4621f9a336a1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53691-cwe-24-path-traversal-filedir-in-hi-882e1cf1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53691%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Hikvision%20CSMP%20iSecure%20Center&amp;severity=high&amp;id=68f856df8c4621f9a336a1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62775-cwe-669-incorrect-resource-transfer-5bbba3c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62775%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Mercku%20M6a&amp;severity=high&amp;id=68f8501287e9a014511a9019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62774-cwe-331-insufficient-entropy-in-mer-e40dad61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62774%3A%20CWE-331%20Insufficient%20Entropy%20in%20Mercku%20M6a&amp;severity=low&amp;id=68f8501287e9a014511a9015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62773-cwe-912-hidden-functionality-in-mer-9436ca64</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62773%3A%20CWE-912%20Hidden%20Functionality%20in%20Mercku%20M6a&amp;severity=low&amp;id=68f8501287e9a014511a9011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62772-cwe-305-authentication-bypass-by-pr-d4e2908c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62772%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Mercku%20M6a&amp;severity=low&amp;id=68f8501287e9a014511a900d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62771-cwe-352-cross-site-request-forgery--3cb7e8e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62771%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mercku%20M6a&amp;severity=high&amp;id=68f8501287e9a014511a9009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61756-easily-exploitable-vulnerability-al-1b5aaf76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61756%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=68f8144a6b1ace0f36b001a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casting-a-netty-for-bugs-and-catching-a-big-one-cv-7990ce9a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casting%20a%20Net(ty)%20for%20Bugs%2C%20and%20Catching%20a%20Big%20One%20(CVE-2025-59419)&amp;severity=critical&amp;id=68f805f5061d6011e857c8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mirai-the-iot-botnet-9e031f8c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mirai%3A%20The%20IoT%20Botnet&amp;severity=medium&amp;id=68f8941fd59611fbd95e412e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tykit-analysis-new-phishing-kit-stealing-hundreds--d337919c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tykit%20Analysis%3A%20New%20Phishing%20Kit%20Stealing%20Hundreds%20of%20Microsoft%20Accounts%20in%20Finance&amp;severity=medium&amp;id=68f88fd4e21654ab74ba35c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/electronic-warfare-puts-commercial-gps-users-on-no-388ae97f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Electronic%20Warfare%20Puts%20Commercial%20GPS%20Users%20on%20Notice&amp;severity=medium&amp;id=68f8343e87e9a01451028aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62641-easily-exploitable-vulnerability-al-6f76e0a5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62641%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62592-easily-exploitable-vulnerability-al-b987be96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62592%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=68f7e97201721c03c6f13f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62591-easily-exploitable-vulnerability-al-1f43d916</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62591%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=68f7e97201721c03c6f13f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62590-easily-exploitable-vulnerability-al-9c0015f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62590%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62589-easily-exploitable-vulnerability-al-5cc4d88c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62589%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62588-easily-exploitable-vulnerability-al-15f76695</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62588%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62587-easily-exploitable-vulnerability-al-a0bd34b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62587%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62481-easily-exploitable-vulnerability-al-b3306be9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62481%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Marketing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Marketing.%20in%20Oracle%20Corporation%20Oracle%20Marketing&amp;severity=critical&amp;id=68f7e97201721c03c6f13f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62480-easily-exploitable-vulnerability-al-394250b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62480%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=low&amp;id=68f7e97201721c03c6f13f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62479-easily-exploitable-vulnerability-al-8e7c5c9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62479%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=low&amp;id=68f7e97201721c03c6f13f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62478-easily-exploitable-vulnerability-al-ebbc8979</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62478%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97201721c03c6f13f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62477-easily-exploitable-vulnerability-al-98f4948e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62477%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97201721c03c6f13f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62476-easily-exploitable-vulnerability-al-f8c80c31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62476%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97201721c03c6f13f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62475-easily-exploitable-vulnerability-al-39decc46</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62475%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97201721c03c6f13f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62290-easily-exploitable-vulnerability-al-7f5d936a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62290%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=high&amp;id=68f7e97201721c03c6f13f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62289-easily-exploitable-vulnerability-al-f9475939</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62289%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97101721c03c6f13eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62288-easily-exploitable-vulnerability-al-ed50aeb5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62288%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Health%20Sciences%20Data%20Management%20Workbench.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Health%20Sciences%20Data%20Management%20Workbench%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Health%20Sciences%20Data%20Management%20Workbench&amp;severity=medium&amp;id=68f7e97101721c03c6f13eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62287-easily-exploitable-vulnerability-al-66ccdafe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62287%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20InForm.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Life%20Sciences%20InForm%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20InForm&amp;severity=medium&amp;id=68f7e97101721c03c6f13ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61885-easily-exploitable-vulnerability-al-1d05ec65</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61885%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20InForm.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20InForm&amp;severity=medium&amp;id=68f7e97101721c03c6f13ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61881-difficult-to-exploit-vulnerability--0d2ac84b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61881%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Java%20VM.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Java%20VM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=68f7e97101721c03c6f13ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61764-easily-exploitable-vulnerability-al-c1cc7bee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61764%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=68f7e97101721c03c6f13edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61763-easily-exploitable-vulnerability-al-0acf5a24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61763%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Essbase.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Essbase%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Essbase%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Essbase&amp;severity=high&amp;id=68f7e97101721c03c6f13edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61762-easily-exploitable-vulnerability-al-775fe056</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61762%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Payables.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20FIN%20Payables%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20FIN%20Payables%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20PeopleSoft%20Enterprise%20FIN%20Payables.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Payables&amp;severity=medium&amp;id=68f7e97101721c03c6f13ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61761-easily-exploitable-vulnerability-al-3b55b785</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61761%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management&amp;severity=medium&amp;id=68f7e97101721c03c6f13ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61760-difficult-to-exploit-vulnerability--daf50cc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61760%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97101721c03c6f13ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61759-easily-exploitable-vulnerability-al-ac23fe1e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61759%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61758-easily-exploitable-vulnerability-al-0a1e2f57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61758%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20IT%20Asset%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20IT%20Asset%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20IT%20Asset%20Management&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61757-easily-exploitable-vulnerability-al-e6a75922</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61757%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Identity%20Manager.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Identity%20Manager.%20in%20Oracle%20Corporation%20Identity%20Manager&amp;severity=critical&amp;id=68f7e96f01721c03c6f13e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61755-difficult-to-exploit-vulnerability--b1890674</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61755%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20GraalVM%20for%20JDK.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20GraalVM%20for%20JDK%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20GraalVM%20for%20JDK&amp;severity=low&amp;id=68f7e96f01721c03c6f13e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61754-easily-exploitable-vulnerability-al-d829e4f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61754%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20BI%20Publisher.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20BI%20Publisher%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20BI%20Publisher&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61753-easily-exploitable-vulnerability-al-dffe752c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61753%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Scripting.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Scripting%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Scripting%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Scripting%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Scripting&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61752-easily-exploitable-vulnerability-al-02e1bf24</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61752%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%2F2%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20WebLogic%20Server.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=high&amp;id=68f7e96f01721c03c6f13e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61751-easily-exploitable-vulnerability-al-bc591457</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61751%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=68f7e96f01721c03c6f13e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61750-easily-exploitable-vulnerability-al-28af73fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61750%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61749-easily-exploitable-vulnerability-al-d1eb9249</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61749%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20DBA%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Unified%20Audit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Unified%20Audit%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=68f7e96f01721c03c6f13e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61748-difficult-to-exploit-vulnerability--c47b1bb9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61748%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=68f7e96f01721c03c6f13e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53072-easily-exploitable-vulnerability-al-1b560ecf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53072%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Marketing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Marketing.%20in%20Oracle%20Corporation%20Oracle%20Marketing&amp;severity=critical&amp;id=68f7e96f01721c03c6f13e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53071-easily-exploitable-vulnerability-al-aff75ee5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53071%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53070-easily-exploitable-vulnerability-al-7c44fa44</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53070%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Solaris%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53069-easily-exploitable-vulnerability-al-6150c453</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53069%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53068-easily-exploitable-vulnerability-al-ad8604af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53068%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Solaris%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53067-easily-exploitable-vulnerability-al-ce0aa0b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53067%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53066-easily-exploitable-vulnerability-al-640079b2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53066%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=68f7e96f01721c03c6f13e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53065-easily-exploitable-vulnerability-al-51a0f3d6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53065%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53064-easily-exploitable-vulnerability-al-3f186fe3</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53064%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53063-easily-exploitable-vulnerability-al-cb8808f2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53063%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53062-easily-exploitable-vulnerability-al-213e28ab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53062%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53061-easily-exploitable-vulnerability-al-1e0226db</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53061%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20While%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53060-easily-exploitable-vulnerability-al-4696ac2e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53060%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20JD%20Edwards%20EnterpriseOne%20Tools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53059-easily-exploitable-vulnerability-al-079f839e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53059%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53058-easily-exploitable-vulnerability-al-dddc40be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53058%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Manager.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Applications%20Manager%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Manager%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Applications%20Manager%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Manager&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53057-difficult-to-exploit-vulnerability--04100289</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53057%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53056-easily-exploitable-vulnerability-al-69e76422</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53056%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20JD%20Edwards%20EnterpriseOne%20Tools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53055-easily-exploitable-vulnerability-al-a09852bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53055%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53054-easily-exploitable-vulnerability-al-4ce202fa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53054%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53053-easily-exploitable-vulnerability-al-ceb8f5ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53053%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96d01721c03c6f13dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53052-easily-exploitable-vulnerability-al-6cef64ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53052%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Workflow.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Workflow%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Workflow%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Workflow%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Workflow&amp;severity=medium&amp;id=68f7e96d01721c03c6f13df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53051-easily-exploitable-vulnerability-al-eda986bd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53051%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20SYSDBA%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20RDBMS%20Functional%20Index.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20RDBMS%20Functional%20Index%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=68f7e96d01721c03c6f13df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53050-easily-exploitable-vulnerability-al-aec91c58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53050%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20PeopleSoft%20Enterprise%20PeopleTools.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=high&amp;id=68f7e96d01721c03c6f13df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53049-easily-exploitable-vulnerability-al-89d258e3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53049%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Business%20Intelligence%20Enterprise%20Edition&amp;severity=high&amp;id=68f7e96d01721c03c6f13df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53048-easily-exploitable-vulnerability-al-b33bd7b1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53048%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96d01721c03c6f13ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53047-easily-exploitable-vulnerability-al-5e18e2e5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53047%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Bonjour%20to%20compromise%20Portable%20Clusterware.%20%20While%20the%20vulnerability%20is%20in%20Portable%20Clusterware%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Portable%20Clusterware%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=68f7e96d01721c03c6f13dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53046-easily-exploitable-vulnerability-al-ed13818c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53046%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e96d01721c03c6f13de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53045-easily-exploitable-vulnerability-al-79a46f25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53045%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96d01721c03c6f13de4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53044-easily-exploitable-vulnerability-al-6d030414</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53044%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96d01721c03c6f13de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53043-easily-exploitable-vulnerability-al-6915cefd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53043%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Product%20Hub.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Product%20Hub%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Product%20Hub%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Product%20Hub&amp;severity=high&amp;id=68f7e96c01721c03c6f13dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53042-easily-exploitable-vulnerability-al-52833639</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53042%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53041-easily-exploitable-vulnerability-al-a5ad1c44</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53041%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20iStore.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20iStore%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20iStore%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20iStore%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20iStore&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53040-easily-exploitable-vulnerability-al-e3feb773</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53040%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53037-easily-exploitable-vulnerability-al-768a4355</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53037%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=critical&amp;id=68f7e96c01721c03c6f13dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53036-easily-exploitable-vulnerability-al-853ab8c0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53036%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=68f7e96c01721c03c6f13dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53035-easily-exploitable-vulnerability-al-407e1517</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53035%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53034-easily-exploitable-vulnerability-al-1abd9ad6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53034%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50075-easily-exploitable-vulnerability-al-5341b988</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50075%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50074-easily-exploitable-vulnerability-al-f1877392</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50074%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing&amp;severity=medium&amp;id=68f7e96c01721c03c6f13db8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62661-cwe-276-incorrect-default-permissio-b2298725</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62661%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Thanks%20Extension%2C%20Mediawiki%20-%20Growth%20Experiments%20Extension&amp;severity=medium&amp;id=68f7e40601721c03c6e7330b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salt-typhoon-apt-targets-global-telecom-and-energy-5760f494</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salt%20Typhoon%20APT%20Targets%20Global%20Telecom%20and%20Energy%20Sectors%2C%20Says%20Darktrace&amp;severity=medium&amp;id=68f7e1630ecb6bf811944952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polaredge-targets-cisco-asus-qnap-synology-routers-0150cb39</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PolarEdge%20Targets%20Cisco%2C%20ASUS%2C%20QNAP%2C%20Synology%20Routers%20in%20Expanding%20Botnet%20Campaign&amp;severity=high&amp;id=68f7d1841612af152e93b339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/real-time-audio-deepfakes-are-now-a-reality-f30b247f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Real-Time%20Audio%20Deepfakes%20Are%20Now%20a%20Reality&amp;severity=medium&amp;id=68f7d1841612af152e93b345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-evolve-malware-pushed-in-i-am-not--434b3061</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20hackers%20evolve%20malware%20pushed%20in%20%22I%20am%20not%20a%20robot%22%20captchas&amp;severity=high&amp;id=68f7d1841612af152e93b33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62249-cwe-79-improper-neutralization-of-i-447eb88d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62249%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68f7d1bd1612af152e93e22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11757-cwe-155-improper-neutralization-of--56e88257</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11757%3A%20CWE-155%20Improper%20Neutralization%20of%20Wildcards%20or%20Matching%20Symbols%20in%20CloudEdge%20CloudEdge%20App&amp;severity=high&amp;id=68f7c43cdde5d1d51b4c0d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12031-cwe-1004-sensitive-cookie-without-h-9fd8446e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12031%3A%20CWE-1004%3A%20Sensitive%20Cookie%20Without%20&apos;HttpOnly&apos;%20Flag%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68f7c43cdde5d1d51b4c0d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8050-cwe-73-external-control-of-file-name-7128149d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8050%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20opentext%20Flipper&amp;severity=medium&amp;id=68f7c43cdde5d1d51b4c0d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-use-deepseek-both-privately-and-securely-ka-f23c6a98</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20use%20DeepSeek%20both%20privately%20and%20securely%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68f7c1f341ea2e78b89c740a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11534-cwe-288-authentication-bypass-using-811d9833</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11534%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Raisecomm%20RAX701-GC-WP-01%20P200R002C52&amp;severity=critical&amp;id=68f7be6441ea2e78b8952f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-self-propagating-vscode-extension-worm-b3f3cc38</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%3A%20Self-Propagating%20VSCode%20Extension%20Worm&amp;severity=medium&amp;id=68f7ddd50ecb6bf8118c7f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62598-cwe-79-improper-neutralization-of-i-8076d8a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62598%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68f7ba157853ccdda8797446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62597-cwe-79-improper-neutralization-of-i-9b87e51b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62597%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68f7ba157853ccdda8797441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62595-cwe-601-url-redirection-to-untruste-50fe52c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62595%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20koajs%20koa&amp;severity=medium&amp;id=68f7b4a07853ccdda86f81c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62518-cwe-843-access-of-resource-using-in-8a9c1aa9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62518%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20astral-sh%20tokio-tar&amp;severity=high&amp;id=68f7b4a07853ccdda86f81b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privacy-and-prizes-rewards-from-a-malicious-browse-33d21902</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privacy%20and%20Prizes%3A%20Rewards%20from%20a%20Malicious%20Browser%20Extension&amp;severity=medium&amp;id=68f7b2cca08cdec950742a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-branding-used-in-new-tech-support-scam-73df4e31</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Branding%20Used%20in%20New%20Tech%20Support%20Scam&amp;severity=medium&amp;id=68f7af44a08cdec95073a2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22166-dos-denial-of-service-in-atlassian--827b25f6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22166%3A%20DoS%20(Denial%20of%20Service)%20in%20Atlassian%20Confluence%20Data%20Center&amp;severity=high&amp;id=68f7b2d6a08cdec950742b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62250-cwe-346-origin-validation-error-in--8c85a559</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62250%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68f7abc9a08cdec95072febd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tiktok-videos-promoting-malware-installation-b2b76930</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TikTok%20Videos%20Promoting%20Malware%20Installation&amp;severity=medium&amp;id=68f7b2cca08cdec9507429fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meta-rolls-out-new-tools-to-protect-whatsapp-and-m-5d064cda</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meta%20Rolls%20Out%20New%20Tools%20to%20Protect%20WhatsApp%20and%20Messenger%20Users%20from%20Scams&amp;severity=medium&amp;id=68f8339087e9a01451fc31bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberespionage-campaign-passiveneuron-targets-mach-d4f05152</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberespionage%20campaign%20PassiveNeuron%20targets%20machines%20running%20Windows%20Server&amp;severity=medium&amp;id=68f7af44a08cdec95073a2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/government-industrial-servers-targeted-in-china-li-80f7f107</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Government%2C%20Industrial%20Servers%20Targeted%20in%20China-Linked%20%E2%80%98PassiveNeuron%E2%80%99%20Campaign&amp;severity=high&amp;id=68f79a2da08cdec9506f41d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polaredge-targets-cisco-asus-qnap-synology-routers-169d781f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PolarEdge%20Targets%20Cisco%2C%20ASUS%2C%20QNAP%2C%20Synology%20Routers%20in%20Expanding%20Botnet%20Campaign&amp;severity=medium&amp;id=68f8339087e9a01451fc31c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9339-cwe-89-improper-neutralization-of-sp-90cf6288</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9339%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Simple%20SA%20SIMPLE.ERP&amp;severity=high&amp;id=68f7932da08cdec9506e3459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/streaming-fraud-campaigns-rely-on-ai-tools-bots-3974731c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Streaming%20Fraud%20Campaigns%20Rely%20on%20AI%20Tools%2C%20Bots&amp;severity=medium&amp;id=68f8343e87e9a01451028aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11625-cwe-287-improper-authentication-in--7ad22a33</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11625%3A%20CWE-287%20Improper%20Authentication%20in%20wolfSSL%20wolfSSH&amp;severity=critical&amp;id=695d4b63a7c70f178f7611fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11151-cwe-200-exposure-of-sensitive-infor-63b83537</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11151%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Beyaz%20Bilgisayar%20Software%20Design%20Industry%20and%20Trade%20Ltd.%20Co.%20CityPLus&amp;severity=high&amp;id=68f796b2a08cdec9506ea1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-365-copilot-arbitrary-data-exfiltration--e118a303</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20365%20Copilot%20-%20Arbitrary%20Data%20Exfiltration%20Via%20Mermaid%20Diagrams&amp;severity=medium&amp;id=68f7851fa08cdec9506bda67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-apple-kentico-microsoft-vu-6958dfb5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20Apple%2C%20Kentico%2C%20Microsoft%20Vulnerabilities&amp;severity=high&amp;id=68f78192a08cdec9506b2f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6239-cwe-200-exposure-of-sensitive-inform-e528b257</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6239%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Zohocorp%20ManageEngine%20Applications%20Manager&amp;severity=medium&amp;id=68f781a9a08cdec9506b3157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/envoy-air-american-airlines-confirms-oracle-ebs-0--c8ba43de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Envoy%20Air%20(American%20Airlines)%20Confirms%20Oracle%20EBS%200-Day%20Breach%20Linked%20to%20Cl0p%20Ransomware&amp;severity=high&amp;id=68f77e12a08cdec9506a7545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-11-23h2-end-of-life-a37b5736</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2011%2023H2%20End%20of%20Life&amp;severity=medium&amp;id=68f77a95a08cdec95069ccc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10020-cwe-77-improper-neutralization-of-s-525ab93d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10020%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20ADManager%20Plus&amp;severity=high&amp;id=68f77e24a08cdec9506a767f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealth-bgp-hijacks-with-urpf-filtering-74fdfdad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealth%20BGP%20Hijacks%20with%20uRPF%20Filtering&amp;severity=medium&amp;id=68f7770da08cdec950690ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10641-cwe-319-cleartext-transmission-of-s-12113cfb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10641%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20EfficientLab%20WorkExaminer%20Professional&amp;severity=high&amp;id=68f7770ba08cdec950690ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10640-cwe-602-client-side-enforcement-of--727102fd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10640%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20EfficientLab%20WorkExaminer%20Professional&amp;severity=critical&amp;id=68f77387a08cdec9506874ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9428-cwe-89-improper-neutralization-of-sp-c3c46b9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9428%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zohocorp%20Analytics%20Plus&amp;severity=high&amp;id=68f77387a08cdec9506874f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10639-cwe-798-use-of-hard-coded-credentia-429367ae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10639%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20EfficientLab%20WorkExaminer%20Professional&amp;severity=high&amp;id=68f77387a08cdec9506874f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-targets-vs-code-extensions-wit-c884df58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Attack%20Targets%20VS%20Code%20Extensions%20With%20%E2%80%98GlassWorm%E2%80%99%20Malware&amp;severity=medium&amp;id=68f77002a08cdec95067798d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-ai-to-benefit-from-ai-94676909</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20AI%20to%20Benefit%20from%20AI&amp;severity=medium&amp;id=68f778e6a08cdec9506979f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7473-cwe-91-xml-injection-aka-blind-xpath-5c4dc517</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7473%3A%20CWE-91%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20Zohocorp%20Endpoint%20Central&amp;severity=medium&amp;id=68f76a99a08cdec9505dbb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/passiveneuron-cyber-spies-target-orgs-with-custom--8931ee41</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98PassiveNeuron%E2%80%99%20Cyber%20Spies%20Target%20Orgs%20With%20Custom%20Malware&amp;severity=medium&amp;id=68f8343e87e9a01451028aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-used-snappybee-malware-and-citrix-flaw-to--7d0f1a09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Used%20Snappybee%20Malware%20and%20Citrix%20Flaw%20to%20Breach%20European%20Telecom%20Network&amp;severity=high&amp;id=68f75d097f1dc93a1e7a1d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5496-cwe-269-improper-privilege-managemen-62594cba</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5496%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Zohocorp%20Endpoint%20Central&amp;severity=low&amp;id=68f762f3fa1db7d161aa94c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-73000-watchguard-firebox-devices-impacted-by--f67a0e4a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2073%2C000%20WatchGuard%20Firebox%20Devices%20Impacted%20by%20Recent%20Critical%20Flaw&amp;severity=critical&amp;id=68f75cf67f1dc93a1e79e343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/myanmar-military-shuts-down-major-cybercrime-cente-2e1fc786</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Myanmar%20Military%20Shuts%20Down%20Major%20Cybercrime%20Center%20and%20Detains%20Over%202%2C000%20People&amp;severity=medium&amp;id=68f758df159af2a541c15996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/to-be-a-robot-or-not-to-be-new-malware-attributed--c19c2406</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=To%20Be%20(A%20Robot)%20or%20Not%20to%20Be%3A%20New%20Malware%20Attributed%20to%20Russia%20State-Sponsored%20COLDRIVER&amp;severity=medium&amp;id=68f758f1159af2a541c15c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-phishing-emails-pretend-to-offer-jobs-in-top-f-c9e16dde</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Phishing%20Emails%20Pretend%20to%20Offer%20Jobs%20in%20Top%20Firms%20to%20Steal%20Facebook%20Logins&amp;severity=medium&amp;id=68f750b0cab76000dd2a7865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10612-cwe-79-improper-neutralization-of-i-56c8a3aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20giSoft%20Information%20Technologies%20City%20Guide&amp;severity=medium&amp;id=68f74b48cab76000dd20dfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-confirms-exploitation-of-latest-oracle-ebs-vu-00d83904</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Confirms%20Exploitation%20of%20Latest%20Oracle%20EBS%20Vulnerability&amp;severity=medium&amp;id=68f748e76588c2a0ccddaf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/article-kerberos-security-attacks-and-detection-52d9726a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BArticle%5D%20Kerberos%20Security%3A%20Attacks%20and%20Detection&amp;severity=medium&amp;id=68f740e575ebabd95bb1c959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26392-cwe-89-improper-neutralization-of-s-7b88a781</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26392%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=68f73d5075ebabd95ba9f32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-identifies-three-new-russian-malware-famili-62a06544</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Identifies%20Three%20New%20Russian%20Malware%20Families%20Created%20by%20COLDRIVER%20Hackers&amp;severity=low&amp;id=68f73955d69d6f92d657d10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11949-cwe-306-missing-authentication-for--476d88ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11949%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Digiwin%20EasyFlow%20.NET&amp;severity=high&amp;id=68f731c8068ea03ee5af7f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12004-cwe-732-incorrect-permission-assign-e4ef87a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12004%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Lockdown%20Extension&amp;severity=critical&amp;id=68f72c58068ea03ee5a63d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10916-cwe-73-external-control-of-file-nam-9c91d826</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10916%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20FormGent&amp;severity=critical&amp;id=68f724a6523859c72c10f9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62701-cwe-79-improper-neutralization-of-i-fecbad38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikistories&amp;severity=medium&amp;id=68f713c10f6a5ff36739b251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62702-cwe-79-improper-neutralization-of-i-bc0b858b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62702%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20PageTriage%20Extension&amp;severity=medium&amp;id=68f7103e0f6a5ff36732bb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62694-cwe-79-improper-neutralization-of-i-8e11ab71</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62694%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20WikiLove%20Extension&amp;severity=medium&amp;id=68f70e570f6a5ff3672ff423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62695-cwe-79-improper-neutralization-of-i-d5a4eda6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20WikiLambda%20Extension&amp;severity=medium&amp;id=68f708cf187cf981f21c9b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62696-cwe-77-improper-neutralization-of-s-6da6e8d1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62696%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20Foundation%20-%20Springboard%20Extension&amp;severity=medium&amp;id=68f70e570f6a5ff3672ff427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62699-cwe-200-exposure-of-sensitive-infor-53b5edb3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62699%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Translate%20Extension&amp;severity=medium&amp;id=68f70566187cf981f21700e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9133-cwe-862-missing-authorization-in-zyx-9f9b9459</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9133%3A%20CWE-862%20Missing%20Authorization%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=high&amp;id=68f6f0dbb870ea37e2aefe45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8078-cwe-78-improper-neutralization-of-sp-491e49e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8078%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=high&amp;id=68f6f0dbb870ea37e2aefe42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7851-vulnerability-in-tp-link-systems-inc-fc5e84d7</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7851%3A%20Vulnerability%20in%20TP-Link%20Systems%20Inc.%20Omada%20gateways&amp;severity=high&amp;id=68f6d853b870ea37e2a651e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7850-cwe-78-improper-neutralization-of-sp-ea7871c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7850%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Omada%20gateways&amp;severity=critical&amp;id=68f6d853b870ea37e2a651e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6542-cwe-78-improper-neutralization-of-sp-d3ffc6ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6542%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Omada%20gateways&amp;severity=critical&amp;id=68f6d853b870ea37e2a651dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6541-cwe-78-improper-neutralization-of-sp-34885acc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6541%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Omada%20gateways&amp;severity=high&amp;id=68f6d853b870ea37e2a651d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-21-a456d457</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-21&amp;severity=medium&amp;id=68f8216e1fa795c94c4b2a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52079-na-5292046b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52079%3A%20n%2Fa&amp;severity=high&amp;id=68f7e1720ecb6bf811944a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61457-na-58cfa808</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61457%3A%20n%2Fa&amp;severity=medium&amp;id=68f7dc040ecb6bf8118a36e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56802-na-f7cfd176</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56802%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9a4247d717aace21685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56801-na-a88e56ff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56801%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9a4247d717aace21681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56800-na-0ca70483</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56800%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9a4247d717aace2167d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56799-na-1ad2327b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56799%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9a4247d717aace21679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61255-na-4b0d0aae</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61255%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d410247d717aacd8c59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60507-na-83bf8c05</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60507%3A%20n%2Fa&amp;severity=high&amp;id=68f7c9acdde5d1d51b5517bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60790-na-4cc1f59a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60790%3A%20n%2Fa&amp;severity=medium&amp;id=68f7c43cdde5d1d51b4c0d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60427-na-20b43510</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60427%3A%20n%2Fa&amp;severity=medium&amp;id=68f7c43cdde5d1d51b4c0d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60772-na-b71e1c33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60772%3A%20n%2Fa&amp;severity=critical&amp;id=68f7be6441ea2e78b8952f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60511-na-5b068702</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60511%3A%20n%2Fa&amp;severity=medium&amp;id=68f7be6441ea2e78b8952f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60506-na-5ab4b573</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60506%3A%20n%2Fa&amp;severity=medium&amp;id=68f7be6441ea2e78b8952f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60500-na-d8a0e77f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60500%3A%20n%2Fa&amp;severity=high&amp;id=68f7be6441ea2e78b8952f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62763-cwe-918-server-side-request-forgery-ef8d059c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62763%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Zimbra%20Collaboration&amp;severity=medium&amp;id=68f7bc7541ea2e78b89317a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60280-na-2a296f76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60280%3A%20n%2Fa&amp;severity=medium&amp;id=68f7af4da08cdec95073a432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61220-na-d6acc624</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61220%3A%20n%2Fa&amp;severity=high&amp;id=68f7abc9a08cdec95072fec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61194-na-090a8f6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61194%3A%20n%2Fa&amp;severity=medium&amp;id=68f7a844a08cdec950723b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60751-na-89eac558</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60751%3A%20n%2Fa&amp;severity=high&amp;id=68f7a844a08cdec950723b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61181-na-84e74787</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61181%3A%20n%2Fa&amp;severity=medium&amp;id=68f7a844a08cdec950723b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60344-na-61323593</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60344%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20D-Link%20DSR-150&amp;severity=high&amp;id=68f7a4cea08cdec950718deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56450-na-4aab1ca0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56450%3A%20n%2Fa&amp;severity=medium&amp;id=68f7a4cea08cdec950718de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57521-na-9dc346a5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57521%3A%20n%2Fa&amp;severity=medium&amp;id=68f7a146a08cdec95070f589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60934-na-d2974705</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60934%3A%20n%2Fa&amp;severity=medium&amp;id=68f79dc6a08cdec950700394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60933-na-0a76309c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60933%3A%20n%2Fa&amp;severity=medium&amp;id=68f79dc6a08cdec950700391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60932-na-0b98d863</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60932%3A%20n%2Fa&amp;severity=medium&amp;id=68f79dc6a08cdec95070038e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59438-na-17201df9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59438%3A%20n%2Fa&amp;severity=medium&amp;id=68f79a48a08cdec9506f4bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dns0eu-private-dns-service-shuts-down-over-sustain-818a88a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DNS0.EU%20private%20DNS%20service%20shuts%20down%20over%20sustainability%20issues&amp;severity=high&amp;id=68f6c63b81b1d362526373ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-lynk-group-leaks-sensitive-uk-mod-files-in-44fe32a2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Lynk%20group%20leaks%20sensitive%20UK%20MoD%20files%2C%20including%20info%20on%20eight%20military%20bases&amp;severity=high&amp;id=68f6c63b81b1d362526373ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-october-21st-2025-httpsi-e403e625</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20October%2021st%2C%202025%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9664%2C%20(Mon%2C%20Oct%2020th)&amp;severity=medium&amp;id=68f6bec880866bef67247b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12001-cwe-20-improper-input-validation-in-96c4a1a6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12001%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68f6b0519b180d42fd423cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-spreading-glassworm-malware-hits-openvsx-vs-c-e2d7523e</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-spreading%20GlassWorm%20malware%20hits%20OpenVSX%2C%20VS%20Code%20registries&amp;severity=high&amp;id=68f6b0009b180d42fd4135c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-75000-watchguard-security-devices-vulnerable--83aaced6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2075%2C000%20WatchGuard%20security%20devices%20vulnerable%20to%20critical%20RCE&amp;severity=critical&amp;id=68f6b0009b180d42fd4135bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/retail-giant-muji-halts-online-sales-after-ransomw-01b7ae6c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Retail%20giant%20Muji%20halts%20online%20sales%20after%20ransomware%20attack%20on%20supplier&amp;severity=high&amp;id=68f6b0009b180d42fd4135bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-new-exploited-bugs-land-in-cisas-catalog-orac-21b6af4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20New%20Exploited%20Bugs%20Land%20in%20CISA&apos;s%20Catalog%20%E2%80%94%20Oracle%20and%20Microsoft%20Among%20Targets&amp;severity=high&amp;id=68f6b0009b180d42fd4135c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coldriver-drops-fresh-malware-on-targets-64a9baad</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ColdRiver%20Drops%20Fresh%20Malware%20on%20Targets&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11536-cwe-918-server-side-request-forgery-3b5b3872</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11536%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68f6ac1bd243d1f5a41c5f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/international-sting-takes-down-sim-box-criminal-ne-e5393b2f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=International%20Sting%20Takes%20Down%20SIM%20Box%20Criminal%20Network&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-your-car-a-byod-risk-researchers-demonstrate-ho-7682e581</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20Your%20Car%20a%20BYOD%20Risk%3F%20Researchers%20Demonstrate%20How&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62658-cwe-89-improper-neutralization-of-s-38d5d7dd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62658%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20WatchAnalytics%20extension&amp;severity=high&amp;id=68f69d3c82b5baa232a16e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62657-cwe-79-improper-neutralization-of-i-bc18b46d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62657%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20PageForms%20extension&amp;severity=medium&amp;id=68f69d3c82b5baa232a16e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62656-cwe-79-improper-neutralization-of-i-830d2cce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62656%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20GlobalBlocking%20extension&amp;severity=medium&amp;id=68f69d3c82b5baa232a16e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62528-cwe-79-improper-neutralization-of-i-347af122</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62528%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remram44%20taguette&amp;severity=medium&amp;id=68f697d682b5baa2329830c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62527-cwe-15-external-control-of-system-o-cc98c365</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62527%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20remram44%20taguette&amp;severity=high&amp;id=68f697d682b5baa2329830bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8052-cwe-564-sql-injection-in-opentext-fl-3bc75e7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8052%3A%20CWE-564%20SQL%20Injection%20in%20opentext%20Flipper&amp;severity=low&amp;id=68f697d682b5baa2329830c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62522-cwe-22-improper-limitation-of-a-pat-3ad29971</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62522%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite&amp;severity=medium&amp;id=68f697d682b5baa2329830b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8048-cwe-73-external-control-of-file-name-4b617e1b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8048%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20opentext%20Flipper&amp;severity=medium&amp;id=68f695d3769ba8ba7073f766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8049-cwe-1220-insufficient-granularity-of-3b464b87</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8049%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20opentext%20Flipper&amp;severity=low&amp;id=68f695d3769ba8ba7073f769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8051-cwe-35-path-traversal-in-opentext-fl-2aff0d74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8051%3A%20CWE-35%20Path%20Traversal%20in%20opentext%20Flipper&amp;severity=medium&amp;id=68f695d3769ba8ba7073f76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8053-cwe-1220-insufficient-granularity-of-e419b317</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8053%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20opentext%20Flipper&amp;severity=low&amp;id=68f695d3769ba8ba7073f76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/better-auth-critical-account-takeover-via-unauthen-f2040d12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Better-Auth%20Critical%20Account%20Takeover%20via%20Unauthenticated%20API%20Key%20Creation%20(CVE-2025-61928)&amp;severity=critical&amp;id=68f6924d769ba8ba706d73cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62697-cwe-74-improper-neutralization-of-s-ba7e412f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62697%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20LanguageSelector%20Extension&amp;severity=high&amp;id=68f68e75ecfb41cc9f200fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-new-exploited-bugs-land-in-cisas-catalog-orac-0de9f951</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20New%20Exploited%20Bugs%20Land%20in%20CISA&apos;s%20Catalog%20%E2%80%94%20Oracle%20and%20Microsoft%20Among%20Targets&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/south-korea-seeks-to-arrest-dozens-of-online-scam--bdef40a3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=South%20Korea%20Seeks%20to%20Arrest%20Dozens%20of%20Online%20Scam%20Suspects%20Repatriated%20From%20Cambodia&amp;severity=medium&amp;id=68f68726b7571ea2b185f823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5517-cwe-122-heap-based-buffer-overflow-i-0362fdc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5517%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20ABB%20Terra%20AC%20wallbox%20(UL40%2F80A)&amp;severity=medium&amp;id=68f6838cb7571ea2b17f2afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flawed-vendor-guidance-exposes-enterprises-to-avoi-0bfd8040</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flawed%20Vendor%20Guidance%20Exposes%20Enterprises%20to%20Avoidable%20Risk&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62698-cwe-79-improper-neutralization-of-i-02542a06</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62698%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20ExternalGuidance&amp;severity=medium&amp;id=68f67c627bf8d449e91d409b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62700-cwe-79-improper-neutralization-of-i-2ed8c981</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20MultiBoilerplate%20Extensionmaste&amp;severity=medium&amp;id=68f67a417bf8d449e919cf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47902-cwe-89-improper-neutralization-of-s-c9708ccf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47902%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microchip%20Time%20Provider%204100&amp;severity=high&amp;id=68f6785707c863f509432cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3465-cwe-22-improper-limitation-of-a-path-aeceba29</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3465%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ABB%20CoreSense%E2%84%A2%20HM&amp;severity=high&amp;id=68f6785707c863f509432ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62693-cwe-79-improper-neutralization-of-i-a1eeae6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62693%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20LastModified%20Extension&amp;severity=medium&amp;id=68f6785707c863f509432cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55086-cwe-1285-in-eclipse-foundation-next-dde775bc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55086%3A%20CWE-1285%20in%20Eclipse%20Foundation%20NextX%20Duo&amp;severity=medium&amp;id=68f6785707c863f509432cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47901-cwe-78-improper-neutralization-of-s-7f1717fb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47901%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Microchip%20Time%20Provider%204100&amp;severity=high&amp;id=68f6785707c863f509432cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11979-cwe-416-use-after-free-in-mongodb-i-c6e3e1e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11979%3A%20CWE-416%20Use%20After%20Free%20in%20MongoDB%20Inc.%20Server&amp;severity=medium&amp;id=68f6785707c863f509432cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47900-cwe-78-improper-neutralization-of-s-b457946a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47900%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Microchip%20Time%20Provider%204100&amp;severity=high&amp;id=68f6785707c863f509432cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62510-cwe-280-improper-handling-of-insuff-4c414aff</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62510%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20error311%20FileRise&amp;severity=high&amp;id=68f674d107c863f5093c9144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62509-cwe-280-improper-handling-of-insuff-1a0dadee</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62509%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20error311%20FileRise&amp;severity=high&amp;id=68f674d107c863f5093c913f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tunneling-wireguard-over-https-using-wstunnel-bdf53d9f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tunneling%20WireGuard%20over%20HTTPS%20using%20Wstunnel&amp;severity=medium&amp;id=68f674d107c863f5093c916b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9574-cwe-306-missing-authentication-for-c-2fbe3678</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9574%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ABB%20ALS-mini-s4%20IP&amp;severity=critical&amp;id=68f66ab8b4f32a3742401d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6515-cwe-330-use-of-insufficiently-random-74d7342a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6515%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20oatpp%20oatpp-mcp&amp;severity=medium&amp;id=68f6617fd7e10ba5fa8c36f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62429-cwe-94-improper-control-of-generati-f8a5ba0a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62429%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=68f6617fd7e10ba5fa8c36f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10678-cwe-1392-use-of-default-credentials-8231ef9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10678%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20NetBird%20VPN%20NetBird&amp;severity=critical&amp;id=68f65a059f0e7cefe16a9d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-microchip-tech-protects-vehicles-from-laser-at-1ed9c4ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bombarding%20Cars%20With%20Lasers%3A%20Novel%20Auto%20Cyberattacks%20Emerge&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-view-on-a-recent-salt-typhoon-intrusion-5d49395c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20view%20on%20a%20recent%20Salt%20Typhoon%20intrusion&amp;severity=medium&amp;id=68f75555159af2a541b9f98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57738-cwe-653-improper-isolation-or-compa-27df8ae1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57738%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20Apache%20Software%20Foundation%20Apache%20Syncope&amp;severity=high&amp;id=68f64d4e059c7cb96272a087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-propagating-glassworm-attacks-vs-code-supply--6d5edb16</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-Propagating%20GlassWorm%20Attacks%20VS%20Code%20Supply%20Chain&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8884-cwe-639-authorization-bypass-through-68b9802e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8884%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20VHS%20Electronic%20Software%20Ltd.%20Co.%20ACE%20Center&amp;severity=medium&amp;id=68f64b0d50505a0863bf2f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41390-cwe-829-inclusion-of-functionality--e0a7f915</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41390%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Truffle%20Security%20Co.%20TruffleHog&amp;severity=high&amp;id=68f64d4e059c7cb96272a08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11680-cwe-787-out-of-bounds-write-in-warm-f4e9afcf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11680%3A%20CWE-787%20Out-of-bounds%20Write%20in%20warmcat%20libwebsockets&amp;severity=medium&amp;id=68f6439468d8b0c0b432bc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11679-cwe-125-out-of-bounds-read-in-warmc-f0b24989</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11679%3A%20CWE-125%20Out-of-bounds%20Read%20in%20warmcat%20libwebsockets&amp;severity=medium&amp;id=68f6439468d8b0c0b432bc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11678-cwe-121-stack-based-buffer-overflow-13ece604</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11678%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20warmcat%20libwebsocket&amp;severity=high&amp;id=68f6402668d8b0c0b42c1773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysing-clickfix-3-reasons-why-copypaste-attacks-fee115d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysing%20ClickFix%3A%203%20Reasons%20Why%20Copy%2FPaste%20Attacks%20Are%20Driving%20Security%20Breaches&amp;severity=high&amp;id=68f6401268d8b0c0b42bc79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11677-cwe-416-use-after-free-in-warmcat-l-1c9a13bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11677%3A%20CWE-416%20Use%20After%20Free%20in%20warmcat%20libwebsockets&amp;severity=medium&amp;id=68f63e2c68d8b0c0b429afd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/20th-october-threat-intelligence-report-100cd357</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=20th%20October%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=critical&amp;id=68f638650ac38c6dbff6cdcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sim-farm-dismantled-in-europe-seven-arrested-bde49dc4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SIM%20Farm%20Dismantled%20in%20Europe%2C%20Seven%20Arrested&amp;severity=high&amp;id=68f63395f866bd7f70e5a581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-activity-drops-after-doxxing-baf8d7da</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20Activity%20Drops%20After%20Doxxing&amp;severity=medium&amp;id=68f6300df866bd7f70dd4ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connectwise-patches-critical-flaw-in-automate-rmm--6903ecce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ConnectWise%20Patches%20Critical%20Flaw%20in%20Automate%20RMM%20Tool&amp;severity=critical&amp;id=68f62be673b0747ff349a7fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-f5-breached-linux-rootkits-pixnapping-bbdcd3de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20F5%20Breached%2C%20Linux%20Rootkits%2C%20Pixnapping%20Attack%2C%20EtherHiding%20%26%20More&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aws-outage-crashes-amazon-primevideo-fortnite-perp-65e5852d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AWS%20outage%20crashes%20Amazon%2C%20PrimeVideo%2C%20Fortnite%2C%20Perplexity%20and%20more&amp;severity=high&amp;id=68f62bf873b0747ff349aed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysing-clickfix-3-reasons-why-copypaste-attacks-4a9b0d53</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysing%20ClickFix%3A%203%20Reasons%20Why%20Copy%2FPaste%20Attacks%20Are%20Driving%20Security%20Breaches&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/131-chrome-extensions-caught-hijacking-whatsapp-we-8b992db0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=131%20Chrome%20Extensions%20Caught%20Hijacking%20WhatsApp%20Web%20for%20Massive%20Spam%20Campaign&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-configure-privacy-and-security-in-chatgpt-k-b20c8132</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20configure%20privacy%20and%20security%20in%20ChatGPT%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68f60950ed66740820aaf350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8349-cwe-79-improper-neutralization-of-in-b3aead97</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tawk%20Live%20Chat&amp;severity=medium&amp;id=68f6093ced66740820aae006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-dolby-decoder-can-allow-zero-clic-c5830828</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20Dolby%20Decoder%20Can%20Allow%20Zero-Click%20Attacks&amp;severity=low&amp;id=68f6059eed66740820a57c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nso-ordered-to-stop-hacking-whatsapp-but-damages-c-69ddc943</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NSO%20Ordered%20to%20Stop%20Hacking%20WhatsApp%2C%20but%20Damages%20Cut%20to%20%244%20Million&amp;severity=medium&amp;id=68f604eb256a77fc0567920a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/many-online-services-and-websites-affected-by-an-a-db8a312d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Many%20Online%20Services%20and%20Websites%20Affected%20by%20an%20AWS%20Outage%2C%20(Mon%2C%20Oct%2020th)&amp;severity=medium&amp;id=68f604ea256a77fc056791f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mss-claims-nsa-used-42-cyber-tools-in-multi-stage--2059d544</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MSS%20Claims%20NSA%20Used%2042%20Cyber%20Tools%20in%20Multi-Stage%20Attack%20on%20Beijing%20Time%20Systems&amp;severity=high&amp;id=68f5fd3c1a5d33d7b2f0373f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41028-cwe-89-improper-neutralization-of-s-e49230fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41028%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Grupo%20Castilla%20Epsilon%20RH&amp;severity=critical&amp;id=68f5fd4a1a5d33d7b2f03a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ottercandy-malware-used-by-waterplum-6705a1c3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OtterCandy%2C%20malware%20used%20by%20WaterPlum&amp;severity=medium&amp;id=68f5f63a1a5d33d7b2e42ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57837-cwe-200-exposure-of-sensitive-infor-882febea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57837%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Honor%20FCP-AN10&amp;severity=low&amp;id=68f5f23f58c1f730f1d98293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57839-cwe-200-exposure-of-sensitive-infor-e838b3e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57839%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Honor%20MagicOS&amp;severity=medium&amp;id=68f5ee79ee3f99bfc7e1bfb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57838-cwe-200-exposure-of-sensitive-infor-b3771347</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57838%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Honor%20MagicOS&amp;severity=medium&amp;id=68f5ee79ee3f99bfc7e1bfb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31342-cwe-434-unrestricted-upload-of-file-4391e83b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31342%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Galaxy%20Software%20Services%20Corporation%20Vitals%20ESP&amp;severity=critical&amp;id=68f5ee79ee3f99bfc7e1bfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/american-airlines-subsidiary-envoy-air-hit-by-orac-40069e64</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=American%20Airlines%20Subsidiary%20Envoy%20Air%20Hit%20by%20Oracle%20Hack&amp;severity=medium&amp;id=68f5eae0ee3f99bfc7daf5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61932-improper-verification-of-source-of--8024309c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61932%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20MOTEX%20Inc.%20Lanscope%20Endpoint%20Manager%20(On-Premises)%20(Client%20program%20(MR)%20and%20Detection%20agent%20(DA))&amp;severity=critical&amp;id=68f5e704b3e3725554c349af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-syscall-for-obfuscationfileless-activity-mon-a695658b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20Syscall()%20for%20Obfuscation%2FFileless%20Activity%2C%20(Mon%2C%20Oct%2020th)&amp;severity=medium&amp;id=68f5d82f16b8590182261279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62577-incorrect-default-permissions-in-fs-7000f9c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62577%3A%20Incorrect%20default%20permissions%20in%20Fsas%20Technologies%20Inc.%20ETERNUS%20SF%20AdvancedCopy%20Manager%20Standard%20Edition%20(for%20Solaris%2010%2F%2011)&amp;severity=high&amp;id=68f5cd683fa25f9d08ba72fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mss-claims-nsa-used-42-cyber-tools-in-multi-stage--e06c9632</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MSS%20Claims%20NSA%20Used%2042%20Cyber%20Tools%20in%20Multi-Stage%20Attack%20on%20Beijing%20Time%20Systems&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11948-cwe-434-unrestricted-upload-of-file-efde2151</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11948%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Excellent%20Infotek%20Document%20Management%20System&amp;severity=critical&amp;id=68f5b12c4f503908ae911c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-accuses-us-of-cyberattack-on-national-time-c-51cb577f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Accuses%20US%20of%20Cyberattack%20on%20National%20Time%20Center&amp;severity=medium&amp;id=68f58a7e4f503908ae796fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-20-d36baf7f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-20&amp;severity=medium&amp;id=68f6cea1b870ea37e284378d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54764-na-ad689708</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54764%3A%20n%2Fa&amp;severity=medium&amp;id=68f6a8a4d243d1f5a415cf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61303-na-e4f67c7b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61303%3A%20n%2Fa&amp;severity=critical&amp;id=68f6a14fe073070bd6ef9959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61301-na-4dbdf6b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61301%3A%20n%2Fa&amp;severity=high&amp;id=68f6a14fe073070bd6ef9954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60781-na-f265f054</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60781%3A%20n%2Fa&amp;severity=medium&amp;id=68f69f66e073070bd6ed126c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60783-na-31845747</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60783%3A%20n%2Fa&amp;severity=medium&amp;id=68f69d3c82b5baa232a16e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61488-na-eda8f875</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61488%3A%20n%2Fa&amp;severity=high&amp;id=68f67fa87bf8d449e923053c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48025-na-0b0f0c1d</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48025%3A%20n%2Fa&amp;severity=medium&amp;id=68f65c0bd7e10ba5fa83242c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60856-na-99f6c6cc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60856%3A%20n%2Fa&amp;severity=medium&amp;id=68f65c0bd7e10ba5fa832428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55568-na-8657cbd1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55568%3A%20n%2Fa&amp;severity=high&amp;id=68f65a059f0e7cefe16a9d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26782-na-9e045923</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26782%3A%20n%2Fa&amp;severity=high&amp;id=68f656869f0e7cefe163cf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26781-na-0f23c91e</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26781%3A%20n%2Fa&amp;severity=high&amp;id=68f656869f0e7cefe163cf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61417-na-58b3f4c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61417%3A%20n%2Fa&amp;severity=high&amp;id=68f652b7059c7cb9627c07ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54957-na-539cd8e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54957%3A%20n%2Fa&amp;severity=critical&amp;id=68f64f36059c7cb96275288e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61456-na-357e2d5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61456%3A%20n%2Fa&amp;severity=medium&amp;id=68f64d4e059c7cb96272a08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61455-na-d372975c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61455%3A%20n%2Fa&amp;severity=critical&amp;id=68f63bd90ac38c6dbffe0b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61454-na-9005b0c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61454%3A%20n%2Fa&amp;severity=medium&amp;id=68f634eb0ac38c6dbff2af93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56223-na-fdf80d5d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56223%3A%20n%2Fa&amp;severity=high&amp;id=68f634eb0ac38c6dbff2af8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56224-na-d97f3959</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56224%3A%20n%2Fa&amp;severity=high&amp;id=68f633a7f866bd7f70e5a6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56219-na-ec567ddf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56219%3A%20n%2Fa&amp;severity=high&amp;id=68f633a7f866bd7f70e5a6af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experian-fined-32-million-for-mass-collecting-pers-0cd8e478</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experian%20fined%20%243.2%20million%20for%20mass-collecting%20personal%20data&amp;severity=high&amp;id=68f57b63de6e321f23070d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11947-heap-based-buffer-overflow-in-bftpd-04c2b5a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11947%3A%20Heap-based%20Buffer%20Overflow%20in%20bftpd&amp;severity=low&amp;id=68f561fd0acf3516df87a330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11946-cross-site-scripting-in-logicaldoc--6cea66c9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11946%3A%20Cross%20Site%20Scripting%20in%20LogicalDOC%20Community%20Edition&amp;severity=medium&amp;id=68f55abbd03e41f5d7ce2284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11945-cross-site-scripting-in-toeverythin-fd53f05a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11945%3A%20Cross%20Site%20Scripting%20in%20toeverything%20AFFiNE&amp;severity=medium&amp;id=68f556d8283c10e6bde4a71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11944-sql-injection-in-givanz-vvveb-6d219942</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11944%3A%20SQL%20Injection%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68f5484344f1d399063009ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11943-use-of-default-credentials-in-70mai-57cab3c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11943%3A%20Use%20of%20Default%20Credentials%20in%2070mai%20X200&amp;severity=medium&amp;id=68f540b8b572bcaa2b43c10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11942-missing-authentication-in-70mai-x20-317172c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11942%3A%20Missing%20Authentication%20in%2070mai%20X200&amp;severity=medium&amp;id=68f50e6f33dbe6918a21d6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-data-breach-what-happened-and-how-it-impacts-yo-8c427a49</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Data%20Breach%3A%20What%20Happened%20and%20How%20It%20Impacts%20You&amp;severity=critical&amp;id=68f505665c78ab3001fe5759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11941-path-traversal-in-e107-cms-eeec1d2c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11941%3A%20Path%20Traversal%20in%20e107%20CMS&amp;severity=medium&amp;id=68f506f75c78ab30010130f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defenderwrite-abusing-whitelisted-programs-for-arb-9420ecc7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DefenderWrite%3A%20Abusing%20Whitelisted%20Programs%20for%20Arbitrary%20Writes%20into%20Antivirus&apos;s%20Operating%20Folder&amp;severity=medium&amp;id=68f4eda1fcc669043b4f9bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11940-uncontrolled-search-path-in-librewo-7cc9289e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11940%3A%20Uncontrolled%20Search%20Path%20in%20LibreWolf&amp;severity=high&amp;id=68f4a3e9a1caf49d9dcb28ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11939-path-traversal-in-churchcrm-2d917641</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11939%3A%20Path%20Traversal%20in%20ChurchCRM&amp;severity=medium&amp;id=68f49c99a2d65d4c729ee8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11938-deserialization-in-churchcrm-edbd9490</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11938%3A%20Deserialization%20in%20ChurchCRM&amp;severity=medium&amp;id=68f4954ddd9718ca70979f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europol-dismantles-sim-farm-network-powering-49-mi-024a7e76</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europol%20Dismantles%20SIM%20Farm%20Network%20Powering%2049%20Million%20Fake%20Accounts%20Worldwide&amp;severity=medium&amp;id=68f591024f503908ae7cd144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hardbit-40-investigation-by-reyben-cortes-41984652</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HardBit%204.0%20Investigation%20by%20Reyben%20Cortes&amp;severity=medium&amp;id=68facdcb00e9e97283af56c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-19-d3fc21df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-19&amp;severity=medium&amp;id=68f57f34424fb841ffc0f36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62672-na-a500cfe1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62672%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20boyns%20rplay&amp;severity=medium&amp;id=68f43dd577122960c164e2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-airport-chaos-to-cyber-intrigue-everest-gang--71029c3b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Airport%20chaos%20to%20cyber%20intrigue%3A%20Everest%20Gang%20takes%20credit%20for%20Collins%20Aerospace%20breach%20-%20Security%20Affairs&amp;severity=high&amp;id=68f403d7099f60e0b7fe466b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/winos-40-hackers-expand-to-japan-and-malaysia-with-d58136a4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Winos%204.0%20hackers%20expand%20to%20Japan%20and%20Malaysia%20with%20new%20malware&amp;severity=medium&amp;id=68f403d7099f60e0b7fe466f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notice-google-gemini-ais-undisclosed-911-auto-dial-93405d38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notice%3A%20Google%20Gemini%20AI&apos;s%20Undisclosed%20911%20Auto-Dial%20Bypass%20%E2%80%93%20Logs%20and%20Evidence%20Available&amp;severity=critical&amp;id=68f3cc8e9bcc951554e2d6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47410-cwe-352-cross-site-request-forgery--058a3311</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Geode&amp;severity=high&amp;id=68f3b0a2a1588a753f9e7244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-net-capi-backdoor-targets-russian-auto-and-e-c-14dece74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20.NET%20CAPI%20Backdoor%20Targets%20Russian%20Auto%20and%20E-Commerce%20Firms%20via%20Phishing%20ZIPs&amp;severity=high&amp;id=68f39f94cbcef15488c39fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/american-airlines-subsidiary-envoy-confirms-oracle-501bab35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=American%20Airlines%20subsidiary%20Envoy%20confirms%20Oracle%20data%20theft%20attack&amp;severity=high&amp;id=68f370bf9828099f3096efa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connectwise-fixes-automate-bug-allowing-aitm-updat-85668075</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ConnectWise%20fixes%20Automate%20bug%20allowing%20AiTM%20update%20attacks&amp;severity=high&amp;id=68f370bf9828099f3096efa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-expands-winos-40-attacks-to-japan-and-m-b27e1677</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Expands%20Winos%204.0%20Attacks%20to%20Japan%20and%20Malaysia%20via%20HoldingHands%20RAT&amp;severity=high&amp;id=68f370bf9828099f3096efaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11926-cwe-79-improper-neutralization-of-i-45c4b447</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11926%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdreams%20Related%20Posts%20Lite&amp;severity=medium&amp;id=68f361e78febb5b10781da79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9890-cwe-352-cross-site-request-forgery-c-55937c52</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9890%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mndpsingh287%20Theme%20Editor&amp;severity=high&amp;id=68f352f16320622d3355204a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5555-stack-based-buffer-overflow-in-nixdo-1a9e9be3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5555%3A%20Stack-based%20Buffer%20Overflow%20in%20Nixdorf%20Wincor%20PORT%20IO%20Driver&amp;severity=high&amp;id=68f34ba09cdc1302af5780fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10750-cwe-200-exposure-of-sensitive-infor-bb3d3f9f</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10750%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cyberlord92%20PowerBI%20Embed%20Reports&amp;severity=medium&amp;id=68f3445827133b8ceda05e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11256-cwe-285-improper-authorization-in-k-3c49a6a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11256%3A%20CWE-285%20Improper%20Authorization%20in%20kognetiks%20Kognetiks%20Chatbot%20for%20WordPress&amp;severity=medium&amp;id=68f3445827133b8ceda05e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-expands-winos-40-attacks-to-japan-and-m-b014396f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Expands%20Winos%204.0%20Attacks%20to%20Japan%20and%20Malaysia%20via%20HoldingHands%20RAT&amp;severity=medium&amp;id=68f43e5777122960c1652c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11691-cwe-89-improper-neutralization-of-s-3ab6f026</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11691%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeisle%20PPOM%20%E2%80%93%20Product%20Addons%20%26%20Custom%20Fields%20for%20WooCommerce&amp;severity=high&amp;id=68f33944197c8629076f80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11372-cwe-862-missing-authorization-in-th-95d639c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11372%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=68f33944197c8629076f80c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11391-cwe-434-unrestricted-upload-of-file-2c60773c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11391%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeisle%20PPOM%20%E2%80%93%20Product%20Addons%20%26%20Custom%20Fields%20for%20WooCommerce&amp;severity=critical&amp;id=68f33944197c8629076f80ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11270-cwe-79-improper-neutralization-of-i-c4e4a0cf</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11270%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=68f33944197c8629076f80c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11519-cwe-639-authorization-bypass-throug-ba40b26c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11519%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20optimole%20Optimole%20%E2%80%93%20Optimize%20Images%20in%20Real%20Time&amp;severity=medium&amp;id=68f33944197c8629076f80db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11510-cwe-285-improper-authorization-in-n-e890a4e4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11510%3A%20CWE-285%20Improper%20Authorization%20in%20ninjateam%20FileBird%20%E2%80%93%20WordPress%20Media%20Library%20Folders%20%26%20File%20Manager&amp;severity=medium&amp;id=68f33944197c8629076f80d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9562-cwe-79-improper-neutralization-of-in-1d40aebd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9562%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Redirection%20for%20Contact%20Form%207&amp;severity=medium&amp;id=68f33945197c8629076fa118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11703-cwe-349-acceptance-of-extraneous-un-01a25b47</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11703%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=68f33944197c8629076f80e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10006-cwe-79-improper-neutralization-of-i-05f7f7ce</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10006%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=68f33944197c8629076f80b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10187-cwe-89-improper-neutralization-of-s-597c2a5e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10187%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20creative-solutions-1%20GSpeech%20TTS%20%E2%80%93%20WordPress%20Text%20To%20Speech%20Plugin&amp;severity=medium&amp;id=68f33944197c8629076f80bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11741-cwe-639-authorization-bypass-throug-ba1864c3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11741%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpclever%20WPC%20Smart%20Quick%20View%20for%20WooCommerce&amp;severity=medium&amp;id=68f33945197c8629076fa114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11517-cwe-639-authorization-bypass-throug-078b8190</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11517%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20stellarwp%20Event%20Tickets%20and%20Registration&amp;severity=high&amp;id=68f33944197c8629076f80d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11742-cwe-862-missing-authorization-in-wp-f735f0ad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11742%3A%20CWE-862%20Missing%20Authorization%20in%20wpclever%20WPC%20Smart%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=68f32a83bd206a5487a89662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11857-cwe-79-improper-neutralization-of-i-40f03655</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11857%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mxp%20XX2WP%20Integration%20Tools&amp;severity=medium&amp;id=68f32a83bd206a5487a89666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11738-cwe-73-external-control-of-file-nam-7bd2b601</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11738%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=68f32a83bd206a5487a8965d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11937-cwe-79-improper-neutralization-of-i-4547ad51</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20SecurePoll%20Extension&amp;severity=medium&amp;id=68f3288dbd206a5487a3223a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62666-cwe-770-allocation-of-resources-wit-5a044c36</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62666%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20CirrusSearch%20Extension&amp;severity=medium&amp;id=68f31f48eba81d1dad81143c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62667-cwe-79-improper-neutralization-of-i-9b892851</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments%20Extension&amp;severity=medium&amp;id=68f31f48eba81d1dad811440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62668-cwe-276-incorrect-default-permissio-fd526937</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62668%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments%20Extension&amp;severity=medium&amp;id=68f31bbeeba81d1dad79f298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62669-cwe-200-exposure-of-sensitive-infor-55efe4b5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62669%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20CentralAuth%20Extension&amp;severity=medium&amp;id=68f31bbeeba81d1dad79f29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62670-cwe-79-improper-neutralization-of-i-6ed0ddc8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20FlexDiagrams%20Extension&amp;severity=medium&amp;id=68f319cceba81d1dad76b569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11361-cwe-918-server-side-request-forgery-b8f2d118</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11361%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=68f319cceba81d1dad76b565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62671-cwe-79-improper-neutralization-of-i-dbbd73e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62671%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=68f319cceba81d1dad76b56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62662-cwe-79-improper-neutralization-of-i-de3cfa0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20AdvancedSearch%20Extension&amp;severity=medium&amp;id=68f317da8ff74c446c8a11eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62663-cwe-79-improper-neutralization-of-i-af2537f0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20UploadWizard%20Extension&amp;severity=medium&amp;id=68f317da8ff74c446c8a11ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62664-cwe-79-improper-neutralization-of-i-b54d33d7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20ImageRating%20Extension&amp;severity=medium&amp;id=68f317da8ff74c446c8a11f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62665-cwe-79-improper-neutralization-of-i-f66e9e58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62665%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Skin%3ABlueSky&amp;severity=medium&amp;id=68f314568ff74c446c82ccd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11378-cwe-862-missing-authorization-in-sh-6762cb4e</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11378%3A%20CWE-862%20Missing%20Authorization%20in%20shortpixel%20ShortPixel%20Image%20Optimizer%20%E2%80%93%20Optimize%20Images%2C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=68f30d8cba51437ed4aaca68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-18-9190835c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-18&amp;severity=medium&amp;id=68f42bc1512992bed08622fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62655-cwe-89-improper-neutralization-of-s-ce74ba60</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62655%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20Cargo%20extension&amp;severity=low&amp;id=68f2cadb9c34d0947f492883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62654-cwe-79-improper-neutralization-of-i-fa1f3570</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62654%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20QuizGame%20extension&amp;severity=low&amp;id=68f2c7559c34d0947f4887e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62653-cwe-79-improper-neutralization-of-i-5a41e0e1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62653%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20PollNY%20extension&amp;severity=low&amp;id=68f30b9cba51437ed4a824e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62652-cwe-79-improper-neutralization-of-i-9540b2a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62652%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20WebAuthn%20extension&amp;severity=medium&amp;id=68f2c3d09c34d0947f47e1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62515-cwe-502-deserialization-of-untruste-91ef1bfa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62515%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20marsupialtail%20quokka&amp;severity=critical&amp;id=68f2ab359c34d0947f42a464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11914-path-traversal-in-shenzhen-ruiming--5184be78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11914%3A%20Path%20Traversal%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f2ab359c34d0947f42a45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62508-cwe-79-improper-neutralization-of-i-234e0f70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62508%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=68f2aebd9c34d0947f437b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-fixes-highest-severity-aspnet-core-flaw--8086a971</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20fixes%20highest-severity%20ASP.NET%20Core%20flaw%20ever&amp;severity=high&amp;id=68f2a7ae9c34d0947f41ca5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europol-dismantles-sim-box-operation-renting-numbe-fd267a13</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europol%20dismantles%20SIM%20box%20operation%20renting%20numbers%20for%20cybercrime&amp;severity=high&amp;id=68f2a7ae9c34d0947f41ca5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11913-path-traversal-in-shenzhen-ruiming--b07303b9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11913%3A%20Path%20Traversal%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f2a4339c34d0947f40c74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11912-sql-injection-in-shenzhen-ruiming-t-5612c2aa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11912%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f2a4339c34d0947f40c744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11925-cwe-754-improper-check-for-unusual--a7ed82d0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11925%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68f2a0a79c34d0947f3fb6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62511-cwe-367-time-of-check-time-of-use-t-c0bf1169</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62511%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20zheny-creator%20YtGrabber-TUI&amp;severity=medium&amp;id=68f2a0a79c34d0947f3fb6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11911-sql-injection-in-shenzhen-ruiming-t-a90f5c5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11911%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f29d239c34d0947f3eff5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11910-sql-injection-in-shenzhen-ruiming-t-fe6044ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11910%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f29d239c34d0947f3eff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34282-cwe-918-server-side-request-forgery-82d72a6d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34282%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThingsBoard%2C%20Inc.%20ThingsBoard&amp;severity=medium&amp;id=68f28f159c34d0947f3bb428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34281-cwe-79-improper-neutralization-of-i-c8b0980b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34281%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ThingsBoard%2C%20Inc.%20ThingsBoard&amp;severity=medium&amp;id=68f28f159c34d0947f3bb423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11909-sql-injection-in-shenzhen-ruiming-t-4d6d812d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11909%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f28f159c34d0947f3bb41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11908-unrestricted-upload-in-shenzhen-rui-7cb292b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11908%3A%20Unrestricted%20Upload%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f28f159c34d0947f3bb416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62505-cwe-918-server-side-request-forgery-0755ce4e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62505%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lobehub%20lobe-chat&amp;severity=low&amp;id=68f28b909c34d0947f3b1473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-malware-and-attack-expansion-a-hacker-gro-00b433af</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20Malware%20and%20Attack%20Expansion%3A%20A%20Hacker%20Group&apos;s%20Journey%20across%20Asia&amp;severity=medium&amp;id=68f5f5be58c1f730f1e065df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-disrupts-ransomware-campaign-abusing-azu-068b694c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Disrupts%20Ransomware%20Campaign%20Abusing%20Azure%20Certificates&amp;severity=medium&amp;id=68f43f2a77122960c1656a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62430-cwe-79-improper-neutralization-of-i-f8b4237d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62430%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=68f284899c34d0947f39a008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62424-cwe-22-improper-limitation-of-a-pat-31aeb83b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62424%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=68f27d809c34d0947f370a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-agent-security-whose-responsibility-is-it-0c7fc083</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Agent%20Security%3A%20Whose%20Responsibility%20Is%20It%3F&amp;severity=medium&amp;id=68f43f2a77122960c1656a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tiktok-videos-promoting-malware-installation-fri-o-c915aba1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TikTok%20Videos%20Promoting%20Malware%20Installation%2C%20(Fri%2C%20Oct%2017th)&amp;severity=low&amp;id=68f1f4589c34d0947f07f3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-russia-china-increasingly-using-ai-to-es-e188af61</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%3A%20Russia%2C%20China%20Increasingly%20Using%20AI%20to%20Escalate%20Cyberattacks%20on%20the%20US&amp;severity=medium&amp;id=68f26f669c34d0947f3317a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62168-cwe-209-generation-of-error-message-87fa303f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62168%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20squid-cache%20squid&amp;severity=critical&amp;id=68f26f829c34d0947f331b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8414-cwe-20-improper-input-validation-in--77d2d526</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8414%3A%20CWE-20%20Improper%20Input%20Validation%20in%20silabs.com%20Simplicity%20SDK&amp;severity=critical&amp;id=68f26bed9c34d0947f3176bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/capi-backdoor-net-stealer-targeting-russian-auto-c-459ca4e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CAPI%20Backdoor%3A%20.NET%20Stealer%20Targeting%20Russian%20Auto-Commerce&amp;severity=medium&amp;id=68f268639c34d0947f2fb2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58747-cwe-79-improper-neutralization-of-i-732f4fea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58747%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=low&amp;id=68f268709c34d0947f2fc04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-chat-data-is-historys-most-thorough-record-of-e-60d469af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Chat%20Data%20Is%20History&apos;s%20Most%20Thorough%20Record%20of%20Enterprise%20Secrets.%20Secure%20It%20Wisely&amp;severity=medium&amp;id=68f43f2a77122960c1656a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62356-cwe-22-improper-limitation-of-a-pat-3d1f9415</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62356%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Qodo%20Qodo%20Gen&amp;severity=high&amp;id=68f264e59c34d0947f2e3de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11905-code-injection-in-yanyutao0402-chan-78b75398</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11905%3A%20Code%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68f264e59c34d0947f2e3de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/email-bombs-exploit-lax-authentication-in-zendesk-691b5add</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Email%20Bombs%20Exploit%20Lax%20Authentication%20in%20Zendesk&amp;severity=high&amp;id=68f2615f9c34d0947f2ce6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11904-sql-injection-in-yanyutao0402-chanc-9b55c7e8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11904%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68f25ddf9c34d0947f2bbef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55085-cwe-125-out-of-bounds-read-in-eclip-133baa34</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55085%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=high&amp;id=68f256d89c34d0947f29326a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48087-cwe-79-improper-neutralization-of-i-9e6124f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48087%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jason%20C.%20Memberlite%20Shortcodes&amp;severity=medium&amp;id=68f253519c34d0947f285c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11903-sql-injection-in-yanyutao0402-chanc-fc7d450f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11903%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68f24fd29c34d0947f2503e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11902-sql-injection-in-yanyutao0402-chanc-94adf364</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11902%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68f24fd29c34d0947f2503d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48044-cwe-863-incorrect-authorization-in--c0eb71bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48044%3A%20CWE-863%20Incorrect%20Authorization%20in%20ash-project%20ash&amp;severity=high&amp;id=68f24c4a9c34d0947f23ccc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-crowdstrike-vulnerabilities-cisa-lay-125ab212</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20CrowdStrike%20Vulnerabilities%2C%20CISA%20Layoffs%2C%20Mango%20Data%20Breach&amp;severity=medium&amp;id=68f248bc9c34d0947f22e051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-combine-beavertail-and-otterc-a7507f78</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Combine%20BeaverTail%20and%20OtterCookie%20into%20Advanced%20JS%20Malware&amp;severity=medium&amp;id=68f43e5777122960c1652c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-links-why-your-website-traffic-is-declining-f6cc87f0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20links%3A%20why%20your%20website%20traffic%20is%20declining&amp;severity=medium&amp;id=68f268639c34d0947f2fb2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-package-with-adaptixc2-framework-agent-f-1419d77f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20package%20with%20AdaptixC2%20framework%20agent%20found%20in%20npm%20registry&amp;severity=medium&amp;id=68f268639c34d0947f2fb372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/links-to-porn-and-online-casinos-hidden-inside-cor-d8f2847a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Links%20to%20porn%20and%20online%20casinos%20hidden%20inside%20corporate%20websites&amp;severity=medium&amp;id=68f2293b9c34d0947f196f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-steal-sensitive-data-from-auction-house-so-9f38a086</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Steal%20Sensitive%20Data%20From%20Auction%20House%20Sotheby%E2%80%99s&amp;severity=medium&amp;id=68f229159c34d0947f196c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-perplexity-comet-browser-download-ads-pu-1dfe242f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Perplexity%20Comet%20Browser%20Download%20Ads%20Push%20Password%20Stealer%20Via%20Google%20Search&amp;severity=medium&amp;id=68f2259b9c34d0947f17c982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28815-vulnerability-in-hikvision-isecure--e6054b77</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28815%3A%20Vulnerability%20in%20Hikvision%20iSecure%20Center&amp;severity=critical&amp;id=68f30b9cba51437ed4a824e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28814-vulnerability-in-hikvision-isecure--c7ca8c98</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28814%3A%20Vulnerability%20in%20Hikvision%20iSecure%20Center&amp;severity=critical&amp;id=68f225aa9c34d0947f17ca54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/identity-security-your-first-and-last-line-of-defe-5497e0f7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Identity%20Security%3A%20Your%20First%20and%20Last%20Line%20of%20Defense&amp;severity=medium&amp;id=68f43e5777122960c1652c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/powerschool-hacker-got-four-years-in-prison-a3f28143</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PowerSchool%20hacker%20got%20four%20years%20in%20prison&amp;severity=medium&amp;id=68f222299c34d0947f168b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-watchguard-vpn-bug-that-could--71bc42b1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20WatchGuard%20VPN%20Bug%20That%20Could%20Let%20Attackers%20Take%20Over%20Devices&amp;severity=high&amp;id=68f222299c34d0947f168b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/highest-ever-severity-score-assigned-by-microsoft--6b2f16c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Highest%20Ever%E2%80%99%20Severity%20Score%20Assigned%20by%20Microsoft%20to%20ASP.NET%20Core%20Vulnerability&amp;severity=high&amp;id=68f2220d9c34d0947f168903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11895-cwe-639-authorization-bypass-throug-1b08bc2c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11895%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20letscms%20Binary%20MLM%20Plan&amp;severity=medium&amp;id=68f210859c34d0947f1033d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-watchguard-vpn-bug-that-could--9bfb583e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20WatchGuard%20VPN%20Bug%20That%20Could%20Let%20Attackers%20Take%20Over%20Devices&amp;severity=critical&amp;id=68f43e5777122960c1652c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-brief-nation-state-actor-steals-f5-source-c-a454f9e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Brief%3A%20Nation-State%20Actor%20Steals%20F5%20Source%20Code%20and%20Undisclosed%20Vulnerabilities&amp;severity=medium&amp;id=68f20cfe9c34d0947f0f3de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/auction-giant-sothebys-says-data-breach-exposed-fi-1b9f42c8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Auction%20giant%20Sotheby%E2%80%99s%20says%20data%20breach%20exposed%20financial%20information&amp;severity=high&amp;id=68f20cfe9c34d0947f0f3dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-revokes-200-fraudulent-certificates-used-6335f99b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Revokes%20200%20Fraudulent%20Certificates%20Used%20in%20Rhysida%20Ransomware%20Campaign&amp;severity=high&amp;id=68f209799c34d0947f0e6bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prosper-data-breach-impacts-176-million-accounts-a7e3f7f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prosper%20Data%20Breach%20Impacts%2017.6%20Million%20Accounts&amp;severity=medium&amp;id=68f2026a9c34d0947f0ce078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-allow-disruption-of-phoenix-contac-8b2315d4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20Allow%20Disruption%20of%20Phoenix%20Contact%20UPS%20Devices&amp;severity=low&amp;id=68f1fee59c34d0947f0b8972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gladinet-patches-exploited-centrestack-vulnerabili-581515c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gladinet%20Patches%20Exploited%20CentreStack%20Vulnerability&amp;severity=low&amp;id=68f1f7e39c34d0947f094cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-i-reversed-amazons-kindle-web-obfuscation-beca-d4992c5d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20I%20Reversed%20Amazon&apos;s%20Kindle%20Web%20Obfuscation%20Because%20Their%20App%20Sucked&amp;severity=medium&amp;id=68f1ed649c34d0947f04cbd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55087-cwe-1285-improper-validation-of-spe-169a084d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55087%3A%20CWE-1285%3A%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Eclipse%20Foundation%20NextX%20Duo&amp;severity=medium&amp;id=68f1df4d9c34d0947ffd557a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-revokes-200-fraudulent-certificates-used-e670ded8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Revokes%20200%20Fraudulent%20Certificates%20Used%20in%20Rhysida%20Ransomware%20Campaign&amp;severity=medium&amp;id=68f43e5777122960c1652c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55100-cwe-125-out-of-bounds-read-in-eclip-3e5dda77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55100%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20USBX&amp;severity=low&amp;id=68f1d8459c34d0947ffb7eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55099-cwe-125-out-of-bounds-read-in-eclip-a93ade97</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55099%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20USBX&amp;severity=low&amp;id=68f1d8459c34d0947ffb7eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55098-cwe-125-out-of-bounds-read-in-eclip-263a5a9c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55098%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20USBX&amp;severity=low&amp;id=68f1d8459c34d0947ffb7eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55097-cwe-125-out-of-bounds-read-in-eclip-17b5b763</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55097%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20USBX&amp;severity=low&amp;id=68f1d8459c34d0947ffb7eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55096-cwe-191-integer-underflow-wrap-or-w-198a2eb6</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55096%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=low&amp;id=68f1d5f59c34d0947ffa1173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55094-cwe-125-out-of-bounds-read-in-eclip-c2a9d29e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55094%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f1d5f59c34d0947ffa1170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55093-cwe-126-buffer-over-read-in-eclipse-6b42688e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55093%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f1d13d9c34d0947ff86bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55092-cwe-125-out-of-bounds-read-in-eclip-db4e29df</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55092%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f1d13d9c34d0947ff86bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11849-directory-traversal-in-mammoth-101efb9a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11849%3A%20Directory%20Traversal%20in%20mammoth&amp;severity=medium&amp;id=68f1d13d9c34d0947ff86bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11900-cwe-78-improper-neutralization-of-s-acbc1deb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11900%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20HGiga%20iSherlock%204.5&amp;severity=critical&amp;id=68f1bf5fc417520e4ddfcc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11899-cwe-321-use-of-hard-coded-cryptogra-8545e765</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11899%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Flowring%20Technology%20Agentflow&amp;severity=critical&amp;id=68f1bf5fc417520e4ddfcc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11898-cwe-23-relative-path-traversal-in-f-55a39568</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11898%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Flowring%20Technology%20Agentflow&amp;severity=high&amp;id=68f1bf5fc417520e4ddfcbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6950-cwe-798-use-of-hard-coded-credential-0e6643cd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6950%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Moxa%20EDR-G9010%20Series&amp;severity=critical&amp;id=68f1b8039f8a5dbaea8c0706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6949-cwe-250-execution-with-unnecessary-p-a99a72ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6949%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Moxa%20EDR-G9010%20Series&amp;severity=critical&amp;id=68f1b8039f8a5dbaea8c0703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6894-cwe-250-execution-with-unnecessary-p-36bf7976</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6894%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Moxa%20EDR-G9010%20Series&amp;severity=medium&amp;id=68f1ba682c5d344c54e5d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6893-cwe-250-execution-with-unnecessary-p-cd75690d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6893%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Moxa%20EDR-G9010%20Series&amp;severity=critical&amp;id=68f1ba682c5d344c54e5d947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6892-cwe-863-incorrect-authorization-in-m-1b7367be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6892%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Moxa%20EDR-G9010%20Series&amp;severity=high&amp;id=68f1ba682c5d344c54e5d94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-17-ae57d6b6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-17&amp;severity=medium&amp;id=68f2dc5c9c34d0947f4c6772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62645-cwe-266-incorrect-privilege-assignm-f73d8c8a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62645%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=critical&amp;id=68f2aebd9c34d0947f437b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62644-cwe-359-exposure-of-private-persona-4ae35cea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62644%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2aebd9c34d0947f437b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62643-cwe-319-cleartext-transmission-of-s-b6270560</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62643%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=low&amp;id=68f2aebd9c34d0947f437b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62646-cwe-669-incorrect-resource-transfer-eb780049</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62646%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62649-cwe-603-use-of-client-side-authenti-796ca3f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62649%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62648-cwe-863-incorrect-authorization-in--d5cb6046</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62648%3A%20CWE-863%20Incorrect%20Authorization%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62647-cwe-863-incorrect-authorization-in--c1266568</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62647%3A%20CWE-863%20Incorrect%20Authorization%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62642-cwe-862-missing-authorization-in-re-30946901</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62642%3A%20CWE-862%20Missing%20Authorization%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62651-cwe-863-incorrect-authorization-in--290004b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62651%3A%20CWE-863%20Incorrect%20Authorization%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62650-cwe-603-use-of-client-side-authenti-7dd89d61</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62650%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=high&amp;id=68f2ab359c34d0947f42a44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56221-na-8241ab30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56221%3A%20n%2Fa&amp;severity=critical&amp;id=68f28f159c34d0947f3bb42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31573-na-6bbe4db4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31573%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20XMLUnit%20XMLUnit%20for%20Java&amp;severity=medium&amp;id=68f28f159c34d0947f3bb40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56320-na-b4b10bb9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56320%3A%20n%2Fa&amp;severity=medium&amp;id=68f28b909c34d0947f3b146e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56316-na-a3a35313</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56316%3A%20n%2Fa&amp;severity=critical&amp;id=68f28b909c34d0947f3b146a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56218-na-76fab4a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56218%3A%20n%2Fa&amp;severity=critical&amp;id=68f28b909c34d0947f3b1465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60514-na-40fa0634</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60514%3A%20n%2Fa&amp;severity=medium&amp;id=68f2880c9c34d0947f3a7c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57164-na-2f018d06</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57164%3A%20n%2Fa&amp;severity=medium&amp;id=68f284899c34d0947f39a003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60279-na-e20ffaff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60279%3A%20n%2Fa&amp;severity=critical&amp;id=68f2616f9c34d0947f2ce859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57567-na-0b493e53</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57567%3A%20n%2Fa&amp;severity=critical&amp;id=68f2616f9c34d0947f2ce851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60361-na-ee4d8eca</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60361%3A%20n%2Fa&amp;severity=low&amp;id=68f256d89c34d0947f29326d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60360-na-134777a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60360%3A%20n%2Fa&amp;severity=medium&amp;id=68f24fd29c34d0947f2503ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60359-na-e55dc443</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60359%3A%20n%2Fa&amp;severity=medium&amp;id=68f24fd29c34d0947f2503e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attacks-and-how-victims-respond-209d3c5f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20attacks%20and%20how%20victims%20respond&amp;severity=medium&amp;id=68f1e9dc9c34d0947f026e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62504-cwe-416-use-after-free-in-envoyprox-c14c0eae</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62504%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=68f1639f9f8a5dbaea0c0fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11864-server-side-request-forgery-in-nucl-d71cf618</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11864%3A%20Server-Side%20Request%20Forgery%20in%20NucleoidAI%20Nucleoid&amp;severity=medium&amp;id=68f160199f8a5dbaea0a238f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattackers-target-lastpass-top-password-manage-b799d77d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattackers%20Target%20LastPass%2C%20Top%20Password%20Managers&amp;severity=medium&amp;id=68f1d64d9c34d0947ffa2453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-cisco-snmp-flaw-to-deploy-rootkit--f4740f32</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploit%20Cisco%20SNMP%20flaw%20to%20deploy%20rootkit%20on%20switches&amp;severity=high&amp;id=68f1558c9f8a5dbaea04a4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42192-cwe-522-insufficiently-protected-cr-f3fb1c60</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42192%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20HCL%20Software%20Traveler%20for%20Microsoft%20Outlook&amp;severity=medium&amp;id=68f159139f8a5dbaea066b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leaks-in-microsoft-vs-code-marketplace-put-supply--49a36ffc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leaks%20in%20Microsoft%20VS%20Code%20Marketplace%20Put%20Supply%20Chain%20at%20Risk&amp;severity=medium&amp;id=68f1d64d9c34d0947ffa2456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11853-improper-access-controls-in-sismics-5c4175e3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11853%3A%20Improper%20Access%20Controls%20in%20Sismics%20Teedy&amp;severity=medium&amp;id=68f143fc9f8a5dbaeaf964be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11852-missing-authentication-in-apeman-id-9979efc3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11852%3A%20Missing%20Authentication%20in%20Apeman%20ID71&amp;severity=medium&amp;id=68f143fc9f8a5dbaeaf964b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11493-cwe-494-download-of-code-without-in-d5861a74</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11493%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ConnectWise%20Automate&amp;severity=high&amp;id=68f143fc9f8a5dbaeaf964b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11492-cwe-319-cleartext-transmission-of-s-fc777e45</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11492%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20ConnectWise%20Automate&amp;severity=critical&amp;id=68f143fc9f8a5dbaeaf964b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62428-cwe-601-url-redirection-to-untruste-89c6dd26</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62428%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Drawing-Captcha%20Drawing-Captcha-APP&amp;severity=high&amp;id=68f140779f8a5dbaeaf6e5c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34253-cwe-79-improper-neutralization-of-i-09432ac4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34253%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20D-Link%20Nuclias%20Connect&amp;severity=medium&amp;id=68f140779f8a5dbaeaf6e5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34255-cwe-204-observable-response-discrep-7591ef13</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34255%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20D-Link%20Nuclias%20Connect&amp;severity=medium&amp;id=68f140779f8a5dbaeaf6e5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34254-cwe-204-observable-response-discrep-f010ccec</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34254%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20D-Link%20Nuclias%20Connect&amp;severity=medium&amp;id=68f140779f8a5dbaeaf6e5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62427-cwe-918-server-side-request-forgery-4df3a1d9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62427%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20angular%20angular-cli&amp;severity=high&amp;id=68f140779f8a5dbaeaf6e5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62425-cwe-620-unverified-password-change--3f03ac08</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62425%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20element-hq%20matrix-authentication-service&amp;severity=high&amp;id=68f140779f8a5dbaeaf6e5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62423-cwe-89-improper-neutralization-of-s-81755ef3</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62423%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=68f13cf29f8a5dbaeaf4a7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/misconfigured-netcorecloud-server-exposed-40-billi-77262a19</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Misconfigured%20NetcoreCloud%20Server%20Exposed%2040%20Billion%20Records%20in%2013.4TB%20of%20Data&amp;severity=medium&amp;id=68f135f29f8a5dbaeaf0fc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62413-cwe-79-improper-neutralization-of-i-772b81f9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62413%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emqx%20MQTTX&amp;severity=medium&amp;id=68f136089f8a5dbaeaf0ff12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34517-cwe-22-improper-limitation-of-a-pat-72f78f39</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34517%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68f132679f8a5dbaeaef9b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34514-cwe-78-improper-neutralization-of-s-46c53c9f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34514%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68f132679f8a5dbaeaef9b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34519-cwe-327-use-of-a-broken-or-risky-cr-ea145229</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34519%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68f132679f8a5dbaeaef9b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34512-cwe-79-improper-neutralization-of-i-f905e707</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=medium&amp;id=68f132679f8a5dbaeaef9b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34518-cwe-22-improper-limitation-of-a-pat-7e785b04</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68f132679f8a5dbaeaef9b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34515-cwe-250-execution-with-unnecessary--40189c8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34515%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68f132679f8a5dbaeaef9b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34513-cwe-78-improper-neutralization-of-s-c9bfc265</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34513%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68f132679f8a5dbaeaef9b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-group-on-the-block-unc5142-leverages-etherhidi-0deb2cf7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Group%20on%20the%20Block%3A%20UNC5142%20Leverages%20EtherHiding%20to%20Distribute%20Malware&amp;severity=medium&amp;id=68f163919f8a5dbaea0bfdd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprk-adopts-etherhiding-nation-state-malware-hidin-1806b93e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK%20Adopts%20EtherHiding%3A%20Nation-State%20Malware%20Hiding%20on%20Blockchains&amp;severity=medium&amp;id=68f163919f8a5dbaea0bfdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/odyssey-stealer-amos-hit-macos-developers-with-fak-34ce0793</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Odyssey%20Stealer%20%26%20AMOS%20Hit%20macOS%20Developers%20with%20Fake%20Homebrew%20Sites&amp;severity=medium&amp;id=68f163919f8a5dbaea0bfe82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-warns-customers-it-has-not-been-hacked-am-a5289031</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Warns%20Customers%20It%20Has%20Not%20Been%20Hacked%20Amid%20Phishing%20Emails&amp;severity=medium&amp;id=68f163919f8a5dbaea0bfe92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34516-cwe-1392-use-of-default-credentials-c75d55d0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34516%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68f132679f8a5dbaeaef9b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62409-cwe-476-null-pointer-dereference-in-4f308a08</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62409%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=68f132679f8a5dbaeaef9ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61924-cwe-184-incomplete-list-of-disallow-c8590deb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61924%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20PrestaShopCorp%20ps_checkout&amp;severity=low&amp;id=68f12ee39f8a5dbaeaee6015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61923-cwe-22-improper-limitation-of-a-pat-1ec0b857</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61923%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PrestaShopCorp%20ps_checkout&amp;severity=medium&amp;id=68f12ee39f8a5dbaeaee6012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61922-cwe-287-improper-authentication-in--78f6af06</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61922%3A%20CWE-287%3A%20Improper%20Authentication%20in%20PrestaShopCorp%20ps_checkout&amp;severity=critical&amp;id=68f12ee39f8a5dbaeaee601e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61909-cwe-250-execution-with-unnecessary--26cce72e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61909%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Icinga%20icinga2&amp;severity=medium&amp;id=68f12ee39f8a5dbaeaee6018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62586-cwe-306-missing-authentication-for--57de8b07</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62586%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20OPEXUS%20FOIAXpress&amp;severity=high&amp;id=68f12ee39f8a5dbaeaee6025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61908-cwe-476-null-pointer-dereference-in-994f39aa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61908%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Icinga%20icinga2&amp;severity=high&amp;id=68f12b5e9f8a5dbaeaed1b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61907-cwe-200-exposure-of-sensitive-infor-d24c6554</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61907%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Icinga%20icinga2&amp;severity=high&amp;id=68f12b5e9f8a5dbaeaed1b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-jewelbug-targets-russian-it-provi-9d00bf24</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20APT%20Jewelbug%20targets%20Russian%20IT%20provider%20in%20rare%20cross-nation%20cyberattack&amp;severity=medium&amp;id=68f127e39f8a5dbaeaeb791e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linkpro-linux-rootkit-uses-ebpf-to-hide-and-activa-247742b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LinkPro%20Linux%20Rootkit%20Uses%20eBPF%20to%20Hide%20and%20Activates%20via%20Magic%20TCP%20Packets&amp;severity=high&amp;id=68f127e39f8a5dbaeaeb790a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-maximum-severity-adobe-flaw-now-exploited-in--39d4ae62</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%3A%20Maximum-severity%20Adobe%20flaw%20now%20exploited%20in%20attacks&amp;severity=high&amp;id=68f127e39f8a5dbaeaeb790e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-blockchain-smart-contracts-to-spread-8082c766</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Abuse%20Blockchain%20Smart%20Contracts%20to%20Spread%20Malware%20via%20Infected%20WordPress%20Sites&amp;severity=high&amp;id=68f127e39f8a5dbaeaeb7912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/model-context-protocol-credential-weakness-raises--07ba0af1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Model%20Context%20Protocol%20credential%20weakness%20raises%20red%20flags%20%7C%20ReversingLabs&amp;severity=medium&amp;id=68f127e39f8a5dbaeaeb7922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-day-initiative-pwn2own-automotive-returns-to--b083b293</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero%20Day%20Initiative%20%E2%80%94%20Pwn2Own%20Automotive%20Returns%20to%20Tokyo%20with%20Expanded%20Chargers%20and%20More!&amp;severity=critical&amp;id=68f127e39f8a5dbaeaeb791a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gladinet-fixes-actively-exploited-zero-day-in-file-07cc4269</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gladinet%20fixes%20actively%20exploited%20zero-day%20in%20file-sharing%20software&amp;severity=critical&amp;id=68f127e39f8a5dbaeaeb7906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-hackers-test-ai-optimized-attack-chains-in-t-aed01742</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Hackers%20Test%20AI-Optimized%20Attack%20Chains%20in%20Taiwan&amp;severity=medium&amp;id=68f127cc9f8a5dbaeaeb76d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61789-cwe-204-observable-response-discrep-99f0fa3c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61789%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Icinga%20icingadb-web&amp;severity=medium&amp;id=68f1284b9f8a5dbaeaeb9039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36128-cwe-772-missing-release-of-resource-a84859f8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36128%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20IBM%20MQ&amp;severity=high&amp;id=68f124619f8a5dbaeaea87b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58051-cwe-841-improper-enforcement-of-beh-d1c6dc24</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58051%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=68f124619f8a5dbaeaea87b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-famous-chollima-hackers-use-beavertai-1c556f66</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea&apos;s%20Famous%20Chollima%20hackers%20Use%20BeaverTail%20and%20OtterCookie%20Malware%20in%20Job%20Scam&amp;severity=medium&amp;id=68f124519f8a5dbaeaea763d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11851-cross-site-scripting-in-apeman-id71-edeb51ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11851%3A%20Cross%20Site%20Scripting%20in%20Apeman%20ID71&amp;severity=medium&amp;id=68f119c69f8a5dbaeae59d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11842-path-traversal-in-shazwazza-smidge-e071d5df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11842%3A%20Path%20Traversal%20in%20Shazwazza%20Smidge&amp;severity=medium&amp;id=68f112c09f8a5dbaeae05646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11840-out-of-bounds-read-in-gnu-binutils-8bd2a714</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11840%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68f112c09f8a5dbaeae0563d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9559-cwe-639-authorization-bypass-through-577eb5b0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9559%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=68f112c09f8a5dbaeae0564d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-use-etherhiding-to-hide-malwa-3666fabe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Use%20EtherHiding%20to%20Hide%20Malware%20Inside%20Blockchain%20Smart%20Contracts&amp;severity=medium&amp;id=68f1d5609c34d0947ff9968e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36002-password-in-configuration-file-in-i-1ccccda4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36002%3A%20CWE-260%20Password%20in%20Configuration%20File%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=68f108349f8a5dbaeadb9478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41254-cwe-352-cross-site-request-forgery--e9855997</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41254%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=68f108349f8a5dbaeadb947b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-revokes-over-200-certificates-to-disrupt-66ed92fa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Revokes%20Over%20200%20Certificates%20to%20Disrupt%20Ransomware%20Campaign&amp;severity=medium&amp;id=68f104a69f8a5dbaeada4666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linkpro-linux-rootkit-uses-ebpf-to-hide-and-activa-fbc386d6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LinkPro%20Linux%20Rootkit%20Uses%20eBPF%20to%20Hide%20and%20Activates%20via%20Magic%20TCP%20Packets&amp;severity=medium&amp;id=68f1d5609c34d0947ff99694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41253-cwe-917-improper-neutralization-of--c34c7bed</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41253%3A%20CWE-917%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20Expression%20Language%20Statement%20(&apos;Expression%20Language%20Injection&apos;)%20in%20VMware%20Spring%20Cloud%20Gateway%20Server%20Webflux&amp;severity=high&amp;id=68f104c59f8a5dbaeada61fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/denial-of-fuzzing-rust-in-the-windows-kernel-6b4f7100</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Denial%20of%20Fuzzing%3A%20Rust%20in%20the%20Windows%20kernel&amp;severity=low&amp;id=68f101329f8a5dbaead96a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11839-unchecked-return-value-in-gnu-binut-f93c4b52</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11839%3A%20Unchecked%20Return%20Value%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68f0fda89f8a5dbaead89164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46752-information-disclosure-in-fortinet--1889cdb7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46752%3A%20Information%20disclosure%20in%20Fortinet%20FortiDLP&amp;severity=medium&amp;id=68f0fda89f8a5dbaead8916c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53950-information-disclosure-in-fortinet--62e1c919</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53950%3A%20Information%20disclosure%20in%20Fortinet%20FortiDLP&amp;severity=medium&amp;id=68f0fda89f8a5dbaead8916f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53951-escalation-of-privilege-in-fortinet-7e4ebf82</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53951%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiDLP&amp;severity=medium&amp;id=68f0fda89f8a5dbaead89172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54658-escalation-of-privilege-in-fortinet-8f87356a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54658%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiDLP&amp;severity=high&amp;id=68f0fda89f8a5dbaead89175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/postgresql-13-end-of-life-lansweeper-b22bb2e0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PostgreSQL%2013%20End%20of%20Life%20-%20Lansweeper&amp;severity=medium&amp;id=68f0f04f9f8a5dbaead45d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisle-emerges-from-stealth-with-ai-based-reasoning-93416730</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AISLE%20Emerges%20From%20Stealth%20With%20AI-Based%20Reasoning%20System%20to%20Remediate%20Vulnerabilities%20on%20the%20Fly&amp;severity=medium&amp;id=68f0f0329f8a5dbaead45ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9152-vulnerability-in-wso2-wso2-api-manag-67b8e91f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9152%3A%20Vulnerability%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=68f0ec159f8a5dbaead3754e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9804-vulnerability-in-wso2-wso2-identity--2d9ea20f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9804%3A%20Vulnerability%20in%20WSO2%20WSO2%20Identity%20Server%20as%20Key%20Manager&amp;severity=critical&amp;id=68f0ec159f8a5dbaead37551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-adobe-aem-forms--57e72b18</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Adobe%20AEM%20Forms%20Vulnerability&amp;severity=medium&amp;id=68f0e5029f8a5dbaead026db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9955-vulnerability-in-wso2-wso2-enterpris-efc29a4d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9955%3A%20Vulnerability%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=68f0e51d9f8a5dbaead0282f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10611-vulnerability-in-wso2-wso2-api-mana-3a47c8f4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10611%3A%20Vulnerability%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=68f0e51d9f8a5dbaead0282c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fuji-electric-hmi-configurator-flaws-expose-indust-5ad75406</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fuji%20Electric%20HMI%20Configurator%20Flaws%20Expose%20Industrial%20Organizations%20to%20Hacking&amp;severity=medium&amp;id=68f0ddfd9f8a5dbaeacdfb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/architectures-risks-and-adoption-how-to-assess-and-dbfdcdc6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Architectures%2C%20Risks%2C%20and%20Adoption%3A%20How%20to%20Assess%20and%20Choose%20the%20Right%20AI-SOC%20Platform&amp;severity=medium&amp;id=68f1d5609c34d0947ff99697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-silk-lure-scheduled-tasks-weaponized-for-10d54c6f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Silk%20Lure%3A%20Scheduled%20Tasks%20Weaponized%20for%20DLL%20Side-Loading%20(drops%20ValleyRAT)&amp;severity=medium&amp;id=68f108289f8a5dbaeadb936b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-deploy-linux-rootkits-via-cisco-snmp-flaw--b71dcbef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Deploy%20Linux%20Rootkits%20via%20Cisco%20SNMP%20Flaw%20in%20&apos;Zero%20Disco&apos;%20Attacks&amp;severity=low&amp;id=68f1d5609c34d0947ff9969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tech-support-scam-uses-microsoft-logo-to-fake--4f1305a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Tech%20Support%20Scam%20Uses%20Microsoft%20Logo%20to%20Fake%20Browser%20Lock%20to%20Steal%20Data&amp;severity=medium&amp;id=68f0da7d9f8a5dbaeacca292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-routers-hacked-for-rootkit-deployment-822a906c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Routers%20Hacked%20for%20Rootkit%20Deployment&amp;severity=medium&amp;id=68f0d36e9f8a5dbaeaca1504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-charges-cambodian-executive-in-massive-crypto-s-fee93d6e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Charges%20Cambodian%20Executive%20in%20Massive%20Crypto%20Scam%20and%20Seizes%20More%20Than%20%2414%20Billion%20in%20Bitcoin&amp;severity=medium&amp;id=68f0cfea9f8a5dbaeac8de38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beware-the-hidden-costs-of-pen-testing-6c760732</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beware%20the%20Hidden%20Costs%20of%20Pen%20Testing&amp;severity=medium&amp;id=68f1d5609c34d0947ff9969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evolving-with-a-new-javascript-module-ac262daf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evolving%20with%20a%20new%20Javascript%20module&amp;severity=medium&amp;id=68f108289f8a5dbaeadb937f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58426-use-of-hard-coded-cryptographic-key-32bdd84c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58426%3A%20Use%20of%20hard-coded%20cryptographic%20key%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58079-improper-protection-of-alternate-pa-7329530d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58079%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55072-cross-site-scripting-xss-in-neojapa-8e15e819</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55072%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54859-cross-site-scripting-xss-in-neojapa-5038059c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54859%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54760-cross-site-scripting-xss-in-neojapa-3722dd85</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54760%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52583-cross-site-scripting-xss-in-neojapa-9e957c7d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52583%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20Web%20Server&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24833-cross-site-scripting-xss-in-neojapa-99ec283d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24833%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-year-prison-sentence-for-powerschool-hacker-72f30719</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four-Year%20Prison%20Sentence%20for%20PowerSchool%20Hacker&amp;severity=medium&amp;id=68f0be569f8a5dbaeac537dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6338-cwe-459-incomplete-cleanup-in-the-qt-517f4824</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6338%3A%20CWE-459%20Incomplete%20Cleanup%20in%20The%20Qt%20Company%20Qt&amp;severity=critical&amp;id=68f0be6f9f8a5dbaeac53a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-15b-crypto-bust-satellite-spyi-05370867</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20%2415B%20Crypto%20Bust%2C%20Satellite%20Spying%2C%20Billion-Dollar%20Smishing%2C%20Android%20RATs%20%26%20More&amp;severity=medium&amp;id=68f0bace9f8a5dbaeac43ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58115-cross-site-scripting-xss-in-neojapa-1b7e34a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58115%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20ChatLuck&amp;severity=medium&amp;id=68f0b5089f8a5dbaeac23886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54461-insufficient-granularity-of-access--e9303ffe</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54461%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20NEOJAPAN%20Inc.%20ChatLuck&amp;severity=medium&amp;id=68f0b5089f8a5dbaeac23882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53858-cross-site-scripting-xss-in-neojapa-de1b3eda</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53858%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20ChatLuck&amp;severity=medium&amp;id=68f0b5089f8a5dbaeac2387e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-hack-attack-linked-to-china-big-ip-flaws-patche-70a8b07b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Hack%3A%20Attack%20Linked%20to%20China%2C%20BIG-IP%20Flaws%20Patched%2C%20Governments%20Issue%20Alerts&amp;severity=medium&amp;id=68f0b0469f8a5dbaeabeb78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61581-cwe-1333-inefficient-regular-expres-b2ce45c2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61581%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Control&amp;severity=high&amp;id=68f0b5089f8a5dbaeac2388a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0277-cwe-693-protection-mechanism-failure-16cb869d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0277%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20HCL%20Software%20BigFix%20Mobile&amp;severity=medium&amp;id=68f0b05f9f8a5dbaeabeba55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54539-cwe-502-deserialization-of-untruste-8253ccf0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54539%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20NMS%20AMQP%20Client&amp;severity=critical&amp;id=68f0accc9f8a5dbaeaba941c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0276-cwe-693-protection-mechanism-failure-b5e4a800</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0276%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20HCL%20Software%20BigFix%20Modern%20Client%20Management&amp;severity=medium&amp;id=68f0accc9f8a5dbaeaba9419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41021-cwe-79-improper-neutralization-of-i-32d08f85</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41021%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sergestec%20SISTICK&amp;severity=medium&amp;id=68f0b5099f8a5dbaeac23896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41020-cwe-639-authorization-bypass-throug-a017f033</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41020%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Sergestec%20Exito&amp;severity=high&amp;id=68f0b5089f8a5dbaeac23893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41019-cwe-89-improper-neutralization-of-s-562ea712</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41019%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sergestec%20SISTICK&amp;severity=critical&amp;id=68f0b5089f8a5dbaeac23890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55091-cwe-125-out-of-bounds-read-in-eclip-b3264547</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55091%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f0b5099f8a5dbaeac23899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41018-cwe-89-improper-neutralization-of-s-90a50b37</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41018%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sergestec%20Exito&amp;severity=critical&amp;id=68f0b5089f8a5dbaeac2388d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62585-cwe-358-improperly-implemented-secu-17c01d07</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62585%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=high&amp;id=68f0983c20d29eed058254bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62584-cwe-346-origin-validation-error-in--8efee3aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62584%3A%20CWE-346%20Origin%20Validation%20Error%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=high&amp;id=68f0983c20d29eed058254b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62583-cwe-358-improperly-implemented-secu-51576771</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62583%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=critical&amp;id=68f0983c20d29eed058254b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10849-cwe-862-missing-authorization-in-ri-40ca6a46</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10849%3A%20CWE-862%20Missing%20Authorization%20in%20RiceTheme%20Felan%20Framework&amp;severity=medium&amp;id=68f0983c20d29eed058254ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10850-cwe-798-use-of-hard-coded-credentia-3db122b4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10850%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20RiceTheme%20Felan%20Framework&amp;severity=critical&amp;id=68f0983c20d29eed058254b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10742-cwe-639-authorization-bypass-throug-3b4248e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10742%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dreamstechnologies%20Truelysell%20Core&amp;severity=critical&amp;id=68f0983c20d29eed058254aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10706-cwe-862-missing-authorization-in-cr-aff2e787</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10706%3A%20CWE-862%20Missing%20Authorization%20in%20Cridio%20Studio%20ClassifiedPro%20-%20reCommerce%20WordPress%20Theme&amp;severity=high&amp;id=68f0983c20d29eed058254a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55090-cwe-125-out-of-bounds-read-in-eclip-692b0402</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55090%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f09eb3b8696e8de1b1589f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55089-cwe-119-improper-restriction-of-ope-68ad5817</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55089%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Eclipse%20Foundation%20FileX&amp;severity=critical&amp;id=68f0938de05ddc61b131ce1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55084-cwe-126-buffer-over-read-in-eclipse-3c83968d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55084%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f0938de05ddc61b131ce1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58778-hidden-functionality-in-ruijie-netw-a3e1db1a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58778%3A%20Hidden%20functionality%20in%20Ruijie%20Networks%20Co.%2C%20Ltd.%20RG-EST300&amp;severity=high&amp;id=68f08e21e05ddc61b12878f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0275-cwe-306-missing-authentication-for-c-20f46470</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0275%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HCL%20Software%20BigFix%20Mobile&amp;severity=medium&amp;id=68f083e40279cbc56ef7734e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0274-cwe-306-missing-authentication-for-c-590dbebc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0274%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HCL%20Software%20BigFix%20Modern%20Client%20Management&amp;severity=medium&amp;id=68f07c48b3384a6fd3f74acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11814-cwe-79-improper-neutralization-of-i-517fad7a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery&amp;severity=medium&amp;id=68f076d9b3384a6fd3edb858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-adobe-aem-flaw-with-perfect-100-score-a-a57d6b9f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Adobe%20AEM%20Flaw%20with%20Perfect%2010.0%20Score%20%E2%80%94%20Already%20Under%20Active%20Attack&amp;severity=critical&amp;id=68f0b4f79f8a5dbaeac236f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10700-cwe-352-cross-site-request-forgery--b26a79c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10700%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20elemntor%20Ally%20%E2%80%93%20Web%20Accessibility%20%26%20Usability&amp;severity=medium&amp;id=68f05ee44f645e963f14c52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62580-cwe-121-stack-based-buffer-overflow-3b731f6a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62580%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ASDA-Soft&amp;severity=high&amp;id=68f06f6c79054d06ca3cb5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62579-cwe-121-stack-based-buffer-overflow-b5ee64a7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62579%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ASDA-Soft&amp;severity=high&amp;id=68f06f6c79054d06ca3cb5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11683-cwe-119-improper-restriction-of-ope-574c85a2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11683%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20TODDR%20YAML%3A%3ASyck&amp;severity=medium&amp;id=68f03f534f645e963f083876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-16-63acfc99</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-16&amp;severity=medium&amp;id=68f18a389f8a5dbaea422005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60358-na-b0ae39a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60358%3A%20n%2Fa&amp;severity=medium&amp;id=68f1520b9f8a5dbaea02a8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61539-na-d2027800</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61539%3A%20n%2Fa&amp;severity=medium&amp;id=68f14e869f8a5dbaea003e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60855-na-353018e3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60855%3A%20n%2Fa&amp;severity=medium&amp;id=68f14b039f8a5dbaeafdfa88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61554-na-5bcaaf8c</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61554%3A%20n%2Fa&amp;severity=medium&amp;id=68f14b039f8a5dbaeafdfa84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61553-na-2967dd9e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61553%3A%20n%2Fa&amp;severity=high&amp;id=68f143fc9f8a5dbaeaf964c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61514-na-aea655d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61514%3A%20n%2Fa&amp;severity=medium&amp;id=68f13cf29f8a5dbaeaf4a7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60639-na-c2bfa4e0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60639%3A%20n%2Fa&amp;severity=medium&amp;id=68f136089f8a5dbaeaf0ff0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61330-na-5ddd016e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61330%3A%20n%2Fa&amp;severity=medium&amp;id=68f132689f8a5dbaeaef9be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60641-na-8326e285</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60641%3A%20n%2Fa&amp;severity=medium&amp;id=68f132679f8a5dbaeaef9b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56699-na-7cf72c62</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56699%3A%20n%2Fa&amp;severity=medium&amp;id=68f124619f8a5dbaeaea87bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56700-na-f5ebe7af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56700%3A%20n%2Fa&amp;severity=medium&amp;id=68f120ce9f8a5dbaeae91931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61540-na-4efd01ea</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61540%3A%20n%2Fa&amp;severity=medium&amp;id=68f112c09f8a5dbaeae05654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22381-na-b7568af4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22381%3A%20n%2Fa&amp;severity=high&amp;id=68f112c09f8a5dbaeae05650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61543-na-3a4a6de4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61543%3A%20n%2Fa&amp;severity=high&amp;id=68f108349f8a5dbaeadb9488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61541-na-a7982b8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61541%3A%20n%2Fa&amp;severity=high&amp;id=68f108349f8a5dbaeadb9483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61536-na-10fa8bb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61536%3A%20n%2Fa&amp;severity=high&amp;id=68f108349f8a5dbaeadb947f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mysterious-elephant-moves-beyond-recycled-malware-1e494d03</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Mysterious%20Elephant&apos;%20Moves%20Beyond%20Recycled%20Malware&amp;severity=medium&amp;id=68f04b034f645e963f102fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43282-an-app-may-be-able-to-cause-unexpec-53003581</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43282%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68f00082d6afaf303e7d1301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43313-an-app-may-be-able-to-access-sensit-d4b1485a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43313%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68f00082d6afaf303e7d130b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43280-forwarding-an-email-could-display-r-3f9ce239</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43280%3A%20Forwarding%20an%20email%20could%20display%20remote%20images%20in%20Mail%20in%20Lockdown%20Mode%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68f00082d6afaf303e7d12fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43281-a-local-attacker-may-be-able-to-ele-c4f67dac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43281%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68f00082d6afaf303e7d12fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11619-cwe-295-improper-certificate-valida-cd73fcd3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11619%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Devolutions%20Devolutions%20Server&amp;severity=high&amp;id=68f00082d6afaf303e7d1310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11568-improper-validation-of-specified-qu-ff058e4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11568%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Latchset%20luksmeta&amp;severity=medium&amp;id=68effb19d6afaf303e734bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62375-cwe-295-improper-certificate-valida-1e430518</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62375%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20in-toto%20go-witness&amp;severity=medium&amp;id=68eff91f8fdbc4b28b29b763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11832-cwe-770-allocation-of-resources-wit-5c379ebf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11832%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68eff3b78fdbc4b28b200684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-big-ip-environment-breached-by-nation-state-act-b206e6d3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20BIG-IP%20Environment%20Breached%20by%20Nation-State%20Actor&amp;severity=medium&amp;id=68f04b034f645e963f102fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wiretap-and-battering-ram-attacks-on-tees-kaspersk-f6dbea37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WireTap%20and%20Battering%20RAM%3A%20attacks%20on%20TEEs%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68eff2298fdbc4b28b1cbaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-releases-big-ip-patches-for-stolen-security-vul-4d23cf6c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20releases%20BIG-IP%20patches%20for%20stolen%20security%20vulnerabilities&amp;severity=high&amp;id=68efee6e610883e4f9527ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-confirms-nation-state-breach-source-code-and-vu-de96bb17</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Confirms%20Nation-State%20Breach%2C%20Source%20Code%20and%20Vulnerability%20Data%20Stolen&amp;severity=high&amp;id=68efe74cd1a220c1e982638b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-oct-2025-fixs-175-vulnerab-61c0cd4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20Oct%202025%20Fixs%20175%20Vulnerabilities%20including%203%20Zero-Days&amp;severity=medium&amp;id=68efdc66d4cab3a2882c910f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-threat-group-jewelbug-quietly-infiltrated--7dd94623</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Threat%20Group%20&apos;Jewelbug&apos;%20Quietly%20Infiltrated%20Russian%20IT%20Network%20for%20Months&amp;severity=medium&amp;id=68f049d84f645e963f0fedfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62371-cwe-295-improper-certificate-valida-580b94d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62371%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20opensearch-project%20data-prepper&amp;severity=high&amp;id=68efdcb86817339dcf782799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62410-cwe-1321-improperly-controlled-modi-fdcd7008</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62410%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20capricorn86%20happy-dom&amp;severity=critical&amp;id=68efdcb86817339dcf78279f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62381-cwe-1321-improperly-controlled-modi-ac03fd09</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62381%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20ciscoheat%20sveltekit-superforms&amp;severity=high&amp;id=68efd906d4cab3a288267939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-says-hackers-stole-undisclosed-big-ip-flaws-sou-a9712439</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20says%20hackers%20stole%20undisclosed%20BIG-IP%20flaws%2C%20source%20code&amp;severity=high&amp;id=68efd8e8d4cab3a288255172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clothing-giant-mango-discloses-data-breach-exposin-e11687b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clothing%20giant%20MANGO%20discloses%20data%20breach%20exposing%20customer%20info&amp;severity=high&amp;id=68efd8e8d4cab3a28825516e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62382-cwe-73-external-control-of-file-nam-bfb81067</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62382%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20blakeblackshear%20frigate&amp;severity=high&amp;id=68efd906d4cab3a28826793d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62378-cwe-706-use-of-incorrectly-resolved-37e47862</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62378%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20underctrl-io%20commandkit&amp;severity=medium&amp;id=68efd53e346ce4cfc57b3a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-latest-mirai-wave-exploiting-tbk-d-aec68058</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maverick%3A%20a%20new%20banking%20trojan%20abusing%20WhatsApp%20in%20a%20massive%20scale%20distribution&amp;severity=medium&amp;id=684585c571f4d251b54eaf44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10577-cwe-266-in-hp-inc-sound-research-1b898718</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10577%3A%20CWE-266%20in%20HP%2C%20Inc.%20Sound%20Research&amp;severity=high&amp;id=68efd53e346ce4cfc57b3a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10576-cwe-266-in-hp-inc-sound-research-989a82a7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10576%3A%20CWE-266%20in%20HP%2C%20Inc.%20Sound%20Research&amp;severity=high&amp;id=68efd53e346ce4cfc57b3a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62380-cwe-79-improper-neutralization-of-i-ed39fc35</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62380%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eladnava%20mailgen&amp;severity=low&amp;id=68efd53e346ce4cfc57b3a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54271-time-of-check-time-of-use-toctou-ra-cc64b448</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54271%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20(CWE-367)%20in%20Adobe%20Creative%20Cloud%20Desktop&amp;severity=medium&amp;id=68efce11ed06978b6a61650d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20360-buffer-access-with-incorrect-length-23f4019f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20360%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=68efca8eed06978b6a597396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20359-buffer-under-read-in-cisco-cisco-cy-3e3310ab</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20359%3A%20Buffer%20Under-read%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=68efca8eed06978b6a597393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20351-improper-neutralization-of-input-du-5d374e7f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Session%20Initiation%20Protocol%20(SIP)%20Software&amp;severity=medium&amp;id=68efca8eed06978b6a597390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20350-stack-based-buffer-overflow-in-cisc-c634f8d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20350%3A%20Stack-based%20Buffer%20Overflow%20in%20Cisco%20Cisco%20Session%20Initiation%20Protocol%20(SIP)%20Software&amp;severity=high&amp;id=68efca8eed06978b6a59738d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20329-insertion-of-sensitive-information--04505814</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20329%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Cisco%20Cisco%20RoomOS%20Software&amp;severity=medium&amp;id=68efca8eed06978b6a59738a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58133-cwe-288-authentication-bypass-using-cb4811d4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58133%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=medium&amp;id=68efca8eed06978b6a59739c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58132-cwe-77-improper-neutralization-of-s-c9aaea6b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58132%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients%20for%20Windows&amp;severity=medium&amp;id=68efca8eed06978b6a597399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-breach-exposes-big-ip-source-code-nation-state--b1c16ce2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Breach%20Exposes%20BIG-IP%20Source%20Code%20%E2%80%94%20Nation-State%20Hackers%20Behind%20Massive%20Intrusion&amp;severity=high&amp;id=68f049d84f645e963f0fedfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62379-cwe-601-url-redirection-to-untruste-1f153e25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62379%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20reflex-dev%20reflex&amp;severity=low&amp;id=68efc69b60c3b60ff6f859d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62370-cwe-248-uncaught-exception-in-alloy-1df2a86c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62370%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20alloy-rs%20core&amp;severity=high&amp;id=68efbf6451297e5c13a0013f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2529-cwe-228-improper-handling-of-syntact-a4434123</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2529%3A%20CWE-228%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20IBM%20Terracotta&amp;severity=low&amp;id=68efbf6451297e5c13a0013c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61990-cwe-415-double-free-in-f5-big-ip-56894874</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61990%3A%20CWE-415%20Double%20Free%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efbf6451297e5c13a00152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57780-cwe-250-in-f5-f5os-appliance-4e839be1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57780%3A%20CWE-250%20in%20F5%20F5OS%20-%20Appliance&amp;severity=high&amp;id=68efbf6451297e5c13a00146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61933-cwe-79-improper-neutralization-of-i-bb5e3347</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61933%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efbf6451297e5c13a0014c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58071-cwe-457-use-of-uninitialized-variab-09e0d98d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58071%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efbf6451297e5c13a00149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61935-cwe-252-unchecked-return-value-in-f-86ebebb6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61935%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efbf6451297e5c13a0014f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53860-cwe-214-invocation-of-process-using-5be1347d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53860%3A%20CWE-214%3A%20Invocation%20of%20Process%20Using%20Visible%20Sensitive%20Information%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=68efbbee51297e5c1399a27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvard-university-breached-in-oracle-zero-day-att-b34cf7be</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvard%20University%20Breached%20in%20Oracle%20Zero-Day%20Attack&amp;severity=medium&amp;id=68f04b034f645e963f102fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-blames-nation-state-hackers-for-theft-of-source-dcae8651</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Says%20Nation-State%20Hackers%20Stole%20Source%20Code%20and%20Vulnerability%20Data&amp;severity=medium&amp;id=68efb494ea97afbedf527648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10699-cwe-295-improper-certificate-valida-1fb34407</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10699%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20LeCloud%20Client&amp;severity=medium&amp;id=68efb2aeea97afbedf4f99ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10581-cwe-427-uncontrolled-search-path-el-d06dac66</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10581%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=68efb2aeea97afbedf4f99a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9548-cwe-476-null-pointer-dereference-in--6befc85e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9548%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Lenovo%20Power%20Management%20Driver&amp;severity=medium&amp;id=68efb2aeea97afbedf4f99b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8486-cwe-250-execution-with-unnecessary-p-b2064c24</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8486%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=68efb2aeea97afbedf4f99b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6026-cwe-295-improper-certificate-validat-84af9df2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6026%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20Universal%20Device%20Client&amp;severity=low&amp;id=68efb2aeea97afbedf4f99b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-100-vs-code-extensions-exposed-developers-to--aa4e76a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20100%20VS%20Code%20Extensions%20Exposed%20Developers%20to%20Hidden%20Supply%20Chain%20Risks&amp;severity=critical&amp;id=68f049d84f645e963f0fee01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55083-cwe-126-buffer-over-read-in-eclipse-aede0deb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55083%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68efb0ddb00d656ee54120bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60015-cwe-787-out-of-bounds-write-in-f5-f-464f4b71</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60015%3A%20CWE-787%20Out-of-bounds%20Write%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=68efa99527d7577a180040de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54755-cwe-146-improper-neutralization-of--8718748c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54755%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a1800408c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59483-cwe-73-external-control-of-file-nam-66d2033f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59483%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61974-cwe-401-missing-release-of-memory-a-54b96a39</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61974%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59481-cwe-250-execution-with-unnecessary--83f0750d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59481%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a180040c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61960-cwe-476-null-pointer-dereference-in-c64305e5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61960%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61955-cwe-95-improper-neutralization-of-d-82ec768a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61955%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20F5%20F5OS%20-%20Appliance&amp;severity=high&amp;id=68efa99527d7577a180040ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54854-cwe-125-out-of-bounds-read-in-f5-bi-60ca6c22</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54854%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a18004092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61958-cwe-250-execution-with-unnecessary--f7a64daa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61958%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53521-cwe-770-allocation-of-resources-wit-0dad3b3b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53521%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20F5%20BIG-IP&amp;severity=critical&amp;id=68efa99327d7577a18004061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58096-cwe-787-out-of-bounds-write-in-f5-b-cb8c6bef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58096%3A%20CWE-787%20Out-of-bounds%20Write%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a180040a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54858-cwe-674-uncontrolled-recursion-in-f-7dd2f977</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54858%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a18004095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53868-cwe-78-improper-neutralization-of-s-768dd43b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53868%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18004067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58120-cwe-476-null-pointer-dereference-in-a3b4c3e2</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58120%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP%20Next%20SPK&amp;severity=high&amp;id=68efa99427d7577a180040a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60013-cwe-78-improper-neutralization-of-s-ed76e46f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60013%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=68efa99427d7577a180040cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61951-cwe-125-out-of-bounds-read-in-f5-bi-b26ff8f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61951%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53856-cwe-705-incorrect-control-flow-scop-ad63bf5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53856%3A%20CWE-705%20Incorrect%20Control%20Flow%20Scoping%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18004064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54479-cwe-787-out-of-bounds-write-in-f5-b-0f2f407b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54479%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a1800406a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59778-cwe-770-allocation-of-resources-wit-7ce0575e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59778%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20F5OS%20-%20Chassis&amp;severity=high&amp;id=68efa99427d7577a180040c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54805-cwe-401-missing-release-of-memory-a-0578be16</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54805%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20F5%20BIG-IP%20Next%20SPK&amp;severity=medium&amp;id=68efa99427d7577a1800408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55670-cwe-770-allocation-of-resources-wit-63c09158</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55670%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP%20Next%20SPK&amp;severity=medium&amp;id=68efa99427d7577a1800409e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41430-cwe-770-allocation-of-resources-wit-4d6ce177</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41430%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18001345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61938-cwe-1284-improper-validation-of-spe-d71ab58b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61938%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58424-cwe-340-generation-of-predictable-n-6aa3aad1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58424%3A%20CWE-340%3A%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55036-cwe-787-out-of-bounds-write-in-f5-b-439be2f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55036%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a18004098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59781-cwe-459-incomplete-cleanup-in-f5-bi-45c32ff3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59781%3A%20CWE-459%20Incomplete%20Cleanup%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a180040cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47150-cwe-401-missing-release-of-memory-a-22acb820</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47150%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=68efa99327d7577a18004055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46706-cwe-770-allocation-of-resources-wit-a0e8f6db</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46706%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18001348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55669-cwe-672-operation-on-a-resource-aft-de0ddcac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55669%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a1800409b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48008-cwe-416-use-after-free-in-f5-big-ip-df4215d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48008%3A%20CWE-416%20Use%20After%20Free%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18004058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58153-cwe-703-improper-check-or-handling--e79a969e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58153%3A%20CWE-667%20Improper%20Locking%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60016-cwe-119-improper-restriction-of-ope-bba05d17</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60016%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59478-cwe-824-access-of-uninitialized-poi-e0dd4b9b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59478%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a180040c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58474-cwe-770-allocation-of-resources-wit-fd730576</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58474%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47148-cwe-404-improper-resource-shutdown--20dde908</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47148%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99327d7577a1800134b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59269-cwe-79-improper-neutralization-of-i-8270cfe4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59269%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59268-cwe-201-in-f5-big-ip-35754850</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59268%3A%20CWE-201%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53474-cwe-120-buffer-copy-without-checkin-cd786f84</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53474%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a1800405e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/singularity-deep-dive-into-a-modern-stealth-linux--d9610ef3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Singularity%3A%20Deep%20Dive%20into%20a%20Modern%20Stealth%20Linux%20Kernel%20Rootkit%20%E2%80%93%20Kyntra%20Blog&amp;severity=medium&amp;id=68efa99227d7577a18001308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/customer-service-firm-5ca-denies-responsibility-fo-9e15361c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Customer%20Service%20Firm%205CA%20Denies%20Responsibility%20for%20Discord%20Data%20Breach&amp;severity=medium&amp;id=68ef9edba4b88470136161a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elasticsearch-server-leak-exposes-6-billion-record-569ea046</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Elasticsearch%20Server%20Leak%20Exposes%206%20Billion%20Records%20from%20Scraping%2C%20Old%20and%20New%20Breaches&amp;severity=medium&amp;id=68ef9f0aa4b884701362a8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9640-vulnerability-in-red-hat-red-hat-ent-80ad4a53</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9640%3A%20Use%20of%20Uninitialized%20Resource&amp;severity=medium&amp;id=68ef9b21178f764e1f470999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10869-cwe-79-improper-neutralization-of-i-95d18883</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Oct8ne%20Chatbot&amp;severity=medium&amp;id=68ef9b21178f764e1f470996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fake-google-job-offer-email-scam-targets-works-e375a8bb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Fake%20Google%20Job%20Offer%20Email%20Scam%20Targets%20Workspace%20and%20Microsoft%20365%20Users&amp;severity=medium&amp;id=68ef8c9dedb8272845fde0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-attackers-bypass-synced-passkeys-7002d36c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Attackers%20Bypass%20Synced%20Passkeys&amp;severity=medium&amp;id=68f049d84f645e963f0fee04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-fixes-announced-by-siemens-schne-4c1e9412</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Fixes%20Announced%20by%20Siemens%2C%20Schneider%2C%20Rockwell%2C%20ABB%2C%20Phoenix%20Contact&amp;severity=medium&amp;id=68ef8561290e66ee3b417082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55082-cwe-125-out-of-bounds-read-in-eclip-36fb26e6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55082%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68ef81e7290e66ee3b3a9f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55081-cwe-126-buffer-over-read-in-eclipse-d2c5befb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55081%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68ef7e24507ec470927a1454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unencrypted-satellites-expose-global-communication-97b78012</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unencrypted%20satellites%20expose%20global%20communications&amp;severity=medium&amp;id=68ef736aa13d368f6fc3c5cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-new-windows-zero-days-exploited-in-the-wild-on-b19f3281</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20New%20Windows%20Zero-Days%20Exploited%20in%20the%20Wild%20%E2%80%94%20One%20Affects%20Every%20Version%20Ever%20Shipped&amp;severity=medium&amp;id=68f049d84f645e963f0fee07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anatomy-of-an-attack-the-blacksuit-blitz-at-a-glob-c314d471</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anatomy%20of%20an%20Attack%3A%20The%20%22BlackSuit%20Blitz%22%20at%20a%20Global%20Equipment%20Manufacturer&amp;severity=medium&amp;id=68ef64715578b80782323ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-ictbroadcast-servers-via-cookie-exp-e8c39b79</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20ICTBroadcast%20Servers%20via%20Cookie%20Exploit%20to%20Gain%20Remote%20Shell%20Access&amp;severity=high&amp;id=68ef64715578b80782323aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-cvss-100-bugs-in-red-lion-rtus-could-hand-hack-a06f3f21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20CVSS%2010.0%20Bugs%20in%20Red%20Lion%20RTUs%20Could%20Hand%20Hackers%20Full%20Industrial%20Control&amp;severity=medium&amp;id=68ef64715578b80782323aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10194-cwe-79-improper-neutralization-of-i-2adcd731</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10194%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eflyjason%20Shortcode%20Button&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e5696b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11701-cwe-862-missing-authorization-in-qu-bd0773d7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11701%3A%20CWE-862%20Missing%20Authorization%20in%20quicoto%20Zip%20Attachments&amp;severity=medium&amp;id=68ef5c7ec4f69c9730e56a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10056-cwe-918-server-side-request-forgery-8ac7cbb3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10056%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20miunosoft%20Task%20Scheduler&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11728-cwe-306-missing-authentication-for--38282594</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11728%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20oceanpayment%20Oceanpayment%20CreditCard%20Gateway&amp;severity=medium&amp;id=68ef5c7ec4f69c9730e56a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10313-cwe-862-missing-authorization-in-ja-62fd2fa4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10313%3A%20CWE-862%20Missing%20Authorization%20in%20jankimoradiya%20Find%20And%20Replace%20content%20for%20WordPress&amp;severity=high&amp;id=68ef5c7dc4f69c9730e569c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11196-cwe-200-exposure-of-sensitive-infor-ea14ff45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11196%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tbenyon%20External%20Login&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10486-cwe-532-insertion-of-sensitive-info-330a0223</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10486%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20steadycontent%20Content%20Writer&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10294-cwe-288-authentication-bypass-using-42eb1a0a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10294%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20victornavarro%20OwnID%20Passwordless%20Login&amp;severity=critical&amp;id=68ef5c7cc4f69c9730e56974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9967-cwe-288-authentication-bypass-using--f980e8c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9967%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20gsayed786%20Orion%20SMS%20OTP%20Verification.&amp;severity=critical&amp;id=68ef5c7ec4f69c9730e56a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10140-cwe-79-improper-neutralization-of-i-b220e2d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10140%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andreiigna%20Quick%20Social%20Login&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11692-cwe-862-missing-authorization-in-qu-d90e376c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11692%3A%20CWE-862%20Missing%20Authorization%20in%20quicoto%20Zip%20Attachments&amp;severity=medium&amp;id=68ef5c7ec4f69c9730e56a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11365-cwe-89-improper-neutralization-of-s-ace3dbb4</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11365%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20akbrohi%20WP%20Google%20Map%20Plugin&amp;severity=medium&amp;id=68ef5c7ec4f69c9730e56a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10303-cwe-862-missing-authorization-in-ow-60c3fed1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10303%3A%20CWE-862%20Missing%20Authorization%20in%20owthub%20Library%20Management%20System&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e56986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10312-cwe-352-cross-site-request-forgery--efd86491</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10312%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20steve-forster%20Theme%20Importer&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e5698f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10300-cwe-352-cross-site-request-forgery--52dad469</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10300%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fmeaddons%20TopBar&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e5697c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10135-cwe-79-improper-neutralization-of-i-930994fe</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falldeaf%20WP%20ViewSTL&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e5694c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10038-cwe-266-incorrect-privilege-assignm-0f6181ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10038%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20letscms%20Binary%20MLM%20Plan&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e5692f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10132-cwe-79-improper-neutralization-of-i-f4791f08</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dash8x%20Dhivehi%20Text&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10743-cwe-89-improper-neutralization-of-s-af5c99ac</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20maycorolbuche1%20Outdoor&amp;severity=high&amp;id=68ef5c7dc4f69c9730e569e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11722-cwe-98-improper-control-of-filename-d4d01f09</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11722%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ikhodal%20Woocommerce%20Category%20and%20Products%20Accordion%20Panel&amp;severity=high&amp;id=68ef5c7ec4f69c9730e56a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10133-cwe-79-improper-neutralization-of-i-88fa7849</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10133%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salamzadeh%20URLYar%20URL%20Shortner&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10299-cwe-862-missing-authorization-in-ha-81ade7aa</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10299%3A%20CWE-862%20Missing%20Authorization%20in%20hakik%20Bifr%C3%B6st%20%E2%80%93%20Instant%20Passwordless%20Temporary%20Login%20Links&amp;severity=high&amp;id=68ef5c7cc4f69c9730e56978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11177-cwe-89-improper-neutralization-of-s-25cc0e6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11177%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tbenyon%20External%20Login&amp;severity=high&amp;id=68ef5c7dc4f69c9730e569eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10051-cwe-434-unrestricted-upload-of-file-a42ee4a5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10051%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeinwp%20Demo%20Import%20Kit&amp;severity=high&amp;id=68ef5c7bc4f69c9730e5693c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10041-cwe-434-unrestricted-upload-of-file-c35e01cf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10041%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ajitdas%20Flex%20QR%20Code%20Generator&amp;severity=critical&amp;id=68ef5c7bc4f69c9730e56933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10186-cwe-862-missing-authorization-in-jj-da1e7f8d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10186%3A%20CWE-862%20Missing%20Authorization%20in%20jjlemstra%20WhyDonate%20%E2%80%93%20FREE%20Donate%20button%20%E2%80%93%20Crowdfunding%20%E2%80%93%20Fundraising&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e56967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10575-cwe-89-improper-neutralization-of-s-38688de1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10575%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ivycat%20WP%20jQuery%20Pager&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10301-cwe-352-cross-site-request-forgery--fe7e78ab</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10301%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20flenskiproject%20FunKItools&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e56982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10730-cwe-89-improper-neutralization-of-s-98799312</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10730%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplushotmailcom%20Wp%20tabber%20widget&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10045-cwe-89-improper-neutralization-of-s-52a1756a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10045%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20onofficeweb%20onOffice%20for%20WP-Websites&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10310-cwe-89-improper-neutralization-of-s-11c35d1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10310%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jayce53%20Rich%20Snippet%20Site%20Report&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e5698a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10660-cwe-89-improper-neutralization-of-s-62dc4b2d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10660%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicholasbosch%20WP%20Dashboard%20Chat&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10648-cwe-862-missing-authorization-in-cy-e60be01c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10648%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20Login%20with%20YourMembership%20%E2%80%93%20YM%20SSO%20Login&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10293-cwe-287-improper-authentication-in--22f8bf9a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10293%3A%20CWE-287%20Improper%20Authentication%20in%20nexist%20Keyy%20Two%20Factor%20Authentication%20(like%20Clef)&amp;severity=high&amp;id=68ef5c7cc4f69c9730e56970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10139-cwe-79-improper-neutralization-of-i-9dbd64eb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10139%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remko%20WP%20BookWidgets&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10754-cwe-434-unrestricted-upload-of-file-bdf6bb7a</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10754%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20geolocationtechnology%20DocoDoco%20Store%20Locator&amp;severity=high&amp;id=68ef5c7dc4f69c9730e569e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/africa-remains-top-global-target-even-as-attacks-d-2058604c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Africa%20Remains%20Top%20Global%20Target%2C%20Even%20as%20Attacks%20Decline&amp;severity=medium&amp;id=68ef54ef8373f2b27ae48205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/high-severity-vulnerabilities-patched-by-fortinet--7c55936b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=High-Severity%20Vulnerabilities%20Patched%20by%20Fortinet%20and%20Ivanti&amp;severity=high&amp;id=68ef51708373f2b27ade0858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61941-improper-limitation-of-a-pathname-t-917c06b3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61941%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20BUFFALO%20INC.%20WXR9300BE6P%20series&amp;severity=high&amp;id=68ef50c5cae19e7fe92c3789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11501-cwe-89-improper-neutralization-of-s-e3315a70</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11501%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20markomaksym%20Dynamically%20Display%20Posts&amp;severity=high&amp;id=68ef50c5cae19e7fe92c3785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55039-cwe-347-improper-verification-of-cr-bcfac309</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55039%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Apache%20Software%20Foundation%20Apache%20Spark&amp;severity=medium&amp;id=68ef4d40cae19e7fe9244039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-cvss-100-bugs-in-red-lion-rtus-could-hand-hack-a9782699</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20CVSS%2010.0%20Bugs%20in%20Red%20Lion%20RTUs%20Could%20Hand%20Hackers%20Full%20Industrial%20Control&amp;severity=critical&amp;id=68f049d84f645e963f0fee0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11160-cwe-80-improper-neutralization-of-s-3e4ff3a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11160%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=68ef451c439e765f09a73bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11161-cwe-80-improper-neutralization-of-s-ce9868da</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11161%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=68ef451c439e765f09a73be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-ictbroadcast-servers-via-cookie-exp-e3a2b978</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20ICTBroadcast%20Servers%20via%20Cookie%20Exploit%20to%20Gain%20Remote%20Shell%20Access&amp;severity=critical&amp;id=68f049d84f645e963f0fee0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26861-uncontrolled-search-path-element-in-88945977</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26861%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RSUPPORT%20CO.%2C%20LTD.%20RemoteCall%20Remote%20Support%20Program%20(for%20Operator)&amp;severity=high&amp;id=68ef3b8a68c5b4250c33579e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26860-uncontrolled-search-path-element-in-fe860ec5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26860%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RSUPPORT%20CO.%2C%20LTD.%20RemoteCall%20Remote%20Support%20Program%20(for%20Operator)&amp;severity=high&amp;id=68ef3b8a68c5b4250c33579a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26859-uncontrolled-search-path-element-in-249ce6ce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26859%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RSUPPORT%20CO.%2C%20LTD.%20RemoteView%20PC%20Application%20Console&amp;severity=high&amp;id=68ef3b8a68c5b4250c335796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10406-cwe-22-improper-limitation-of-a-pat-4064aa80</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10406%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BlindMatrix%20e-Commerce&amp;severity=medium&amp;id=68ef3b8a68c5b4250c335793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31702-cwe-732-incorrect-permission-assign-2f31752c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31702%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dahua%20IPC&amp;severity=medium&amp;id=68ef39aeb5560353b8eac1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55080-cwe-233-improper-handling-of-parame-4e08bbbf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55080%3A%20CWE-233%20Improper%20Handling%20of%20Parameters%20in%20Eclipse%20Foundation%20ThreadX&amp;severity=high&amp;id=68ef3627b5560353b8e3938d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clipboard-pictures-exfiltration-in-python-infostea-43601c4b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer%2C%20(Wed%2C%20Oct%2015th)&amp;severity=medium&amp;id=68ef360ab5560353b8e37a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sap-netweaver-bug-lets-attackers-take-over-ser-737fd0d1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20SAP%20NetWeaver%20Bug%20Lets%20Attackers%20Take%20Over%20Servers%20Without%20Login&amp;severity=medium&amp;id=68f049d84f645e963f0fee10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8561-cwe-87-improper-neutralization-of-al-585e517b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8561%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20ovatheme%20Ova%20Advent&amp;severity=medium&amp;id=68ef32334e16767881e4a827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6042-cwe-269-improper-privilege-managemen-7386e9e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6042%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20pebas%20Lisfinity%20Core%20-%20Lisfinity%20Core%20plugin%20used%20for%20pebas%C2%AE%20Lisfinity%20WordPress%20theme&amp;severity=high&amp;id=68ef32334e16767881e4a823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11176-cwe-639-authorization-bypass-throug-2d06dd12</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11176%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kybernetikservices%20Quick%20Featured%20Images&amp;severity=medium&amp;id=68ef32334e16767881e4a81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55079-cwe-770-allocation-of-resources-wit-fa06acb5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55079%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Eclipse%20Foundation%20ThreadX&amp;severity=medium&amp;id=68ef254480e6e715302a8099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-critical-vulnerability-in-connect-co-9ed3c920</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Critical%20Vulnerability%20in%20Connect%20Collaboration%20Suite&amp;severity=critical&amp;id=68ef235099201ce2fe1bf537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-173-vulnerabilities-including-ex-93b5fb30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20173%20Vulnerabilities%2C%20Including%20Exploited%20Windows%20Flaws&amp;severity=critical&amp;id=68ef1fcd99201ce2fe14aa15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/search-click-steal-the-hidden-threat-of-spoofed-iv-d7e6f359</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Search%2C%20Click%2C%20Steal%3A%20The%20Hidden%20Threat%20of%20Spoofed%20Ivanti%20VPN%20Client%20Sites&amp;severity=medium&amp;id=68ef5ff1c4f69c9730edcbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11746-cwe-22-improper-limitation-of-a-pat-6edf1434</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11746%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%208theme%20XStore&amp;severity=high&amp;id=68ef0c4955734f1608eb63a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7305-cwe-434-unrestricted-upload-of-file--4480cd22</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7305%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Guangzhou%20Smart%20Software%20Co.%2C%20Ltd.%20SmartBI&amp;severity=critical&amp;id=68eefe3955734f1608e6823f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7304-cwe-78-improper-neutralization-of-sp-a66b027f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7304%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ruijie%20Networks%20Co.%2C%20Ltd.%20RG-UAC&amp;severity=critical&amp;id=68eefe3955734f1608e6823b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13991-cwe-22-improper-limitation-of-a-pat-456d957b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13991%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Huijietong%20Cloud%20Video%20Platform&amp;severity=high&amp;id=68eefe3955734f1608e6824b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7311-cwe-78-improper-neutralization-of-sp-1891bbc9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7311%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BYTEVALUE%20(Luoyang%20Baiwei%20Intelligent%20Technology%20Co.%2C%20Ltd.)%20Flow%20Control%20Router&amp;severity=critical&amp;id=68eefe3955734f1608e68245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54268-heap-based-buffer-overflow-cwe-122--bb64a6a0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54268%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=68eefe3955734f1608e6824f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54278-heap-based-buffer-overflow-cwe-122--27dd54a5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54278%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=68eefe3955734f1608e68252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61804-heap-based-buffer-overflow-cwe-122--bcfeafac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61804%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Animate&amp;severity=high&amp;id=68eef02955734f1608d3dfac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54279-use-after-free-cwe-416-in-adobe-ani-56bc48cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54279%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Animate&amp;severity=high&amp;id=68eef02955734f1608d3dfa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54269-out-of-bounds-read-cwe-125-in-adobe-ceb22c9d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54269%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=68eef02955734f1608d3dfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54270-null-pointer-dereference-cwe-476-in-04563f94</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54270%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=68eef02955734f1608d3dfa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-15-9eae5e7c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-15&amp;severity=medium&amp;id=68f0379eae27d187307571e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56749-na-185ced5a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56749%3A%20n%2Fa&amp;severity=critical&amp;id=68efb2aeea97afbedf4f99b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56748-na-b3644c91</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56748%3A%20n%2Fa&amp;severity=medium&amp;id=68efb0ddb00d656ee54120c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56746-na-2999ba81</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56746%3A%20n%2Fa&amp;severity=low&amp;id=68efad53b00d656ee539c3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62376-cwe-287-improper-authentication-in--b492ac59</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62376%3A%20CWE-287%3A%20Improper%20Authentication%20in%20pwncollege%20dojo&amp;severity=critical&amp;id=68eecaf64a57b2a930bdf0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49552-cross-site-scripting-dom-based-xss--8c606fff</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49552%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=high&amp;id=68eeccd7eb8be918751956eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49553-cross-site-scripting-dom-based-xss--cdc1ca5d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49553%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=68eeccd7eb8be918751956ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54196-url-redirection-to-untrusted-site-o-7b5b301f</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54196%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20(CWE-601)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=68eeccd7eb8be918751956f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-drops-terrifyingly-large-october-patch-u-89ba9cfc</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Drops%20Terrifyingly%20Large%20October%20Patch%20Update&amp;severity=high&amp;id=68eef95355734f1608e4f99c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61797-cross-site-scripting-stored-xss-cwe-4b82bfbb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61797%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68eec00f519df59857dc719b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54272-cross-site-scripting-stored-xss-cwe-c1451b3b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54272%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68eec00f519df59857dc7195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61796-cross-site-scripting-stored-xss-cwe-12672735</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61796%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68eec00f519df59857dc7198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinas-flax-typhoon-turns-geo-mapping-server-into--cbe6c8fe</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China&apos;s%20Flax%20Typhoon%20Turns%20Geo-Mapping%20Server%20into%20a%20Backdoor&amp;severity=medium&amp;id=68eef95355734f1608e4f99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-seizes-15-billion-in-crypto-from-pig-butchering-2357033f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20seizes%20%2415%20billion%20in%20crypto%20from%20&apos;pig%20butchering&apos;%20kingpin&amp;severity=high&amp;id=68eebc3407f6bbeafa149923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-of-widespread-rdp-attacks-by-100k-b0249da9</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20warn%20of%20widespread%20RDP%20attacks%20by%20100K-node%20botnet&amp;severity=medium&amp;id=68eebc3407f6bbeafa149927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mcp-snitch-the-mcp-security-tool-you-probably-need-e9160c82</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MCP%20Snitch%20-%20The%20MCP%20Security%20Tool%20You%20Probably%20Need&amp;severity=medium&amp;id=68eeb4a254d2200316a0d6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54267-incorrect-authorization-cwe-863-in--23f5a2e1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54267%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68eeb4a054d2200316a0d6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54266-cross-site-scripting-stored-xss-cwe-f5436672</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54266%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68eeb4a054d2200316a0d6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54263-incorrect-authorization-cwe-863-in--ce7f93a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54263%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=68eeb4a054d2200316a0d6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54277-incorrect-authorization-cwe-863-in--5e2368e3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54277&amp;severity=null&amp;id=68eeb4a054d2200316a0d6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54265-incorrect-authorization-cwe-863-in--85d8ddae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54265%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68eeb4a054d2200316a0d6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54264-cross-site-scripting-stored-xss-cwe-aa33f662</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54264%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=68eeb4a054d2200316a0d6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pixnapping-attack-lets-attackers-steal-2fa-on-andr-b3579615</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pixnapping%20Attack%20Lets%20Attackers%20Steal%202FA%20on%20Android&amp;severity=low&amp;id=68eef95355734f1608e4f9a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62374-cwe-1321-improperly-controlled-modi-6a068842</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62374%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20Parse-SDK-JS&amp;severity=medium&amp;id=68eeaf1354d220031697493e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61803-integer-overflow-or-wraparound-cwe--ff149b91</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61803%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61802-use-after-free-cwe-416-in-adobe-sub-d06a85c2</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61802%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61805-out-of-bounds-read-cwe-125-in-adobe-c4ef7c84</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61805%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61807-integer-overflow-or-wraparound-cwe--7fbda66a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61807%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61806-out-of-bounds-read-cwe-125-in-adobe-3927684b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61806%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61799-out-of-bounds-read-cwe-125-in-adobe-5087f64a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61799%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=68eea752bbec4fba96d79ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61798-out-of-bounds-read-cwe-125-in-adobe-810b93cf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61798%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=68eea752bbec4fba96d79ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61800-integer-overflow-or-wraparound-cwe--f8961cc7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61800%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=68eea752bbec4fba96d79eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61801-use-after-free-cwe-416-in-adobe-dim-840ef41b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61801%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=68eea752bbec4fba96d79eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61678-cwe-434-unrestricted-upload-of-file-7e5425aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61678%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FreePBX%20endpointman&amp;severity=high&amp;id=68eea752bbec4fba96d79ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34267-cwe-77-improper-neutralization-of-s-083774ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34267%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=68eea752bbec4fba96d79ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61675-cwe-89-improper-neutralization-of-s-bf957697</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61675%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20endpoint&amp;severity=high&amp;id=68eea752bbec4fba96d79edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54283-out-of-bounds-write-cwe-787-in-adob-51e3f098</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54283%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=68eea592ae73b78941f498c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54284-out-of-bounds-write-cwe-787-in-adob-6c64ecde</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54284%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=68eea592ae73b78941f498c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59429-cwe-79-improper-neutralization-of-i-15a741e2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59429%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FreePBX%20core&amp;severity=high&amp;id=68eea592ae73b78941f498ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33177-cwe-400-uncontrolled-resource-consu-1d8a8e0a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33177%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20NVIDIA%20Jetson%20Orin%20Series&amp;severity=medium&amp;id=68eea752bbec4fba96d79ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54282-heap-based-buffer-overflow-cwe-122--ef0b522b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54282%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=68eea752bbec4fba96d79ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54281-use-after-free-cwe-416-in-adobe-ado-120ffdc8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54281%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=68eea592ae73b78941f498d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59051-cwe-78-improper-neutralization-of-s-aa3be3c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59051%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20endpoint&amp;severity=high&amp;id=68eea592ae73b78941f498d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54276-out-of-bounds-read-cwe-125-in-adobe-93f24f29</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54276%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=68eea592ae73b78941f498cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33182-cwe-862-missing-authorization-in-nv-ab250f56</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33182%3A%20CWE-862%20Missing%20Authorization%20in%20NVIDIA%20Jetson%20Orin%20Series&amp;severity=high&amp;id=68eea212ae73b78941ef5551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54274-stack-based-buffer-overflow-cwe-121-ceef99e5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54274%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68eea212ae73b78941ef5557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54273-out-of-bounds-write-cwe-787-in-adob-2115cb90</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54273%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68eea212ae73b78941ef5554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54275-out-of-bounds-write-cwe-787-in-adob-af035f21</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54275%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=medium&amp;id=68eea212ae73b78941ef555a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54280-out-of-bounds-write-cwe-787-in-adob-cf8ce6f9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54280%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68eea212ae73b78941ef555d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bombshell-uefi-shell-vulnerabilities-allow-attacke-7e20677f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BombShell%3A%20UEFI%20shell%20vulnerabilities%20allow%20attackers%20to%20bypass%20Secure%20Boot%20on%20Framework%20Devices&amp;severity=medium&amp;id=68ee9814d8f994a66ec32b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-october-2025-tue-oct-14th-a1d916ac</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20October%202025%2C%20(Tue%2C%20Oct%2014th)&amp;severity=critical&amp;id=68ee9068f2e93b27b0244a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23356-cwe-306-in-nvidia-isaac-lab-02fa91bd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23356%3A%20CWE-306%20in%20NVIDIA%20Isaac%20Lab&amp;severity=high&amp;id=68ee8c743dd1bfb0b7f039c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11736-sql-injection-in-itsourcecode-onlin-0def9c44</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11736%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Examination%20System&amp;severity=medium&amp;id=68ee8c743dd1bfb0b7f039cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8459-cwe-79-improper-neutralization-of-in-70aa891d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8459%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=high&amp;id=68ee8e6cf2e93b27b022870f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37145-vulnerability-in-hewlett-packard-en-6684be75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37145%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59497-cwe-367-time-of-check-time-of-use-t-f2207c75</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59497%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Linux&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59289-cwe-415-double-free-in-microsoft-wi-c38b0059</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59289%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85903dd1bfb0b7e42393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59287-cwe-502-deserialization-of-untruste-56bc0296</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59287%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Windows%20Server%202012&amp;severity=critical&amp;id=68ee85903dd1bfb0b7e4238d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59285-cwe-502-deserialization-of-untruste-2ca2fb0b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59285%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=68ee85903dd1bfb0b7e4238a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59278-cwe-1287-improper-validation-of-spe-024a5d81</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59278%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59275-cwe-1287-improper-validation-of-spe-60831a5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59275%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37144-vulnerability-in-hewlett-packard-en-51bdb555</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37144%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59261-cwe-367-time-of-check-time-of-use-t-eedfad3d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59261%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59260-cwe-200-exposure-of-sensitive-infor-b8069c9f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59260%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68ee858f3dd1bfb0b7e41d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59253-cwe-284-improper-access-control-in--ca3315a6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59253%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858e3dd1bfb0b7e41c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59230-cwe-284-improper-access-control-in--b617baab</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59230%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59248-cwe-20-improper-input-validation-in-96deefe3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59248%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59244-cwe-73-external-control-of-file-nam-5dd68607</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59244%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858e3dd1bfb0b7e41c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59241-cwe-59-improper-link-resolution-bef-c6b73d76</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59241%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59238-cwe-416-use-after-free-in-microsoft-e5b46ca1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59238%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59232-cwe-125-out-of-bounds-read-in-micro-dd512353</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59232%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59229-cwe-248-uncaught-exception-in-micro-e06e3bdf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59229%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=68ee858d3dd1bfb0b7e41c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59227-cwe-416-use-after-free-in-microsoft-8fb0e5ac</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59227%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59226-cwe-416-use-after-free-in-microsoft-6996e114</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59226%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59225-cwe-416-use-after-free-in-microsoft-07e7d3ea</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59225%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59224-cwe-416-use-after-free-in-microsoft-6a1041af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59224%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59223-cwe-416-use-after-free-in-microsoft-f0267063</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59223%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59222-cwe-416-use-after-free-in-microsoft-19f40732</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59222%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59221-cwe-416-use-after-free-in-microsoft-866c0812</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59221%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59214-cwe-200-exposure-of-sensitive-infor-3faa4ba9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59214%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858d3dd1bfb0b7e40cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59213-cwe-89-improper-neutralization-of-s-06fceafa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59213%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59210-cwe-416-use-after-free-in-microsoft-3137998a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59210%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee858c3dd1bfb0b7e40645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59209-cwe-200-exposure-of-sensitive-infor-2f402466</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59209%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858c3dd1bfb0b7e40642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59208-cwe-125-out-of-bounds-read-in-micro-a7982385</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59208%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858c3dd1bfb0b7e4063f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59205-cwe-362-concurrent-execution-using--6654249f</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59205%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858b3dd1bfb0b7e40636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59203-cwe-532-insertion-of-sensitive-info-17c36457</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59203%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858b3dd1bfb0b7e40630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59198-cwe-20-improper-input-validation-in-2b863ffc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59198%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e40555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59197-cwe-532-insertion-of-sensitive-info-bd7d79e6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59197%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e40552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59194-cwe-908-use-of-uninitialized-resour-17911375</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59194%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59193-cwe-362-concurrent-execution-using--4b5216d9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59193%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59192-cwe-126-buffer-over-read-in-microso-a137fea9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59192%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59191-cwe-122-heap-based-buffer-overflow--4190b1de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59191%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e401b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59190-cwe-20-improper-input-validation-in-e690db7b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59190%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e401b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59189-cwe-416-use-after-free-in-microsoft-77fc7d3f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59189%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e401ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59188-cwe-200-exposure-of-sensitive-infor-be84c4a4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59188%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202012&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e401ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59187-cwe-20-improper-input-validation-in-0f2c2cb0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59187%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e401a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59184-cwe-200-exposure-of-sensitive-infor-3c1236c7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59184%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e4019f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58739-cwe-200-exposure-of-sensitive-infor-1ba4aa5d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58739%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e4019c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58738-cwe-416-use-after-free-in-microsoft-509f47a9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58738%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58737-cwe-416-use-after-free-in-microsoft-87d0ae4c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58737%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58736-cwe-416-use-after-free-in-microsoft-3101c2b4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58736%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58734-cwe-416-use-after-free-in-microsoft-5278606d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58734%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58733-cwe-416-use-after-free-in-microsoft-9455c015</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58733%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58731-cwe-416-use-after-free-in-microsoft-dbb12639</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58731%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58730-cwe-416-use-after-free-in-microsoft-2b826a12</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58730%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58729-cwe-1287-improper-validation-of-spe-f2bb59fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58729%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85893dd1bfb0b7e3fd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58727-cwe-362-concurrent-execution-using--1bf6f99c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58727%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58726-cwe-284-improper-access-control-in--ea01f350</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58726%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58725-cwe-122-heap-based-buffer-overflow--850f757c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58725%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58724-cwe-284-improper-access-control-in--1aeb1725</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58724%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Arc%20Enabled%20Servers%20-%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58720-cwe-1240-use-of-a-cryptographic-pri-d34923cb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58720%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58718-cwe-416-use-after-free-in-microsoft-b4fec7c5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58718%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58714-cwe-284-improper-access-control-in--271deec8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58714%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55699-cwe-200-exposure-of-sensitive-infor-81e44474</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55699%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85873dd1bfb0b7e3f5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55698-cwe-476-null-pointer-dereference-in-fb473587</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55698%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55697-cwe-122-heap-based-buffer-overflow--2ad52d3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55697%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55696-cwe-367-time-of-check-time-of-use-t-87f24b6d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55696%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55695-cwe-125-out-of-bounds-read-in-micro-1886bd6c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55695%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85873dd1bfb0b7e3f5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55694-cwe-284-improper-access-control-in--89095ad9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55694%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55693-cwe-416-use-after-free-in-microsoft-2d3e6351</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55693%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55692-cwe-20-improper-input-validation-in-3e26b266</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55692%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55691-cwe-416-use-after-free-in-microsoft-1aca4ea1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55691%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55690-cwe-416-use-after-free-in-microsoft-c1381d18</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55690%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55688-cwe-416-use-after-free-in-microsoft-573ff9c1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55688%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55684-cwe-416-use-after-free-in-microsoft-34f766d3</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55684%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55683-cwe-200-exposure-of-sensitive-infor-0761f883</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55683%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68ee85853dd1bfb0b7e3f160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55682-cwe-841-improper-enforcement-of-beh-2e6fd883</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55682%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68ee85853dd1bfb0b7e3f15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55680-cwe-367-time-of-check-time-of-use-t-9b8ee541</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55680%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55679-cwe-20-improper-input-validation-in-3a0d9005</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55679%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee85853dd1bfb0b7e3f154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55678-cwe-416-use-after-free-in-microsoft-2fbfb60b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55678%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55337-cwe-841-improper-enforcement-of-beh-e3a99106</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55337%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55334-cwe-312-cleartext-storage-of-sensit-8e598b54</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55334%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55332-cwe-841-improper-enforcement-of-beh-98e12cfc</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55332%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55331-cwe-416-use-after-free-in-microsoft-a1094552</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55331%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85843dd1bfb0b7e3ed06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55330-cwe-841-improper-enforcement-of-beh-1ee9f15e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55330%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55328-cwe-362-concurrent-execution-using--24c58b07</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55328%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85843dd1bfb0b7e3ed00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55326-cwe-416-use-after-free-in-microsoft-d0a5ac77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55326%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55248-cwe-326-inadequate-encryption-stren-f0ae79b0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55248%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20Microsoft%20.NET%208.0&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55240-cwe-284-improper-access-control-in--82ce5529</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55240%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e73c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53768-cwe-416-use-after-free-in-microsoft-ea18b58d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53768%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53139-cwe-319-cleartext-transmission-of-s-561dafdd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53139%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50175-cwe-416-use-after-free-in-microsoft-f27e8535</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50175%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53150-cwe-416-use-after-free-in-microsoft-8f4aa23a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53150%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50152-cwe-125-out-of-bounds-read-in-micro-bbd882ae</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50152%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53717-cwe-807-reliance-on-untrusted-input-0e7f2808</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53717%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25004-cwe-284-improper-access-control-in--977be0f8</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25004%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20PowerShell%207.4&amp;severity=high&amp;id=68ee85823dd1bfb0b7e3e08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48813-cwe-324-use-of-a-key-past-its-expir-2137d0f3</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48813%3A%20CWE-324%3A%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59502-cwe-400-uncontrolled-resource-consu-909ed232</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59502%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59494-cwe-284-improper-access-control-in--67771589</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59494%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59295-cwe-122-heap-based-buffer-overflow--a5983a5c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59295%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59294-cwe-200-exposure-of-sensitive-infor-def82b92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59294%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=low&amp;id=68ee85903dd1bfb0b7e4239f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59292-cwe-73-external-control-of-file-nam-0a43e586</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59292%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Azure%20Compute%20Gallery&amp;severity=high&amp;id=68ee85903dd1bfb0b7e4239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59291-cwe-73-external-control-of-file-nam-6560353e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59291%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Azure%20Compute%20Gallery&amp;severity=high&amp;id=68ee85903dd1bfb0b7e42399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59290-cwe-416-use-after-free-in-microsoft-184a8f92</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59290%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85903dd1bfb0b7e42396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59288-cwe-347-improper-verification-of-cr-12c453ef</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59288%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20microsoft%2Fplaywright&amp;severity=medium&amp;id=68ee85903dd1bfb0b7e42390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59284-cwe-200-exposure-of-sensitive-infor-532dc7c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59284%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=low&amp;id=68ee85903dd1bfb0b7e42387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59282-cwe-362-concurrent-execution-using--5d6ff542</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59282%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85903dd1bfb0b7e42384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59281-cwe-59-improper-link-resolution-bef-d1a1da96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59281%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Xbox%20Gaming%20Services&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47979-cwe-532-insertion-of-sensitive-info-8b87495a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47979%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59280-cwe-287-improper-authentication-in--01409627</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59280%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=low&amp;id=68ee858f3dd1bfb0b7e41d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59277-cwe-1287-improper-validation-of-spe-df8e1cb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59277%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59259-cwe-1287-improper-validation-of-spe-53758d07</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59259%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858f3dd1bfb0b7e41d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59258-cwe-532-insertion-of-sensitive-info-c7b270c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59258%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%20Server%202012&amp;severity=medium&amp;id=68ee858f3dd1bfb0b7e41d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59257-cwe-1287-improper-validation-of-spe-1e714fad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59257%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68ee858f3dd1bfb0b7e41d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59255-cwe-122-heap-based-buffer-overflow--8779f984</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59255%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59254-cwe-122-heap-based-buffer-overflow--5942782f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59254%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59250-cwe-20-improper-input-validation-in-87e97893</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59250%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20JDBC%20Driver%20for%20SQL%20Server%2010.2&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59249-cwe-1390-weak-authentication-in-mic-4ae2aadb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59249%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59243-cwe-416-use-after-free-in-microsoft-f0065a25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59243%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49708-cwe-416-use-after-free-in-microsoft-5623b877</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49708%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=critical&amp;id=68ee85833dd1bfb0b7e3e65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59242-cwe-122-heap-based-buffer-overflow--733db26c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59242%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59237-cwe-502-deserialization-of-untruste-55ba3e2e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59237%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59236-cwe-416-use-after-free-in-microsoft-1095d1e8</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59236%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59235-cwe-125-out-of-bounds-read-in-micro-7ae4b377</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59235%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59234-cwe-416-use-after-free-in-microsoft-260e4267</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59234%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59233-cwe-843-access-of-resource-using-in-96187bb9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59233%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59231-cwe-843-access-of-resource-using-in-55cc6b67</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59231%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59228-cwe-20-improper-input-validation-in-705799c4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59228%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59211-cwe-200-exposure-of-sensitive-infor-6caf2516</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59211%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858c3dd1bfb0b7e40648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59207-cwe-822-untrusted-pointer-dereferen-23c06e08</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59207%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858c3dd1bfb0b7e4063c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59206-cwe-416-use-after-free-in-microsoft-74cb6fe5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59206%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee858b3dd1bfb0b7e40639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59204-cwe-908-use-of-uninitialized-resour-9b508cfb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59204%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee858b3dd1bfb0b7e40633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59202-cwe-416-use-after-free-in-microsoft-e1407c22</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59202%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68ee858b3dd1bfb0b7e4062d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59201-cwe-284-improper-access-control-in--8dc0bac6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59201%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e4055e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59200-cwe-362-concurrent-execution-using--6419bb7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59200%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e4055b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59199-cwe-284-improper-access-control-in--bb7bc249</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59199%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59196-cwe-362-concurrent-execution-using--1a0ba6ef</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59196%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e4054f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59195-cwe-362-concurrent-execution-using--6b7aee0c</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59195%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e4054c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59186-cwe-200-exposure-of-sensitive-infor-847cdccc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59186%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e401a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59185-cwe-73-external-control-of-file-nam-ea154171</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59185%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e401a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58735-cwe-416-use-after-free-in-microsoft-2088f594</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58735%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58732-cwe-416-use-after-free-in-microsoft-e834bbbb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58732%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58728-cwe-416-use-after-free-in-microsoft-0a6667e2</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58728%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58722-cwe-122-heap-based-buffer-overflow--255756a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58722%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58719-cwe-416-use-after-free-in-microsoft-e4816b3b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58719%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=68ee85883dd1bfb0b7e3f8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58717-cwe-125-out-of-bounds-read-in-micro-a929dcba</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58717%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85883dd1bfb0b7e3f8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37143-vulnerability-in-hewlett-packard-en-b7c7b7a3</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37143%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58716-cwe-20-improper-input-validation-in-9be34fe1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58716%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58715-cwe-190-integer-overflow-or-wraparo-0e930cfe</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58715%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55701-cwe-1287-improper-validation-of-spe-2a73f269</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55701%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55700-cwe-125-out-of-bounds-read-in-micro-86fa41e8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55700%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85873dd1bfb0b7e3f5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55689-cwe-416-use-after-free-in-microsoft-462043ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55689%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55687-cwe-362-concurrent-execution-using--fcd80125</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55687%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55686-cwe-416-use-after-free-in-microsoft-dcdd1a64</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55686%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55685-cwe-416-use-after-free-in-microsoft-552d4e32</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55685%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55681-cwe-125-out-of-bounds-read-in-micro-d0bbfee9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55681%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55677-cwe-822-untrusted-pointer-dereferen-61d063a1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55677%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55676-cwe-209-generation-of-error-message-ef0cb86b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55676%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68ee85853dd1bfb0b7e3f14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55340-cwe-287-improper-authentication-in--1ca77a4a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55340%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55339-cwe-125-out-of-bounds-read-in-micro-733fcc01</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55339%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55338-security-feature-bypass-in-microsof-dcc69d37</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55338%3A%20CWE-1310%3A%20Missing%20Ability%20to%20Patch%20ROM%20Code%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55336-cwe-200-exposure-of-sensitive-infor-4fea751f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55336%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55335-cwe-416-use-after-free-in-microsoft-02bc342d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55335%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85843dd1bfb0b7e3ed12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55333-cwe-1023-incomplete-comparison-with-0b489e65</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55333%3A%20CWE-1023%3A%20Incomplete%20Comparison%20with%20Missing%20Factors%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55325-cwe-126-buffer-over-read-in-microso-5ecffc49</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55325%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55320-cwe-89-improper-neutralization-of-s-7d3b6790</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55320%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24052-cwe-121-stack-based-buffer-overflow-36ea267a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24052%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85823dd1bfb0b7e3e089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24990-cwe-822-untrusted-pointer-dereferen-403d3e5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24990%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85823dd1bfb0b7e3e08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55315-cwe-444-inconsistent-interpretation-f826b6db</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55315%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Microsoft%20ASP.NET%20Core%202.3&amp;severity=critical&amp;id=68ee85833dd1bfb0b7e3e745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55247-cwe-59-improper-link-resolution-bef-75809cdd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55247%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53782-cwe-303-incorrect-implementation-of-6fe53990</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53782%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50174-cwe-416-use-after-free-in-microsoft-e932973e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50174%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48004-cwe-416-use-after-free-in-microsoft-20e805a0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48004%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47989-cwe-284-improper-access-control-in--ae8ae1be</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47989%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Arc%20Enabled%20Servers%20-%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37142-vulnerability-in-hewlett-packard-en-2012c30d</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37142%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37141-vulnerability-in-hewlett-packard-en-4af9352d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37141%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37140-vulnerability-in-hewlett-packard-en-86736df7</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37140%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37139-vulnerability-in-hewlett-packard-en-17619d8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37139%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37138-vulnerability-in-hewlett-packard-en-11c61a2e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37138%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37137-vulnerability-in-hewlett-packard-en-060e608d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37137%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e89a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37136-vulnerability-in-hewlett-packard-en-19e09fd4</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37136%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37135-vulnerability-in-hewlett-packard-en-c5c0c55e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37135%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37134-vulnerability-in-hewlett-packard-en-f0363fc7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37134%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee81fc8fa40b621b08e891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-exploit-arcgis-server-as-backdoor--d4665610</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Exploit%20ArcGIS%20Server%20as%20Backdoor%20for%20Over%20a%20Year&amp;severity=medium&amp;id=68ee81d88fa40b621b088938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8430-cwe-79-improper-neutralization-of-in-417e72bb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8430%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37133-vulnerability-in-hewlett-packard-en-391ae6c0</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37133%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee81fc8fa40b621b08e88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37132-vulnerability-in-hewlett-packard-en-30298e0a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37132%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee81fc8fa40b621b08e88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11548-cwe-94-improper-control-of-generati-deb7e16b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11548%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ibi%20WebFOCUS&amp;severity=critical&amp;id=68ee81fc8fa40b621b08e8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37148-vulnerability-in-hewlett-packard-en-1c3050f7</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37148%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee7e6d8fa40b621b022aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37147-vulnerability-in-hewlett-packard-en-0411cf35</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37147%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee7e6d8fa40b621b022aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37146-vulnerability-in-hewlett-packard-en-3ecd48a7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37146%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee7e6d8fa40b621b022aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pixnapping-android-flaw-lets-rogue-apps-steal--d59fda90</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Pixnapping%20Android%20Flaw%20Lets%20Rogue%20Apps%20Steal%202FA%20Codes%20Without%20Permissions&amp;severity=high&amp;id=68ee772175ce224a043334e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-abuse-geo-mapping-tool-for-year-lo-6eeb6b1d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20hackers%20abuse%20geo-mapping%20tool%20for%20year-long%20persistence&amp;severity=high&amp;id=68ee772175ce224a043334ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/secure-boot-bypass-risk-threatens-nearly-200000-li-27b76ca8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Secure%20Boot%20bypass%20risk%20threatens%20nearly%20200%2C000%20Linux%20Framework%20laptops&amp;severity=high&amp;id=68ee772175ce224a043334e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37149-vulnerability-in-hewlett-packard-en-1217854d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37149%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ProLiant%20RL300%20Gen11%20Server&amp;severity=medium&amp;id=68ee73a175ce224a042d3465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11577-cwe-321-use-of-hardcoded-cryptograp-df81799a</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11577%3A%20CWE-321%20Use%20of%20Hard%E2%80%91coded%20Cryptographic%20Key%20in%20Clevo%20Notebook%20System%20Firmware&amp;severity=high&amp;id=68ee702b75ce224a0426b537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8429-cwe-79-improper-neutralization-of-in-7e968e10</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee702c75ce224a0426b924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54893-cwe-79-improper-neutralization-of-i-9044cf01</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee702c75ce224a0426b914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31514-information-disclosure-in-fortinet--81a7aba5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31514%3A%20Information%20disclosure%20in%20Fortinet%20FortiProxy&amp;severity=low&amp;id=68ee702b75ce224a0426b559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46774-escalation-of-privilege-in-fortinet-78ff3290</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46774%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientMac&amp;severity=medium&amp;id=68ee702c75ce224a0426b90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54822-improper-access-control-in-fortinet-f50df995</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54822%3A%20Improper%20access%20control%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68ee702c75ce224a0426b911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62366-cwe-79-improper-neutralization-of-i-5d324b7a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62366%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eladnava%20mailgen&amp;severity=low&amp;id=68ee702c75ce224a0426b920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31365-execute-unauthorized-code-or-comman-6d08eeb0</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31365%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientMac&amp;severity=medium&amp;id=68ee702b75ce224a0426b556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53845-improper-access-control-in-fortinet-0d010291</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53845%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=68ee702c75ce224a0426b90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59921-information-disclosure-in-fortinet--ae1dab5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59921%3A%20Information%20disclosure%20in%20Fortinet%20FortiADC&amp;severity=medium&amp;id=68ee702c75ce224a0426b91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33507-denial-of-service-privilege-escalat-f9d56898</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33507%3A%20Denial%20of%20service%2C%20Privilege%20escalation%20in%20Fortinet%20FortiIsolator&amp;severity=high&amp;id=68ee702b75ce224a0426b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57716-execute-unauthorized-code-or-comman-613daaa3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57716%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=68ee702c75ce224a0426b91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25255-improper-access-control-in-fortinet-9cb7d4fc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25255%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68ee702b75ce224a0426b553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25252-improper-access-control-in-fortinet-bc7a1be9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25252%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68ee702b75ce224a0426b550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26008-denial-of-service-in-fortinet-forti-221c90fb</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26008%3A%20Denial%20of%20service%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68ee702b75ce224a0426b542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47569-information-disclosure-in-fortinet--0f5d4aa2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47569%3A%20Information%20disclosure%20in%20Fortinet%20FortiManager%20Cloud&amp;severity=medium&amp;id=68ee702b75ce224a0426b549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54973-improper-access-control-in-fortinet-5626ba59</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54973%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=68ee702c75ce224a0426b917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46718-execute-unauthorized-code-or-comman-48b25376</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46718%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68ee702b75ce224a0426b53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50571-execute-unauthorized-code-or-comman-13926225</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50571%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=68ee702b75ce224a0426b54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31366-improper-access-control-in-fortinet-2b86f10d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31366%3A%20Improper%20access%20control%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e04032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22258-escalation-of-privilege-in-fortinet-46345852</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22258%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiPAM&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e0402c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25253-information-disclosure-in-fortinet--ee20411d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25253%3A%20Information%20disclosure%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e0402f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57740-execute-unauthorized-code-or-comman-0f3cebcb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57740%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiPAM&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e0403b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47890-improper-access-control-in-fortinet-e6626c76</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47890%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSASE&amp;severity=low&amp;id=68ee6cbb1b3029e3c7e04035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57741-escalation-of-privilege-in-fortinet-9a6930de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57741%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientMac&amp;severity=high&amp;id=68ee6cbb1b3029e3c7e0403e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49201-execute-unauthorized-code-or-comman-c178c16f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49201%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiPAM&amp;severity=high&amp;id=68ee6cbb1b3029e3c7e04038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58325-escalation-of-privilege-in-fortinet-8447598b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58325%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=68ee6cbb1b3029e3c7e04044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58324-execute-unauthorized-code-or-comman-787c7b0d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58324%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e04041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58903-denial-of-service-in-fortinet-forti-5d572aa2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58903%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=68ee6cbc1b3029e3c7e04054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48891-escalation-of-privilege-in-fortinet-eb4cdc48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48891%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e04029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62172-cwe-80-improper-neutralization-of-s-87ef0280</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62172%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20home-assistant%20core&amp;severity=high&amp;id=68ee6cbc1b3029e3c7e04057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54891-cwe-79-improper-neutralization-of-i-4abddc9b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee69461b3029e3c7d96f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62157-cwe-522-insufficiently-protected-cr-58061e6c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62157%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=68ee69461b3029e3c7d96f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54892-cwe-79-improper-neutralization-of-i-790983b2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee69461b3029e3c7d96f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54889-cwe-79-improper-neutralization-of-i-4d227b00</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee65b283f5d4e8a43ff594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62156-cwe-22-improper-limitation-of-a-pat-829c0aa8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62156%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=68ee65b283f5d4e8a43ff597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0033-cwe-284-improper-access-control-in-a-aa8c05fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0033%3A%20CWE-284%20%20Improper%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Series%20Processors%20(formerly%20codenamed%20%22Milan%22)&amp;severity=medium&amp;id=68ee6aa71b3029e3c7dc1688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44088-cwe-79-improper-neutralization-of-i-16a1770e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Geode&amp;severity=medium&amp;id=68ee623083f5d4e8a43949f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5946-cwe-78-improper-neutralization-of-sp-071c6d2a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5946%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=high&amp;id=68ee5f184c738d5ce3163a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10986-cwe-22-improper-limitation-of-a-pat-52f1e296</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10986%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=medium&amp;id=68ee5f184c738d5ce3163a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8428-cwe-79-improper-neutralization-of-in-b53b8284</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8428%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee5f184c738d5ce3163a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10985-cwe-78-improper-neutralization-of-s-7d0c7eb7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10985%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=68ee5f184c738d5ce3163a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10243-cwe-78-improper-neutralization-of-s-78f16f8b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10243%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=68ee639883f5d4e8a43c4d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10242-cwe-78-improper-neutralization-of-s-f6d95e81</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10242%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=68ee639883f5d4e8a43c4d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27906-cwe-548-exposure-of-information-thr-b2ea9622</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27906%3A%20CWE-548%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20IBM%20Content%20Navigator&amp;severity=medium&amp;id=68ee639883f5d4e8a43c4d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-limits-ie-mode-in-edge-after-chakra-zero-7c1f8e3c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Limits%20IE%20Mode%20in%20Edge%20After%20Chakra%20Zero-Day%20Activity%20Detected&amp;severity=critical&amp;id=68ee5b974c738d5ce30f2a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33044-cwe-119-improper-restriction-of-ope-7fe1e62b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33044%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68ee5bac4c738d5ce30f7db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22833-cwe-787-out-of-bounds-write-in-ami--2eae5f4a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22833%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68ee5bac4c738d5ce30f7daf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22832-cwe-787-out-of-bounds-write-in-ami--cd19ef40</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22832%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68ee5bac4c738d5ce30f7dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22831-cwe-787-out-of-bounds-write-in-ami--f00835d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22831%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68ee5bac4c738d5ce30f7da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-vulnerabilities-in-netweaver--1140eff4</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20Vulnerabilities%20in%20NetWeaver%2C%20Print%20Service%2C%20SRM&amp;severity=critical&amp;id=68ee587d2f0a6ddb6c7aeab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47856-execute-unauthorized-code-or-comman-2b934ff5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47856%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiVoice&amp;severity=high&amp;id=68ee550c2f0a6ddb6c734b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9178-cwe-787-out-of-bounds-write-in-rockw-58d4a8d3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9178%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Rockwell%20Automation%201715-AENTR%20EtherNet%2FIP%20Adapter&amp;severity=high&amp;id=68ee4b3a509368ccaa76d788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9177-cwe-770-allocation-of-resources-with-32c13096</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9177%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Rockwell%20Automation%201715-AENTR%20EtherNet%2FIP%20Adapter&amp;severity=high&amp;id=68ee4b3a509368ccaa76d785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvard-is-first-confirmed-victim-of-oracle-ebs-ze-98b0275d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvard%20Is%20First%20Confirmed%20Victim%20of%20Oracle%20EBS%20Zero-Day%20Hack&amp;severity=medium&amp;id=68ee47b1509368ccaa6f7316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7330-cwe-352-cross-site-request-forgery-c-31e9a41f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7330%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rockwell%20Automation%20Comms%20-%201783-NATR&amp;severity=high&amp;id=68ee47d0509368ccaa6fc9b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10610-cwe-89-improper-neutralization-of-s-9e6b2322</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10610%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SFS%20Consulting%20Information%20Processing%20Industry%20and%20Foreign%20Trade%20Inc.%20Winsure&amp;severity=critical&amp;id=68ee47cf509368ccaa6fc896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11498-cwe-1236-improper-neutralization-of-67b4f8c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11498%3A%20CWE-1236%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20B%26R%20Industrial%20Automation%20GmbH%20Automation%20Runtime&amp;severity=medium&amp;id=68ee47cf509368ccaa6fc899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7329-cwe-79-improper-neutralization-of-in-db8c44d9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7329%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rockwell%20Automation%20Comms%20-%201783-NATR&amp;severity=high&amp;id=68ee47d0509368ccaa6fc9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7328-cwe-306-missing-authentication-for-c-505b1ccf</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7328%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Rockwell%20Automation%20Comms%20-%201783-NATR&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11720-spoofing-risk-in-android-custom-tab-3f789d77</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11720%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68ee47d0509368ccaa6fc9a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11718-address-bar-could-be-spoofed-on-and-9693bd23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11718%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68ee47d0509368ccaa6fc99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11717-the-password-edit-screen-was-not-hi-d0c1a0a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11717%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11721-memory-safety-bug-fixed-in-firefox--034643e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11721%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11719-use-after-free-caused-by-the-native-2eb86c2b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11719%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11716-sandboxed-iframes-allowed-links-to--85e6e601</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11716%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68ee47cf509368ccaa6fc8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11715-memory-safety-bugs-fixed-in-firefox-d7d91895</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11715%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68ee47cf509368ccaa6fc8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11713-potential-user-assisted-code-execut-9f1c24fe</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11713%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68ee47cf509368ccaa6fc8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11712-an-object-tag-type-attribute-overro-f7980773</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11712%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68ee47cf509368ccaa6fc8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11708-use-after-free-in-mediatrackgraphim-8aefe1c9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11708%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47cf509368ccaa6fc89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11714-memory-safety-bugs-fixed-in-firefox-d179cdde</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11714%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68ee47cf509368ccaa6fc8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11711-some-non-writable-object-properties-72a5cfe7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11711%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68ee47cf509368ccaa6fc8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11710-cross-process-information-leaked-du-9a26668c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11710%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47cf509368ccaa6fc8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11709-out-of-bounds-readwrite-in-a-privil-26725319</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11709%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee4920509368ccaa72487e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9067-cwe-269-improper-privilege-managemen-3abe94b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9067%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Rockwell%20Automation%20FactoryTalk%20Linx&amp;severity=high&amp;id=68ee4920509368ccaa72488f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9124-cwe-248-uncaught-exception-in-rockwe-0bc4e2be</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9124%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Rockwell%20Automation%20Compact%20GuardLogix%C2%AE%205370&amp;severity=high&amp;id=68ee4920509368ccaa724895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9068-cwe-269-improper-privilege-managemen-21f0c63f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9068%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Rockwell%20Automation%20FactoryTalk%20Linx&amp;severity=high&amp;id=68ee4920509368ccaa724892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9064-cwe-287-improper-authentication-in-r-5ddcf4cd</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9064%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Rockwell%20Automation%20FactoryTalk%20View%20Machine%20Edition&amp;severity=high&amp;id=68ee4920509368ccaa724889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9063-cwe-287-improper-authentication-in-r-f43c7d7d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9063%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Rockwell%20Automation%20PanelView%20Plus%207%20Performance%20Series%20B&amp;severity=high&amp;id=68ee4920509368ccaa724886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9066-cwe-20-improper-input-validation-in--3202352d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9066%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20FactoryTalk%20ViewPoint&amp;severity=high&amp;id=68ee4920509368ccaa72488c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9437-cwe-755-improper-handling-of-excepti-a334b193</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9437%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Rockwell%20Automation%20ArmorStart%20AOP&amp;severity=high&amp;id=68ee412a6844b28d82f10590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pixnapping-attack-steals-data-from-google-samsung--bad7c6fb</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pixnapping%20Attack%20Steals%20Data%20From%20Google%2C%20Samsung%20Android%20Phones&amp;severity=medium&amp;id=68ee3a7865eb75fc048633fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rmpocalypse-single-8-byte-write-shatters-amds-sev--d47e3566</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RMPocalypse%3A%20Single%208-Byte%20Write%20Shatters%20AMD%E2%80%99s%20SEV-SNP%20Confidential%20Computing&amp;severity=medium&amp;id=68eef85f55734f1608e47850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intents-android-12-fonctionnement-scurit-et-exempl-ab4e6ba9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intents%20Android%20(1%2F2)%20%3A%20fonctionnement%2C%20s%C3%A9curit%C3%A9%20et%20exemples%20d&apos;attaques&amp;severity=medium&amp;id=68ee3773f4a587eca87a8509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pixnapping-android-flaw-lets-rogue-apps-steal--7c977b39</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Pixnapping%20Android%20Flaw%20Lets%20Rogue%20Apps%20Steal%202FA%20Codes%20Without%20Permissions&amp;severity=medium&amp;id=68eef85f55734f1608e47853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-ai-reveals-about-web-applications-and-why-it--639e85dc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20AI%20Reveals%20About%20Web%20Applications%E2%80%94%20and%20Why%20It%20Matters&amp;severity=low&amp;id=68eef85f55734f1608e47856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rmpocalypse-new-attack-breaks-amd-confidential-com-3064afef</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RMPocalypse%3A%20New%20Attack%20Breaks%20AMD%20Confidential%20Computing&amp;severity=low&amp;id=68ee2d1aeab6788b87c8510e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-10-still-on-over-40-of-devices-as-it-reach-7d3b7fce</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2010%20Still%20on%20Over%2040%25%20of%20Devices%20as%20It%20Reaches%20End%20of%20Support&amp;severity=medium&amp;id=68ee1fe5fadadd4ae262ba32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-pypi-and-rubygems-packages-found-sending-devel-7f81f155</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%2C%20PyPI%2C%20and%20RubyGems%20Packages%20Found%20Sending%20Developer%20Data%20to%20Discord%20Channels&amp;severity=high&amp;id=68ee2008fadadd4ae263392a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/astaroth-trojan-targets-windows-uses-github-images-4d9a7ae3</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Astaroth%20Trojan%20Targets%20Windows%2C%20Uses%20GitHub%20Images%20to%20Stay%20Active%20After%20Takedowns&amp;severity=medium&amp;id=68ee2008fadadd4ae263392e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unverified-cots-hardware-enables-persistent-attack-27301b7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unverified%20COTS%20hardware%20enables%20persistent%20attacks%20in%20small%20satellites%20via%20SpyChain&amp;severity=medium&amp;id=68ee2008fadadd4ae2633932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10228-cwe-384-session-fixation-in-rolanti-40f2e4fe</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10228%3A%20CWE-384%20Session%20Fixation%20in%20Rolantis%20Information%20Technologies%20Agentis&amp;severity=high&amp;id=68ee16307eab8b438c025d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40812-cwe-125-out-of-bounds-read-in-sieme-e9e76491</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40812%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2024&amp;severity=high&amp;id=68ee16327eab8b438c025d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40811-cwe-125-out-of-bounds-read-in-sieme-07b3932b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40811%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2024&amp;severity=high&amp;id=68ee16327eab8b438c025d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40810-cwe-787-out-of-bounds-write-in-siem-b13e8bc3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40810%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Solid%20Edge%20SE2024&amp;severity=high&amp;id=68ee16327eab8b438c025d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40809-cwe-787-out-of-bounds-write-in-siem-39a22030</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40809%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Solid%20Edge%20SE2024&amp;severity=high&amp;id=68ee16327eab8b438c025d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40774-cwe-257-storing-passwords-in-a-reco-2664a477</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40774%3A%20CWE-257%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Siemens%20SiPass%20integrated&amp;severity=medium&amp;id=68ee16327eab8b438c025d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40773-cwe-639-authorization-bypass-throug-190cbd72</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40773%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Siemens%20SiPass%20integrated&amp;severity=low&amp;id=68ee16327eab8b438c025d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40772-cwe-79-improper-neutralization-of-i-6fb5df8a</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40772%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Siemens%20SiPass%20integrated&amp;severity=high&amp;id=68ee16327eab8b438c025d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40771-cwe-306-missing-authentication-for--c662fe93</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40771%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20SIMATIC%20CP%201542SP-1&amp;severity=critical&amp;id=68ee16317eab8b438c025d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40765-cwe-306-missing-authentication-for--e591b3ca</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40765%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20TeleControl%20Server%20Basic%20V3.1&amp;severity=critical&amp;id=68ee16317eab8b438c025d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40755-cwe-89-improper-neutralization-of-s-c3cfa8d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40755%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=68ee16317eab8b438c025d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20724-cwe-125-out-of-bounds-read-in-media-b812432a</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20724%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=68ee16317eab8b438c025d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20717-cwe-121-stack-overflow-in-mediatek--fb0f91e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20717%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20716-cwe-787-out-of-bounds-write-in-medi-2b148028</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20716%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20715-cwe-787-out-of-bounds-write-in-medi-41d2d89a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20715%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20723-cwe-787-out-of-bounds-write-in-medi-8451e58a</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20723%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8775%2C%20MT8791T%2C%20MT8796%2C%20MT8873&amp;severity=high&amp;id=68ee16317eab8b438c025d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20722-cwe-190-integer-overflow-in-mediate-e2646c80</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20722%3A%20CWE-190%20Integer%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6980D%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8775%2C%20MT8791T%2C%20MT8796%2C%20MT8873&amp;severity=medium&amp;id=68ee16317eab8b438c025d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20714-cwe-121-stack-overflow-in-mediatek--064e4a57</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20714%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20713-cwe-121-stack-overflow-in-mediatek--41b8193b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20713%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20721-cwe-787-out-of-bounds-write-in-medi-4eb918e5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20721%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8195%2C%20MT8196%2C%20MT8370%2C%20MT8390%2C%20MT8395%2C%20MT8792%2C%20MT8793&amp;severity=high&amp;id=68ee16317eab8b438c025d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20720-cwe-122-heap-overflow-in-mediatek-i-3c87af6e</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20720%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7603%2C%20MT7615%2C%20MT7622%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16317eab8b438c025d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20719-cwe-121-stack-overflow-in-mediatek--d236e968</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20719%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7603%2C%20MT7615%2C%20MT7622%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16317eab8b438c025d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20718-cwe-121-stack-overflow-in-mediatek--753dd459</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20718%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16317eab8b438c025d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20709-cwe-120-classic-buffer-overflow-in--eb16bfe2</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20709%3A%20CWE-120%20Classic%20Buffer%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20710-cwe-190-integer-overflow-in-mediate-a7e820e4</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20710%3A%20CWE-190%20Integer%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20711-cwe-1287-specified-type-in-mediatek-fc0942b7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20711%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20712-cwe-122-heap-overflow-in-mediatek-i-d5f66391</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20712%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6990%2C%20MT7990%2C%20MT7991%2C%20MT7992%2C%20MT7993&amp;severity=high&amp;id=68ee16307eab8b438c025d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/banking-trojan-abusing-github-for-resilience-c9f6e401</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Banking%20Trojan%20Abusing%20GitHub%20for%20Resilience&amp;severity=medium&amp;id=68ee16217eab8b438c022a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46581-cwe-94-improper-control-of-generati-d70ae5ef</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46581%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ZTE%20ZXCDN&amp;severity=critical&amp;id=68ee12ad7eab8b438cfa7656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41699-cwe-94-improper-control-of-generati-b83ab47f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41699%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=68ee0c499bdcb32828080e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-ta585s-monsterv2-malware-capabi-93ef58cb</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20TA585%E2%80%99s%20MonsterV2%20Malware%20Capabilities%20and%20Attack%20Chain&amp;severity=high&amp;id=68ee0c389bdcb3282807d1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/streamlining-vulnerability-research-with-the-idali-ad5388b0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Streamlining%20Vulnerability%20Research%20with%20the%20idalib%20Rust%20Bindings%20for%20IDA%209.2%20-%20HN%20Security&amp;severity=medium&amp;id=68ee0c4a9bdcb32828081204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41718-cwe-319-cleartext-transmission-of-s-16a7a6f5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41718%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Murrelektronik%20Firmware%20Impact67%20Pro%2054630&amp;severity=high&amp;id=68ee0c499bdcb32828080e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41707-cwe-120-buffer-copy-without-checkin-d09ef133</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41707%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=medium&amp;id=68ee0d9d9bdcb328280b3ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41706-cwe-120-buffer-copy-without-checkin-0f218ffa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41706%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=medium&amp;id=68ee0d9d9bdcb328280b3ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41705-cwe-523-unprotected-transport-of-cr-8f6ad93b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41705%3A%20CWE-523%20Unprotected%20Transport%20of%20Credentials%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=medium&amp;id=68ee0d9d9bdcb328280b3ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41704-cwe-770-allocation-of-resources-wit-fc6345fc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41704%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=medium&amp;id=68ee0d9d9bdcb328280b3ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41703-cwe-306-missing-authentication-for--b00c23de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41703%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=high&amp;id=68ee0d9d9bdcb328280b3ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55078-cwe-233-improper-handling-of-parame-9d51b4d6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55078%3A%20CWE-233%20Improper%20Handling%20of%20Parameters%20in%20Eclipse%20Foundation%20ThreadX&amp;severity=medium&amp;id=68edfbefcfc28f75da6ec64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-pypi-and-rubygems-packages-found-sending-devel-5d3d22fc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%2C%20PyPI%2C%20and%20RubyGems%20Packages%20Found%20Sending%20Developer%20Data%20to%20Discord%20Channels&amp;severity=medium&amp;id=68eef85f55734f1608e47859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11731-access-of-resource-using-incompatib-b846153a</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11731%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)&amp;severity=low&amp;id=68edeb573aa78542cebbacfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8594-cwe-918-server-side-request-forgery--266e1754</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8594%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Pz-LinkCard&amp;severity=low&amp;id=68edeb573aa78542cebbad00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10357-cwe-79-cross-site-scripting-xss-in--71bf745c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10357%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Simple%20SEO&amp;severity=medium&amp;id=68edeb573aa78542cebbacf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10732-cwe-862-missing-authorization-in-br-3eb8f7e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10732%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=medium&amp;id=68ede1c61a06eb79bea0b465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59889-cwe-427-uncontrolled-search-path-el-5a993389</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59889%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Eaton%20Eaton%20IPP%20software&amp;severity=high&amp;id=68edde4b1a06eb79be991ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-critical-bugs-in-adobe-experience-manager-a7d1cbf2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20Critical%20Bugs%20in%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=68edd1460a9b8f553a63bd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-the-monster-bytes-tracking-ta585-and-its-arse-4d0ae5ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20the%20monster%20bytes%3A%20tracking%20TA585%20and%20its%20arsenal&amp;severity=medium&amp;id=68ee12a37eab8b438cfa6e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42939-cwe-863-incorrect-authorization-in--34a47f5b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42939%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Manage%20Processing%20Rules%20-%20For%20Bank%20Statements)&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42937-cwe-35-path-traversal-in-sapse-sap--b5678cbf</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42937%3A%20CWE-35%3A%20Path%20Traversal%20in%20SAP_SE%20SAP%20Print%20Service&amp;severity=critical&amp;id=68ed9e3ae121319cf76b7b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42910-cwe-434-unrestricted-upload-of-file-49ee3843</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42910%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management&amp;severity=critical&amp;id=68ed9e3ae121319cf76b7b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42909-cwe-1004-sensitive-cookie-without-h-2fee8b90</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42909%3A%20CWE-1004%3A%20Sensitive%20Cookie%20Without%20HttpOnly%20Flag%20in%20SAP_SE%20SAP%20Cloud%20Appliance%20Library%20Appliances&amp;severity=low&amp;id=68ed9e3ae121319cf76b7b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42908-cwe-352-cross-site-request-forgery--cebee152</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42908%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42906-cwe-22-improper-limitation-of-a-pat-605d17db</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42906%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20Commerce%20Cloud&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42903-cwe-204-observable-response-discrep-b3df29bd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42903%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20SAP_SE%20SAP%20Financial%20Service%20Claims%20Management&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42902-cwe-476-null-pointer-dereference-in-df41b2c1</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42902%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20SAP_SE%20SAP%20Netweaver%20AS%20ABAP%20and%20ABAP%20Platform&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42901-cwe-94-improper-control-of-generati-9b6e0af6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42901%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Application%20Server%20for%20ABAP%20(BAPI%20Browser)&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-14-5bfe3b3b</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-14&amp;severity=medium&amp;id=68eee8a6b519a370726fef6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60374-na-0ee40893</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60374%3A%20n%2Fa&amp;severity=medium&amp;id=68eeacdbbbec4fba96e15baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60540-na-005c1fd7</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60540%3A%20n%2Fa&amp;severity=medium&amp;id=68eea752bbec4fba96d79ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60537-na-53053d84</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60537%3A%20n%2Fa&amp;severity=medium&amp;id=68ee8e6cf2e93b27b022870a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60536-na-f6295c18</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60536%3A%20n%2Fa&amp;severity=high&amp;id=68ee8e6cf2e93b27b0228705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57618-na-709eed91</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57618%3A%20n%2Fa&amp;severity=high&amp;id=68ee88ef3dd1bfb0b7e95c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57563-na-5c5f5539</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57563%3A%20n%2Fa&amp;severity=medium&amp;id=68ee88ef3dd1bfb0b7e95c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60535-na-f5020c8e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60535%3A%20n%2Fa&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54603-na-09d577f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54603%3A%20n%2Fa&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56747-na-c0463182</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56747%3A%20n%2Fa&amp;severity=medium&amp;id=68ee6aa71b3029e3c7dc168b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62363-cwe-59-improper-link-resolution-bef-0bed9b13</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62363%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20zheny-creator%20YtGrabber-TUI&amp;severity=high&amp;id=68ed73a7efcc33289f4e04fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62362-cwe-359-exposure-of-private-persona-6c4a41d9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62362%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20GPP-Woo%20GPP-burgerportaal&amp;severity=medium&amp;id=68ed73a7efcc33289f4e04f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62361-cwe-601-url-redirection-to-untruste-b694bc0f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62361%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68ed702cefcc33289f469148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62360-cwe-89-improper-neutralization-of-s-f2c80d34</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62360%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68ed702cefcc33289f469154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62251-cwe-732-incorrect-permission-assign-53240f75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62251%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed702cefcc33289f46914c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62359-cwe-79-improper-neutralization-of-i-350bf7fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62359%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68ed702cefcc33289f46914f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62358-cwe-79-improper-neutralization-of-i-19e93bc5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62358%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62179-cwe-89-improper-neutralization-of-s-52a05542</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62179%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68ed6d2e38344d8bcf324872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62384-cwe-89-improper-neutralization-of-s-0ae68dd9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62384%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf32487d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62386-cwe-89-improper-neutralization-of-s-dc44eca4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62386%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62383-cwe-89-improper-neutralization-of-s-a7bf65f5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62383%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf32487a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62391-cwe-89-improper-neutralization-of-s-d947fb12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62391%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62178-cwe-79-improper-neutralization-of-i-af2eb4f1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62178%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=low&amp;id=68ed6d2e38344d8bcf32486d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62385-cwe-89-improper-neutralization-of-s-a9c0b82e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62385%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62387-cwe-89-improper-neutralization-of-s-d0cf5ea6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62387%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62388-cwe-89-improper-neutralization-of-s-dfdc5512</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62388%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62389-cwe-89-improper-neutralization-of-s-ef7721d3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62389%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62390-cwe-89-improper-neutralization-of-s-28fe940a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62390%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62392-cwe-89-improper-neutralization-of-s-2d649999</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62392%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62177-cwe-89-improper-neutralization-of-s-cea4d891</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62177%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68ed6d2e38344d8bcf324869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11623-cwe-89-improper-neutralization-of-s-be0efed1</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11623%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9713-cwe-22-improper-limitation-of-a-path-84467dc3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9713%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=68ed718fefcc33289f495f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11622-cwe-502-deserialization-of-untruste-cdfd6d4a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11622%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=68ed718fefcc33289f495f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61688-cwe-200-exposure-of-sensitive-infor-db5e4078</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61688%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20siderolabs%20omni&amp;severity=high&amp;id=68ed66ece828b4dd3cc6ab2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59836-cwe-703-improper-check-or-handling--54944e44</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59836%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20siderolabs%20omni&amp;severity=medium&amp;id=68ed66ece828b4dd3cc6ab26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62252-cwe-639-authorization-bypass-throug-80773cbb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62252%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed66ece828b4dd3cc6ab2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-releases-emergency-patch-for-new-e-business-e88d1bc1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20releases%20emergency%20patch%20for%20new%20E-Business%20Suite%20flaw&amp;severity=critical&amp;id=68ed66bee828b4dd3cc60f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-multi-country-botnet-targets-rdp-services--469a9630</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20multi-country%20botnet%20targets%20RDP%20services%20in%20the%20US&amp;severity=high&amp;id=68ed66bee828b4dd3cc60fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/customer-payment-data-stolen-in-unity-technologies-fc80d594</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Customer%20payment%20data%20stolen%20in%20Unity%20Technologies%E2%80%99s%20SpeedTree%20website%20compromise&amp;severity=high&amp;id=68ed66bee828b4dd3cc60fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62364-cwe-59-improper-link-resolution-bef-5a1ba851</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62364%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=medium&amp;id=68ed6345e828b4dd3cbdd2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62246-cwe-79-improper-neutralization-of-i-1441d158</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62246%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed60592e9a9eee888b853d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62241-cwe-639-authorization-bypass-throug-4144fee6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62241%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20DXP&amp;severity=medium&amp;id=68ed566e06a2a330d3233343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62242-cwe-639-authorization-bypass-throug-af80d1a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62242%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed57c406a2a330d326046c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/judicial-notification-phish-targets-colombian-user-72f40cab</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Judicial%20Notification%20Phish%20Targets%20Colombian%20Users%20%E2%80%93%20.SVG%20Attachment%20Deploys%20Info-stealer%20Malware&amp;severity=medium&amp;id=68ed566406a2a330d32311e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61775-cwe-613-insufficient-session-expira-952fa92c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61775%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Whimsies-YAT%20Vickey&amp;severity=medium&amp;id=68ed396165e259ed7edc1e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62243-cwe-863-incorrect-authorization-in--6599d06e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62243%3A%20CWE-863%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed35e765e259ed7ed4fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-leak-millions-of-users-data-from-qant-d0bf1155</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20Leak%20Millions%20of%20Users&apos;%20Data%20from%20Qantas%2C%20Vietnam%20Airlines%20and%20Others&amp;severity=medium&amp;id=68ed32d939004152d7f5a900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62244-cwe-639-authorization-bypass-throug-9bd702f5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62244%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed375065e259ed7ed7d000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/heads-up-scans-for-esafenet-cdg-v5-mon-oct-13th-31120a59</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20%2C%20(Mon%2C%20Oct%2013th)&amp;severity=medium&amp;id=68ed2be94a0d14fc5abc2db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11695-cwe-295-improper-certificate-valida-40f7100c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11695%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20MongoDB%20Rust%20Driver&amp;severity=high&amp;id=68ed30c839004152d7ef8a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7707-cwe-377-insecure-temporary-file-in-r-a038680d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7707%3A%20CWE-377%20Insecure%20Temporary%20File%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=68ed28784a0d14fc5ab516ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/def-con-33-how-i-hacked-over-1000-car-dealerships--d5544abc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=(DEF%20CON%2033)%20How%20I%20hacked%20over%201%2C000%20car%20dealerships%20across%20the%20US&amp;severity=medium&amp;id=68ed1ec2e2beed89262b47ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/astaroth-trojan-abuses-github-to-host-configs-and--d2f1ecb3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Astaroth%20Trojan%20abuses%20GitHub%20to%20host%20configs%20and%20evade%20takedowns&amp;severity=medium&amp;id=68ed1e6ee2beed89262a5ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-rondodox-botnet-is-weaponizing-ov-3262c5f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20RondoDox%20Botnet%20is%20Weaponizing%20Over%2050%20Flaws%20Across%2030%2B%20Vendors&amp;severity=high&amp;id=68ed1e6ee2beed89262a5eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvard-investigating-breach-linked-to-oracle-zero-bf1df288</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvard%20investigating%20breach%20linked%20to%20Oracle%20zero-day%20exploit&amp;severity=critical&amp;id=68ed1e6ee2beed89262a5ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-unmonitored-javascript-is-your-biggest-holiday-276eab24</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Unmonitored%20JavaScript%20Is%20Your%20Biggest%20Holiday%20Security%20Risk&amp;severity=high&amp;id=68ed1e6ee2beed89262a5ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simonmed-imaging-discloses-a-data-breach-impacting-e9b2392f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SimonMed%20Imaging%20discloses%20a%20data%20breach%20impacting%20over%201.2%20million%20people&amp;severity=high&amp;id=68ed1e6ee2beed89262a5ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openais-guardrails-can-be-bypassed-by-simple-promp-b8c2a5a5</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%E2%80%99s%20Guardrails%20Can%20Be%20Bypassed%20by%20Simple%20Prompt%20Injection%20Attack&amp;severity=medium&amp;id=68ed1af6e2beed8926232566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/llm-honeypot-vs-cryptojacking-understanding-the-en-a4fb08ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LLM%20Honeypot%20vs.%20Cryptojacking%3A%20Understanding%20the%20Enemy&amp;severity=medium&amp;id=68ed179d9bc739241f40d343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/financial-other-industries-urged-to-prepare-for-qu-8ff07b57</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Financial%2C%20Other%20Industries%20Urged%20to%20Prepare%20for%20Quantum%20Computers&amp;severity=medium&amp;id=68eda150e121319cf76c6bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43991-cwe-61-unix-symbolic-link-symlink-f-092f9a6b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43991%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Dell%20SupportAssist%20for%20Home%20PCs&amp;severity=medium&amp;id=68ed158d9bc739241f3ccd69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-code-on-unity-website-skims-information--ded398fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Code%20on%20Unity%20Website%20Skims%20Information%20From%20Hundreds%20of%20Customers&amp;severity=medium&amp;id=68ed0d6352482bb54d52d4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-infrastructure-cisos-cant-ignore-back-off-3a58fb63</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20infrastructure%20CISOs%20Can&apos;t%20Ignore%20&apos;Back-Office%20Clutter&apos;%20Data&amp;severity=critical&amp;id=68ed066025fb26f08f8b77a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37729-cwe-1336-in-elastic-elastic-cloud-e-d422b4c9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37729%3A%20CWE-1336%20in%20Elastic%20Elastic%20Cloud%20Enterprise%20(ECE)&amp;severity=critical&amp;id=68ed034f67696672afefd273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-whatsapp-worm-critical-cves-oracle-0--080fef14</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20WhatsApp%20Worm%2C%20Critical%20CVEs%2C%20Oracle%200-Day%2C%20Ransomware%20Cartel%20%26%20More&amp;severity=critical&amp;id=68eda062e121319cf76c34fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-ssl-vpn-accounts-in-attacker-crosshairs-668916d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20SSL%20VPN%20Accounts%20in%20Attacker%20Crosshairs&amp;severity=medium&amp;id=68ecfc877da36148c99f8e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9902-cwe-639-authorization-bypass-through-477d5848</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9902%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20AKIN%20Software%20Computer%20Import%20Export%20Industry%20and%20Trade%20Co.%20Ltd.%20QRMenu&amp;severity=high&amp;id=68ed014867696672afeb29c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6919-cwe-89-improper-neutralization-of-sp-a7de2e17</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6919%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cats%20Information%20Technology%20Software%20Development%20Technologies%20Aykome%20License%20Tracking%20System&amp;severity=critical&amp;id=68ecf9147da36148c998a6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simonmed-imaging-data-breach-impacts-12-million-48b0a62e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SimonMed%20Imaging%20Data%20Breach%20Impacts%201.2%20Million&amp;severity=medium&amp;id=68ecf247dd5e0d603050473f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-unmonitored-javascript-is-your-biggest-holiday-db4069a8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Unmonitored%20JavaScript%20Is%20Your%20Biggest%20Holiday%20Security%20Risk&amp;severity=critical&amp;id=68eda062e121319cf76c3500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-infrastructure-abused-in-phishing-campaign-aim-632ab965</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Infrastructure%20Abused%20in%20Phishing%20Campaign%20Aimed%20at%20Industrial%20and%20Electronics%20Firms&amp;severity=medium&amp;id=68ece878daa53b24786fa2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/invoicely-database-leak-exposes-180000-sensitive-r-de8c5f1a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Invoicely%20Database%20Leak%20Exposes%20180%2C000%20Sensitive%20Records&amp;severity=medium&amp;id=68ece1834f0998eca3fbdb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-patches-ebs-vulnerability-allowing-access-t-d29731a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Patches%20EBS%20Vulnerability%20Allowing%20Access%20to%20Sensitive%20Data&amp;severity=low&amp;id=68ecd6b89fb532f07af2d401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-rondodox-botnet-is-weaponizing-ov-0b0e2ae7</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20RondoDox%20Botnet%20is%20Weaponizing%20Over%2050%20Flaws%20Across%2030%2B%20Vendors&amp;severity=medium&amp;id=68eda062e121319cf76c3503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-locks-down-ie-mode-after-hackers-turned--56f20384</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Locks%20Down%20IE%20Mode%20After%20Hackers%20Turned%20Legacy%20Feature%20Into%20Backdoor&amp;severity=medium&amp;id=68eda062e121319cf76c3506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10720-cwe-639-authorization-bypass-throug-58f4d786</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10720%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20Private%20Content%20Plus&amp;severity=medium&amp;id=68ecd13f847004351751526f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spanish-authorities-dismantle-gxc-team-crime-as-a--10b85e4a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spanish%20Authorities%20Dismantle%20%E2%80%98GXC%20Team%E2%80%99%20Crime-as-a-Service%20Operation&amp;severity=medium&amp;id=68ecc8f7ff270e1f1a064f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9337-cwe-476-null-pointer-dereference-in--df657ce0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9337%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20ASUS%20Armoury%20Crate&amp;severity=medium&amp;id=68ecc911ff270e1f1a069210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9336-cwe-121-stack-based-buffer-overflow--885cab87</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9336%3A%20CWE-121%20-%20Stack-based%20Buffer%20Overflow%20in%20ASUS%20Armoury%20Crate&amp;severity=medium&amp;id=68ecc911ff270e1f1a06920d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11184-cwe-79-improper-neutralization-of-i-2336a6aa</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11184%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20qwc-services%20qwc-registration-gui&amp;severity=medium&amp;id=68ecc5a7617226e321685f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11183-cwe-79-improper-neutralization-of-i-1a12943f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20QGIS%20QWC2&amp;severity=medium&amp;id=68ecc5a7617226e321685f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/13th-october-threat-intelligence-report-57b35e13</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=13th%20October%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68ecbed9fcb31871cb71f1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/extortion-group-leaks-millions-of-records-from-sal-c3670b48</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Extortion%20Group%20Leaks%20Millions%20of%20Records%20From%20Salesforce%20Hacks&amp;severity=medium&amp;id=68ecbec2fcb31871cb71dd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9968-cwe-59-improper-link-resolution-befo-e9de5c51</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9968%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20ASUS%20Armoury%20Crate&amp;severity=high&amp;id=68ecbcbcfcb31871cb6ddb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11668-sql-injection-in-code-projects-auto-3a805de6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11668%3A%20SQL%20Injection%20in%20code-projects%20Automated%20Voting%20System&amp;severity=medium&amp;id=68ecb4ba5296f0f0802d7ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11675-cwe-434-unrestricted-upload-of-file-6f9a4b74</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11675%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ragic%20Enterprise%20Cloud%20Database&amp;severity=high&amp;id=68ecb1b913a035d7a75ed865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11674-cwe-918-server-side-request-forgery-f8427d3a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11674%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PiExtract%20SOOP-CLM&amp;severity=medium&amp;id=68ecb62b5296f0f080308ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10558-cwe-79-improper-neutralization-of-i-d09a4d84</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10558%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%203DSwymer&amp;severity=high&amp;id=68ecae3d13a035d7a7575c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10557-cwe-79-improper-neutralization-of-i-a2e438c8</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10557%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=68ecae3d13a035d7a7575c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10556-cwe-79-improper-neutralization-of-i-2fd7399a</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10556%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Specification%20Manager&amp;severity=high&amp;id=68ecae3d13a035d7a7575bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10552-cwe-79-improper-neutralization-of-i-29d539dd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10552%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%203DSwymer&amp;severity=high&amp;id=68ecae3d13a035d7a7575bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11673-cwe-912-hidden-functionality-in-pie-76f1b7ab</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11673%3A%20CWE-912%20Hidden%20Functionality%20in%20PiExtract%20SOOP-CLM&amp;severity=high&amp;id=68ecae3d13a035d7a7575c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9976-cwe-78-improper-neutralization-of-sp-2b6cdb67</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9976%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Station%20Launcher%20App%20in%203DEXPERIENCE%20platform&amp;severity=critical&amp;id=68ecae3d13a035d7a7575c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11672-cwe-306-missing-authentication-for--c99d1601</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11672%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20EBM%20Technologies%20Uniweb%2FSoliPACS%20WebServer&amp;severity=medium&amp;id=68ecae3d13a035d7a7575c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11667-sql-injection-in-code-projects-auto-6c36a341</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11667%3A%20SQL%20Injection%20in%20code-projects%20Automated%20Voting%20System&amp;severity=medium&amp;id=68ecae3d13a035d7a7575c11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11671-cwe-306-missing-authentication-for--f56cfc81</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11671%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20EBM%20Technologies%20Uniweb%2FSoliPACS%20WebServer&amp;severity=medium&amp;id=68ecae3d13a035d7a7575c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11666-use-of-hard-coded-password-in-tenda-31abd94e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11666%3A%20Use%20of%20Hard-coded%20Password%20in%20Tenda%20RP3%20Pro&amp;severity=high&amp;id=68eca73af9d7069310c27773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8915-cwe-200-exposure-of-sensitive-inform-a666c6b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8915%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Kiloview%20N30&amp;severity=high&amp;id=68eca3f676ac24bf78e1805f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9265-cwe-346-origin-validation-error-in-k-d982bf26</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9265%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Kiloview%20NDI&amp;severity=critical&amp;id=68eca3f676ac24bf78e18062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/astaroth-banking-trojan-abuses-github-to-remain-op-59a3fe52</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Astaroth%20Banking%20Trojan%20Abuses%20GitHub%20to%20Remain%20Operational%20After%20Takedowns&amp;severity=medium&amp;id=68eda062e121319cf76c3509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11665-os-command-injection-in-d-link-dap--379f7223</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11665%3A%20OS%20Command%20Injection%20in%20D-Link%20DAP-2695&amp;severity=medium&amp;id=68eca07b76ac24bf78d95a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0636-cwe-78-improper-neutralization-of-sp-d317c429</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0636%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ericsson%20Site%20Controller%206610&amp;severity=high&amp;id=68ec9d40a7330cdb49adeae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27258-cwe-284-improper-access-control-in--80cca729</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27258%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Ericsson%20Ericsson%20Network%20Manager(ENM)&amp;severity=medium&amp;id=68ec9d40a7330cdb49adeaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27259-cwe-79-improper-neutralization-of-i-c9e5f153</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27259%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ericsson%20Ericsson%20Network%20Manager(ENM)&amp;severity=low&amp;id=68ec9d40a7330cdb49adeaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11664-sql-injection-in-campcodes-online-b-05766d68</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11664%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68ec99d4a7330cdb49a66d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9698-cwe-79-cross-site-scripting-xss-in-t-aade89ee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9698%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20The%20Plus%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68ec96c744969315cfd5cb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11663-sql-injection-in-campcodes-online-b-047e65ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11663%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68ec9049d25177382441df02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-rust-based-malware-chaosbot-uses-discord-chann-515129af</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Rust-Based%20Malware%20%22ChaosBot%22%20Uses%20Discord%20Channels%20to%20Control%20Victims&apos;%20PCs&amp;severity=low&amp;id=68eda062e121319cf76c350c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11662-sql-injection-in-sourcecodester-bes-84d90fcc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11662%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68ec89cf1590c630c202cbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31995-cwe-20-improper-input-validation-in-85de45d2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31995%3A%20CWE-20%20Improper%20Input%20Validation%20in%20HCL%20Software%20MaxAI%20Workbench&amp;severity=low&amp;id=68ec89cf1590c630c202cbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11661-missing-authentication-in-projectsa-b86c44ee</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11661%3A%20Missing%20Authentication%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec836385888e71ae1a402e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11660-unrestricted-upload-in-projectsandp-8e07fbfe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11660%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec7cd32800e7e3a061fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31994-cwe-79-improper-neutralization-of-i-548263d6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20Unica%20Campaign&amp;severity=medium&amp;id=68ec815385888e71ae15df7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31996-cwe-552-files-or-directories-access-ca4b4bed</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31996%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20HCL%20Software%20Unica%20Platform&amp;severity=medium&amp;id=68ec79542800e7e3a05a7f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11659-unrestricted-upload-in-projectsandp-dab5650a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11659%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec764afbc519dcfe649f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11658-unrestricted-upload-in-projectsandp-a3b4a187</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11658%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec72b9fbc519dcfe63011b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11657-unrestricted-upload-in-projectsandp-4a15bdb3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11657%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec6bb7fbc519dcfe6190f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11656-unrestricted-upload-in-projectsandp-c2a14beb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11656%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec64b6fbc519dcfe601ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11655-unrestricted-upload-in-totaljs-flow-8281e6c6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11655%3A%20Unrestricted%20Upload%20in%20Total.js%20Flow&amp;severity=medium&amp;id=68ec5d9efbc519dcfe5dfc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11654-sql-injection-in-yousaf530-inferno--290b59e9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11654%3A%20SQL%20Injection%20in%20yousaf530%20Inferno%20Online%20Clothing%20Store&amp;severity=medium&amp;id=68ec5315fbc519dcfe5c047e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36087-cwe-798-use-of-hard-coded-credentia-772d0dd8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36087%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Security%20Verify%20Access&amp;severity=high&amp;id=68ec4e11fbc519dcfe5af6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11653-buffer-overflow-in-utt-hiper-2620g-feb39aa4</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11653%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%202620G&amp;severity=high&amp;id=68ec4e11fbc519dcfe5af6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11652-buffer-overflow-in-utt-518g-f8b679f6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11652%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20518G&amp;severity=high&amp;id=68ec4896fbc519dcfe53b447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-13-cf0ca0f0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-13&amp;severity=medium&amp;id=68ed93f253be882d4e4b5136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11651-buffer-overflow-in-utt-518g-f5994709</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11651%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20518G&amp;severity=high&amp;id=68ec3b1ffb97228d20438bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11650-use-of-weak-hash-in-tomofun-furbo-3-891749cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11650%3A%20Use%20of%20Weak%20Hash%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ec3621b99bb870f150ee90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11649-use-of-hard-coded-password-in-tomof-948cb52a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11649%3A%20Use%20of%20Hard-coded%20Password%20in%20Tomofun%20Furbo%20360&amp;severity=high&amp;id=68ec2e4f54ebfa14c6b73c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11648-server-side-request-forgery-in-tomo-8e23d8ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11648%3A%20Server-Side%20Request%20Forgery%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ec27b2152e6fbe60df9308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11647-information-disclosure-in-tomofun-f-7c635ab5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11647%3A%20Information%20Disclosure%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ec21584063b57761c6472e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-oracle-e-business-suite-bug-could-let-hackers--d9fc564a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Oracle%20E-Business%20Suite%20Bug%20Could%20Let%20Hackers%20Access%20Data%20Without%20Login&amp;severity=high&amp;id=68ec1e512951d0f0a8781ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11646-improper-access-controls-in-tomofun-47d6d427</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11646%3A%20Improper%20Access%20Controls%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ec1ad92951d0f0a8712bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11645-insecure-storage-of-sensitive-infor-203d2854</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11645%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Tomofun%20Furbo%20Mobile%20App&amp;severity=low&amp;id=68ec117fb0f2f6c74eaacec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11644-insecure-storage-of-sensitive-infor-0100ce95</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11644%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ec0b3b8f179ca8e875fda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spain-dismantles-gxc-team-cybercrime-syndicate-arr-351f2e4f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spain%20dismantles%20%E2%80%9CGXC%20Team%E2%80%9D%20cybercrime%20syndicate%2C%20arrests%20leader&amp;severity=high&amp;id=68ec0b018f179ca8e87579be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-inflation-refund-texts-target-new-yorkers-in--fee95c7c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20&apos;Inflation%20Refund&apos;%20texts%20target%20New%20Yorkers%20in%20new%20scam&amp;severity=high&amp;id=68ec0b018f179ca8e87579c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-ransomware-group-claims-the-hack-of-harvard-u-3fed64c1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20Ransomware%20group%20claims%20the%20hack%20of%20Harvard%20University&amp;severity=medium&amp;id=68ec0b018f179ca8e87579c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11643-hard-coded-credentials-in-tomofun-f-4f0feb69</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11643%3A%20Hard-coded%20Credentials%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ec04772ad1f36bd948e97a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11642-denial-of-service-in-tomofun-furbo--a41afc9e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11642%3A%20Denial%20of%20Service%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebfdab326426c3ce4b9041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11641-improper-access-controls-in-tomofun-976c73a6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11641%3A%20Improper%20Access%20Controls%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ebf5e4b1bbab260229ddf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11640-cleartext-transmission-of-sensitive-42bbee41</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11640%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ebf07242ddb1210bc1e905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11639-insecure-storage-of-sensitive-infor-576356d7</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11639%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebe832514ee80e17c46bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-oracle-e-business-suite-bug-could-let-hackers--7c970d10</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Oracle%20E-Business%20Suite%20Bug%20Could%20Let%20Hackers%20Access%20Data%20Without%20Login&amp;severity=high&amp;id=68ec4cb8fbc519dcfe59fede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11638-denial-of-service-in-tomofun-furbo--83fd62c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11638%3A%20Denial%20of%20Service%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebe1892b9503bda4776cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11637-race-condition-in-tomofun-furbo-360-5f5b5ad2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11637%3A%20Race%20Condition%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebdaac94f05d7804bfc0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11636-server-side-request-forgery-in-tomo-c79c5d1a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11636%3A%20Server-Side%20Request%20Forgery%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebc5b38f89936022b765da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11635-resource-consumption-in-tomofun-fur-59e05df6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11635%3A%20Resource%20Consumption%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebb8db8ff13aa08ba99207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2138-cwe-602-client-side-enforcement-of-s-4ea38d89</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2138%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Engineering%20Requirements%20Management%20Doors%20Next&amp;severity=low&amp;id=68ebb20ce7e4c74b800ba668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2139-cwe-602-client-side-enforcement-of-s-3df394bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2139%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Engineering%20Requirements%20Management%20Doors%20Next&amp;severity=low&amp;id=68ebb20ce7e4c74b800ba66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2140-cwe-346-origin-validation-error-in-i-570e4a6a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2140%3A%20CWE-346%20Origin%20Validation%20Error%20in%20IBM%20Engineering%20Requirements%20Management%20Doors%20Next&amp;severity=medium&amp;id=68ebb20ce7e4c74b800ba66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33096-cwe-674-uncontrolled-recursion-in-i-d8e26230</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33096%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20IBM%20Engineering%20Requirements%20Management%20Doors%20Next&amp;severity=medium&amp;id=68ebb20ce7e4c74b800ba671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11634-information-disclosure-in-tomofun-f-e2719d68</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11634%3A%20Information%20Disclosure%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68eba4434919031131a7368e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11633-improper-certificate-validation-in--4858f15d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11633%3A%20Improper%20Certificate%20Validation%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68eb9db55b13363b9aae311e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52615-cwe-693-protection-mechanism-failur-0f224390</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52615%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20HCL%20Software%20Unica%20Platform&amp;severity=low&amp;id=68eb66275e31a5ce11114464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11631-path-traversal-in-rainygao-docsys-4b92fd72</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11631%3A%20Path%20Traversal%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=68eb6abbca4916fd91025b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52614-cwe-614-sensitive-cookie-in-https-s-d7d00b09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52614%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20HCL%20Software%20Unica%20Platform&amp;severity=low&amp;id=68eb5f99e1ad852e9038ab35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31969-cwe-358-improperly-implemented-secu-c3c03f31</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31969%3A%20CWE-358%20%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20HCL%20Software%20Unica%20Platform&amp;severity=medium&amp;id=68eb64135e31a5ce110d0bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11630-path-traversal-in-rainygao-docsys-94536486</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11630%3A%20Path%20Traversal%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=68eb5c37e1ad852e9031a4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-4410-and-460-released-sun-oct-12th-62c56c58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.4.10%20and%204.6.0%20Released%2C%20(Sun%2C%20Oct%2012th)&amp;severity=medium&amp;id=68eb5c1ae1ad852e903127e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11629-sql-injection-in-rainygao-docsys-8898313b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11629%3A%20SQL%20Injection%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=68eb55984e7fa26e3d2396e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31992-cwe-80-improper-neutralization-of-s-368b5e65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31992%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20HCL%20Software%20MaxAI%20Assistant&amp;severity=medium&amp;id=68eb454c3a1a0b12de17ca04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11628-sql-injection-in-jimit105-project-o-d9481388</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11628%3A%20SQL%20Injection%20in%20jimit105%20Project-Online-Shopping-Website&amp;severity=medium&amp;id=68eb38594d1b2b17802d79c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52616-cwe-497-exposure-of-sensitive-syste-b2c16011</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52616%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20HCL%20Software%20Unica&amp;severity=medium&amp;id=68eb31dec96eae101eba8414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blind-enumeration-of-grpc-services-69d72040</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blind%20Enumeration%20of%20gRPC%20Services&amp;severity=medium&amp;id=68eb23a39e4c4c77c0af044a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31998-cwe-703-improper-check-or-handling--9fe412b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31998%3A%20CWE-703%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20HCL%20Software%20Unica%20Centralized%20Offer%20Management&amp;severity=low&amp;id=68eb18ce5baaa01f1c02ff9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61884-easily-exploitable-vulnerability-al-08dc9c67</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61884%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Configurator.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Configurator%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Configurator&amp;severity=high&amp;id=68eb18ce5baaa01f1c02ffa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31997-cwe-639-authorization-bypass-throug-280b4e36</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31997%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20HCL%20Software%20Unica%20Centralized%20Offer%20Management&amp;severity=medium&amp;id=68eb18ce5baaa01f1c02ff9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31993-cwe-918-server-side-request-forgery-c1354369</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31993%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HCL%20Software%20Unica%20Centralized%20Offer%20Management&amp;severity=low&amp;id=68eb18ce5baaa01f1c02ff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-12-bec3dff1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-12&amp;severity=medium&amp;id=68ec44fafbc519dcfe506e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11615-sql-injection-in-sourcecodester-bes-366ee80e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11615%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68eacef65baaa01f1cdaf783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11614-sql-injection-in-sourcecodester-bes-58604d75</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11614%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68eac0e95baaa01f1cd4ba18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-warn-of-widespread-sonicwall-vpn-compromis-7c043863</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Warn%20of%20Widespread%20SonicWall%20VPN%20Compromise%20Impacting%20Over%20100%20Accounts&amp;severity=high&amp;id=68eab9e15baaa01f1cd2ca64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11613-sql-injection-in-code-projects-simp-b0baa22f</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11613%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68eab2d95baaa01f1cd0f778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11612-sql-injection-in-code-projects-simp-1b80a0eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11612%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68eaabda5baaa01f1cce7baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11611-sql-injection-in-sourcecodester-sim-302effdf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11611%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Inventory%20System&amp;severity=medium&amp;id=68eaa4d85baaa01f1cccb515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11610-sql-injection-in-sourcecodester-sim-604c58f0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11610%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Inventory%20System&amp;severity=medium&amp;id=68eb218d9e4c4c77c0aa679f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11609-use-of-hard-coded-cryptographic-key-39683e2f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11609%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20code-projects%20Hospital%20Management%20System&amp;severity=medium&amp;id=68ea96c55baaa01f1cc98d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11608-sql-injection-in-code-projects-e-ba-5c7d6b14</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11608%3A%20SQL%20Injection%20in%20code-projects%20E-Banking%20System&amp;severity=medium&amp;id=68ea8fb15baaa01f1cc7ee1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11607-path-traversal-in-harry0703-moneypr-a534a8b3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11607%3A%20Path%20Traversal%20in%20harry0703%20MoneyPrinterTurbo&amp;severity=medium&amp;id=68ea88af5baaa01f1cc5800d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11606-sql-injection-in-ipynch-social-netw-32679cc2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11606%3A%20SQL%20Injection%20in%20iPynch%20Social%20Network%20Website&amp;severity=medium&amp;id=68ea73935baaa01f1cbf8143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11605-sql-injection-in-code-projects-clie-645a6232</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11605%3A%20SQL%20Injection%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ea6c8a5baaa01f1cbd7828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11604-sql-injection-in-projectworlds-onli-3052b7eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11604%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Ordering%20Food%20System&amp;severity=medium&amp;id=68ea65895baaa01f1cbb6470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11603-sql-injection-in-code-projects-simp-7a2e5e00</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11603%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ea5e7a5baaa01f1cb96f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-warn-of-widespread-sonicwall-vpn-compromis-a532dc91</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Warn%20of%20Widespread%20SonicWall%20VPN%20Compromise%20Impacting%20Over%20100%20Accounts&amp;severity=medium&amp;id=68ec4cb8fbc519dcfe59fee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-turn-velociraptor-dfir-tool-into-weapon-in-1024e98e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Turn%20Velociraptor%20DFIR%20Tool%20Into%20Weapon%20in%20LockBit%20Ransomware%20Attacks&amp;severity=medium&amp;id=68ec4cb8fbc519dcfe59fee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11601-sql-injection-in-sourcecodester-onl-a633600c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11601%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Result%20System&amp;severity=medium&amp;id=68ea57795baaa01f1cb66479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11600-sql-injection-in-code-projects-simp-7dce2bb5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11600%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ea506a5baaa01f1cb35758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11599-sql-injection-in-campcodes-online-a-3c2bc02a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11599%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68eb218d9e4c4c77c0aa67a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11597-sql-injection-in-code-projects-e-co-8022c8e2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11597%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68ea3b545baaa01f1cab1962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11596-sql-injection-in-code-projects-e-co-2564d46b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11596%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68ea2d435baaa01f1ca3be09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iamantimalware-inject-malicious-code-into-antiviru-8906fa70</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IAmAntimalware%3A%20Inject%20Malicious%20Code%20Into%20Antivirus&amp;severity=medium&amp;id=68ea29c25baaa01f1ca27b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11595-sql-injection-in-campcodes-online-a-dcf44a7f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11595%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10376-cwe-352-cross-site-request-forgery--574ba577</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10376%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ercbs%20Course%20Redirects%20for%20Learndash%20Plugin&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10129-cwe-79-improper-neutralization-of-i-16bb8075</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10129%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miksco%20WordPress%20Live%20Webcam%20Widget%20%26%20Shortcode&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10375-cwe-352-cross-site-request-forgery--8efebdb3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10375%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20accessibewp%20Web%20Accessibility%20by%20accessiBe&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9947-cwe-89-improper-neutralization-of-sp-2fed07b9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9947%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kunalnagar%20Custom%20404%20Pro&amp;severity=medium&amp;id=68ea263e5baaa01f1ca10003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8606-cwe-352-cross-site-request-forgery-c-87f0ef33</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8606%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20westerndeal%20GSheetConnector%20for%20Gravity%20Forms%20%E2%80%93%20Send%20Gravity%20Forms%20Entries%20to%20Google%20Sheets%20in%20Real-Time&amp;severity=low&amp;id=68ea263e5baaa01f1ca0ffed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10175-cwe-89-improper-neutralization-of-s-d1448a12</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10175%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rico-macchi%20WP%20Links%20Page&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8593-cwe-862-missing-authorization-in-wes-c29e6199</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8593%3A%20CWE-862%20Missing%20Authorization%20in%20westerndeal%20GSheetConnector%20for%20Gravity%20Forms%20%E2%80%93%20Send%20Gravity%20Forms%20Entries%20to%20Google%20Sheets%20in%20Real-Time&amp;severity=high&amp;id=68ea263e5baaa01f1ca0ffe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8484-cwe-200-exposure-of-sensitive-inform-5864d773</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8484%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nickclarkweb%20Code%20Quality%20Control%20Tool&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ffa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9950-cwe-22-improper-limitation-of-a-path-455b0c7b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9950%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bestwebsoft%20Error%20Log%20Viewer%20by%20BestWebSoft&amp;severity=medium&amp;id=68ea263e5baaa01f1ca10007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8682-cwe-862-missing-authorization-in-the-933ec437</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8682%3A%20CWE-862%20Missing%20Authorization%20in%20themeansar%20Newsup&amp;severity=medium&amp;id=68ea263e5baaa01f1ca0fff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9626-cwe-352-cross-site-request-forgery-c-44d687a5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9626%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20softwud%20Page%20Blocks&amp;severity=medium&amp;id=68ea263e5baaa01f1ca0fffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10190-cwe-79-improper-neutralization-of-i-3ef136ae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10190%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20husainahmedqureshi%20WP%20Easy%20Toggles&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9975-cwe-918-server-side-request-forgery--c9e43dee</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9975%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20rico-macchi%20WP%20Scraper&amp;severity=medium&amp;id=68ea263e5baaa01f1ca1000b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6439-cwe-22-improper-limitation-of-a-path-0932a760</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6439%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20JMA%20Plugins%20WooCommerce%20Designer%20Pro&amp;severity=critical&amp;id=68ea263d5baaa01f1ca0ffa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7652-cwe-79-improper-neutralization-of-in-e6c4e4ed</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7652%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ndiego%20Easy%20Plugin%20Stats&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ffa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10167-cwe-79-improper-neutralization-of-i-e3e8f333</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10167%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcodefactory%20Stock%20History%20%26%20Reports%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9621-cwe-352-cross-site-request-forgery-c-fc05f531</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9621%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20widgetpack%20WidgetPack%20Comment%20System&amp;severity=medium&amp;id=68ea263e5baaa01f1ca0fff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58293-cwe-264-permissions-privileges-and--39b5bf2f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58293%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea263e5baaa01f1ca10016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58289-cwe-840-business-logic-errors-in-hu-a0fb5537</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58289%3A%20CWE-840%20Business%20Logic%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea263e5baaa01f1ca1000f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58301-cwe-121-stack-based-buffer-overflow-5adb99b9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58301%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea263f5baaa01f1ca1003c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58300-cwe-121-stack-based-buffer-overflow-4413a861</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58300%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea22b95baaa01f1c9f768f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58299-cwe-416-use-after-free-in-huawei-ha-b7649818</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58299%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68ea1f345baaa01f1c9e3c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58298-cwe-121-stack-based-buffer-overflow-d55dfbb2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58298%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68ea1f345baaa01f1c9e3c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11594-improper-validation-of-specified-qu-5d063e17</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11594%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20ywxbear%20PHP-Bookstore-Website-Example&amp;severity=medium&amp;id=68ea1f345baaa01f1c9e3c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58297-cwe-121-stack-based-buffer-overflow-8d84767c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58297%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea1f345baaa01f1c9e3c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58295-cwe-121-stack-based-buffer-overflow-6c4a6891</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58295%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea1bb15baaa01f1c9d1d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58292-cwe-27-path-traversal-dirfilename-i-3936ca1a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58292%3A%20CWE-27%20Path%20Traversal%3A%20&apos;dir%2F..%2F..%2Ffilename&apos;%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68ea1bb15baaa01f1c9d1d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58291-cwe-29-path-traversal-filename-in-h-764c8d91</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58291%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68ea1bb15baaa01f1c9d1d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58290-cwe-41-improper-resolution-of-path--41a359bc</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58290%3A%20CWE-41%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68ea1bb15baaa01f1c9d1d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58288-cwe-275-permission-issues-in-huawei-07e051ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58288%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea1bb15baaa01f1c9d1d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58287-cwe-275-permission-issues-in-huawei-f474e5d4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58287%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68ea1bb15baaa01f1c9d1d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58286-cwe-25-path-traversal-filedir-in-hu-e61f3bdd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58286%3A%20CWE-25%20Path%20Traversal%3A%20&apos;%2F..%2Ffiledir&apos;%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68ea1bb15baaa01f1c9d1d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11167-cwe-601-url-redirection-to-untruste-524ec643</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11167%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20creativemindssolutions%20CM%20Registration%20%E2%80%93%20Tailored%20tool%20for%20seamless%20login%20and%20invitation-based%20registrations&amp;severity=medium&amp;id=68ea182c5baaa01f1c9bed29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11518-cwe-639-authorization-bypass-throug-4f852b5e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11518%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpclever%20WPC%20Smart%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=68ea182c5baaa01f1c9bed32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11254-cwe-1236-improper-neutralization-of-52f67e4f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11254%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=medium&amp;id=68ea182c5baaa01f1c9bed2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6553-cwe-434-unrestricted-upload-of-file--b45e0c70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6553%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ovatheme%20Ovatheme%20Events%20Manager&amp;severity=critical&amp;id=68ea182c5baaa01f1c9bed36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10185-cwe-89-improper-neutralization-of-s-e62abbf0</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10185%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=68ea07c7ea13521b93fae104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10048-cwe-89-improper-neutralization-of-s-95a50c00</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10048%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=medium&amp;id=68ea07c7ea13521b93fae100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9196-cwe-200-exposure-of-sensitive-inform-1823c363</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9196%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sergiotrinity%20Trinity%20Audio%20%E2%80%93%20Text%20to%20Speech%20AI%20audio%20player%20to%20convert%20content%20into%20audio&amp;severity=medium&amp;id=68ea07c7ea13521b93fae112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11197-cwe-79-improper-neutralization-of-i-ba3a6fd5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11197%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Draft%20List&amp;severity=medium&amp;id=68ea07c7ea13521b93fae109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11533-cwe-269-improper-privilege-manageme-36e924d9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11533%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ApusTheme%20WP%20Freeio&amp;severity=critical&amp;id=68ea07c7ea13521b93fae10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9496-cwe-79-improper-neutralization-of-in-b2bd13b9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shortpixel%20Enable%20Media%20Replace&amp;severity=medium&amp;id=68ea07c7ea13521b93fae116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11593-sql-injection-in-codeastro-gym-mana-649342e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11593%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68ea044cea13521b93f32531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11592-sql-injection-in-codeastro-gym-mana-f03fa658</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11592%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e9fdd46ec084c5e89a5566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11591-sql-injection-in-codeastro-gym-mana-47c5220f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11591%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e9e6f7cd0503e930188560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58285-cwe-264-permissions-privileges-and--23a5f992</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58285%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9de46bc1e212db987cfff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58284-cwe-264-permissions-privileges-and--69159c3a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58284%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9de46bc1e212db987cffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58283-cwe-264-permissions-privileges-and--bdb66415</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58283%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9d65caf47a96dabc8f9e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58282-cwe-264-permissions-privileges-and--e67bb8c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58282%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68e9d65caf47a96dabc8f9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58278-cwe-200-exposure-of-sensitive-infor-5e6c6cf6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58278%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9d65caf47a96dabc8f9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58277-cwe-200-exposure-of-sensitive-infor-96d0c883</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58277%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9d38e54cfe91d8ff083ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-story-about-bypassing-air-canadas-in-flight-netw-98c21b6b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Story%20About%20Bypassing%20Air%20Canada&apos;s%20In-flight%20Network%20Restrictions&amp;severity=medium&amp;id=68e9d00f54cfe91d8fefed1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stealit-campaign-abuses-nodejs-single-executab-de061660</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Stealit%20Campaign%20Abuses%20Node.js%20Single%20Executable%20Application&amp;severity=medium&amp;id=68ecd3468470043517556eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11380-cwe-862-missing-authorization-in-ev-608ef6b8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11380%3A%20CWE-862%20Missing%20Authorization%20in%20everestthemes%20Everest%20Backup%20%E2%80%93%20WordPress%20Cloud%20Backup%2C%20Migration%2C%20Restore%20%26%20Cloning%20Plugin&amp;severity=medium&amp;id=68e9c57e54cfe91d8fee2b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9560-cwe-79-improper-neutralization-of-in-4dd5ab81</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9560%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=68e9c57e54cfe91d8fee2b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54654-cwe-264-permissions-privileges-and--34f6e38a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54654%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9be7854cfe91d8fec883f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11590-sql-injection-in-codeastro-gym-mana-05e18dc8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11590%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e9b06754cfe91d8fea642c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31718-cwe-78-os-command-injection-in-unis-6bf0c291</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31718%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T606%2FT612%2FT616%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=high&amp;id=68e9a97654cfe91d8fe5c94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31717-cwe-78-os-command-injection-in-unis-4cbe3d70</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31717%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=high&amp;id=68e9a97654cfe91d8fe5c94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-11-edcafc36</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-11&amp;severity=medium&amp;id=68eaf2135baaa01f1ce556ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11626-cwe-835-loop-with-unreachable-exit--ff2a18d5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11626%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=68e98d8a427d841ed4f6b6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9554-vulnerability-in-drupal-owl-carousel-c2210e58</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9554%3A%20Vulnerability%20in%20Drupal%20Owl%20Carousel%202&amp;severity=medium&amp;id=68e98a03a6e766b7172b96a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9553-vulnerability-in-drupal-api-key-mana-b8296744</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9553%3A%20Vulnerability%20in%20Drupal%20API%20Key%20manager&amp;severity=medium&amp;id=68e98a03a6e766b7172b96a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9552-vulnerability-in-drupal-synchronize--28ebba23</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9552%3A%20Vulnerability%20in%20Drupal%20Synchronize%20composer.json%20With%20Contrib%20Modules&amp;severity=medium&amp;id=68e98a03a6e766b7172b96a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9551-cwe-307-improper-restriction-of-exce-28270199</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9551%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Drupal%20Protected%20Pages&amp;severity=medium&amp;id=68e98a03a6e766b7172b96a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9550-cwe-79-improper-neutralization-of-in-c125be01</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9550%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Facets&amp;severity=medium&amp;id=68e98a03a6e766b7172b969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9549-cwe-862-missing-authorization-in-dru-b8e02924</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9549%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Facets&amp;severity=medium&amp;id=68e98a03a6e766b7172b969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8093-cwe-288-authentication-bypass-using--d090a7bc</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8093%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Authenticator%20Login&amp;severity=high&amp;id=68e98a03a6e766b7172b9697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52647-cwe-644-improper-neutralization-of--21bc2246</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52647%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20HCL%20Software%20BigFix%20WebUI&amp;severity=medium&amp;id=68e98689a6e766b717250985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploiting-zero-day-in-gladinet-file-shari-edeb0bb5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploiting%20zero-day%20in%20Gladinet%20file%20sharing%20software&amp;severity=critical&amp;id=68e97fb88031eb1aa2d23790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11589-sql-injection-in-codeastro-gym-mana-13f46a3d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11589%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e97fc68031eb1aa2d2662c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11588-sql-injection-in-codeastro-gym-mana-9a485f6a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11588%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e97fc68031eb1aa2d26625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1password-addresses-critical-ai-browser-agent-secu-cdd52355</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1Password%20Addresses%20Critical%20AI%20Browser%20Agent%20Security%20Gap&amp;severity=critical&amp;id=68e9af5454cfe91d8fea39a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11586-stack-based-buffer-overflow-in-tend-c5664a1c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11586%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e9756d807ca07d502307f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11585-sql-injection-in-code-projects-proj-86d935d2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11585%3A%20SQL%20Injection%20in%20code-projects%20Project%20Monitoring%20System&amp;severity=medium&amp;id=68e9756d807ca07d502307f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-infostealer-to-full-rat-dissecting-the-purera-7934e8b0</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20infostealer%20to%20full%20RAT%3A%20dissecting%20the%20PureRAT%20attack%20chain&amp;severity=medium&amp;id=68e96e4d4338e1ae7d84ca8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11584-sql-injection-in-code-projects-onli-40929b28</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11584%3A%20SQL%20Injection%20in%20code-projects%20Online%20Job%20Search%20Engine&amp;severity=medium&amp;id=68e971f7807ca07d501c4640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62158-cwe-200-exposure-of-sensitive-infor-917267ac</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62158%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20frappe%20lms&amp;severity=low&amp;id=68e96ae14338e1ae7d7efb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11583-sql-injection-in-code-projects-onli-e4197f13</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11583%3A%20SQL%20Injection%20in%20code-projects%20Online%20Job%20Search%20Engine&amp;severity=medium&amp;id=68e96ae14338e1ae7d7efb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11582-sql-injection-in-code-projects-onli-4b63eef0</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11582%3A%20SQL%20Injection%20in%20code-projects%20Online%20Job%20Search%20Engine&amp;severity=medium&amp;id=68e96ae14338e1ae7d7efb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61929-cwe-94-improper-control-of-generati-e750e089</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61929%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CherryHQ%20cherry-studio&amp;severity=critical&amp;id=68e9657bb83e3429f3274514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61927-cwe-94-improper-control-of-generati-630ef7e2</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61927%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20capricorn86%20happy-dom&amp;severity=high&amp;id=68e96415b83e3429f324341a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61925-cwe-470-use-of-externally-controlle-daced5a1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61925%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=68e96415b83e3429f3243537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-an-exploit-shotgun-for-edge-vulns-ee297d14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%3A%20an%20&apos;Exploit%20Shotgun&apos;%20for%20Edge%20Vulns&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-now-offers-2-million-for-zero-click-rce-vuln-925e6c17</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20now%20offers%20%242%20million%20for%20zero-click%20RCE%20vulnerabilities&amp;severity=high&amp;id=68e95d14710816ddd72cdab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-chrome-to-revoke-notification-access-for-in-39d7580d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Chrome%20to%20revoke%20notification%20access%20for%20inactive%20sites&amp;severity=high&amp;id=68e95d14710816ddd72cdab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62245-cwe-352-cross-site-request-forgery--6b3391c3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62245%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e95d32710816ddd72d64df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11581-missing-authorization-in-powerjob-a3cd7e9f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11581%3A%20Missing%20Authorization%20in%20PowerJob&amp;severity=medium&amp;id=68e95d32710816ddd72d64e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-fight-against-ransomware-heats-up-on-the-facto-4c3cf2d7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Fight%20Against%20Ransomware%20Heats%20Up%20on%20the%20Factory%20Floor&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11580-missing-authorization-in-powerjob-c7b3ae0b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11580%3A%20Missing%20Authorization%20in%20PowerJob&amp;severity=medium&amp;id=68e94f461df34bad8db23a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-clickfix-factory-first-exposure-of-iuam-clickf-34f428d5</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20ClickFix%20Factory%3A%20First%20Exposure%20of%20IUAM%20ClickFix%20Generator&amp;severity=medium&amp;id=68e94bbba811ebd3155d19b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23282-cwe-415-double-free-in-nvidia-virtu-4cb39d6a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23282%3A%20CWE-415%20Double%20Free%20in%20NVIDIA%20Virtual%20GPU%20Manager&amp;severity=high&amp;id=68e9484da811ebd31556bed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23280-cwe-416-use-after-free-in-nvidia-ge-b066e491</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23280%3A%20CWE-416%20Use%20After%20Free%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=68e9484da811ebd31556bedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23309-cwe-427-uncontrolled-search-path-el-abe288af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23309%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=68e9484da811ebd31556bee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crimson-collective-a-new-threat-group-observed-ope-10ee0f34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crimson%20Collective%3A%20A%20New%20Threat%20Group%20Observed%20Operating%20in%20the%20Cloud&amp;severity=medium&amp;id=68e94164a46c174737d6e699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11618-cwe-476-null-pointer-dereference-in-0d5832b2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11618%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=68e94174a46c174737d6e772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11617-cwe-126-buffer-over-read-in-aws-fre-779213f2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11617%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=68e94174a46c174737d6e76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11616-cwe-126-buffer-over-read-in-aws-fre-ee6010fd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11616%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20AWS%20FreeRTOS-Plus_TCP&amp;severity=medium&amp;id=68e94174a46c174737d6e76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-payroll-pirates-hijacking-hr-sa-90cc9a30</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20of%20%E2%80%98Payroll%20Pirates%E2%80%99%20Hijacking%20HR%20SaaS%20Accounts%20to%20Steal%20Employee%20Salaries&amp;severity=high&amp;id=68e93e0f811be5ca96d13eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blog-anatomy-of-a-hacktivist-attack-russian-aligne-6ff697f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blog%20Anatomy%20of%20a%20Hacktivist%20Attack%3A%20Russian-Aligned%20Group%20Targets%20OT%2FICS&amp;severity=medium&amp;id=68e93e03811be5ca96d13cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61689-cwe-113-improper-neutralization-of--04169100</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61689%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20JuliaWeb%20HTTP.jl&amp;severity=high&amp;id=68e93a9c811be5ca96ca6d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/feds-shutter-shinyhunters-salesforce-extortion-sit-03a097d1</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Feds%20Shutter%20ShinyHunters%20Salesforce%20Extortion%20Site&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-risks-of-vibe-coding-and-llm-assistants-f-6ccfe02f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20risks%20of%20vibe%20coding%20and%20LLM%20assistants%20for%20developers&amp;severity=medium&amp;id=68e93752ca439c55520f8597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/auth-bypass-flaw-in-service-finder-wordpress-plugi-e76c2598</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Auth%20Bypass%20Flaw%20in%20Service%20Finder%20WordPress%20Plugin%20Under%20Active%20Exploit&amp;severity=high&amp;id=68e933d1ca439c5552087378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48043-cwe-863-incorrect-authorization-in--23695597</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48043%3A%20CWE-863%20Incorrect%20Authorization%20in%20ash-project%20ash&amp;severity=high&amp;id=68e93535ca439c55520b301d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-use-velociraptor-ir-tool-in-ransom-fd66d3f9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Use%20Velociraptor%20IR%20Tool%20in%20Ransomware%20Attacks&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-sees-surge-in-ai-powered-cyberattacks-by-r-687fbec9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20sees%20surge%20in%20AI-Powered%20cyberattacks%20by%20Russia-linked%20Threat%20Actors&amp;severity=medium&amp;id=68e91f6393e1426593c0ee9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-patched-nine-critical-flaws-in-junos-space-a77110eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20patched%20nine%20critical%20flaws%20in%20Junos%20Space&amp;severity=critical&amp;id=68e91f6393e1426593c0ee9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealit-malware-using-nodejs-to-hide-in-fake-game--b5973dad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealit%20Malware%20Using%20Node.js%20to%20Hide%20in%20Fake%20Game%20and%20VPN%20Installers&amp;severity=medium&amp;id=68e9189899b0507a101d806b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deepfake-awareness-high-at-orgs-but-cyber-defenses-8d7f6004</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deepfake%20Awareness%20High%20at%20Orgs%2C%20But%20Cyber%20Defenses%20Badly%20Lag&amp;severity=high&amp;id=68e9af5454cfe91d8fea39b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mid-sized-firms-worried-but-confident-over-deepfak-3901303b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mid-Sized%20Firms%20Worried%20But%20Confident%20Over%20Deepfakes&amp;severity=medium&amp;id=68e9187d99b0507a101d5032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealit-malware-abuses-nodejs-single-executable-fe-303f2e88</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealit%20Malware%20Abuses%20Node.js%20Single%20Executable%20Feature%20via%20Game%20and%20VPN%20Installers&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/living-off-nodejs-addons-f4de520c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Living%20off%20Node.js%20Addons&amp;severity=medium&amp;id=68e918a999b0507a101de8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-gladinet-flaw-exploitation-attacks-o-3d92f1e7</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Gladinet%20Flaw%20Exploitation%2C%20Attacks%20on%20ICS%20Honeypot%2C%20ClayRat%20Spyware&amp;severity=medium&amp;id=68e915809497c34e0b75da4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8887-cwe-639-authorization-bypass-through-d2562d34</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8887%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Usta%20Information%20Systems%20Inc.%20Aybs%20Interaktif&amp;severity=medium&amp;id=68e912159497c34e0b6ebdc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8886-cwe-732-incorrect-permission-assignm-809090ec</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8886%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Usta%20Information%20Systems%20Inc.%20Aybs%20Interaktif&amp;severity=medium&amp;id=68e9137e9497c34e0b718e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-payroll-pirates-hijacking-hr-sa-81ac3c25</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20of%20%E2%80%98Payroll%20Pirates%E2%80%99%20Hijacking%20HR%20SaaS%20Accounts%20to%20Steal%20Employee%20Salaries&amp;severity=high&amp;id=68e9ae2654cfe91d8fe9e2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62237-cwe-79-improper-neutralization-of-i-6818521f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62237%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e901b8fd0dca528e8b9a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-fortinet-palo-alto-networks-devices-targeted-38318fd5</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%2C%20Fortinet%2C%20Palo%20Alto%20Networks%20Devices%20Targeted%20in%20Coordinated%20Campaign&amp;severity=medium&amp;id=68e9019cfd0dca528e8b3eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62238-cwe-79-improper-neutralization-of-i-c24ab4bf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e901b8fd0dca528e8b9a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62239-cwe-79-improper-neutralization-of-i-fdb6ecd9</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e8fe2ffd0dca528e83b21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-takes-exploit-shotgun-approach-dbc1d3da</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20Takes%20%E2%80%98Exploit%20Shotgun%E2%80%99%20Approach&amp;severity=medium&amp;id=68e8f7744fe17e26d4190908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-vector-analysis-250-surge-prom-74811b93</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Attack%20Vector%20Analysis%3A%20250%25%20Surge%20Prompts%20CISA%20Emergency%20Response&amp;severity=critical&amp;id=68e8f7964fe17e26d4199524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-detection-to-patch-fortra-reveals-full-timeli-d569181c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Detection%20to%20Patch%3A%20Fortra%20Reveals%20Full%20Timeline%20of%20CVE-2025-10035%20Exploitation&amp;severity=critical&amp;id=68e9ae2654cfe91d8fe9e2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7374-cwe-863-incorrect-authorization-in-w-bb12706b</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7374%3A%20CWE-863%20Incorrect%20Authorization%20in%20WP%20JobHunt&amp;severity=medium&amp;id=68e8f247395901574383ec06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7781-cwe-79-improper-neutralization-of-in-d00e9554</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7781%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20JobHunt&amp;severity=medium&amp;id=68e8f247395901574383ec0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11579-cwe-789-memory-allocation-with-exce-5b6fc628</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11579%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20nwaples%20rardecode&amp;severity=medium&amp;id=68e8f247395901574383ec03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61864-use-after-free-in-fuji-electric-co--daba407a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61864%3A%20Use%20after%20free%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8ea6230774abc8f786ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11190-cwe-89-improper-neutralization-of-s-251c9d38</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11190%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Synchroweb%20Kiwire&amp;severity=medium&amp;id=68e8ea6230774abc8f786ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11189-cwe-79-improper-neutralization-of-i-df00ef1d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Synchroweb%20Kiwire&amp;severity=high&amp;id=68e8ea6230774abc8f786ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11188-cwe-89-improper-neutralization-of-s-c6ce3745</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11188%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Synchroweb%20Kiwire&amp;severity=high&amp;id=68e8ea6230774abc8f786ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61863-out-of-bounds-read-in-fuji-electric-2a8883e6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61863%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8ea6230774abc8f786ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ai-soc-stack-of-2026-what-sets-top-tier-platfo-85aa321f</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20AI%20SOC%20Stack%20of%202026%3A%20What%20Sets%20Top-Tier%20Platforms%20Apart%3F&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61862-out-of-bounds-read-in-fuji-electric-48460685</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61862%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e768bc5428e10f9f4407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-takes-down-breachforums-portal-used-for-salesf-31fd873a</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20takes%20down%20BreachForums%20portal%20used%20for%20Salesforce%20extortion&amp;severity=high&amp;id=68e8e746bc5428e10f9eb2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61861-out-of-bounds-read-in-fuji-electric-7d539e4b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61861%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e768bc5428e10f9f4403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-lfi-to-rce-active-exploitation-detected-in-gl-07926b0d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20LFI%20to%20RCE%3A%20Active%20Exploitation%20Detected%20in%20Gladinet%20and%20TrioFox%20Vulnerability&amp;severity=high&amp;id=68e8e746bc5428e10f9eb2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/175-malicious-npm-packages-with-26000-downloads-us-d487aae4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=175%20Malicious%20npm%20Packages%20with%2026%2C000%20Downloads%20Used%20in%20Credential%20Phishing%20Campaign&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61860-out-of-bounds-read-in-fuji-electric-7b826e15</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61860%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e3e0bc5428e10f97dccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-grafana-flaw-to-its-known-exploited-v-a38a1860</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Grafana%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68e8e3d0bc5428e10f97838c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61859-out-of-bounds-write-in-fuji-electri-c7cead73</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61859%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e3e0bc5428e10f97dcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61857-out-of-bounds-write-in-fuji-electri-61db863d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61857%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e0e3aec0381be5865212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52625-cwe-525-in-hcl-aion-6be1b91c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52625%3A%20CWE-525%20in%20HCL%20AION&amp;severity=low&amp;id=68e8e0e3aec0381be5865208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61858-out-of-bounds-write-in-fuji-electri-970a60f7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61858%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e0e3aec0381be5865216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-networks-patches-critical-junos-space-vuln-c5afe2ca</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20Networks%20Patches%20Critical%20Junos%20Space%20Vulnerabilities&amp;severity=critical&amp;id=68e8e0c0aec0381be585eef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52624-cwe-1032-in-hcl-aion-80fb7b4b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52624%3A%20CWE-1032%20in%20HCL%20AION&amp;severity=medium&amp;id=68e8e0e3aec0381be5865205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52635-cwe-1032-in-hcl-aion-2ef35cc8</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52635%3A%20CWE-1032%20in%20HCL%20AION&amp;severity=low&amp;id=68e8e0e3aec0381be586520b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61856-stack-based-buffer-overflow-in-fuji-3aa39b11</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61856%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e0e3aec0381be586520e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52632-cwe-614-in-hcl-aion-65282dad</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52632%3A%20CWE-614%20in%20HCL%20AION&amp;severity=medium&amp;id=68e8dd52aec0381be57eb4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37727-cwe-532-insertion-of-sensitive-info-7648d052</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37727%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=68e8da15014f1108aabb06d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52630-cwe-200-exposure-of-sensitive-infor-fb244a51</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52630%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20AION&amp;severity=low&amp;id=68e8da15014f1108aabb06db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ida-tips-for-reversing-u-boot-1093d40e</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IDA%20tips%20for%20reversing%20U-Boot&amp;severity=medium&amp;id=68e8da18014f1108aabb07a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25017-cwe-79-improper-neutralization-of-i-60245127</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25017%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=68e8da15014f1108aabb06d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30001-cwe-279-incorrect-execution-assigne-89232480</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30001%3A%20CWE-279%20Incorrect%20Execution-Assigned%20Permissions%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=high&amp;id=68e8da15014f1108aabb06d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25018-cwe-79-improper-neutralization-of-i-adf76ccf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25018%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=68e8debbaec0381be58193b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zdi-drops-13-unpatched-ivanti-endpoint-manager-vul-235adb03</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZDI%20Drops%2013%20Unpatched%20Ivanti%20Endpoint%20Manager%20Vulnerabilities&amp;severity=low&amp;id=68e8d68e014f1108aab3a90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52634-cwe-200-exposure-of-sensitive-infor-78c30aa3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52634%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20HCL%20AION&amp;severity=low&amp;id=68e8d6b0014f1108aab40a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-emergency-directive-ai-powered-phishing-campa-d846f0fb</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Emergency%20Directive%3A%20AI-Powered%20Phishing%20Campaign%20Analysis%20-%20300%25%20Surge%2C%20%242.3B%20Q3%20Losses&amp;severity=critical&amp;id=68e8d6b3014f1108aab41ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-lfi-to-rce-active-exploitation-detected-in-gl-29e57b73</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20LFI%20to%20RCE%3A%20Active%20Exploitation%20Detected%20in%20Gladinet%20and%20TrioFox%20Vulnerability&amp;severity=low&amp;id=68e9ae2654cfe91d8fe9e2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52650-cwe-1032-in-hcl-hcl-aion-dc72f665</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52650%3A%20CWE-1032%20in%20HCL%20HCL%20AION&amp;severity=high&amp;id=68e8d389cad02c497658ef8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41089-cwe-79-improper-neutralization-of-i-763c9561</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41089%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Xibo%20Signage%20Xibo%20CMS&amp;severity=medium&amp;id=68e8d178cad02c49765494c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41088-cwe-79-improper-neutralization-of-i-325cd76d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Xibo%20Signage%20Xibo%20CMS&amp;severity=medium&amp;id=68e8d178cad02c49765494c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-ai-remembers-too-much-persistent-behaviors-in-0cf1d022</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20AI%20Remembers%20Too%20Much%20%E2%80%93%20Persistent%20Behaviors%20in%20Agents%E2%80%99%20Memory&amp;severity=medium&amp;id=68e8cc54a06d5f7cba036b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-targets-56-flaws-across-30-device--6d9907b5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20targets%2056%20flaws%20across%2030%2B%20device%20types%20worldwide&amp;severity=medium&amp;id=68e8cc54a06d5f7cba036b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52655-cwe-829-inclusion-of-functionality--e291599b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52655%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20HCL%20HCL%20MyXalytics&amp;severity=low&amp;id=68e8cc6ea06d5f7cba03b390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-vietnamese-threat-actors-shift-from-pxa-stealer--6f7821c9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Vietnamese%20threat%20actor&apos;s%20shift%20from%20PXA%20Stealer%20to%20PureRAT&amp;severity=medium&amp;id=68e8c5819fd71783de4a68f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40640-cwe-79-improper-neutralization-of-i-af068634</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40640%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Status%20Tracker%20Energy%20CRM&amp;severity=medium&amp;id=68e8c37b9fd71783de462c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clayrat-a-new-android-spyware-targeting-russia-0c5e5919</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClayRat%3A%20A%20New%20Android%20Spyware%20Targeting%20Russia&amp;severity=medium&amp;id=68e8c5819fd71783de4a68fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-malware-deployed-in-oracle-ebs-zero--fe30ec9f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20Malware%20Deployed%20in%20Oracle%20EBS%20Zero-Day%20Attacks&amp;severity=medium&amp;id=68e8b96063e03efae96a661e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21050-cwe-20-improper-input-validation-in-8592d5e4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21050%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=68e8ad897817465f6ff3a6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cl0p-linked-hackers-breach-dozens-of-organizations-889611b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CL0P-Linked%20Hackers%20Breach%20Dozens%20of%20Organizations%20Through%20Oracle%20Software%20Flaw&amp;severity=low&amp;id=68e9ae2654cfe91d8fe9e2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21070-cwe-787-out-of-bounds-write-in-sams-aef990fd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21070%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff2496e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21069-cwe-125-out-of-bounds-read-in-samsu-ad471782</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21069%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff2496b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21068-cwe-125-out-of-bounds-read-in-samsu-9017e0ca</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21068%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff24968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21067-cwe-125-out-of-bounds-read-in-samsu-83cd3717</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21067%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff24965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21066-cwe-125-out-of-bounds-read-in-samsu-a73b5841</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21066%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff24962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21065-cwe-20-improper-input-validation-in-297d9420</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21065%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Retail%20Mode&amp;severity=medium&amp;id=68e8ab7a7817465f6ff24955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21064-cwe-287-improper-authentication-in--23dba1fd</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21064%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=68e8ab7a7817465f6ff24952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21063-cwe-284-improper-access-control-in--3fc46bc7</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21063%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Voice%20Recorder&amp;severity=medium&amp;id=68e8ab7a7817465f6ff2494f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21062-cwe-327-use-of-a-broken-or-risky-cr-cc37a901</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21062%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=68e8ab7a7817465f6ff2494c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21061-cwe-312-cleartext-storage-of-sensit-d0968596</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21061%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=68e8ab7a7817465f6ff24949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21060-cwe-312-cleartext-storage-of-sensit-b3870fce</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21060%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=68e8ab7a7817465f6ff24946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21059-cwe-285-improper-authorization-in-s-e678590f</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21059%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Health&amp;severity=medium&amp;id=68e8ab7a7817465f6ff24943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21058-cwe-284-improper-access-control-in--d216b3a0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21058%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Routines&amp;severity=high&amp;id=68e8ab7a7817465f6ff24940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21057-cwe-927-use-of-implicit-intent-for--dae6c93b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21057%3A%20CWE-927%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7a7817465f6ff2493d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21055-cwe-125-out-of-bounds-read-in-samsu-5821a4b8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21055%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab7a7817465f6ff2493a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21054-cwe-125-out-of-bounds-read-in-samsu-169621de</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21054%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff2492d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21053-cwe-787-out-of-bounds-write-in-sams-8daa8fe8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21053%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff2492a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21052-cwe-787-out-of-bounds-write-in-sams-71c4da0f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21052%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21051-cwe-787-out-of-bounds-write-in-sams-c2b413c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21051%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21049-cwe-284-improper-access-control-in--6e0198b2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21049%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21048-cwe-23-relative-path-traversal-in-s-95b2beb1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21048%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff2491e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21047-cwe-284-improper-access-control-in--5ce90712</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21047%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff2491b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21046-cwe-284-improper-access-control-in--f05e3fe2</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21046%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=low&amp;id=68e8ab797817465f6ff24918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21045-cwe-922-insecure-storage-of-sensiti-ba49c5b5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21045%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21044-cwe-787-out-of-bounds-write-in-sams-1889ed4c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21044%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10124-cwe-863-incorrect-authorization-in--59c878ff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10124%3A%20CWE-863%20Incorrect%20Authorization%20in%20Booking%20Manager&amp;severity=medium&amp;id=68e8ab7b7817465f6ff24971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11570-cross-site-scripting-xss-in-drupal--db336d05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11570%3A%20Cross-site%20Scripting%20(XSS)%20in%20drupal-pattern-lab%2Funified-twig-extensions&amp;severity=medium&amp;id=68e89b8508dbb565a295228f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11569-directory-traversal-in-cross-zip-54f8c221</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11569&amp;severity=null&amp;id=68e89b8508dbb565a295228a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61871-unquoted-search-path-or-element-in--815d7fdf</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61871%3A%20Unquoted%20search%20path%20or%20element%20in%20BUFFALO%20INC.%20NAS%20Navigator2%20(Windows%20version%20only)&amp;severity=medium&amp;id=68e892fd3eb08f791a703a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11449-cwe-79-improper-neutralization-of-i-1e9afc49</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11449%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ServiceNow%20ServiceNow%20AI%20Platform&amp;severity=medium&amp;id=68e87f2bfb63177606d960e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11450-cwe-79-improper-neutralization-of-i-4b4410fe</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ServiceNow%20ServiceNow%20AI%20Platform&amp;severity=medium&amp;id=68e87f2bfb63177606d960e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-10-f1495105</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-10&amp;severity=medium&amp;id=68e9a25054cfe91d8fdfba08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55903-na-acafc25b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55903%3A%20n%2Fa&amp;severity=high&amp;id=68e9657bb83e3429f3274517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61505-na-66d7fff9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61505%3A%20n%2Fa&amp;severity=medium&amp;id=68e952c11df34bad8db92885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60880-na-2e80506f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60880%3A%20n%2Fa&amp;severity=high&amp;id=68e952c11df34bad8db92882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60838-na-72242219</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60838%3A%20n%2Fa&amp;severity=medium&amp;id=68e94bc9a811ebd3155d6560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60268-na-1fc6e1b5</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60268%3A%20n%2Fa&amp;severity=medium&amp;id=68e949afa811ebd315597ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60308-na-2b892ae6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60308%3A%20n%2Fa&amp;severity=medium&amp;id=68e93a9c811be5ca96ca6d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60269-na-f72f28c0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60269%3A%20n%2Fa&amp;severity=critical&amp;id=68e93a9c811be5ca96ca6d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60306-na-3b85649b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60306%3A%20n%2Fa&amp;severity=critical&amp;id=68e93746ca439c55520f7f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60305-na-8911c90a</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60305%3A%20n%2Fa&amp;severity=high&amp;id=68e92e74956de071395be5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60307-na-364b484b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60307%3A%20n%2Fa&amp;severity=critical&amp;id=68e9261b5488f82d99852e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60869-na-e8db0848</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60869%3A%20n%2Fa&amp;severity=high&amp;id=68e91f8393e1426593c1e515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60378-na-1769f630</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60378%3A%20n%2Fa&amp;severity=high&amp;id=68e91c0c99b0507a10243325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61319-na-b057c892</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61319%3A%20n%2Fa&amp;severity=medium&amp;id=68e912159497c34e0b6ebdcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61152-na-f0e49284</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61152%3A%20n%2Fa&amp;severity=medium&amp;id=68e912159497c34e0b6ebdc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60868-na-0cedec57</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60868%3A%20n%2Fa&amp;severity=medium&amp;id=68e912159497c34e0b6ebdc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62292-cwe-669-incorrect-resource-transfer-914bf3ee</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62292%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20SonarSource%20SonarQube&amp;severity=medium&amp;id=68e8a8b066587de92d235d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61926-cwe-453-insecure-default-variable-i-a908e295</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61926%3A%20CWE-453%3A%20Insecure%20Default%20Variable%20Initialization%20in%20ossf%20allstar&amp;severity=medium&amp;id=68e82b3aba0e608b4fad9ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adaptixc2-uncovered-capabilities-tactics-hunting-s-267686da</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AdaptixC2%20Uncovered%3A%20Capabilities%2C%20Tactics%20%26%20Hunting%20Strategies&amp;severity=medium&amp;id=68e8c5819fd71783de4a68f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62240-cwe-79-improper-neutralization-of-i-0c08a7bb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62240%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e827b1ba0e608b4fad4efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59286-cwe-77-improper-neutralization-of-s-a92d4f5f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59286%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&apos;s%20Business%20Chat&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59272-cwe-77-improper-neutralization-of-s-3db4f965</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59272%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&apos;s%20Business%20Chat&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59271-cwe-285-improper-authorization-in-m-a73c6ff6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59271%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Cache%20for%20Redis%20Enterprise&amp;severity=high&amp;id=68e827b1ba0e608b4fad4ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59252-cwe-77-improper-neutralization-of-s-08cd6b00</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59252%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Word%20Copilot&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55321-cwe-79-improper-neutralization-of-i-baefc863</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55321%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20Monitor&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59247-cwe-269-improper-privilege-manageme-13970598</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59247%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Azure%20PlayFab&amp;severity=high&amp;id=68e827b1ba0e608b4fad4eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59246-cwe-306-missing-authentication-for--a1dd06df</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59246%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59218-cwe-284-improper-access-control-in--bbedc393</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59218%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11558-sql-injection-in-code-projects-e-co-71b772fa</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11558%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68e8243cba0e608b4facfb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11557-sql-injection-in-projectworlds-gate-dc252956</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11557%3A%20SQL%20Injection%20in%20projectworlds%20Gate%20Pass%20Management%20System&amp;severity=medium&amp;id=68e8243cba0e608b4facfb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-says-hackers-breached-all-of-its-firewal-64143b5d</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Says%20Hackers%20Breached%20All%20of%20Its%20Firewall%20Backups&amp;severity=medium&amp;id=68e8242cba0e608b4facfa58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61783-cwe-303-incorrect-implementation-of-26ebadd3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61783%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20python-social-auth%20social-app-django&amp;severity=medium&amp;id=68e8243cba0e608b4facfb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61779-cwe-639-authorization-bypass-throug-17c91dd7</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61779%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20confidential-containers%20trustee&amp;severity=high&amp;id=68e8243cba0e608b4facfb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43296-an-app-may-bypass-gatekeeper-checks-7da254e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43296%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=68e820a9ba0e608b4facc8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34248-cwe-22-improper-limitation-of-a-pat-c75673c3</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34248%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20D-Link%20Nuclias%20Connect&amp;severity=high&amp;id=68e820a9ba0e608b4facc8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11556-sql-injection-in-code-projects-simp-558b652d</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11556%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Leave%20Manager&amp;severity=medium&amp;id=68e87f2bfb63177606d960f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11555-sql-injection-in-campcodes-online-l-08ea1bcd</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11555%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68e87f2bfb63177606d960ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35061-cwe-294-authentication-bypass-by-ca-f055e56e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35061%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Newforma%20Project%20Center&amp;severity=high&amp;id=68e81d27ba0e608b4fac9458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35062-cwe-276-incorrect-default-permissio-e376e4eb</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35062%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d27ba0e608b4fac945c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35060-cwe-79-improper-neutralization-of-i-5d727a61</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35060%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d27ba0e608b4fac9454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35059-cwe-601-url-redirection-to-untruste-5ef79e35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35059%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac9446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35058-cwe-294-authentication-bypass-by-ca-8a5b9147</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35058%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Newforma%20Project%20Center&amp;severity=high&amp;id=68e81d26ba0e608b4fac9442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35057-cwe-294-authentication-bypass-by-ca-0c59a66f</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35057%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac943e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35056-cwe-22-improper-limitation-of-a-pat-b8daada8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35056%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac9439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35055-cwe-22-improper-limitation-of-a-pat-cf9e5914</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35055%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Newforma%20Project%20Center&amp;severity=high&amp;id=68e81d26ba0e608b4fac9434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35054-cwe-922-insecure-storage-of-sensiti-6f82877d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35054%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac9430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35053-cwe-22-improper-limitation-of-a-pat-b486f489</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35053%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac942b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35052-cwe-321-use-of-hard-coded-cryptogra-4b9ce459</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35052%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac9427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35051-cwe-502-deserialization-of-untruste-9727e767</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35051%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Newforma%20Project%20Center&amp;severity=critical&amp;id=68e81d26ba0e608b4fac9422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35050-cwe-502-deserialization-of-untruste-5e60a06b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35050%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Newforma%20Project%20Center&amp;severity=critical&amp;id=68e81d26ba0e608b4fac941c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-targets-56-n-day-flaws-in-worldwid-725411f0</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20botnet%20targets%2056%20n-day%20flaws%20in%20worldwide%20attacks&amp;severity=high&amp;id=68e819a0ba0e608b4fac2f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-healthkick-to-govershell-the-evolution-of-uta-08f1ce17</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20HealthKick%20to%20GOVERSHELL%3A%20The%20Evolution%20of%20UTA0388&apos;s%20Espionage%20Malware&amp;severity=high&amp;id=68e819a0ba0e608b4fac2f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-defender-mistakenly-flags-sql-server-as--cab28825</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Defender%20mistakenly%20flags%20SQL%20Server%20as%20end-of-life&amp;severity=high&amp;id=68e819a0ba0e608b4fac2f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-now-use-velociraptor-dfir-tool-in-ransomwa-f2d906de</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20now%20use%20Velociraptor%20DFIR%20tool%20in%20ransomware%20attacks&amp;severity=high&amp;id=68e819a0ba0e608b4fac2f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11554-insecure-inherited-permissions-in-p-d9df09c4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11554%3A%20Insecure%20Inherited%20Permissions%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68e87f2bfb63177606d960f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-copilot-camoleak-ai-attack-exfiltrates-data-70b57452</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Copilot%20&apos;CamoLeak&apos;%20AI%20Attack%20Exfiltrates%20Data&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11553-sql-injection-in-code-projects-cour-f06fb15c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11553%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=68e80f15ba0e608b4fab452c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-100-of-firewall-backups-were-breached-e058c43c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%3A%20100%25%20of%20Firewall%20Backups%20Were%20Breached&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11552-sql-injection-in-code-projects-onli-46b30e35</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11552%3A%20SQL%20Injection%20in%20code-projects%20Online%20Complaint%20Site&amp;severity=medium&amp;id=68e80b92ba0e608b4fab12d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59146-cwe-918-server-side-request-forgery-83379e96</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59146%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=68e8080dba0e608b4faad9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4615-cwe-83-improper-neutralization-of-sc-c65ded9c</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4615%3A%20CWE-83%20Improper%20Neutralization%20of%20Script%20in%20Attributes%20in%20a%20Web%20Page%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=68e8048eba0e608b4faa7cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4614-cwe-497-exposure-of-sensitive-system-0c62414a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4614%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=68e80105ba0e608b4fa9e3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11551-sql-injection-in-code-projects-stud-20222a84</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11551%3A%20SQL%20Injection%20in%20code-projects%20Student%20Result%20Manager&amp;severity=medium&amp;id=68e7fd81ba0e608b4fa9648d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11550-null-pointer-dereference-in-tenda-w-df0770d8</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11550%3A%20NULL%20Pointer%20Dereference%20in%20Tenda%20W12&amp;severity=high&amp;id=68e7fd81ba0e608b4fa96486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11573-cwe-1286-improper-validation-of-syn-0140b7b1</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11573%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Amazon%20Amazon.IonDotnet&amp;severity=high&amp;id=68e7fa08ba0e608b4fa8ce46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-tiktok-and-whatsapp-apps-infect-android-devic-078d8374</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20TikTok%20and%20WhatsApp%20Apps%20Infect%20Android%20Devices%20with%20ClayRat%20Spyware&amp;severity=medium&amp;id=68e7f2f6ba0e608b4fa56cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11549-stack-based-buffer-overflow-in-tend-c807d3f8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11549%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W12&amp;severity=high&amp;id=68e7ebf3ba0e608b4fa3cf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-actively-exploiting-critical-vulnerabili-8f864e3b</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Actively%20Exploiting%20Critical%20Vulnerability%20in%20Service%20Finder%20Bookings%20Plugin&amp;severity=medium&amp;id=68e7ebe2ba0e608b4fa3ca04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11371-vulnerability-in-gladinet-centresta-a1700cc1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11371%3A%20Vulnerability%20in%20Gladinet%20CentreStack%20and%20TrioFox&amp;severity=high&amp;id=68e7ebf3ba0e608b4fa3cf85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-crown-prince-nezha-a-new-tool-favored-by-china-c9178a46</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Crown%20Prince%2C%20Nezha%3A%20A%20New%20Tool%20Favored%20by%20China-Nexus%20Threat%20Actors&amp;severity=medium&amp;id=68e7ebe2ba0e608b4fa3c9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60010-cwe-262-not-using-password-aging-in-236c7b3f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60010%3A%20CWE-262%20Not%20Using%20Password%20Aging%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60009-cwe-79-improper-neutralization-of-i-c54ce2e8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60009%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60006-cwe-78-improper-neutralization-of-s-fb295dfd</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60006%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60004-cwe-754-improper-check-for-unusual--3f09ce38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60004%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68e7e4e6ba0e608b4fa29d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60002-cwe-79-improper-neutralization-of-i-cdf6c715</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60002%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60001-cwe-79-improper-neutralization-of-i-33b53c5b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60001%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60000-cwe-79-improper-neutralization-of-i-0eea9f8f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59999-cwe-79-improper-neutralization-of-i-fa4572f4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59999%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59998-cwe-79-improper-neutralization-of-i-8afc3ad4</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59998%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59997-cwe-79-improper-neutralization-of-i-fc2d6ca1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59996-cwe-79-improper-neutralization-of-i-6fa27740</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59996%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59995-cwe-79-improper-neutralization-of-i-31adce3e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59995%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59994-cwe-79-improper-neutralization-of-i-ef10b87c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59993-cwe-79-improper-neutralization-of-i-6f19958f</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59993%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59992-cwe-79-improper-neutralization-of-i-4170f2e7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59992%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59991-cwe-79-improper-neutralization-of-i-30cde6d7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59991%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59990-cwe-79-improper-neutralization-of-i-e77d949d</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59990%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59989-cwe-79-improper-neutralization-of-i-5b996997</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59988-cwe-79-improper-neutralization-of-i-2084cf62</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59987-cwe-79-improper-neutralization-of-i-dc524c1b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59986-cwe-79-improper-neutralization-of-i-68c7191e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59985-cwe-79-improper-neutralization-of-i-e84ad20c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59984-cwe-79-improper-neutralization-of-i-77a7df38</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59984%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59983-cwe-79-improper-neutralization-of-i-59c161f1</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59982-cwe-79-improper-neutralization-of-i-041a2d7e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59982%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59981-cwe-79-improper-neutralization-of-i-d7b29ef9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59981%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59980-cwe-305-authentication-bypass-by-pr-d4ff9bc7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59980%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59978-cwe-79-improper-neutralization-of-i-b40549f3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59978%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=critical&amp;id=68e7e163ba0e608b4fa1e471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59976-cwe-552-files-or-directories-access-c3bd5f23</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59976%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7dde2ba0e608b4fa12b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59975-cwe-400-uncontrolled-resource-consu-419ca762</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59975%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=high&amp;id=68e7dde2ba0e608b4fa12b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59974-cwe-79-improper-neutralization-of-i-9b8f8a8b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59974%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space%20Security%20Director&amp;severity=high&amp;id=68e7dde2ba0e608b4fa12b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59968-cwe862-missing-authorization-in-jun-8ba387c6</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59968%3A%20CWE%E2%80%91862%3A%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20Space%20Security%20Director&amp;severity=high&amp;id=68e7dde2ba0e608b4fa12b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-analysis-of-a-medical-device-methods-and--51827958</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Analysis%20of%20a%20medical%20device%3A%20Methods%20and%20Findings&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59967-cwe-476-null-pointer-dereference-in-fca82f20</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59967%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68e7dde2ba0e608b4fa12b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59964-cwe-908-use-of-uninitialized-resour-72f413ea</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59964%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68e7da5fba0e608b4fa05bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10284-cwe-22-improper-limitation-of-a-pat-4e343310</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10284%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BLSOPS%2C%20LLC%20bbot&amp;severity=critical&amp;id=68e7da5eba0e608b4fa05b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10283-cwe-22-improper-limitation-of-a-pat-efceffeb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10283%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BLSOPS%2C%20LLC%20bbot&amp;severity=critical&amp;id=68e7da5eba0e608b4fa05b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10282-cwe-200-exposure-of-sensitive-infor-12c1764b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10282%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20BLSOPS%2C%20LLC%20bbot&amp;severity=medium&amp;id=68e7da5eba0e608b4fa05b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10281-cwe-200-exposure-of-sensitive-infor-8d07250b</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10281%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20BLSOPS%2C%20LLC%20bbot&amp;severity=medium&amp;id=68e7da5eba0e608b4fa05b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59962-cwe-824-access-of-uninitialized-poi-fbffa826</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59962%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59958-cwe-754-improper-check-for-unusual--b40dc879</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59958%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59957-cwe-346-origin-validation-error-in--82d4676d</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59957%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52961-cwe-400-uncontrolled-resource-consu-be110863</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52961%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68e7da5eba0e608b4fa05b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52960-cwe-120-buffer-copy-without-checkin-6893900a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52960%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7da5eba0e608b4fa05b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11198-cwe-306-missing-authentication-for--5ec89938</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11198%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Security%20Director%20Policy%20Enforcer&amp;severity=high&amp;id=68e7da5eba0e608b4fa05b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-says-hackers-stole-70000-government-id-pho-e0c029d2</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20Says%20Hackers%20Stole%2070%2C000%20Government%20ID%20Photos%2C%20Dismisses%20Extortion%20Claims&amp;severity=medium&amp;id=68e7d6d4ba0e608b4f9f9ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-clayrat-spyware-targets-android-users-via-fake-428db3a3</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ClayRat%20Spyware%20Targets%20Android%20Users%20via%20Fake%20WhatsApp%20and%20TikTok%20Apps&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39664-cwe-22-improper-limitation-of-a-pat-5f421917</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39664%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=68e7cfcdba0e608b4f9eb509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32919-cwe-427-uncontrolled-search-path-el-2c1bda5e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32919%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=68e7cfcdba0e608b4f9eb506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32916-cwe-598-use-of-get-request-method-w-8543614d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32916%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=low&amp;id=68e7cfcdba0e608b4f9eb503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-cpu-spikes-to-defense-b0ff69cb</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20CPU%20Spikes%20to%20Defense&amp;severity=high&amp;id=68e7c8ecba0e608b4f9e1ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/take-note-cyber-risks-with-ai-notetakers-7818be46</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Take%20Note%3A%20Cyber-Risks%20With%20AI%20Notetakers&amp;severity=medium&amp;id=68e7c1b4ba0e608b4f9cd844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36171-cwe-770-allocation-of-resources-wit-81125b68</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36171%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=68e7c1d2ba0e608b4f9cd95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36225-cwe-203-observable-discrepancy-in-i-b35a534e</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36225%3A%20CWE-203%20Observable%20Discrepancy%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=68e7c1d2ba0e608b4f9cd963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37401-cwe-942-overly-permissive-cross-dom-dc8b4f2b</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37401%3A%20CWE-942%20Overly%20Permissive%20Cross-domain%20Whitelist%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=68e7c1d2ba0e608b4f9cd960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-access-sonicwall-cloud-firewall-backups-sp-58f51ccc</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Access%20SonicWall%20Cloud%20Firewall%20Backups%2C%20Spark%20Urgent%20Security%20Checks&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11561-improper-privilege-management-in-re-4598bc8c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11561%3A%20Improper%20Privilege%20Management&amp;severity=high&amp;id=68e7be44ba0e608b4f9c42d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-your-car-from-hacking-kaspersky-off-6f51ff48</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20your%20car%20from%20hacking%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e7bacaba0e608b4f9be812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62228-cwe-89-improper-neutralization-of-s-e620fd97</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62228%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Flink%20CDC&amp;severity=medium&amp;id=68e7b744ba0e608b4f9b9a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/your-shipment-notification-is-now-a-malware-droppe-0dd9875c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Your%20Shipment%20Notification%20Is%20Now%20a%20Malware%20Dropper&amp;severity=medium&amp;id=68e7b732ba0e608b4f9b9961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/all-sonicwall-cloud-backup-users-have-firewall-con-56794710</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=All%20SonicWall%20Cloud%20Backup%20Users%20Have%20Firewall%20Configuration%20Files%20Sto&amp;severity=high&amp;id=68e7b3acba0e608b4f9b07fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacktivists-target-critical-infrastructure-hit-dec-3eca830e</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacktivists%20target%20critical%20infrastructure%2C%20hit%20decoy%20plant&amp;severity=critical&amp;id=68e7b3acba0e608b4f9b07f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10240-cwe-79-improper-neutralization-of-i-21cf3f4a</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10240%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=68e7b3ceba0e608b4f9b09a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10239-cwe-78-improper-neutralization-of-s-5ca3d8a0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10239%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=68e7b3ceba0e608b4f9b09a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ms-teams-hack-mfa-hijacking-2b-c91c315f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20MS%20Teams%20Hack%2C%20MFA%20Hijacking%2C%20%242B%20Crypto%20Heist%2C%20Apple%20Siri%20Probe%20%26%20More&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chaos-c-ransomware-targets-windows-by-wiping-d-e83913b7</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Chaos-C%2B%2B%20Ransomware%20Targets%20Windows%20by%20Wiping%20Data%20and%20Stealing%20Crypto&amp;severity=medium&amp;id=68e7a21cba0e608b4f97fa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/saas-breaches-start-with-tokens-what-security-team-74939a23</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SaaS%20Breaches%20Start%20with%20Tokens%20-%20What%20Security%20Teams%20Must%20Watch&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9371-cwe-79-improper-neutralization-of-in-4c04bd5c</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9371%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MuffinGroup%20Betheme&amp;severity=medium&amp;id=68e7a23bba0e608b4f980fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10249-cwe-23-relative-path-traversal-in-r-c538971d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10249%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Revolution%20Slider%20Slider%20Revolution&amp;severity=medium&amp;id=68e7a23aba0e608b4f980f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-copilot-chat-flaw-leaked-data-from-private--337a6fd8</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Copilot%20Chat%20Flaw%20Leaked%20Data%20From%20Private%20Repositories&amp;severity=low&amp;id=68e7962d253d340dd454117b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-denies-massive-breach-confirms-limited-exp-418662e3</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20denies%20massive%20breach%2C%20confirms%20limited%20exposure%20of%2070K%20ID%20photos&amp;severity=high&amp;id=68e7896301b7ab9c73bf525a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-teams-installers-dropping-oyster-backdoor-aka-9f074269</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Teams%20Installers%20Dropping%20Oyster%20Backdoor%20(aka%20Broomstick)%20in%20New%20Malvertising%20Scam&amp;severity=medium&amp;id=68e7896301b7ab9c73bf525e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chaos-ransomware-upgrades-with-aggressive-new-c-va-05a0671f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chaos%20Ransomware%20Upgrades%20With%20Aggressive%20New%20C%2B%2B%20Variant&amp;severity=medium&amp;id=68e9af5554cfe91d8fea39c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-breached-law-firm-williams-connoll-3fd757ff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Breached%20Law%20Firm%20Williams%20%26%20Connolly%20via%20Zero-Day&amp;severity=medium&amp;id=68e785c7d7a0c363cfd4ac17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-filefix-attack-uses-cache-smuggling-to-evade-s-d514c0a9</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20FileFix%20attack%20uses%20cache%20smuggling%20to%20evade%20security%20software&amp;severity=high&amp;id=68e78275d7a0c363cfd10a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-claim-discord-breach-exposed-data-of-55-mi-443ebeea</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20claim%20Discord%20breach%20exposed%20data%20of%205.5%20million%20users&amp;severity=high&amp;id=68e78275d7a0c363cfd10a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-phishing-to-malware-ai-becomes-russias-new-cy-eaec2470</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Phishing%20to%20Malware%3A%20AI%20Becomes%20Russia&apos;s%20New%20Cyber%20Weapon%20in%20War%20on%20Ukraine&amp;severity=medium&amp;id=68e7923401b7ab9c73cb0c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/all-sonicwall-cloud-backup-users-had-firewall-conf-f26c39c6</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=All%20SonicWall%20Cloud%20Backup%20Users%20Had%20Firewall%20Configurations%20Stolen&amp;severity=medium&amp;id=68e7745d6b49b1a4209508f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10862-cwe-89-improper-neutralization-of-s-c48468d9</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10862%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=high&amp;id=68e772546b49b1a420925e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-says-70000-users-had-ids-exposed-in-recent-a6300222</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20Says%2070%2C000%20Users%20Had%20IDs%20Exposed%20in%20Recent%20Data%20Breach&amp;severity=medium&amp;id=68e76d22f5254f629ab65abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11522-cwe-288-authentication-bypass-using-18ab30f9</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11522%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Elated-Themes%20Search%20%26%20Go%20-%20Directory%20WordPress%20Theme&amp;severity=critical&amp;id=68e766774454a62ee99e89df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11539-cwe-94-improper-control-of-generati-e55386f6</loc>
    <lastmod>2026-05-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11539%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Grafana%20grafana-image-renderer&amp;severity=critical&amp;id=68e762fe4454a62ee9978f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-exploit-lets-hackers-bypass-authenticatio-88280a13</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Exploit%20Lets%20Hackers%20Bypass%20Authentication%20in%20WordPress%20Service%20Finder%20Theme&amp;severity=critical&amp;id=68e782118736dec42f6616fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7634-cwe-98-improper-control-of-filename--733a6ee0</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7634%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Tour%20Booking%20Plugin%20%E2%80%93%20Tour%20Operator%20Software&amp;severity=critical&amp;id=68e74b345132fb26fe2091fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7526-cwe-22-improper-limitation-of-a-path-df768a4c</loc>
    <lastmod>2026-05-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7526%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Tour%20Booking%20Plugin%20%E2%80%93%20Tour%20Operator%20Software&amp;severity=critical&amp;id=68e74b345132fb26fe2091f7</image:loc>
    </image:image>
  </url>
</urlset>